Hi [[ session.user.profile.firstName ]]

Information Technology

  • Cutting Through the Noise: A Pragmatic Look At Artificial Intelligence's Impact
    Cutting Through the Noise: A Pragmatic Look At Artificial Intelligence's Impact Paddy Lawton, General Manager of Coupa Spend Recorded: May 26 2017 60 mins
    "Artificial intelligence” and “machine learning” are popular buzzwords, but what do they specifically mean for spend management? During this webinar, we'll define the terms in plain English and give practical examples of how they are being used today. You'll leave with a good understanding of how AI and machine learning can transform data analysis and affect spend management initiatives, both now and in the future. Paddy Lawton will share real-world examples of how companies and individuals are using these techniques (and related ones, like hybrid machine learning and deep learning).
  • Anatomy of WannaCry - Learning from the Ransomware that Paralyzed Global Systems
    Anatomy of WannaCry - Learning from the Ransomware that Paralyzed Global Systems Paul Schofield, Director, Partner Architecture & Enablement, enSilo Recorded: May 26 2017 57 mins
    In early May, the world witnessed a massive ransomware campaign that had a crippling effect on businesses in multiple industries across the globe. What made this ransomware, called WannaCry, so different than others was the ransomware’s ability to combine lateral movement. As opposed to other ransomware that typically infects a few devices within an organization, WannaCry had worm-like capabilities, spreading itself throughout the organizational network and hitting servers.

    While a “kill-switch” was used against WannaCry, organizations are undoubtedly going to continue suffering from WannaCry’s remnants within organizations. More so, the impact of WannaCry will motivate ransomware authors to start adopting lateral movement capabilities. Yet, with all the advanced malware techniques, security professionals are required to ensure the continuous operations of their systems.

    In this webinar, you will:
    - Learn about EternalBlue - the exploit in Microsoft's implementation of the SMB protocol that enabled WannaCry to propagate throughout the organization
    - Watch how WannaCry attacks an unpatched endpoint and encrypts data
    - Receive strategies and best practices to ensure that your systems are protected from advanced ransomware
  • Email Fraud Defense - Live Demo
    Email Fraud Defense - Live Demo Aaron Neff, Sr Engineer, Parker Bowman Account Manager Recorded: May 26 2017 26 mins
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Ransomware - The Great Shakedown
    Ransomware - The Great Shakedown Keith Rayle, Chief Security Strategist, Fortinet Recorded: May 26 2017 63 mins
    Ransomware is the fastest growing security issue for professionals. Cyber criminals leverage a wide range of tools and methods for implementing these types of attacks. Join us in this Web cast to learn about the various types of ransomware, the history of it, current trends, and what you can do in order to protect your critical business environment.
  • Comprendre les caractéristiques clés du stockage software-defined avec Dell EMC
    Comprendre les caractéristiques clés du stockage software-defined avec Dell EMC Navin Sharma et Jay Goldfinch Recorded: May 26 2017 60 mins
    Ces dix dernières années, nous avons vécu les évolutions de la pile IT : d’abord centrée sur le matériel, elle a évolué vers le logiciel, avec le serveur, le réseau et maintenant, le stockage. Dans cette session, nous vous expliquerons les caractéristiques clés des technologies SDS sur le marché actuel, et nous verrons dans quels cas et de quelle façon vous pouvez intégrer ScaleIO. Nous vous présenterons certains des principaux concepts technologiques liés à ScaleIO et couvrirons les avantages de ScaleIO en matière de simplification du cycle de vie du stockage et de TCO global. Vous pourrez également assister à une démonstration en direct de certaines de ces fonctionnalités
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you
    WanaCrypt0r Ransomware – How Palo Alto Networks protects you Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42 Recorded: May 26 2017 46 mins
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Polska premiera IDPA - nowego applience’u backup/recovery
    Polska premiera IDPA - nowego applience’u backup/recovery Daniel Olkowski, Dell EMC Recorded: May 26 2017 50 mins
    Dell EMC World, Vegas, maj 2017.
    Jeden z 2 najważniejszych wdyarzeń tej imprezy to ogłoszenie:
    IDPA – Integrated Data Protection Appliance
    Czym jest IDPA?
    Dla kogo jest przeznaczony?
    Jakiej wartości dostarcza?
    Ile kosztuje?
    Zapraszam na krótką, 30-minutową sesję, w trakcie której powiemy o wszystkich szczegółach nowego urządzenia ze stajni Dell EMC.
  • Palo Alto Networks Next Generation Endpoint Solution Traps™
    Palo Alto Networks Next Generation Endpoint Solution Traps™ Paul Wilcox Recorded: May 26 2017 49 mins
    You are invited to join this live webinar for an overview of Palo Alto Networks® Traps™ advanced endpoint protection and learn about this market-leading solution that provides multi-method protection against known and unknown threats.

