As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
Axel Wirth, Distinguished Healthcare ArchitectRecorded: Dec 12 201867 mins
In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.
Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:
• The latest threat trends and incidents
• The challenges of securing healthcare ecosystems
• Effective cybersecurity strategies
openATTIC is a web-based management and monitoring tool for Ceph storage clusters. This webinar covers the functionality available in the most recent release, including performance graphs, node and disk monitoring, along with storage and gateway service management.
Ron Pelletier, Founder, PonderanceRecorded: Dec 11 201840 mins
Hacking is a lucrative business. Like any other line of work, there are business drivers that lead to natural surges in activity. Just as retailers rely on holiday shopping season to remain in the black, malicious actors are spending time right now gearing up for Breach Season. Pondurance research shows a massive uptick in intrusions during the months of February-April, in some cases, 80-90%. This means now is the time that hackers are busy doing reconnaissance and infiltrating networks.
Pondurance Founder Ron Pelletier will discuss:
· Breach Season basics: who is affected and what to expect
· The main drivers causing the intrusions and breaches?
· Pre-season tactics and strategies to prepare
· What companies can do to reduce the likelihood of occurrence
· Review of last year’s top threats and predictions for 2019
Ron Pelletier, Founder, Pondurance
With more than 17 years of information security and business continuity experience, Pondurance Founder Ron Pelletier brings seasoned expertise in all areas of risk advisory, incident response and forensic investigations. His training as a U.S. Army commissioned officer equipped him with problem-solving and risk analysis capabilities well-suited for the tech world. His vast experience in enterprise risk and security includes a wide range of industries and organizations ranging from Fortune 500 to small, non-profit groups.
Ron is certified in multiple disciplines relating to information and asset protection including Certified Information Systems Security Professional (CISSP), Certified Information Systems Security Manager (CISM), Certified Business Continuity Professional (CBCP), Certified Information Systems Auditor (CISA), Certified Computer Forensics Examiner (CCFE), and Certified Ethical Hacker (CEH).
Christopher Porter, Chief Intelligence Strategist, FireEyeRecorded: Dec 11 201857 mins
As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.
Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye Threat Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:
•Threats to the aviation industry, including cyber espionage and cybercrime
•What to expect from established and emerging nation states
•How threat actors are changing their tactics to stay ahead of defenders
Register today to learn what lies ahead and stay one step ahead of cyber security threats.
BI workloads are an increasingly important part of your big data system and typically consist of large queries that analyze huge amounts of data. Because of this, BI users frequently complain about the responsiveness of their applications.
Learn how Pepperdata enables you to tune your big data system and applications to meet SLAs for critical BI workloads.
Nathan Rowe, Chief Product Officer, EvidentRecorded: Dec 11 201845 mins
2018 was an important year for cybersecurity and privacy. The General Data Protection Regulation (GDPR) went into effect and the California Consumer Privacy Act (CaCPA) passed amid a flurry of high-profile cyber attacks.
While some organizations have prioritized compliance with the aforementioned regulations to prevent further damage and secure their reputations, others have simply treated them as suggestions for best practice, and have not yet implemented comprehensive processes and infrastructure to thwart cyber attacks and data breaches.
Such a broad discrepancy in how companies are tackling their cybersecurity and data protection efforts begs the question: What will happen next year?
In this webinar, we’ll discuss cybersecurity trends for 2019, with a focus on best practice recommendations as well as preventative measures that organizations can implement to protect themselves, their employees, and their customers from risk.
