Hi [[ session.user.profile.firstName ]]

Information Technology

  • SANS Research: A Holistic Approach to Securing Mobile Data and Devices
    SANS Research: A Holistic Approach to Securing Mobile Data and Devices Lee Neely, Mentor Instructor, SANS Institute and Mic McCully, Senior Solutions Consultant, Symantec Recorded: Dec 18 2017 63 mins
    The ubiquitous use of mobile devices has radically changed the landscape of data protection, and the abundance of applications only complicates the situation.

    How, then, can mobile device data be protected? This webcast reviews the current and emerging services and practices designed to help secure and protect the data on these devices, and identifies areas where solutions are needed to fill the remaining gaps and provides recommendations for a holistic approach including mobile threat protection.

    View this on-demand webinar to learn:

    - What role security tools such as analytics can play in managing mobile devices

    - How mobile devices and data are currently protected and how effective those protections are

    - Common attack vectors and possible mitigation strategies

    - Features and capabilities that a solution should have to provide organizations with ideal mobile security and visibility

    View Today
  • Three Secrets to Becoming a Mobile Security Super Hero
    Three Secrets to Becoming a Mobile Security Super Hero John Dickson, Director of IT Infrastructure & Cybersecurity at Republic National Distributing Company (RNDC) Recorded: Dec 18 2017 66 mins
    How do you go about protecting your mobile infrastructure, know that it is secure, and build confidence with executives and the Board of Directors that you are taking care of business? Most people don’t know exactly what the mobile risks are or how to mitigate them.

    Learn how to become the mobile security superhero at your company by following these 3 steps:

    - Prove to your management that mobile security threats are real by showing real examples

    - Review the SANS Institute checklist to help choose the right mobile threat defense solution

    - Provide monthly reports to management to increase visibility and prove that the organization is secure

    View this recorded webinar to hear from a real mobile security superhero, John Dickson, who details his own hero journey as Director of IT Infrastructure & Cybersecurity at Republic National Distributing Company (RNDC), the second largest beverage alcohol distributer in the U.S.
  • How Healthcare CISOs Can Secure Mobile Devices that Access Sensitive Information
    How Healthcare CISOs Can Secure Mobile Devices that Access Sensitive Information Jim Routh,CSO at Aetna, and Adi Sharabani, SVP Modern OS Security at Symantec Recorded: Dec 18 2017 60 mins
    SEP Mobile research found that around 18 million Android devices have at least one medical app and a high-risk malware on it. The study also found that 1.96% of all devices in any organization are at a high risk of getting compromised.

    How do you create a mobile environment that is HIPAA compliant, secure, resilient and enables employees for increased productivity as compared to constraining them?

    View this on-demand webinar with Jim Routh, CSO at Aetna, and Adi Sharabani, SVP Modern OS Security at Symantec, to learn:

    - About the state of mobile security in Healthcare organizations
    - How to improve incident response and resilience of mHealth IT operations
    - How to leverage risk-based mobility to predict, detect and protect against threats
  • How to Prepare for GDPR: A Gemalto Case Study
    How to Prepare for GDPR: A Gemalto Case Study Jean-Pierre Mistral, Director of Global Data Privacy and Alex Hanway, Encryption Product Marketing Recorded: Dec 18 2017 60 mins
    Join us for a new webinar in our series focused on helping companies prepare for the upcoming global government regulations, like European General Data Protection Regulation (GDPR). Data sovereignty, especially for cloud-first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our Director of Global Data Privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Alex Hanway, Product Marketing, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •What is GDPR?
    •Case Study: A look at how Gemalto has prepared for GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • Strategy and Tactics for Securing Mobile Devices in Financial Organizations
    Strategy and Tactics for Securing Mobile Devices in Financial Organizations Brian Heemsoth, Director of Software & Mobile Security, Aetna Recorded: Dec 18 2017 56 mins
    Protecting financial data has gotten drastically more difficult in the age of mobility, with always-on, always-connected computers in our pockets. A whole new approach is required to effectively defend against mobile malware attacks, network attacks and attacks against OS vulnerabilities.