    Hosted by Paul Wilcox, APAC Sales Director for Palo Alto Networks Cybersecurity Solutions Group, you will learn why Traps is the most effective solution on the market today to address the current threat landscape, including:

    •How it effectively prevent attacks against exploits and malware – such as ransomware
    •An overview of the unique approach Traps takes to endpoint security
    •How legacy antivirus is no longer effective enough
    •How Traps can replace your existing legacy antivirus software
    Included in this live webinar will be a live demonstration of Traps in action.
  • Informatica Cloudで連携するデータ分析プラットフォーム
    Informatica Cloudで連携するデータ分析プラットフォーム クラウドセールスコンサルタント 高田 泰志 Recorded: May 26 2017 37 mins
    Informatica Cloudを利用したデータ分析プラットフォームの構築について、
    ユースケースを交えながらご紹介します。
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention]
    SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Charles Woo, Systems Engineer, Palo Alto Networks Recorded: May 26 2017 35 mins
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.

    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you
    WanaCrypt0r Ransomware – How Palo Alto Networks protects you Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42 Recorded: May 26 2017 47 mins
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • How I Learned to Stop Worrying and Love the Data - Meeting Seasonal Data Peaks
    How I Learned to Stop Worrying and Love the Data - Meeting Seasonal Data Peaks Eric Thorsen, Hortonworks and Deba Chatterjee, Robin Systems Recorded: May 25 2017 66 mins
    Deploying, right sizing and the ability to meet seasonal peaks without disrupting availability are often seen as difficult challenges in a big data and Hadoop deployment. In this webinar, we will discuss these operational complexities and how to overcome them without adversely impacting the business.
  • Stop Attackers from Phishing Your Inbox for Good
    Stop Attackers from Phishing Your Inbox for Good Andrew Coyle, Sales Engineer Recorded: May 25 2017 15 mins
    Inbound email is the primary source of phishing attacks that lead to breaches like ransomware, BEC attacks, malware and credential harvesting. Area 1 Security locks down your email to keep your organization safe from hacks where current secure email gateways and anti-spam filters fail. This webinar shows you how to achieve absolute phishing protection with total preemption.
  • IT Management Is Becoming So Predictive – Which Is Good. Right?
    IT Management Is Becoming So Predictive – Which Is Good. Right? Dan Ortega - Vice President of Marketing Recorded: May 25 2017 5 mins
    Improvements in IT data quality and analysis tools have enabled IT management to spend less time looking into the past and more time enabling the dynamic enterprise of the future. This allows them to anticipate business events more accurately, forecast costs and capacity, and identify operational risks before they appear. Empowered by technology-driven insights and technology-enabled prediction ability, IT leaders have secured a long-sought seat at the table with their business counterparts during the strategic planning process. IT management becoming more predictive is good. Right? Perhaps, but there are some risks to consider.

    Technology-enabled prediction is only as good as the underlying data, and does a poor job of addressing unknown variables. Human intuition and analysis skills have traditionally been used to fill gaps in available data, interpret meaning and project future events. The predictive abilities of most IT leaders are heavily dependent on the quality of information and technology-enabled processing power at their disposal. Modern machine learning systems have made tremendous strides in analyzing large volumes of data to identify trends and patterns based on past and current observations. Their capability to do so is limited, however, by the quality and dependability of data inputs. “Garbage in-garbage out” has been the rule for many years.

    Learning how to harness the power of technology and information and applying it to create valuable predictive insights for an organizations is definitely good; IT leaders should be commended for bringing new capabilities to the decision-making table. As we all know, however, no information is perfect, and technology has its limitations. Becoming entirely reliant on technology for prediction and losing the ability to apply a human filter is a risky situation for businesses. As with many business decisions, it is important to balance the potential benefits with the acceptable risk profile for your organization
  • Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace
    Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace Trent Fierro: Director of Software Solutions Marketing at HPE Aruba Recorded: May 25 2017 58 mins
    With the advent of the mobile workforce and IoT, it’s increasingly difficult to know who and what is on your network, how they got there, and whether or not they pose a risk to your business. Is your current security solution able to quickly detect and effectively respond when things go wrong? The answer lies in whether or not you can consolidate information from various security tools to prioritize remediation activities. Watch this webinar from TechTarget “Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace” and learn how to use data and analytics to protect your enterprise while simplifying remediation by enabling:

    * Device identification
    * Policy control
    * Workflow automation
    * Automated threat protection


    Presenters:

    Jamie Chui: Senior Manager, Technology Alliances at Intel Security
    Brian Beaver: Independent Consultant and Founder of Principle Logics
    Trent Fierro: Director of Software Solutions Marketing at HPE Aruba
  • Powering Containers with ScaleIO and REX-Ray
    Powering Containers with ScaleIO and REX-Ray Kendrick Coleman and Brian Dean Recorded: May 25 2017 69 mins
    Organizations are using containers to revolutionize and accelerate application deployment, but often have trouble with persistent applications.  Software-defined storage like Dell EMC ScaleIO, combined with storage orchestration engines like REX-Ray, gives users the freedom and flexibility to support Docker, Mesos, and Kubernetes environments with enterprise-class, persistent storage. Learn why software-defined storage provides the best architecture for running containers and how {code} by Dell EMC provides the integration for highly available persistent applications.
  • Office 2007 Retirement: Upgrade the smart way today
    Office 2007 Retirement: Upgrade the smart way today Haley Hendricks, Solutions Sales Professional State and Local Government Microsoft Corporation Recorded: May 25 2017 25 mins
    Upgrade your technology for continued support, security, and functionality.

    Office 2007 retirement has pressing ramifications for your Office 2007 system. These include reduced functionality when integrating with modern versions of Office servers, no Microsoft support, and disabled features.

    Because there will be no further security updates, while products will continue to boot up, they will be at risk from hackers, unsupported features, and connected applications. In order to maintain support, an upgrade is required.

    Join this webcast to:
    - Find out key dates for Office products approaching end of extended support
    - Learn which upgrade option is right for your organization
    - Make sure you implement changes appropriately to avoid a service interruption
  • Hunting From Network to Endpoint (Hunter Spotlight)
    Hunting From Network to Endpoint (Hunter Spotlight) Ryan Nolette, Hunter and security technologist at Sqrrl Recorded: May 25 2017 31 mins
    Ryan Nolette, Sqrrl's hunter and security technologist, will break down:
    • Determining what endpoints to investigate in a hunt
    • Pivoting from network to endpoint investigations
    • Essential tools and best practices for endpoint hunting

    About the hunter:
    Ryan is Sqrrl's primary security technologist and expert. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With over a decade in the infosec field, Ryan has been on the product and operations side of companies such as Carbon Black, Crossbeam Systems, SecureWorks and Fidelity. Ryan has been an active speaker and writer on threat hunting and endpoint security.
  • Recovering your data from a Ransomware Attack with DataCore
    Recovering your data from a Ransomware Attack with DataCore Sushant Rao, Senior Director, Product Marketing, DataCore Software Recorded: May 25 2017 36 mins
    When you are hit by a ransomware attack, such as the recent WannaCrypt worm, you don’t have many options. You can pay the ransom, in the hopes that your data will be unencrypted. Or, you can wipe your systems clean, and then recover the data. But, backups are typically done on a daily basis. Depending on when the attack hit, the amount of data that you will lose could be in the hours. Fortunately, there is a better option.

    Continuous Data Protection (CDP) captures every write operation from an application and store it in a second location. This means that you can go back to the last data that was written before the ransomware attacked occurred. This ensure that data loss, if any, is minimal. Join this webinar to learn more about CDP and why it’s your safety net when ransomware hits.

    At DataCore, we can help your business address these challenges.
  • Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing
    Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing Brian Lawrence, NowSecure Solutions Engineer & Keith Mokris, NowSecure Product Marketing Leader Recorded: May 25 2017 32 mins
    Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.

    Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:

    -- Address DevOps stakeholders' worries and concerns about integrating security testing
    -- Determine the right depth of analysis for continuous mobile app security testing
    -- Track mobile DevSecOps metrics over time to measure success
  • Get Started with Big Data in the Cloud ASAP
    Get Started with Big Data in the Cloud ASAP Shaun Connolly, Hortonworks and Tony Baer, Ovum Recorded: May 25 2017 64 mins
    Join experts from Ovum and Hortonworks to learn how to get big data analytics workloads up and running in the cloud immediately, and how it will accelerate your time-to-benefit and maximize your agility in the cloud.
  • Tech Demo - Pseudonymization and Data Masking for the GDPR
    Tech Demo - Pseudonymization and Data Masking for the GDPR Cheryl Tang - Director of Product Marketing, and Steve Pomroy - Chief Technologist, Camouflage Recorded: May 25 2017 35 mins
    This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.

    We’ll provide an overview of:

    o What the General Data Protection Regulation (GDPR) is
    o What is pseudonymization and the benefits of pseudonymizing data
    o How data masking can help organizations comply with GDPR by pseudonymizing data classification capabilities

    Hope you can join us!
  • Data Center Network Operations: Fragile to Agile
    Data Center Network Operations: Fragile to Agile Wyatt Sullivan Recorded: May 25 2017 47 mins
    Network infrastructure today does not provide the agility and availability to support business goals. As cloud, Internet of Things (IoT) and digital strategies take hold, network engineers need a solution for the data center network to increase their business velocity and close the gap between business demands and network service delivery.