- Cyber attacks powered by Artificial Intelligence (AI)
- Data security risks associated with high-velocity employment (gig/share economy)
- GDPR, CaCPA, and other regulatory impacts on cybersecurity and compliance
- End-to-end integrations for identity proofing and authentication
- Security by Design and by Default
Sean Sebring and Jason YearyRecorded: Dec 11 201854 mins
Sean Sebring is an IT Process Improvement Manager who used his service management platform as a vehicle to improve business processes throughout the organization. In fact, over 50% of licensed agents in his organization are outside of IT. In this webinar, he'll cover:
- How to create buy-in from stakeholders
- How to work "on the schedule of the business"
- How to drive process improvement in IT and beyond
Moderator: Alex McDonald, SNIA SSSI Co-Chair; Presenters: Tom Coughlin, Coughlin Associates & Jim Handy, Objective AnalysisRecorded: Dec 11 201858 mins
Join SSSI members and respected analysts Tom Coughlin and Jim Handy for a look into their new Emerging Memory and Storage Technologies Report. Tom and Jim will examine emerging memory technologies and their interaction with standard memories, how a new memory layer improves computer performance, and the technical advantages and economies of scale that contribute to the enthusiasm for emerging memories. They will provide an outlook on market projections and enabling and driving applications. The webcast is the perfect preparation for the 2019 SNIA Persistent Memory Summit January 24, 2019.
Mike Rothman, President & Analyst, Securosis and Stan Engelbrecht, Director of Cyber Security, D3 SecurityRecorded: Dec 11 201863 mins
D3 Security and Securosis Present: SOAR to Security Automation Quick Wins (and Measure the SecOps ROI)
There isn't enough time or skilled resources to stay on top of all your security operations responsibilities. You can't work harder, so you'll need to work smarter. That means embracing Security Orchestration, Automation and Response (SOAR) technology as a means to make your team more efficient and effective.
But where do you start? Do you have to blow up your existing operational processes to use a SOAR tool? How can you select the best tool for YOUR environment? How easy is it to integrate the tool with your existing controls? Are you saving money? As you can see, there are many questions to answer for those looking at security automation.
In this webcast, Securosis president and analyst Mike Rothman and D3 director of cyber security Stan Engelbrecht will give you a wealth of tips for how to select, deploy and operate SOAR, so that you can keep pace with the attacks on your environment. You'll learn:
• Unfiltered SOAR platform selection criteria from Securosis president and analyst Mike Rothman
• Security automation use cases that provide a quick win without losing sight of long-term value
• Product and service integrations that automate IR and yield the most SecOps impact
• How to substantiate the ROI of your SOAR investment through time and cost tracking
The webcast will be focused on providing knowledge you can use RIGHT NOW, including use case "blueprints" and business outcomes from real-world SOAR implementations.
John Bell, Sr. Consultant and Michael “Q” Brame, Quality Engineering LeadRecorded: Dec 11 201831 mins
Do you need to securely store data and access it via NFS? In this webinar, John Bell and Michael Brame will discuss using NFS with object storage and explain how this has been handled by traditional file-to-object gateways. They will also do a live demo of Caringo SwarmNFS—the first lightweight file protocol converter to bring the benefits of scale-out object storage to NFSv4, seamlessly integrating files and object storage.
Dropbox Product Managers and Product Marketing ManagersRecorded: Dec 11 201828 mins
Here at Dropbox, we take your work seriously. That’s why we build products that help you get your best work done. Now, for the first time, we’re giving you an inside look at how customer feedback and user research are helping us take the work out of work.
Watch our three-part webinar series to hear how we build easy-to-use products for:
Part 1: Mobile work. How do we design a mobile app that lets people get real work done on the go—without creating an expectation of round-the-clock responsiveness? Hear the research behind our latest mobile app and insights on the future of mobile work.
Part 2: Unblocking workflows with Dropbox previews. You might not always have the right software needed to open and view your files. At Dropbox we solved this problem for our users with a best-in-class previews platform. Even if you work with massive design and media files, we’ve got you covered.
Part 3: Coordinating work with timelines in Dropbox Paper. The nature of teamwork is changing. Increasingly, coordination is a part of everyone’s job. That’s why we built Dropbox Paper, a collaborative workspace that brings collaboration and coordination together. Learn how we approach the work of managing work with timelines, Paper's newest feature.