    View this webinar with Brian Heemsoth, Director of Software & Mobile Security at Aetna, to learn how Aetna protects its corporate data from mobile threats while providing a better user experience and complying with strict industry regulations.

    Key Learning Objectives:

    - How Aetna addressed 23.97 high risk vulnerabilities per device, mitigated 701 malware infections and 460 instances of high risk networks

    - How to manage risk on thousands of mobile devices stemming from malware, networks, and security vulnerabilities

    - How to make your workforce more agile and productive with mobile devices, while protecting corporate data from theft

    View Today
  • 2018 Predictions & Recommendations: Financial Services
    2018 Predictions & Recommendations: Financial Services Lawrence Chin, Security Market Architect, Palo Alto Networks Recorded: Dec 18 2017 4 mins
    Join Lawrence as he looks into the SWIFT mandatory security controls and what that means for financial institutions in 2018.

    Discover more by reading the blog in the attachments.
  • Combating Advanced Threats with SonicWall Hosted Email Security
    Combating Advanced Threats with SonicWall Hosted Email Security John Aarsen Recorded: Dec 18 2017 23 mins
    Join us on Monday, December 18th at 9 a.m. GMT for the hosted email security webinar, Combating Advanced Threats with SonicWall Hosted Email Security.

    Email continues to be vital to business. However, as the volume of email increases, so too does the amount of ransomware, phishing, business email compromise (BEC), spoofing, spam and virus attacks.

    Cyber criminals falsify email sender addresses to fool recipients and inflict damage to unknowing, legitimate brands. Organizations can benefit from replacing legacy solutions with SonicWall’s easy-to-use, affordable cloud-based email security solution that defends against the dynamic, evolving email threat landscape.

    In this webinar, gain insights on:
    •Protection against advanced email threats
    •How SonicWall hosted email security enhances MS Office 365
    •Other benefits of the cloud-based email security subscription service
  • GDPR Introduction
    GDPR Introduction Manish Walia and Munaf Razzak Recorded: Dec 16 2017 55 mins
    The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). The session is an introduction to what are some of the key regulations that are being introduced.
  • Build Your Angular Apps with Sencha Components
    Build Your Angular Apps with Sencha Components Marc Gusmano, Solutions Architect at Sencha Recorded: Dec 15 2017 61 mins
    Attend this hands-on webinar where you will learn how your Angular app can immediately gain access to hundreds of features, components, and widgets from Sencha, all synched to work together!

    Join us and you will:

    - See why Sencha isn’t just Ext JS anymore - including how we are helping Angular and React developers
    - Understand the benefits of our 115+ commercially tested and supported components – a lifeline when your app is on the line
    - See real examples of:
    -->Data Analytics - Grids, Pivot Grids, Analysis, Exports, Excel
    -->Visualization tools – Charts, D3 Visualizations
    -->Prebuilt packages - Calendar, Forms, Tabs, Menus
  • [Webinar] Shifting Left Without Sacrificing Security and Compliance
    [Webinar] Shifting Left Without Sacrificing Security and Compliance Maya Ber Lerner, VP of Product, Quali Recorded: Dec 15 2017 25 mins
    Deliver Production-like Environments Early in the Dev/Test Lifecycle
    As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
  • Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack
    Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack Bob Adams, Mimecast Cybersecurity Expert; David Hood, Mimecast Director of Product Marketing Recorded: Dec 15 2017 62 mins
    Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Join us for Anatomy of an Email-Borne Attack where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live “hack.”
  • Intelligent Workload Placement and Optimization
    Intelligent Workload Placement and Optimization Bobby Allen, Dir of Technical Services, CloudGenera and Jim Wittry, GM Alliances & Channel, CloudGenera Recorded: Dec 15 2017 53 mins
    The audience will be exposed to a SaaS based analytics platform that allows them to define and or defend their Cloud/ Hybrid IT Strategy. Users have to ability to quickly review, substantive venue analysis for workload placement, with the ability to run “what if scenarios” as well for PVC-Hosted Environments and or Public Cloud as alternative Venues. You are guaranteed to learn something about Cloud and Workload placement that you can apply to your business immediately.
  • Security Review & 2018 Predictions for Financial Services
    Security Review & 2018 Predictions for Financial Services Adam Hamm, Managing Director, Protiviti Global Consulting Recorded: Dec 15 2017 62 mins
    The regulators are coming regarding cybersecurity. Are you ready?

