Hi [[ session.user.profile.firstName ]]

Information Technology

  • Defending Against Today's Sophisticated Attacks on Healthcare Organisations
    Defending Against Today's Sophisticated Attacks on Healthcare Organisations
    Axel Wirth, Distinguished Healthcare Architect Recorded: Dec 12 2018 67 mins
    In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.

    Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:

    • The latest threat trends and incidents
    • The challenges of securing healthcare ecosystems
    • Effective cybersecurity strategies
  • Monitoring and Managing Ceph with openATTIC
    Monitoring and Managing Ceph with openATTIC
    Tim Serong, SUSE Recorded: Dec 12 2018 42 mins
    openATTIC is a web-based management and monitoring tool for Ceph storage clusters. This webinar covers the functionality available in the most recent release, including performance graphs, node and disk monitoring, along with storage and gateway service management.
  • It’s almost Breach Season… Are You Prepared?
    It’s almost Breach Season… Are You Prepared?
    Ron Pelletier, Founder, Ponderance Recorded: Dec 11 2018 40 mins
    Hacking is a lucrative business. Like any other line of work, there are business drivers that lead to natural surges in activity. Just as retailers rely on holiday shopping season to remain in the black, malicious actors are spending time right now gearing up for Breach Season. Pondurance research shows a massive uptick in intrusions during the months of February-April, in some cases, 80-90%. This means now is the time that hackers are busy doing reconnaissance and infiltrating networks.

    Pondurance Founder Ron Pelletier will discuss:
    · Breach Season basics: who is affected and what to expect
    · The main drivers causing the intrusions and breaches?
    · Pre-season tactics and strategies to prepare
    · What companies can do to reduce the likelihood of occurrence
    · Review of last year’s top threats and predictions for 2019

    Ron Pelletier, Founder, Pondurance
    With more than 17 years of information security and business continuity experience, Pondurance Founder Ron Pelletier brings seasoned expertise in all areas of risk advisory, incident response and forensic investigations. His training as a U.S. Army commissioned officer equipped him with problem-solving and risk analysis capabilities well-suited for the tech world. His vast experience in enterprise risk and security includes a wide range of industries and organizations ranging from Fortune 500 to small, non-profit groups.

    Ron is certified in multiple disciplines relating to information and asset protection including Certified Information Systems Security Professional (CISSP), Certified Information Systems Security Manager (CISM), Certified Business Continuity Professional (CBCP), Certified Information Systems Auditor (CISA), Certified Computer Forensics Examiner (CCFE), and Certified Ethical Hacker (CEH).
  • Facing Forward: Cyber Security in 2019 and Beyond
    Facing Forward: Cyber Security in 2019 and Beyond
    Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Dec 11 2018 57 mins
    As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.

    Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye Threat Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:

    •Threats to the aviation industry, including cyber espionage and cybercrime
    •What to expect from established and emerging nation states
    •How threat actors are changing their tactics to stay ahead of defenders

    Register today to learn what lies ahead and stay one step ahead of cyber security threats.
  • Optimizing BI Workloads with Pepperdata
    Optimizing BI Workloads with Pepperdata
    Pepperdata Recorded: Dec 11 2018 36 mins
    BI workloads are an increasingly important part of your big data system and typically consist of large queries that analyze huge amounts of data. Because of this, BI users frequently complain about the responsiveness of their applications.

    Learn how Pepperdata enables you to tune your big data system and applications to meet SLAs for critical BI workloads.
  • Get Ready for 2019: Top Cybersecurity Trends
    Get Ready for 2019: Top Cybersecurity Trends
    Nathan Rowe, Chief Product Officer, Evident Recorded: Dec 11 2018 45 mins
    2018 was an important year for cybersecurity and privacy. The General Data Protection Regulation (GDPR) went into effect and the California Consumer Privacy Act (CaCPA) passed amid a flurry of high-profile cyber attacks.

    While some organizations have prioritized compliance with the aforementioned regulations to prevent further damage and secure their reputations, others have simply treated them as suggestions for best practice, and have not yet implemented comprehensive processes and infrastructure to thwart cyber attacks and data breaches.

    Such a broad discrepancy in how companies are tackling their cybersecurity and data protection efforts begs the question: What will happen next year?

    In this webinar, we’ll discuss cybersecurity trends for 2019, with a focus on best practice recommendations as well as preventative measures that organizations can implement to protect themselves, their employees, and their customers from risk.