Derek Yee, PMM, Cloudflare | Cavin Kindsvogel, Stream Product Specialist, Cloudflare | Jon Levine, Stream PM, CloudflareRecorded: Dec 11 201831 mins
CDNs have played a significant role in successful video delivery, especially across OTT services, publishing, ad tech, gaming, and sporting sites. Cloudflare is building a better Internet, which includes delivering a fast, secure and reliable video experience for consumers anywhere in the world. Cloudflare offers a high performing distribution network that can meet the evolving needs of companies delivering video.
Join us for this 45-minute webinar where we cover the following:
- The foundations of building a resilient network to support high traffic video content
- Advances in Cloudflare’s caching infrastructure for better streaming performance
- How Cloudflare Workers provides video providers increased control of content distribution and visibility to user analytics
Chris Goettl, Director of Product Management for Security at IvantiRecorded: Dec 11 201841 mins
Since WannaCry changed the game in June 2017, cyber threats have continued evolve in intent and consequences. How can you protect your organization from today’s sophisticated attacks designed to have such a critical impact? You must prioritize risk.
Join Chris Goettl, Director of Product Management for Security at Ivanti, as he looks at how attacks today are getting into networks, the damage they’ve done, and how focusing on the right threat vectors can go a long way toward protecting your organization from a similar fate.
Jon Kies, Product Marketing Manager and Nisarg Shah, Product Management Director, Micro FocusRecorded: Dec 11 201862 mins
Join us for an exciting and informative look at the latest release of Micro Focus Network Operations Management.
Network Operations Management (NOM)—the leading management tool for enterprise networks—is built on the core capabilities of Network Node Manager I and Network Automation. It integrates fault, performance, configuration, and compliance of physical, virtual, wireless, and software-defined network infrastructures.
Learn about NOM’s latest enhancements for diagnostic analytics, the scheduled out-of-service feature, integration with Micro Focus Operations Bridge, and more.
You will also get a sneak preview of the new NOMX User Interface—our next-generation customizable and persona-based experience that unifies network data from monitoring, automation, compliance, and orchestration into actionable insights.
Dean Wallace, Marvell; Barry Maskas, HPERecorded: Dec 11 201850 mins
Fibre Channel’s speed roadmap defines a well-understood technological trend: the need to double the bit rate in the channel without doubling the required bandwidth.
In order to do this, PAM4 (pulse-amplitude modulation, with four levels of pulse modulation), enters the Fibre Channel physical layer picture. With the use of four signal levels instead of two, and with each signal level corresponding to a two-bit symbol, the standards define 64GFC operation while maintaining backward compatibility with 32GFC and 16GFC.
This advanced technical session will cover the T11 standards which define 64GFC serial Fibre Channel, backwards speed auto-negotiation compatibility, and compatible form factors:
•New physical layer and specification challenges for PAM4, which includes eye openings, crosstalk sensitivity, and new test methodologies and parameters
•Transceivers, their form factors, and how 64GFC maintains backward compatibility with multi-mode fibre cable deployments in the data center, including distance specifications
•Discussion of protocol changes, and an overview of backward-compatible link speed and forward error correction (FEC) negotiation
•The FCIA’s Fibre Channel speed roadmap and evolution, and new technologies under consideration
Kevin Haley, Director Security Response, SymantecRecorded: Dec 11 201848 mins
Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.
Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.
Key Learning Objectives:
• Insights on cryptojacking, fileless threats and ransomware
• Capabilities you need to protect yourself from these threats
• Best practices for more efficient and effective endpoint security
Natalie Fisher, senior product managerRecorded: Dec 11 201830 mins
Cloud BI brings the promise of increased productivity and operational efficiency—and chances are high that sooner or later you will face a cloud migration. If you are thinking about moving your on-premises analytics deployment to the cloud, or starting your journey directly in the cloud and don't know where to begin, this session is for you. We will cover useful best practices for cloud deployment of TIBCO Spotfire®, including where to start and what you need to know about transitioning to the cloud.
Arun Trivedi, Partner, Wipro and Kelly Harris, Senior Content Manager, BrightTALKRecorded: Dec 11 201849 mins
This webinar is part of BrightTALK's Ask the Expert Series.