    Join this interactive webinar to learn more about:
    - The NYDFS Part 500 cyber regulations, including insights on implementation and auditing
    - Review the NAIC's new Insurance Data Security Model Law adopted on October 24, 2017

    About the Presenter:
    Adam Hamm is a Managing Director at Protiviti Global Consulting who serves financial services industry clients across the country regarding risk, compliance, and cybersecurity matters. He has deep knowledge of financial services regulation with hands on experience in all insurance supervision and policy related matters. Before he joined Protiviti in January 2017, he was a former President of the National Association of Insurance Commissioners (NAIC), Chairman of the NAIC’s Cybersecurity Task Force, Principal on America’s Financial and Banking Information Infrastructure Committee (the primary national regulatory cybersecurity committee for the financial services sector), Principal on the United States Financial Stability Oversight Council (FSOC), and North Dakota’s elected insurance commissioner from 2007-2016. Adam also spent ten years as a violent crimes prosecutor and civil litigator.
  • How Cryptocurrencies are Changing the Face of Financial Services
    How Cryptocurrencies are Changing the Face of Financial Services Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy Recorded: Dec 15 2017 61 mins
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • Using Analytics to Protect At-Risk Children
    Using Analytics to Protect At-Risk Children Beena Tharakan, Ernst & Young and Greg Henderson, SAS Recorded: Dec 15 2017 64 mins
    One of the paramount responsibilities of government is the protection of the welfare of youths and children. Study after study has demonstrated the correlation between contact and interaction with child protective services and later quality-of-life outcomes. And on too many occasions, at-risk youth become tragic statistics before they reach adulthood.

    In the on-demand webinar Using Advanced Analytics to Protect At-Risk Children, hosted by Institute of Public Administration of Canada (IPAC) Chief Executive Officer Robert Taylor, experts from SAS Institute and Ernst & Young discuss the challenges facing child welfare professionals, how data from disparate sources can flag high-risk situations, and how an evidence-based approach, focused on outcomes for at-risk children, can be driven through the operation, from policy-makers to program managers to front-line workers and improve outcomes.
  • The 2018 Cyber Threat Predictions from FortiGuard Labs
    The 2018 Cyber Threat Predictions from FortiGuard Labs Derek Manky, Global Security Strategist, Fortinet Recorded: Dec 15 2017 6 mins
    Join Derek Manky, Global Security Strategist at Fortinet, to learn about the top Threat Predictions for 2018, as identified by FortiGuard Labs' 200 expert threat researchers, and gain the latest intelligence on the threat landscape and our predictions for every critical area including malware, botnets, mobile threats and more.

    You can also access our 2018 Threat Prediction Report attached to understand what cybercriminals have in store for us and what you, as an IT security professional, should be most prepared to address.
  • Warum Veeam und Pure Storage so gut zusammenpassen
    Warum Veeam und Pure Storage so gut zusammenpassen Jörg Schneider, Systems Engineer, Pure Storage Recorded: Dec 15 2017 36 mins
    Kurzer Überblick zu Veeam und Einblicke in die Story von Veeam. Darüber hinaus berichte ich über die Integration von Veeam und Pure Storage.
  • Paysage des menaces : tendances cyber sécurité 2017 et au-delà
    Paysage des menaces : tendances cyber sécurité 2017 et au-delà Laurent Heslault, Directeur des Stratégies de Sécurité, Symantec France Recorded: Dec 15 2017 56 mins
    L’année qui s’achève a été essentiellement marquée par des attaques coûteuses, des fuites de données retentissantes et plusieurs cas de ransomwares et d’espionnage économique. La cyber criminalité a gagné en ampleur et en audace, avec des retombées financières bien plus élevées. Les cyber attaques sont désormais régulièrement citées dans les médias.
    Ce webcast aborde les points suivants :
    • Le paysage des menaces en 2017
    • Les personnes ou les erreurs qui ont conduit à ces incidents
    • Les enseignements à tirer de cette année pour les professionnels de la sécurité comme vous
    • Les solutions qui peuvent renforcer votre sécurité à l’approche de 2018
    Inscrivez-vous
  • Новые возможности СХД Dell EMC класса Mid-Range: Unity и SC All Flash
    Новые возможности СХД Dell EMC класса Mid-Range: Unity и SC All Flash Артур Вартанян Recorded: Dec 15 2017 45 mins
    В рамках вебинара будут озвучены ключевые обновления технологий в СХД Unity и SC AFA от компании Dell EMC, которые станут доступны заказчикам в декабре 2017 года – январе 2018 года. Вебинар направлен на специалистов по продажам и технических экспертов. На русском языке - in Russian language.