    Trend Topics
    - Cyber attacks powered by Artificial Intelligence (AI)
    - Data security risks associated with high-velocity employment (gig/share economy)
    - GDPR, CaCPA, and other regulatory impacts on cybersecurity and compliance
    - End-to-end integrations for identity proofing and authentication
    - Security by Design and by Default
  • How to Avoid Internal Friction When Expanding Service Management
    How to Avoid Internal Friction When Expanding Service Management
    Sean Sebring and Jason Yeary Recorded: Dec 11 2018 54 mins
    Sean Sebring is an IT Process Improvement Manager who used his service management platform as a vehicle to improve business processes throughout the organization. In fact, over 50% of licensed agents in his organization are outside of IT. In this webinar, he'll cover:

    - How to create buy-in from stakeholders
    - How to work "on the schedule of the business"
    - How to drive process improvement in IT and beyond
  • The Future of Federal Analytics
    The Future of Federal Analytics
    Nextgov | Underwritten by: Cloudera Recorded: Dec 11 2018 64 mins
    Applying Disruptive Tech in Your Agency
  • Emerging Memory Poised to Explode
    Emerging Memory Poised to Explode
    Moderator: Alex McDonald, SNIA SSSI Co-Chair; Presenters: Tom Coughlin, Coughlin Associates & Jim Handy, Objective Analysis Recorded: Dec 11 2018 58 mins
    Join SSSI members and respected analysts Tom Coughlin and Jim Handy for a look into their new Emerging Memory and Storage Technologies Report. Tom and Jim will examine emerging memory technologies and their interaction with standard memories, how a new memory layer improves computer performance, and the technical advantages and economies of scale that contribute to the enthusiasm for emerging memories. They will provide an outlook on market projections and enabling and driving applications. The webcast is the perfect preparation for the 2019 SNIA Persistent Memory Summit January 24, 2019.
  • SOAR to Security Automation Quick Wins (and Measure the SecOps ROI)
    SOAR to Security Automation Quick Wins (and Measure the SecOps ROI)
    Mike Rothman, President & Analyst, Securosis and Stan Engelbrecht, Director of Cyber Security, D3 Security Recorded: Dec 11 2018 63 mins
    D3 Security and Securosis Present: SOAR to Security Automation Quick Wins (and Measure the SecOps ROI)

    There isn't enough time or skilled resources to stay on top of all your security operations responsibilities. You can't work harder, so you'll need to work smarter. That means embracing Security Orchestration, Automation and Response (SOAR) technology as a means to make your team more efficient and effective.

    But where do you start? Do you have to blow up your existing operational processes to use a SOAR tool? How can you select the best tool for YOUR environment? How easy is it to integrate the tool with your existing controls? Are you saving money? As you can see, there are many questions to answer for those looking at security automation.

    In this webcast, Securosis president and analyst Mike Rothman and D3 director of cyber security Stan Engelbrecht will give you a wealth of tips for how to select, deploy and operate SOAR, so that you can keep pace with the attacks on your environment. You'll learn:

    • Unfiltered SOAR platform selection criteria from Securosis president and analyst Mike Rothman
    • Security automation use cases that provide a quick win without losing sight of long-term value
    • Product and service integrations that automate IR and yield the most SecOps impact
    • How to substantiate the ROI of your SOAR investment through time and cost tracking

    The webcast will be focused on providing knowledge you can use RIGHT NOW, including use case "blueprints" and business outcomes from real-world SOAR implementations.
  • Using NFS with Object Storage
    Using NFS with Object Storage
    John Bell, Sr. Consultant and Michael “Q” Brame, Quality Engineering Lead Recorded: Dec 11 2018 31 mins
    Do you need to securely store data and access it via NFS? In this webinar, John Bell and Michael Brame will discuss using NFS with object storage and explain how this has been handled by traditional file-to-object gateways. They will also do a live demo of Caringo SwarmNFS—the first lightweight file protocol converter to bring the benefits of scale-out object storage to NFSv4, seamlessly integrating files and object storage.
  • The Future of Work: Under the hood with Dropbox Business
    The Future of Work: Under the hood with Dropbox Business
    Dropbox Product Managers and Product Marketing Managers Recorded: Dec 11 2018 28 mins
    Here at Dropbox, we take your work seriously. That’s why we build products that help you get your best work done. Now, for the first time, we’re giving you an inside look at how customer feedback and user research are helping us take the work out of work.