Service monetization is sometimes a competitive differentiator or an answer to disruptive competitors. Irrespective of the reason for transformation, service monetization provides a great platform to model business models to improve customer retention and increase revenue in the longer term.
This session will provide participants with an understanding of service monetization challenges and how companies can transform their overall business process and quote to revenue in particular.
Join Arun Trivedi, Partner, Wipro Technologies and Kelly Harris, Senior Content Manager, BrightTALK for a live discussion on service monetization and revenue streams from XaaS.
Кирилл Сорокин, Системный инженерDec 12 20188:00 amUTC60 mins
Новое поколение ЦОД состоит из пулов ИТ-ресурсов с разделяемым доступом: вычислительные мощности, ресурсы хранения и сетевые фабрики могут быть доступны любой задаче по запросу. Узнайте как Кинетическая Инфраструктура PowerEdge MX, первое модульное решение спроектированное для построения компонуемых ЦОД, позволяет создать легко изменяемую ИТ-среду, повысить уровень утилизации ИТ-ресурсов и обеспечить защиту инвестиций.
Frank Blasa und Wolfgang SowarschDec 12 20189:00 amUTC30 mins
Halten Sie noch immer Ausschau nach einer mächtigen, Cloud-ähnlichen Backup-Lösung, die aber auch mächtig flexibel und mächtig einfach ist? Sozusagen „Plug & Play“? Einfach Stecker rein, und es wird automatisch installiert. Linear skalierbar, fehlertolerant, selbstheilend und Cloud-ähnlich.
Nehmen Sie sich einen Café und 20 Minuten Zeit, um in unserem Webinar mehr über die neue Leichtigkeit des Backups zu erfahren. Sie werden sehen: Mit einer super-einfachen „All-in-one“-Appliance auf Scale-out-Basis können Sie sich beruhigt anderen Aufgaben widmen.
Die Sicherheit von Unternehmen zu managen und auf Cyber-Ereignisse zu reagieren sind große operative Herausforderungen. Unzureichende Transparenz und mangelndes Wissen über diese Risiken innerhalb der Netzwerk-Fabric verschärfen das Problem noch weiter.
In diesem Webinar erläutern wir, wie eine ganzheitliche Orchestrierung der Sicherheitsinfrastruktur gelingt. Sie lernen intelligentere Sicherheitsregeln und -kontrollen kennen, um alle Sicherheits-, Compliance- und Verfügbarkeitsanforderungen der Netzwerkumgebung sicherzustellen. Außerdem erfahren Sie, wie Sie:
• Single Sign-on(SSO)-Zugriff gewährleisten, um Netzwerk-, Endgeräte- und Cloud-Security Services bereitzustellen und zu verwalten.
• ganze Sicherheitsprozesse und -services von einer einfachen, gemeinsamen Cloud-Benutzeroberfläche aus verwalten.
• eine zentrale Übersicht und situativ angepasste Informationen zur Sicherheitsumgebung des Netzwerks gewinnen.
• eine fehlerfreie Regelverwaltung erreichen.
• Firewalls remote mithilfe der Cloud implementieren und bereitstellen.
Dinah Barrett, Specialist Solutions Architect, AWS Marketplace & David Maclean, Cloud Engineer, Palo Alto NetworksDec 12 20189:30 amUTC60 mins
Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing.
In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS
and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.
Simon Bryden, Consulting Systems Engineer, FortinetDec 12 201810:00 amUTC45 mins
In this webinar we will discuss some of the key security events and trends over the last year, drawing on threat intelligence facts and statistics as researched and reported by the FortiGuard Labs.
As as both cyber criminals and cyber defenders look to new technological advances, we will then consider some emerging threats and defense strategies and discuss how both sides are likely to benefit, and to what extent?
Jamie Cowper, Director, IBM Resilient, Jess Cholerton, European Technical Sales, IBM ResilientDec 12 201810:00 amUTC59 mins
The conversation for the upcoming Payment Services Directive (PSD2) has been centered on the digital transformation offered by the new open banking requirements. However, there are major implications for Incident Response (IR) too.