    Join Wyatt Sullivan, Product Manager at Apstra®, on Thursday, May 25 at 11:00 AM PST / 2:00 PM EST as he discusses current and upcoming features in the Apstra Operating System™ that deliver a “command and control system” providing game-changing network service agility, uptime and dramatically improved infrastructure TCO.
  • Server Virtualization with EMC XtremIO All-Flash Array & VMware, A Perfect Match
    Server Virtualization with EMC XtremIO All-Flash Array & VMware, A Perfect Match Neil Hopwood, Sr. Systems Engineer All Flash Technologies May 29 2017 11:00 am UTC 75 mins
    This Webinar will highlight the performance and advantages of server virtualization based on EMC XtremIO all-flash array technology
  • De waarde van Next Generation Security Platform
    De waarde van Next Generation Security Platform Fred Streefland May 29 2017 12:00 pm UTC 60 mins
    De combinatie van complexe, moderne IT-omgevingen en een snel ontwikkelende bedreigingen maakt het voor veel bedrijven een uitdaging om kosten laag te houden en tegelijk de systemen te beschermen waarvan hun werk afhankelijk is.

    In veel gevallen zijn de uitdagingen het resultaat van te veel verschillende beveiligingsoplossingen die geen samenhang hebben in combinatie met een gebrek aan tijd en/of expertise.

    Organisaties in alle soorten en maten gaan deze uitdagingen aan door te zoeken naar manieren om hun beveiligingsinfrastructuur te bundelen, zodat ze hun beveiligingsbeleid kunnen verbeteren en de totale eigendomskosten (TCO) kunnen verlagen.

    Neem deel aan onze webinar waar we bespreken hoe het Next-Generation Security Platform van Palo Alto Networks uw organisatie in staat stelt om:

    - De bedreigings “footprint” te verkleinen
    - Bekende en onbekende aanvallen te voorkomen
    - Beleid aan gebruikers te verbinden
  • Come proteggere le comunicazioni e-mail
    Come proteggere le comunicazioni e-mail Cristiano Cafferata May 29 2017 1:30 pm UTC 75 mins
    Le comunicazioni basate sulla posta elettronica sono un elemento fondamentale per fare business in modo efficace. Ecco perché le e-mail sono un vettore privilegiato per il sabotaggio delle reti e un trampolino di lancio per la diffusione di malware, tra cui ransomware e minacce zero-day.

    Questo webcast mostra come SonicWall Email Security – ora integrato con Capture Advanced Threat Protection – può fornire una protezione sandbox multi-engine basata sul cloud per le email dei tuoi clienti.

    Partecipa al webinar per scoprire come questa soluzione completa, flessibile e scalabile è in grado di:

    •Scansionare numerosi tipi di allegati e-mail per rilevare eventuali minacce avanzate
    •Analizzarli in una sandbox multi-engine
    •Bloccarli finché non viene accertata la loro natura
    •Installare rapidamente le signature di riparazione
  • SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture
    SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec May 30 2017 5:00 am UTC 30 mins
    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    We look forward to welcoming you in our webinar.

    Register today!
  • The General Data Protection Regulation or “We Don’t Know What We Don’t Know”
    The General Data Protection Regulation or “We Don’t Know What We Don’t Know” Patrick Grillo, Senior Director, Security Solutions, Fortinet May 30 2017 9:00 am UTC 45 mins
    The clock is ticking on the General Data Protection Regulation (GDPR) coming into effect and while there isn’t wide scale panic yet, lots of organizations are either 1) in denial or 2) just coming to grips with its implications.

    The difficulty with GDPR is that the regulation states the “WHAT” but pretty much is silent on the “HOW”. The overwhelming majority of the regulation deals with process, procedure and is it really necessary to collect the data and stresses the rights of the data subject. How to protect the data, in movement and in rest, is left to individual organizations to decide except for the vague mention of “continuous risk assessment” and “state of the art”.

    Another major change from the existing national regulations, which were enacted during the mid to late 1990s, GDPR takes into account the massive change in how technology plays in everyday. To protect the data subject, the punitive aspect of non-compliance is significant with penalties of €20M or 4% of annual turnover, whichever is GREATER.

    So in this confusing and changing environment, where do cyber security technologies come into play?