    Watch our three-part webinar series to hear how we build easy-to-use products for:

    Part 1: Mobile work. How do we design a mobile app that lets people get real work done on the go—without creating an expectation of round-the-clock responsiveness? Hear the research behind our latest mobile app and insights on the future of mobile work.

    Part 2: Unblocking workflows with Dropbox previews. You might not always have the right software needed to open and view your files. At Dropbox we solved this problem for our users with a best-in-class previews platform. Even if you work with massive design and media files, we’ve got you covered.

    Part 3: Coordinating work with timelines in Dropbox Paper. The nature of teamwork is changing. Increasingly, coordination is a part of everyone’s job. That’s why we built Dropbox Paper, a collaborative workspace that brings collaboration and coordination together. Learn how we approach the work of managing work with timelines, Paper's newest feature.
  • Stream Video to Your Global Users Securely and Confidently
    Stream Video to Your Global Users Securely and Confidently
    Derek Yee, PMM, Cloudflare | Cavin Kindsvogel, Stream Product Specialist, Cloudflare | Jon Levine, Stream PM, Cloudflare Recorded: Dec 11 2018 31 mins
    CDNs have played a significant role in successful video delivery, especially across OTT services, publishing, ad tech, gaming, and sporting sites. Cloudflare is building a better Internet, which includes delivering a fast, secure and reliable video experience for consumers anywhere in the world. Cloudflare offers a high performing distribution network that can meet the evolving needs of companies delivering video.

    Join us for this 45-minute webinar where we cover the following:

    - The foundations of building a resilient network to support high traffic video content
    - Advances in Cloudflare’s caching infrastructure for better streaming performance
    - How Cloudflare Workers provides video providers increased control of content distribution and visibility to user analytics
  • 5 Steps to Defeat Most Cyber Attacks
    5 Steps to Defeat Most Cyber Attacks
    Chris Goettl, Director of Product Management for Security at Ivanti Recorded: Dec 11 2018 41 mins
    Since WannaCry changed the game in June 2017, cyber threats have continued evolve in intent and consequences. How can you protect your organization from today’s sophisticated attacks designed to have such a critical impact? You must prioritize risk.

    Join Chris Goettl, Director of Product Management for Security at Ivanti, as he looks at how attacks today are getting into networks, the damage they’ve done, and how focusing on the right threat vectors can go a long way toward protecting your organization from a similar fate.
  • What’s New in Network Operations Management
    What’s New in Network Operations Management
    Jon Kies, Product Marketing Manager and Nisarg Shah, Product Management Director, Micro Focus Recorded: Dec 11 2018 62 mins
    Join us for an exciting and informative look at the latest release of Micro Focus Network Operations Management.

    Network Operations Management (NOM)—the leading management tool for enterprise networks—is built on the core capabilities of Network Node Manager I and Network Automation. It integrates fault, performance, configuration, and compliance of physical, virtual, wireless, and software-defined network infrastructures.

    Learn about NOM’s latest enhancements for diagnostic analytics, the scheduled out-of-service feature, integration with Micro Focus Operations Bridge, and more.

    You will also get a sneak preview of the new NOMX User Interface—our next-generation customizable and persona-based experience that unifies network data from monitoring, automation, compliance, and orchestration into actionable insights.
  • Will You Still Love Me When I Turn 64GFC?
    Will You Still Love Me When I Turn 64GFC?
    Dean Wallace, Marvell; Barry Maskas, HPE Recorded: Dec 11 2018 50 mins
    Fibre Channel’s speed roadmap defines a well-understood technological trend: the need to double the bit rate in the channel without doubling the required bandwidth.

    In order to do this, PAM4 (pulse-amplitude modulation, with four levels of pulse modulation), enters the Fibre Channel physical layer picture. With the use of four signal levels instead of two, and with each signal level corresponding to a two-bit symbol, the standards define 64GFC operation while maintaining backward compatibility with 32GFC and 16GFC.

    This advanced technical session will cover the T11 standards which define 64GFC serial Fibre Channel, backwards speed auto-negotiation compatibility, and compatible form factors:

    •New physical layer and specification challenges for PAM4, which includes eye openings, crosstalk sensitivity, and new test methodologies and parameters
    •Transceivers, their form factors, and how 64GFC maintains backward compatibility with multi-mode fibre cable deployments in the data center, including distance specifications
    •Discussion of protocol changes, and an overview of backward-compatible link speed and forward error correction (FEC) negotiation
    •The FCIA’s Fibre Channel speed roadmap and evolution, and new technologies under consideration
  • Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Kevin Haley, Director Security Response, Symantec Recorded: Dec 11 2018 48 mins
    Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.

    Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.

    Key Learning Objectives:

    • Insights on cryptojacking, fileless threats and ransomware
    • Capabilities you need to protect yourself from these threats
    • Best practices for more efficient and effective endpoint security

    Please Join Us, Register Today
  • Best Practices for Cloud Deployment
    Best Practices for Cloud Deployment
    Natalie Fisher, senior product manager Recorded: Dec 11 2018 30 mins
    Cloud BI brings the promise of increased productivity and operational efficiency—and chances are high that sooner or later you will face a cloud migration. If you are thinking about moving your on-premises analytics deployment to the cloud, or starting your journey directly in the cloud and don't know where to begin, this session is for you. We will cover useful best practices for cloud deployment of TIBCO Spotfire®, including where to start and what you need to know about transitioning to the cloud.
  • [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    Arun Trivedi, Partner, Wipro and Kelly Harris, Senior Content Manager, BrightTALK Recorded: Dec 11 2018 49 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Service monetization is sometimes a competitive differentiator or an answer to disruptive competitors. Irrespective of the reason for transformation, service monetization provides a great platform to model business models to improve customer retention and increase revenue in the longer term.

    This session will provide participants with an understanding of service monetization challenges and how companies can transform their overall business process and quote to revenue in particular.

    Join Arun Trivedi, Partner, Wipro Technologies and Kelly Harris, Senior Content Manager, BrightTALK for a live discussion on service monetization and revenue streams from XaaS.
  • Компонуемый ЦОД: Кинетическая Инфраструктура в действии
    Компонуемый ЦОД: Кинетическая Инфраструктура в действии
    Кирилл Сорокин, Системный инженер Dec 12 2018 8:00 am UTC 60 mins
    Новое поколение ЦОД состоит из пулов ИТ-ресурсов с разделяемым доступом: вычислительные мощности, ресурсы хранения и сетевые фабрики могут быть доступны любой задаче по запросу. Узнайте как Кинетическая Инфраструктура PowerEdge MX, первое модульное решение спроектированное для построения компонуемых ЦОД, позволяет создать легко изменяемую ИТ-среду, повысить уровень утилизации ИТ-ресурсов и обеспечить защиту инвестиций.
  • Plug & Play: Die neue Leichtigkeit des Backups
    Plug & Play: Die neue Leichtigkeit des Backups
    Frank Blasa und Wolfgang Sowarsch Dec 12 2018 9:00 am UTC 30 mins
    Halten Sie noch immer Ausschau nach einer mächtigen, Cloud-ähnlichen Backup-Lösung, die aber auch mächtig flexibel und mächtig einfach ist? Sozusagen „Plug & Play“? Einfach Stecker rein, und es wird automatisch installiert. Linear skalierbar, fehlertolerant, selbstheilend und Cloud-ähnlich.

    Nehmen Sie sich einen Café und 20 Minuten Zeit, um in unserem Webinar mehr über die neue Leichtigkeit des Backups zu erfahren. Sie werden sehen: Mit einer super-einfachen „All-in-one“-Appliance auf Scale-out-Basis können Sie sich beruhigt anderen Aufgaben widmen.
  • Transparenz, Wissen und Kontrolle für Ihr Sicherheitsökosystem
    Transparenz, Wissen und Kontrolle für Ihr Sicherheitsökosystem
    Silvan Noll Dec 12 2018 9:00 am UTC 60 mins
    Die Sicherheit von Unternehmen zu managen und auf Cyber-Ereignisse zu reagieren sind große operative Herausforderungen. Unzureichende Transparenz und mangelndes Wissen über diese Risiken innerhalb der Netzwerk-Fabric verschärfen das Problem noch weiter.