In our upcoming webinar on Tuesday January 23 at 12.00 GMT our security experts, Jamie Cowper and Jess Cholerton, will discuss the following:
- The mandatory incident reporting requirements outlined in PSD2
- How a well-documented, audited IR process is crucial to security teams meeting the four-hour deadline
- The value security orchestration and automation strategies can provide to IR processes for staying compliant
Jacqueline Bloemen, Senior Analyst BI (BARC) and Becky Smith, Sr. Product Marketing (Denodo)Dec 12 201810:00 amUTC60 mins
In a digital World data is really everywhere. It enables innovative use cases, optimizes internal processes and will significantly affect tomorrow´s businesses.
The growing interconnectedness of people, companies, and devices has led us to a vast volume of data from an ever-widening variety of sources. This has resulted in the rising awareness of the necessity to implement a data strategy.
In this webinar Jacqueline Bloemen, Senior Analyst BI at BARC and Becky Smith, Senior Marketing Manager at Denodo, provide an overview of the current state of data strategy and data governance initiatives from companies around the world, based on the findings of a recently conducted study.
Key Questions this webinar will address:
- What are the most striking benefits of data governance?
- Which technological approaches are companies taking to control and provide data?
- What are the critical success factors of effective data governance?
1) Introduction and Challenges (Denodo)
2) Insights into the current state of data strategy and data governance initiatives (BARC)
3) Key Takeaways
유 지 영, Solutions Engineer, CloudflareDec 12 201810:00 amUTC60 mins
최근 몇 년 동안 한국, 싱가포르, 일본, 중국 같은 국가에서 DDoS 공격이 빈번하게 발생하고 있습니다. 또한 2018년에는 Memcached 서버를 이용하는 대규모 DDoS 공격 사례들이 새롭게 목격되고 있습니다. 이 웨비나에서는 날로 확대되는 DDoS 위협 환경에 대해 알아보고 공격의 유형과 규모에 관계없이 웹 사이트를 보호할 수 있는 Cloudflare의 이점을 소개합니다.
웨비나를 통해 다음을 알아보십시오.
-DDoS 공격의 유형 및 최신 트렌드
-DDoS 방어를 위한 Cloudflare 활용법
발표자: 유 지 영, Solutions Engineer, Cloudflare
진행자: 박 선 영, Business Development Manager, APAC, (ISC)²
Adrian Lane, Analysis, SecurosisDec 12 201810:30 amUTC43 mins
When software development moves at the speed of DevOps, creating every line of code from scratch is simply not feasible. In turn, most development shops are increasingly relying on open source libraries to supplement their code.
The use of these open source libraries is not in itself a bad thing, on the contrary, it’s best practice, and not taking advantage of this code would put your organization at a competitive disadvantage. The risky part lies with the visibility. What happens when it’s revealed that an open source library contains a major vulnerability? Would you know if you are using that library? What about where or how you are using it? Could you find out fast enough to patch it? Attend this session to get up to speed on open source library use, including its risks and best practices.
Victoria Oiknine, Project Manager at WhiteSourceDec 12 201811:00 amUTC15 mins
Meet WhiteSource Bolt for GitHub - the new free app which will allow you to harness the power of open source without having to compromise on security or agility ever again!
WhiteSource Bolt continuously scans all your repos, detects vulnerabilities in open source components and provides fixes, all in real-time, in your GitHub native environment. The tool supports both private and public repositories, and covers over 200 programming languages.
Sign up to this short webinar to learn more about the different capabilities of this new app and how to use it in your GitHub native environment.
Mike Chen, Tim Murphy, Robert Arandjelovic | Live Q&A with Karthik RamakrishnanDec 12 201811:00 amUTC62 mins
Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.
Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?
In this webinar we'll discuss:
- Why you should embrace cloud-based network security
- The tools you need to provide protection against a variety of attacks
- Why a proxy belongs at the center of your cloud service
- Cloud migration strategies
- Integrations that orchestrate defenses across control points and attack vectors
Register Today to hear from Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic, Director Product Marketing.