    This session will focus on the role of the underlying network in any organization’s GDPR compliance efforts and how to take advantage of certain aspects of GDPR to avoid the substantial penalties associated with the regulation.
  • Using e-Infrastructures for Biodiversity Conservation
    Using e-Infrastructures for Biodiversity Conservation Gianpaolo Coro, CNR-ISTI & BlueBRIDGE consortium May 30 2017 9:00 am UTC 75 mins
    An e-Infrastructure is a distributed network of service nodes, residing on multiple sites and managed by one or more organizations. E-Infrastructures allow scientists residing at distant places to collaborate. They offer a multiplicity of facilities as-a-service, supporting data sharing and usage at different levels of abstraction, e.g. data transfer, data harmonization, data processing workflows etc. e-Infrastructures are gaining an important place in the field of biodiversity conservation. Their computational capabilities help scientists to reuse models, obtain results in shorter time and share these results with other colleagues. They are also used to access several and heterogeneous biodiversity catalogues. This webinar will focus on how the BlueBRIDGE e-Infrastructure and Virtual Research Environments can enable data sharing and experiments reproducibility and repeatability in the biodiverisity conservation field. Examples of tools that can be adopted by the audience will be also showcased. Webinar contents in brief:

    e-Infrastructures and Virtual Research Environments
    Geospatial data visualization and representation
    Statistical models for species distribution modelling
    Accessing large heterogeneous biodiversity data catalogues
    Signal processing of biodiversity-related observations
    Machine Learning applied to species observation records
    Lexical search in large taxonomic trees
    Cloud computing applied to biodiversity analyses
  • Securing faster delivery time to market with top quality SaaS apps
    Securing faster delivery time to market with top quality SaaS apps Sami Suro, Director, Business Solutions, Tieto May 30 2017 9:00 am UTC 60 mins
    Tieto is securing deliveries with faster time to market thanks to top quality Saas applications. Including Tieto Test Tools Cloud, HPE ALM, HPE Fortify on Demand and HPE Software FlexCare Support.
  • Attacchi cyber in EMEA: i nuovi trend
    Attacchi cyber in EMEA: i nuovi trend Gabriele Zanoni, Systems Engineer di FireEye May 30 2017 9:30 am UTC 45 mins
    Partecipa al webinar con Gabriele Zanoni, Systems Engineer di FireEye, per scoprire come si sta evolvendo il panorama delle minacce sulla base dei dati sui cyber attacchi dello scorso anno, rilevati dalle investigazioni di Mandiant.

    Il webinar affronterà temi quali:

    •I nuovi trend negli attacchi di phishing usati per compromettere le aziende
    •I cambiamenti nella telemetria e nella metodologia degli attacchi
    •Le analisi di intelligence sulle minacce emergenti
    •Le nuove strategie di difesa per proteggere al meglio le aziende
    •L’impatto del GDPR sul business
    •Confronto fra trend europei, americani e asiatici
  • Spotlight on INDIA - Data Security, a Major Consideration in IT/ITES Sector
    Spotlight on INDIA - Data Security, a Major Consideration in IT/ITES Sector Vaibhav Pathak, Sr. Pre Sales Engineer May 30 2017 9:30 am UTC 45 mins
    What does an IT/ITES organization need to consider in its efforts to protect itself from fraud, including data breaches?

    These organizations need to provide assurance to customers, clients, internal stakeholders and regulatory bodies that any data being collected and processed by businesses is secure or risk massive fines, public embarrassment, loss of business, or even a closure of it.

    Key learnings:

    •How to manage data security on shared computing resources?
    •How to secure storage and transfer of data on company-owned, or company-managed endpoints?
    •How to facilitate the path to meeting organizational and industry compliances?
    •How to ease the daily burden of your data security administration functions?
  • Securely Enabling a Hybrid Data Center with Microsoft Azure
    Securely Enabling a Hybrid Data Center with Microsoft Azure Matt Keil, Director of Product Marketing at Palo Alto Networks May 30 2017 12:00 pm UTC 45 mins
    Microsoft® Azure™ is enabling a data center transformation that results in a hybrid architecture that combines your on premises resources and the Azure cloud. From a security perspective, your challenge remains: how to protect your applications and data, regardless of their location.

    Join us for this live webinar to learn how the VM-Series can securely enable a hybrid data center. At the end of the webinar, you will learn:
    •Security considerations when moving to Azure
    •Top 3 VM-Series recommendations to protect your data
    •Tips and techniques to streamline your efforts
  • Solace : Messaging with Purpose on Pivotal Cloud Foundry
    Solace : Messaging with Purpose on Pivotal Cloud Foundry Jonathn Schabowsky May 30 2017 2:00 pm UTC 60 mins
    Your enterprise and applications need to communicate – to collect information from many sources and get data where and when it needs to be, which increasingly means in real-time. Complicating matters, as you migrate applications to the cloud and implement IoT strategies, they need to connect increasingly diverse endpoints and systems running in diverse public cloud, private cloud and on-premise environments.

    In this webinar, we’ll describe and demonstrate how the Solace Virtual Message Router can give applications and microservices running in Pivotal Cloud Foundry the ability to exchange information using open APIs and protocols like AMQP, JMS, MQTT, Qpid, Paho, REST and WebSockets. Jonathan Schabowsky of Solace’s office of the CTO will show how easily you can enable real-time communications between microservices with the new Solace Messaging Tile for Pivotal Cloud Foundry and how you can integrate Solace into your crucial data movement solution.