    In diesem Webinar erläutern wir, wie eine ganzheitliche Orchestrierung der Sicherheitsinfrastruktur gelingt. Sie lernen intelligentere Sicherheitsregeln und -kontrollen kennen, um alle Sicherheits-, Compliance- und Verfügbarkeitsanforderungen der Netzwerkumgebung sicherzustellen. Außerdem erfahren Sie, wie Sie:

    • Single Sign-on(SSO)-Zugriff gewährleisten, um Netzwerk-, Endgeräte- und Cloud-Security Services bereitzustellen und zu verwalten.
    • ganze Sicherheitsprozesse und -services von einer einfachen, gemeinsamen Cloud-Benutzeroberfläche aus verwalten.
    • eine zentrale Übersicht und situativ angepasste Informationen zur Sicherheitsumgebung des Netzwerks gewinnen.
    • eine fehlerfreie Regelverwaltung erreichen.
    • Firewalls remote mithilfe der Cloud implementieren und bereitstellen.
  • AWS Security: Securing AWS Workloads with Palo Alto Networks
    AWS Security: Securing AWS Workloads with Palo Alto Networks
    Dinah Barrett, Specialist Solutions Architect, AWS Marketplace & David Maclean, Cloud Engineer, Palo Alto Networks Dec 12 2018 9:30 am UTC 60 mins
    Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing.

    In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS
    and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.
  • The Ghost in the Machine: Who Will Win the AI Race?
    The Ghost in the Machine: Who Will Win the AI Race?
    Simon Bryden, Consulting Systems Engineer, Fortinet Dec 12 2018 10:00 am UTC 45 mins
    In this webinar we will discuss some of the key security events and trends over the last year, drawing on threat intelligence facts and statistics as researched and reported by the FortiGuard Labs.

    As as both cyber criminals and cyber defenders look to new technological advances, we will then consider some emerging threats and defense strategies and discuss how both sides are likely to benefit, and to what extent?
  • New PSD2 guidelines: Can your team respond to a security incident in 4 hours?
    New PSD2 guidelines: Can your team respond to a security incident in 4 hours?
    Jamie Cowper, Director, IBM Resilient, Jess Cholerton, European Technical Sales, IBM Resilient Dec 12 2018 10:00 am UTC 59 mins
    The conversation for the upcoming Payment Services Directive (PSD2) has been centered on the digital transformation offered by the new open banking requirements. However, there are major implications for Incident Response (IR) too.

    In our upcoming webinar on Tuesday January 23 at 12.00 GMT our security experts, Jamie Cowper and Jess Cholerton, will discuss the following:

    - The mandatory incident reporting requirements outlined in PSD2
    - How a well-documented, audited IR process is crucial to security teams meeting the four-hour deadline
    - The value security orchestration and automation strategies can provide to IR processes for staying compliant
  • How to Rule Your Data World
    How to Rule Your Data World
    Jacqueline Bloemen, Senior Analyst BI (BARC) and Becky Smith, Sr. Product Marketing (Denodo) Dec 12 2018 10:00 am UTC 60 mins
    In a digital World data is really everywhere. It enables innovative use cases, optimizes internal processes and will significantly affect tomorrow´s businesses.

    The growing interconnectedness of people, companies, and devices has led us to a vast volume of data from an ever-widening variety of sources. This has resulted in the rising awareness of the necessity to implement a data strategy.

    In this webinar Jacqueline Bloemen, Senior Analyst BI at BARC and Becky Smith, Senior Marketing Manager at Denodo, provide an overview of the current state of data strategy and data governance initiatives from companies around the world, based on the findings of a recently conducted study.

    Key Questions this webinar will address:

    - What are the most striking benefits of data governance?
    - Which technological approaches are companies taking to control and provide data?
    - What are the critical success factors of effective data governance?


    1) Introduction and Challenges (Denodo)
    2) Insights into the current state of data strategy and data governance initiatives (BARC)
    3) Key Takeaways
    4) Q&A
  • DDoS 방어를 위한 Cloudflare 활용법
    DDoS 방어를 위한 Cloudflare 활용법
    유 지 영, Solutions Engineer, Cloudflare Dec 12 2018 10:00 am UTC 60 mins
    최근 몇 년 동안 한국, 싱가포르, 일본, 중국 같은 국가에서 DDoS 공격이 빈번하게 발생하고 있습니다. 또한 2018년에는 Memcached 서버를 이용하는 대규모 DDoS 공격 사례들이 새롭게 목격되고 있습니다. 이 웨비나에서는 날로 확대되는 DDoS 위협 환경에 대해 알아보고 공격의 유형과 규모에 관계없이 웹 사이트를 보호할 수 있는 Cloudflare의 이점을 소개합니다.

    웨비나를 통해 다음을 알아보십시오.