With a live Q&A from Karthik Ramakrishnan, Senior Systems Engineer, EMEA Emerging Markets
A unified security solution for a new era of digital transformation.
Join our technical team as they provide a deeper dive into the Kaspersky Anti-Targeted Attack (KATA) and Kaspersky Endpoint Detection and Response (EDR) platforms.
- it delivers complete visibility across the distributed enterprise environment, together with global threat statistics and reputations, providing contextualised, actionable Intelligence.
- multi-dimensional advanced detection combines machine learning with advanced detection capabilities using static, behavioural, cloud reputation, sandboxing and pattern based detection engines, together with a Targeted Attack Analyser.
- automated prevention of and response to advanced threats
Verdicts are automatically shared via the platform with a whole spectrum of products, including email, web, endpoint and storage protection. As a result, instant action can be taken when an incident emerges.
This session is highly recommended for technical roles and continues our series of technical talks. If you missed a previous one please check it out on our On-Demand Service.
Alok Shukla, VP Data Products, Airtel Global BusinessDec 12 201811:00 amUTC64 mins
The fast proliferation of content, availability of affordable smartphones combined with deeper penetration of broadband services has led to an explosion in data consumption across India, making it one of the fastest growing internet destination in the world. This translates into the 2nd largest online market by 2021 with 600 mn+ users and an additional 400 mn users over the next 5 years. This exponential growth presents immense opportunities. Looking to tap internet led growth in India? Join Airtel talk about next generation data solutions with rise of OTTs, internet software, SaaS, content, media, DC, Cloud and ecommerce companies.
Tim Jarrett, Senior Director of Enterprise Security Strategy, VeracodeDec 12 201811:30 amUTC48 mins
How far-reaching is a vulnerability in one open source component? We recently took a closer look at one vulnerable component to find out. We followed the path of one component library -- Apache Commons Collection (or ACC) that contained a serious vulnerability. We traced all the other libraries ACC touched and, in turn, made vulnerable. In the end, we found its vulnerability had spread to an astounding 80,323 additional components.
Attend this session to follow the path of this vulnerability and get a clear picture of exactly how and why open source libraries can pose such significant risk, and how to use and manage them in a secure way.
Thiago de Lima, SE Brazil from A10 NetworksDec 12 201812:00 pmUTC60 mins
O esgotamento global dos blocos livres de endereços IPv4 disponíveis e a adoção de IPv6, impõem uma série de novos desafios ao crescimento e a rentabilidade dos provedores de serviços. Na maior parte dos casos, os provedores de serviços devem desenhar e implantar estratégias de curto e longo prazo, para preservar recursos extremadamente escasso como são seus endereçamentos IPv4 e migrar sua rede, serviços e assinantes para IPv6.
- Preservação de endereços IPv4
- Migração e coexistência com IPv6
- Aspectos legais, visibilidade e acessibilidade dos usuários
Mark Curphey, VP of Strategy, VeracodeDec 12 201812:30 pmUTC47 mins
It’s one thing to simply talk about the pervasiveness of open source risk. What do you do when your leadership team wants you to actually take action? Where do you start? How do you even begin to inventory the seemingly insurmountable amount of open source libraries deployed across your entire application infrastructure? It takes a systematic approach to identifying vulnerable open source libraries – a system that requires multiple stakeholders across various functional groups including security, development, and sometimes your legal and vendor management teams.
Join Mark Curphy, VP of Strategy at Veracode, as he interviews a customer to discuss how they were successful in implementing a scalable security program to effectively tackle the problem of open source risk. You’ll get real insights from an industry practitioner about how to recognise harmful third party libraries, establish an open source software security policy, and communicate security requirements to the team at large.
Griff James, Director, Damrod Analysis Ltd.Dec 12 20181:00 pmUTC45 mins
A sound defence needs more than technology. Alongside advancements in machine learning and artificial intelligence, there remains a vital role for human insight and ability. At heart, cyber is a field of conflict – a contest over access to data. To allocate resources effectively and win that fight, defenders need consider the attacker’s perspective. Only by understanding what is under threat and what the likely attacks are can defenders allocate defences effectively.