    Our Speaker:
    Jonathan Schabowsky is a Sr. Architect in the Office of the CTO at Solace. His expertise includes architecting large-scale, mission critical enterprise systems in various domains, such as for the FAA, satellite ground systems (GOES-R) and healthcare. Recently, Jonathan has been focused on the use of event driven architectures for microservices and their deployments into platform-as-a-services (PaaS) running within public clouds.
  • WannaCry: Inside the Next Generation of Email Attacks
    WannaCry: Inside the Next Generation of Email Attacks Michael Landewe, Researcher, Avanan Cofounder May 30 2017 3:00 pm UTC 45 mins
    Government-developed malware is loose and IT teams are scrambling. Avanan customers were protected and we had the resources of multiple partners to analyze the attack.

    In this webinar we will analyze the details of the WannaCry code and look ahead at what to expect in future email phishing outbreaks. The proliferation of state-sponsored code to unknown attackers makes is all the more necessary to improve the arsenal of tools we use to defend against them.

    We will introduce the zero-day monitoring tool at www.avanan.com/gauge and show how different tools on the Avanan platform responded to the outbreak.

    Today, more than ever, the only protection is a multi-layer, multi-technology, multi-vendor solution. True defense-in-depth that includes the best technology that the security industry can offer.
  • The Role of DevOps in Reducing the Likelihood of a Data Breach
    The Role of DevOps in Reducing the Likelihood of a Data Breach Amy DeMartine, Principal Analyst, Security & Risk, Forrester & Bhavna Sarathy, Principal Product Manager, Veracode May 30 2017 3:00 pm UTC 60 mins
    Security breaches continue to make headlines and negatively impact the reputation and bottom line for many businesses. According to Cybersecurity Ventures, global annual cybercrime costs will double between now and 2021. More than 50% of all cyberattacks target the software application layer* and the number of these attacks grows at a rate of about 25% per year**.

    Enter DevOps- a delivery approach that focuses on continuous software delivery and gives organizations an opportunity to reduce overall security risks in applications. It offers development teams the ability to introduce security earlier in the development lifecycle so they can identify and address vulnerabilities faster.

    While traditional methodologies typically introduce security during later phases of development, DevOps enables security visibility across the lifecycle to decrease discovery and remediation time.

    In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an overview of the current state of cybersecurity and the DevOps movement, how security is changing the way that software is being built and deployed, and the technologies and best practices organizations should consider in order to reduce the likelihood of a data breach. Specific topics addressing the threat of data breaches to be discussed include:

    • The organizational gaps that both security and development teams are currently tackling with regards to data breach prevention

    • Practical steps both teams can take to transition to a secure DevOps environment

    • Leveraging technologies such as Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle
  • Prevention is futile: A story that will make you WannaCry…
    Prevention is futile: A story that will make you WannaCry… Marcelo Pereira, Product Marketing Manager at Flexera Software May 30 2017 4:00 pm UTC 45 mins
    The WannaCry ransomware attacks a great example how neglecting security patches can have a catastrophic impact for businesses.
    While many discuss whether their anti-virus could have stopped the attack, the plain facts are:
    -This attack uses a vulnerability on a component of Windows and Windows Server that was patched by Microsoft two months ago
    -The vulnerability was part of the recent NSA leak, a highly publicized scandal, and not an obscure vulnerability that no one had heard of before
    -Applying the patch would prevent any successful attack
    Join us for a discussion on the challenges of patch management and how to improve patching processes to avoid falling victim of attacks like WannaCry.
  • Continuous Deployment to the Cloud
    Continuous Deployment to the Cloud Marcin Grzejszczak, Pivotal May 30 2017 5:00 pm UTC 75 mins
    “I have stopped counting how many times I’ve done this from scratch” - was one of the responses to the tweet about starting the project called Spring Cloud Pipelines. Every company sets up a pipeline to take code from your source control, through unit testing and integration testing, to production from scratch. Every company creates some sort of automation to deploy its applications to servers. Enough is enough - time to automate that and focus on delivering business value.