    -DDoS 공격의 유형 및 최신 트렌드
    -DDoS 방어를 위한 Cloudflare 활용법

    발표자: 유 지 영, Solutions Engineer, Cloudflare
    진행자: 박 선 영, Business Development Manager, APAC, (ISC)²
  • Why Is Open Source Use Risky?
    Why Is Open Source Use Risky?
    Adrian Lane, Analysis, Securosis Dec 12 2018 10:30 am UTC 43 mins
    When software development moves at the speed of DevOps, creating every line of code from scratch is simply not feasible. In turn, most development shops are increasingly relying on open source libraries to supplement their code.

    The use of these open source libraries is not in itself a bad thing, on the contrary, it’s best practice, and not taking advantage of this code would put your organization at a competitive disadvantage. The risky part lies with the visibility. What happens when it’s revealed that an open source library contains a major vulnerability? Would you know if you are using that library? What about where or how you are using it? Could you find out fast enough to patch it? Attend this session to get up to speed on open source library use, including its risks and best practices.
  • Find And Fix Open Source Vulnerabilities Within GitHub With WhiteSource Bolt
    Find And Fix Open Source Vulnerabilities Within GitHub With WhiteSource Bolt
    Victoria Oiknine, Project Manager at WhiteSource Dec 12 2018 11:00 am UTC 15 mins
    Meet WhiteSource Bolt for GitHub - the new free app which will allow you to harness the power of open source without having to compromise on security or agility ever again!

    WhiteSource Bolt continuously scans all your repos, detects vulnerabilities in open source components and provides fixes, all in real-time, in your GitHub native environment. The tool supports both private and public repositories, and covers over 200 programming languages.

    Sign up to this short webinar to learn more about the different capabilities of this new app and how to use it in your GitHub native environment.
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation
    When the Walls Come Tumbling Down – Network Security for the Cloud Generation
    Mike Chen, Tim Murphy, Robert Arandjelovic | Live Q&A with Karthik Ramakrishnan Dec 12 2018 11:00 am UTC 62 mins
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:
    - Why you should embrace cloud-based network security
    - The tools you need to provide protection against a variety of attacks
    - Why a proxy belongs at the center of your cloud service
    - Cloud migration strategies
    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today to hear from Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic, Director Product Marketing.

    With a live Q&A from Karthik Ramakrishnan, Senior Systems Engineer, EMEA Emerging Markets
  • Kaspersky Technical Talks Series - KATA / EDR Part 3
    Kaspersky Technical Talks Series - KATA / EDR Part 3
    Jibril Hassan, Executive Pre-Sales Manager | Kaspersky Lab Dec 12 2018 11:00 am UTC 42 mins
    A unified security solution for a new era of digital transformation.

    Join our technical team as they provide a deeper dive into the Kaspersky Anti-Targeted Attack (KATA) and Kaspersky Endpoint Detection and Response (EDR) platforms.

    Learn how:
    - it delivers complete visibility across the distributed enterprise environment, together with global threat statistics and reputations, providing contextualised, actionable Intelligence.
    - multi-dimensional advanced detection combines machine learning with advanced detection capabilities using static, behavioural, cloud reputation, sandboxing and pattern based detection engines, together with a Targeted Attack Analyser.
    - automated prevention of and response to advanced threats
    Verdicts are automatically shared via the platform with a whole spectrum of products, including email, web, endpoint and storage protection. As a result, instant action can be taken when an incident emerges.

    This session is highly recommended for technical roles and continues our series of technical talks. If you missed a previous one please check it out on our On-Demand Service.
  • Data solutions in the age of OTT. One size doesn’t fit all.
    Data solutions in the age of OTT. One size doesn’t fit all.
    Alok Shukla, VP Data Products, Airtel Global Business Dec 12 2018 11:00 am UTC 64 mins
    The fast proliferation of content, availability of affordable smartphones combined with deeper penetration of broadband services has led to an explosion in data consumption across India, making it one of the fastest growing internet destination in the world. This translates into the 2nd largest online market by 2021 with 600 mn+ users and an additional 400 mn users over the next 5 years. This exponential growth presents immense opportunities. Looking to tap internet led growth in India? Join Airtel talk about next generation data solutions with rise of OTTs, internet software, SaaS, content, media, DC, Cloud and ecommerce companies.
  • Illustrating the Systemic Risk Caused by Open Source Library Use
    Illustrating the Systemic Risk Caused by Open Source Library Use
    Tim Jarrett, Senior Director of Enterprise Security Strategy, Veracode Dec 12 2018 11:30 am UTC 48 mins
    How far-reaching is a vulnerability in one open source component? We recently took a closer look at one vulnerable component to find out. We followed the path of one component library -- Apache Commons Collection (or ACC) that contained a serious vulnerability. We traced all the other libraries ACC touched and, in turn, made vulnerable. In the end, we found its vulnerability had spread to an astounding 80,323 additional components.