Ideal for technical leaders explaining priorities to non-technical managers, this webinar discusses how to understand, assess, and defend against cyber-attack using widespread offensive techniques to discuss how best to develop defensive strategy.
La gestion de la sécurité et la réponse apportée aux cyber événements constituent des défis majeurs. Une visibilité et une connaissance insuffisantes de ces risques au sein de votre réseau aggravent cette problématique.
Regardez ce webcast pour découvrir comment établir une approche holistique connectée en matière d’orchestration de la sécurité. Apprenez à mettre en place des règles de sécurité et des actions de contrôle plus intelligentes pour bénéficier d’un environnement réseau plus solide, plus sûr et plus conforme. Vous apprendrez comment :
• proposer un accès avec signature unique (SSO) afin de dimensionner et gérer les services de sécurité réseau, terminaux et Cloud
• contrôler l’ensemble des opérations et des services depuis une interface Cloud commune simplifiée
• bénéficier d’une visibilité centralisée et d’une identification en situation de la sécurité réseau
• bénéficier d’une gestion des règles sans erreur
• déployer et dimensionner des pare-feux à distance via le Cloud
Anthony St Clair and Farzad SeihounDec 12 20182:00 pmUTC45 mins
This webinar will provide insight into what Verizon anticipates will be the most prolific cyber threats for 2019. Members of the Verizon Threat Research Advisory Team offer their outlook on social engineering trends for the next twelve months, summarizing thousands of man-hours spent in customer investigations, along with our dark web research, threat libraries, and identified cyber anomalies drawn from our vast IP network. We will explain how Verizon addresses these types of threats on behalf of our customers, and our top recommendations for ways that organizations can take proactive steps on their own to secure their network.
Gary Moore, Vice President, Sogeti UK, Malcolm Isaacs, Sr. Solution Marketing Manager, Micro FocusDec 12 20182:00 pmUTC45 mins
The latest edition of the World Quality Report 2018-19 analyses responses from 1700 CIOs and other IT Professionals in 32 countries, across ten different sectors, and discussed the trends shaping QA and testing today, along with recommendation for addressing tomorrow’s challenges.
In this webinar, we will explore the findings for the UK and the capabilities required for:
-Complex integration testing
-Test automation across decentralized teams
-Virtualization and the rise of containerized test environments
Put your questions to our experts during the live Q&A and leave with a better understanding of what is top of mind for QA and testing professionals in the UK.
Chris Wigget, Director Insights and Analytics, Britehouse a division of Dimension DataDec 12 20183:00 pmUTC60 mins
Information is the heart of the modern organisation. For many years now business intelligence has been at the forefront of taking data and attempting to turn it into actionable insights.
The truth is that traditional business intelligence approaches are not able to provide the digital organisation with the level of insight that the modern business environment demands.
In this talk we’ll examine how traditional business intelligence is failing the modern, agile organisation, how simply embracing ‘the next big thing’ can backfire, and why organisations find themselves in this situation.
We’ll also show how advanced analytics can help companies escape the information swamp and start turning the data they have into the information they need.
Akhilesh Dhawan, Director of Prod Marketing- Cloud and Darshant Bhagat, Director of Product Management, CitrixDec 12 20184:00 pmUTC47 mins
Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.
This webinar deep dives into:
- Protection of applications from on-premise to the cloud
- Hypervisor protection of servers before the threat hits the operating system
- Device and user protection from external threats
Learn how to proactively counter internal and external threats through analytics.
Meeting the ever-increasing array of IT security regulations can be intimidating, but failing to comply risks severe penalties. Can you afford to leave your most critical resources unsecured from insider threat and cyber attack, or to face millions in fines for non-compliance?
Privileged Access Management (PAM) streamlines your organization's compliance with cybersecurity measures including GDPR, the NIS Directive, PCI DSS, HIPAA, and many other state- and industry-level regulations.
Learn how you can tackle these standards with a simple all-in-one PAM solution for robust IT security compliance!