    In this presentation we’ll go through the contents of the Spring Cloud Pipelines project. We’ll start a new project for which we’ll have a deployment pipeline set up in no time. We’ll deploy to Cloud Foundry and check if our application is backwards compatible so that we can roll it back on production.
  • Stopping Malware Before It Reaches Your Network
    Stopping Malware Before It Reaches Your Network Jonathan Barnett | Sales Engineer May 30 2017 5:00 pm UTC 45 mins
    Malware defenses have typically been concentrated at the network edge and then at the endpoint layer. When so much business is now in the cloud and user Internet requests are resolved outside the network it’s time to manage and control at the cloud ‘domain’ layer too. This webinar looks at a simple, fast, highly effective and easy way to block most malware before it reaches your network and deliver more secure Internet access at the same time.
  • Digital Transformation of the Service Industry: Empowering Today's Employees
    Digital Transformation of the Service Industry: Empowering Today's Employees Todd Kirk, Manager, Product Development, Brainstorm, Inc. May 30 2017 6:00 pm UTC 60 mins
    There are hundreds of millions of frontline workers around the world working in hotels, restaurants, retail stores, on construction sites, and in manufacturing and other service-related industries. These team members are often the public face of the company, interacting with customers and making things happen.

    While they're critical to the company, frontline workers typically don't have a dedicated workspace or computer. This makes it difficult for them to get the information they need for their job. Digital transformation isn't just for corporate offices or IT teams - it's reshaping every industry.

    Join this webcast to:
    - See how Microsoft Office 365 Kiosk empowers frontline workers by giving them access to productivity tools like Microsoft Teams, StaffHub, Outlook, Yammer, and more
    - Learn what's included in Kiosk plans
    - Pick up some tips and tricks to get you started with Kiosk right away
  • Production Spark Series Part 3: Tuning Apache Spark Jobs
    Production Spark Series Part 3: Tuning Apache Spark Jobs Simon King, Engineer, Pepperdata May 30 2017 6:00 pm UTC 60 mins
    A Spark Application that worked well in a development environment or with sample data may not behave as expected when run against a much larger dataset in a production environment. Pepperdata Application Profiler, based on open source Dr Elephant, can help you tune you Spark Application based on current dataset characteristics and cluster execution environment. Application Profiler uses a set of heuristics to provide actionable recommendations to help you quickly tune your applications.

    Occasionally an application will fail (or execute too slowly) due to circumstances outside your control: a busy cluster, another misbehaving YARN application, bad luck, or bad "cluster weather". We'll discuss ways to use Pepperdata's Cluster Analyzer to quickly determine when an application failure may not be your fault and how to diagnose and fix symptoms that you can affect.
  • Why Continued Improvements & Best-in-Class Modern IT Security is Key
    Why Continued Improvements & Best-in-Class Modern IT Security is Key Nathan Mercer, Sr. Marketing Manager & Michael Niehaus, Director Product Marketing, Microsoft May 30 2017 8:00 pm UTC 60 mins
    Modern IT. Advanced security. Improved productivity. Support and secure devices is more important now than ever before.

    Windows 10, version 1703 (also known as the Windows 10 Creators Update) will continue to bring new security capabilities to IT administrators to help them better protect, defend and respond to threats on their networks and devices. It will also deliver new features and capabilities to help you optimize operations, enhance productivity, and maintain the most secure environment possible. Already, IT administrators estimate a 15% improvement in IT management time with Windows 10. The Creators Update will further shift resources and time-intensive tasks to the cloud, allowing you to acquire, provision, support and secure devices more easily than ever.

    Join this webinar to find out about the latest Window 10 features for IT pros, such as:

    - New actions and insights in Windows Defender Advanced Threat Protection (ATP) that enable you to investigate and respond to network attacks, including sensors in memory, enriched intelligence, and new remediation actions.
    - Best-in-class modern IT features that streamline management and deployment, including new Windows Analytics insights, in-place UEFI conversion, a new mobile application management feature, and continued improvements to Windows as a service.

    You'll also learn how you can provide feedback, and shape the future of Windows, through the Windows Insider Program.
  • 전세계 인터넷 보안 현황 보고서를 통해 살펴보는 최근 DDoS 및 웹 보안 공격 트렌드
    전세계 인터넷 보안 현황 보고서를 통해 살펴보는 최근 DDoS 및 웹 보안 공격 트렌드 인승진 (Howard Leen), 이사 (Enterprise Security Senior Architect), 아카마이코리아 May 31 2017 5:00 am UTC 60 mins
    아카마이는 방대한 양의 데이터를 분석하여 전세계 인터넷 보안에 대한 가장 정확도 높은 가시성을 제공하는 인터넷 보안 현황 보고서(State of the Internet Security Report)를 매 분기마다 발표하고 있습니다.

    해당 보고서를 통해 살펴보면 인터넷 상의 위협 트렌드가 최근 크게 변화하고 있다는 것을 알 수 있으며, 무엇보다도 IoT 기반의 봇넷을 활용한 DDoS 공격의 등장으로 최대 650Gbps에 이르는 대형 공격들이 벌어지고 있음을 확인할 수 있습니다.

    본 웨비나에서는 가장 최근에 발표된 인터넷 보안 현황 보고서를 기반으로 아래와 같은 내용들을 중점적으로 살펴볼 예정입니다.