    Вебинар проводится при поддержке компании Intel.
  • Combata las amenazas avanzadas con SonicWall Hosted Email Security
    Combata las amenazas avanzadas con SonicWall Hosted Email Security Maria Garcia Recorded: Dec 15 2017 41 mins
    Participe en nuestro seminario virtual sobre la seguridad de correo electrónico hospedada Combata las amenazas avanzadas con SonicWall Hosted Email Security el viernes, 15 de diciembre a las 11:30 h CET.

    El correo electrónico continúa siendo vital para los negocios. Sin embargo, a medida que crece el volumen de correos electrónicos, aumenta también la cantidad de ataques de ransomware, phishing, compromiso del correo electrónico de negocio (BEC), spoofing, spam y virus.

    Los cibercriminales falsifican direcciones de remitentes de correo electrónico para engañar a los destinatarios, dañando así a marcas legítimas sin que éstas lo sepan. Las organizaciones pueden sustituir sus soluciones antiguas por la solución de seguridad de correo electrónico basada en la nube asequible y fácil de usar de SonicWall, que ofrece protección contra el dinámico y cambiante panorama de las amenazas de correo electrónico.

    En este seminario virtual, obtendrá información sobre los siguientes temas:
    •Protección contra las amenazas de correo electrónico avanzadas
    •Cómo la seguridad de correo electrónico hospedada de SonicWall mejora MS Office 365
    •Otras ventajas del servicio de suscripción de seguridad de correo electrónico basado en la nube
  • Votre proxy gagne en agilité grâce à l’isolation web
    Votre proxy gagne en agilité grâce à l’isolation web Hervé Doreau, Directeur Technique, Symantec France Recorded: Dec 15 2017 27 mins
    Saviez-vous que des millions d’hôtes (domaines, sous-domaines ou adresses IP) apparaissent chaque jour et que, dans bien des cas, leur durée de vie ne dépasse pas 24 heures ?
    De nombreuses entreprises choisissent d’instaurer des politiques de passerelles web sécurisées afin d’empêcher les utilisateurs d’accéder à des sites non classifiés à cause du risque qu’ils représentent, même si la plupart sont tout à fait légitimes dans le cadre d’un usage professionnel.
    De la même façon, beaucoup d’entreprises décident de bloquer des sites dès lors que le niveau de risque est fort, sans être totalement avéré.
    En découle un blocage excessif des sites web qui nourrit l’insatisfaction des utilisateurs.
    Certains sites sont réputés pour leur fiabilité, d’autres pour leur dangerosité. Les sites qui posent vraiment problème sont ceux qui se situent entre les deux, lorsqu’il n’y a pas suffisamment de recul ou d’informations.
    Principaux thèmes abordés :
    - Découvrez le plus grand réseau civil d’intelligence sur les menaces au monde et la protection qu’il peut vous apporter face aux attaques de malware.
    - Apprenez à définir des politiques permettant d’isoler tout le trafic dont le risque est indéterminé ou non classifié par le Global Intelligence Network.
    - Sachez comment booster la productivité de l’entreprise sans créer de risques supplémentaires.
    Inscrivez-vous dès aujourd'hui.