    Attend this session to follow the path of this vulnerability and get a clear picture of exactly how and why open source libraries can pose such significant risk, and how to use and manage them in a secure way.
  • Estratégias para extender a vida útil de IPv4 e introduzir IPv6 em provedores
    Estratégias para extender a vida útil de IPv4 e introduzir IPv6 em provedores
    Thiago de Lima, SE Brazil from A10 Networks Dec 12 2018 12:00 pm UTC 60 mins
    O esgotamento global dos blocos livres de endereços IPv4 disponíveis e a adoção de IPv6, impõem uma série de novos desafios ao crescimento e a rentabilidade dos provedores de serviços. Na maior parte dos casos, os provedores de serviços devem desenhar e implantar estratégias de curto e longo prazo, para preservar recursos extremadamente escasso como são seus endereçamentos IPv4 e migrar sua rede, serviços e assinantes para IPv6.

    - Preservação de endereços IPv4
    - Migração e coexistência com IPv6
    - Aspectos legais, visibilidade e acessibilidade dos usuários
  • The Front Lines: How One Company Systematically Mitigates Their Open Source Risk
    The Front Lines: How One Company Systematically Mitigates Their Open Source Risk
    Mark Curphey, VP of Strategy, Veracode Dec 12 2018 12:30 pm UTC 47 mins
    It’s one thing to simply talk about the pervasiveness of open source risk. What do you do when your leadership team wants you to actually take action? Where do you start? How do you even begin to inventory the seemingly insurmountable amount of open source libraries deployed across your entire application infrastructure? It takes a systematic approach to identifying vulnerable open source libraries – a system that requires multiple stakeholders across various functional groups including security, development, and sometimes your legal and vendor management teams.

    Join Mark Curphy, VP of Strategy at Veracode, as he interviews a customer to discuss how they were successful in implementing a scalable security program to effectively tackle the problem of open source risk. You’ll get real insights from an industry practitioner about how to recognise harmful third party libraries, establish an open source software security policy, and communicate security requirements to the team at large.
  • Intelligence Lead Cyber Defense
    Intelligence Lead Cyber Defense
    Griff James, Director, Damrod Analysis Ltd. Dec 12 2018 1:00 pm UTC 45 mins
    A sound defence needs more than technology. Alongside advancements in machine learning and artificial intelligence, there remains a vital role for human insight and ability. At heart, cyber is a field of conflict – a contest over access to data. To allocate resources effectively and win that fight, defenders need consider the attacker’s perspective. Only by understanding what is under threat and what the likely attacks are can defenders allocate defences effectively.

    Ideal for technical leaders explaining priorities to non-technical managers, this webinar discusses how to understand, assess, and defend against cyber-attack using widespread offensive techniques to discuss how best to develop defensive strategy.
  • Visibilité, connaissance, contrôle : la maîtrise de votre écosystème de sécurité
    Visibilité, connaissance, contrôle : la maîtrise de votre écosystème de sécurité
    Laurent Meimoun Dec 12 2018 2:00 pm UTC 60 mins
    La gestion de la sécurité et la réponse apportée aux cyber événements constituent des défis majeurs. Une visibilité et une connaissance insuffisantes de ces risques au sein de votre réseau aggravent cette problématique.

    Regardez ce webcast pour découvrir comment établir une approche holistique connectée en matière d’orchestration de la sécurité. Apprenez à mettre en place des règles de sécurité et des actions de contrôle plus intelligentes pour bénéficier d’un environnement réseau plus solide, plus sûr et plus conforme. Vous apprendrez comment :