    - 최근 인터넷 보안 현황 보고서를 통해 알아보는 글로벌 주요 보안 이슈들
    - 아시아 지역에서 발생한 보안 공격 통계
    - IoT 봇넷이 아시아 지역의 보안에 가져온 영향
    - IoT 보안 대비의 중요성
  • [CASE STUDY] How Yelp Uses Machine Data to Improve Its Customer Experience
    [CASE STUDY] How Yelp Uses Machine Data to Improve Its Customer Experience Kris Wehner, Vice President Engineering, Yelp & Charles Guenther, Site Reliability Engineering, Yelp May 31 2017 9:00 am UTC 60 mins
    Yelp, the platform that connects millions with business reviews and reservations, needed a way to make over 10+ terabytes of data accessible and usable to everyone within the company. It also needed to monitor the workloads that span both on-premises and cloud systems, across a variety of stacks.

    Join this webinar to learn how Yelp uses the Splunk platform to proactively notify on issues with the web, and save engineering hours by empowering users with access to data. In this session, you’ll hear how the company:

    • Improved website uptime with real-time notifications
    • Quickly and reliably delivers application features to users
    • Uncovers business insights and improves the customer experience

    If you're already running workloads in the cloud, or in the process of migrating, this is a great opportunity to learn how you can gain additional visibility into your cloud strategy.
  • Proteja sus comunicaciones vía e-mail
    Proteja sus comunicaciones vía e-mail Alejandro Vázquez May 31 2017 10:00 am UTC 75 mins
    Las comunicaciones basadas en correo electrónico constituyen un elemento fundamental para hacer negocios de forma efectiva. Por ello, el correo electrónico es una puerta de entrada muy popular para sabotear las redes y lanzar campañas de malware, incluidos el ransomware y las amenazas de día cero.

    Este webcast examina cómo SonicWall Email Security – ahora integrado con Capture Advanced Threat Protection – ofrece protección de sandbox multimotor basada en la nube para su correo electrónico.

    Participe en este evento y descubra cómo esta solución completa, flexible y escalable es capaz de:

    •Escanear una amplia variedad de tipos de archivos adjuntos de correo electrónico para detectar amenazas avanzadas
    •Analizarlos en un sandbox multimotor
    •Bloquearlos antes de que se emita un veredicto de seguridad
    •Implementar rápidamente las correspondientes definiciones
  • Do You Have The Right Visibility Needed To Early Detect &Combat Advanced Threats
    Do You Have The Right Visibility Needed To Early Detect &Combat Advanced Threats Karim Abillama, Manager, System Engineering RSA May 31 2017 11:00 am UTC 75 mins
    We live in an era where cyberattacks became mainstream. From malware to ransomware outbreaks, it’s not anymore whether you will get breached or not, it’s more about how quickly you can report it. No matter how well equipped your organization is in terms of having the best preventative controls in place, adversaries will always find a flaw at the most unexpected time and they will inflict damage. The analogy is striking with a maximum security prison where human ingenuity amongst fugitives has to work only once to be deemed efficient.
  • The value of Next Generation Security Platform
    The value of Next Generation Security Platform Fred Streefland May 31 2017 12:00 pm UTC 45 mins
    The combination of complex, modern IT environments and a rapidly evolving threat landscape has left many businesses challenged to control costs while effectively protecting the systems on which their operations depend. In many cases, the challenges are brought about by the combination of too many disparate security solutions that do not share context and insufficient time and/or expertise.

    To address these challenges, organisations of all shapes and sizes are looking at ways to consolidate their security infrastructure to improve their security posture and reduce their total cost of ownership.

    Please join us for a webinar where we’ll discuss how Palo Alto Networks’ Next-Generation Security Platform can enable your organization to:

    1.Reduce the threat footprint
    2.Prevent known and unknown attacks.
    3.Tie policies to users.
  • Citrix Webinar: Hybrid Cloud Basics- Get Control & Visibility for All your Apps
    Citrix Webinar: Hybrid Cloud Basics- Get Control & Visibility for All your Apps Derek Yee, Sr. Product Mktg. Manager, Networking, Citrix & George McGregor, Sr. Director, Product Mktg., Networking, Citrix May 31 2017 4:00 pm UTC 60 mins
    Applications are moving to the hybrid cloud: they are either migrating from the data center or they are being developed as cloud native applications. This webinar explores the challenges of gaining end-to-end visibility and control of your applications in a hybrid cloud environment.

    Join us and learn how to:

    •Identify the key requirements to shift your applications to the hybrid cloud
    •Build an application-centric view across all your delivery infrastructure
    •Automate tasks that save time and eliminate human error
    •Integrate with OpenStack and Kubernetes to achieve true orchestration and automation