    • proposer un accès avec signature unique (SSO) afin de dimensionner et gérer les services de sécurité réseau, terminaux et Cloud
    • contrôler l’ensemble des opérations et des services depuis une interface Cloud commune simplifiée
    • bénéficier d’une visibilité centralisée et d’une identification en situation de la sécurité réseau
    • bénéficier d’une gestion des règles sans erreur
    • déployer et dimensionner des pare-feux à distance via le Cloud
  • Underground Cyber Threats: Social Engineering. From Staff to C-suite.
    Underground Cyber Threats: Social Engineering. From Staff to C-suite.
    Anthony St Clair and Farzad Seihoun Dec 12 2018 2:00 pm UTC 45 mins
    This webinar will provide insight into what Verizon anticipates will be the most prolific cyber threats for 2019. Members of the Verizon Threat Research Advisory Team offer their outlook on social engineering trends for the next twelve months, summarizing thousands of man-hours spent in customer investigations, along with our dark web research, threat libraries, and identified cyber anomalies drawn from our vast IP network. We will explain how Verizon addresses these types of threats on behalf of our customers, and our top recommendations for ways that organizations can take proactive steps on their own to secure their network.
  • Latest UK trends in Quality Assurance and Software Testing
    Latest UK trends in Quality Assurance and Software Testing
    Gary Moore, Vice President, Sogeti UK, Malcolm Isaacs, Sr. Solution Marketing Manager, Micro Focus Dec 12 2018 2:00 pm UTC 45 mins
    The latest edition of the World Quality Report 2018-19 analyses responses from 1700 CIOs and other IT Professionals in 32 countries, across ten different sectors, and discussed the trends shaping QA and testing today, along with recommendation for addressing tomorrow’s challenges.

    In this webinar, we will explore the findings for the UK and the capabilities required for:
    -Complex integration testing
    -Test automation across decentralized teams
    -Virtualization and the rise of containerized test environments

    Put your questions to our experts during the live Q&A and leave with a better understanding of what is top of mind for QA and testing professionals in the UK.
  • Dell EMC Data Domain/DPS Webinar
    Dell EMC Data Domain/DPS Webinar
    Graeme Sutherland–Senior pre sales architect, Sal DeMasi–DPS Specialist Teknicor Dec 12 2018 2:30 pm UTC 60 mins
    Graeme Sutherland will be presenting an overview of the product and DPS as a whole and Sal DeMasi will be presenting a demonstration of key attributes of the appliance.

    There will be time at the end of the webinar for questions and also the opportunity to have a 1-1 Demonstration if you feel this will be of benefit to you.

    We hope you enjoy the webinar and if you have any questions please feel free to ask.
  • Splunk HEC and syslog-ng deep dive
    Splunk HEC and syslog-ng deep dive
    Balázs Scheidler Founder and Creator of syslog-ng Dec 12 2018 3:00 pm UTC 60 mins
    Dwelling deeper into reliable log ingestion to Splunk with syslog-ng by utilizing the HTTP event collector.
  • The alchemy of data
    The alchemy of data
    Chris Wigget, Director Insights and Analytics, Britehouse a division of Dimension Data Dec 12 2018 3:00 pm UTC 60 mins
    Information is the heart of the modern organisation. For many years now business intelligence has been at the forefront of taking data and attempting to turn it into actionable insights.

    The truth is that traditional business intelligence approaches are not able to provide the digital organisation with the level of insight that the modern business environment demands.

    In this talk we’ll examine how traditional business intelligence is failing the modern, agile organisation, how simply embracing ‘the next big thing’ can backfire, and why organisations find themselves in this situation.

    We’ll also show how advanced analytics can help companies escape the information swamp and start turning the data they have into the information they need.
  • App and Network Attacks
    App and Network Attacks
    Akhilesh Dhawan, Director of Prod Marketing- Cloud and Darshant Bhagat, Director of Product Management, Citrix Dec 12 2018 4:00 pm UTC 47 mins
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This webinar deep dives into:

    - Protection of applications from on-premise to the cloud
    - Hypervisor protection of servers before the threat hits the operating system
    - Device and user protection from external threats

    Learn how to proactively counter internal and external threats through analytics.
  • Are You Compliant? Meet Complex Cybersecurity Regulations with PAM
    Are You Compliant? Meet Complex Cybersecurity Regulations with PAM
    Chad Carter Dec 12 2018 4:00 pm UTC 45 mins
    Meeting the ever-increasing array of IT security regulations can be intimidating, but failing to comply risks severe penalties. Can you afford to leave your most critical resources unsecured from insider threat and cyber attack, or to face millions in fines for non-compliance?

    Privileged Access Management (PAM) streamlines your organization's compliance with cybersecurity measures including GDPR, the NIS Directive, PCI DSS, HIPAA, and many other state- and industry-level regulations.

    Learn how you can tackle these standards with a simple all-in-one PAM solution for robust IT security compliance!