The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Shahnawaz Backer, Solution Architect, F5 NetworksRecorded: Dec 12 201943 mins
It’s a fact: APIs are central to digital transformation. They’re the connective tissue that powers modern web architectures and mobile apps and enables enterprises to deliver a digital marketplace. APIs have become ubiquitous—when we order food online, hail a cab using an app on our phone, or book airline tickets, APIs are behind it.
As you modernize applications, you’re going to need a modern API management solution. Learn how F5 and NGINX can help you achieve full API lifecycle management across multi-cloud environments for both traditional and modern apps.
In the webinar and demo, we will explore:
- What is API Management
- How to secure your API gateway
- API Gateway Deployment patterns
- Visibility and Analytics to mature API program
Raffael Marty, Head of Forcepoint X-Labs & Carl Leonard, Principal Security Analyst, ForcepointRecorded: Dec 12 201950 mins
Join Forcepoint’s Head of X-Labs, Raffael Marty, and Principal Security Analyst, Carl Leonard, as they discuss our top 5 Cybersecurity Predictions for 2020. In this webinar they will discuss:
- The evolution of Deepfake media applied to cybersecurity
- Data theft at the speed of 5G
- What it means to be “Cloud Smart” but remain “Cloud Dumb”
- Making data protection and privacy legislation work for you
- Moving ‘left of breach’: from indicators of compromise to indicators of behaviour
Watch this webinar and gain valuable insights for the year ahead.
Paul Agbabian, Global Chief Technology Officer and Chief Architect, BroadcomRecorded: Dec 12 201959 mins
Join Paul Agbabian, Global CTO and Chief Architect, as he details the power of our combined enterprise security solutions and discusses how Symantec is delivering integrated cyber defense to solve critical cyber security problems for your entire organization.
Manjul Sahay, Director of Product Management NutanixRecorded: Dec 12 201937 mins
In this webinar, you will learn about deploying a successful solution for Disaster Recovery (DR) with Nutanix. You will gain insights into key trends and gather data points to help you prepare a business case for DR within their organizations: ESG Senior Analyst Christophe Bertrand will outline the market landscape and explore organizations’ challenges and needs for a business continuity / disaster recovery planning. The key with DR is to get it done right. That’s why you will also hear from Manjul Sahay from Nutanix who will share how Xi Leap cloud DR service from Nutanix can help organizations deliver on their data protection and DR SLAs.
Greg Kras, Perry CarpenterRecorded: Dec 11 201941 mins
When Greg Kras, KnowBe4’s Chief Product Officer, first rolled out our Phish Alert Button (your users can use it to report suspicious emails), he thought it would be a great way for you to stay up-to-date on actual phishing emails occurring in the wild. Well, he was right but there was also an “interesting side effect”.
Phish reports grew from a couple hundred emails in the beginning to 10,000+ messages per day! Like you, KnowBe4’s team had to adapt our processes to deal with the influx of reports and create mechanisms to facilitate prioritization, enabling the team to take action.
Join Greg and Perry Carpenter, KnowBe4 Chief Strategy Officer, as they explore the challenges and opportunities for creating order from your organization’s phish reporting chaos. Learn useful tips and best practices from in the trenches lessons learned to turning today’s “see something, say something” world into an asset rather than a liability.
Listen to hear about:
- How to maintain business continuity by returning “clean” messages as fast as possible
Enriching email data and clustering into groups to expedite prioritization and follow up
- How Artificial Intelligence and Machine Learning can help you spot real malicious emails even faster
- How automating your email disposition process can save you so much time
Andy Wyatt, Sr. Technologist at InstartRecorded: Dec 11 201917 mins
As web skimming attacks like Magecart continue to grow in popularity for hackers, businesses need to take responsibility for customer information they obtain in their web apps and take the appropriate steps to ensure their customers' data is safe. Today Instart is happy to announce our Web Skimming Protection for Salesforce Commerce Cloud to help prevent these types of attacks from impacting Salesforce Commerce Cloud clients.
In this webinar, you will learn about:
-Magecart attacks and how they infect your site
-Why Instart can make a difference in helping you prevent a breach like this
-How to get started with Instart Web Skimming Protection for Salesforce Commerce Cloud
Negisa Taymourian, Senior Product Marketing Manager at Cisco UmbrellaRecorded: Dec 11 201942 mins
Security needs to evolve to secure DIA and mobile users, remote workers, and SaaS apps. With 2020 on the horizon, organizations need a better way to see and control all internet traffic.
Workplaces are changing; more organizations are switching to direct internet access (DIA) at satellite offices. Users are embracing cloud apps, skipping the VPN, and enjoying the freedom to work from anywhere. But the draw of DIA creates even more gaps in security for IT
Join us for this webcast to learn how you can improve security, simplify your security environment, and reduce the number of security tools to reduce strain on your limited resources.
Jon Tobin Solutions Architect, Trilio, Kevin Jones Cloud Domain Architect, Red HatRecorded: Dec 11 201949 mins
Cloud upgrades can be painful. It’s tempting to delay these system changes and bypass updates in order to avoid interruptions in day-to-day operations. But as your software ages and become more susceptible to security risks over time, the need for a simple, reliable upgrade path grows more urgent.
This webinar will walk through the Red HatⓇ fast forward upgrade process and introduce TrilioVault, which provides data protection for complete OpenStackⓇ workloads.
Join us to learn:
- How Red Hat and Trilio offer a safer, more secure, and more efficient path for customers to upgrade to the latest OpenStack version.
- About the value of data protection during upgrades and how TrilioVault captures and protects tenant workloads throughout the procedure.
- How administrators can rapidly and efficiently restore an entire overcloud in an automated fashion, while minimizing user input to the bare minimum.
- How you can reduce downtime by streamlining restoration activities with point-in-time backups from Trilio.
Andrew Leong, Director Product Marketing, R. Scott Raynovich, Founder and Principal AnalystRecorded: Dec 11 201954 mins
SD-WAN has become top of mind for many enterprise network operations teams as they look to align better to their organizational priorities of building more agility and efficiency. In pondering which technology projects to prioritize for the year ahead, you might be wondering how to justify a transition to SD-WAN. While benefits such as security, support for cloud migration, and improved user experience may be important, not surprisingly the business case is also about dollars and cents.
Join Citrix and R. Scott Raynovich, Founder and Principal Analyst from Futuriom as we take a real-world look into the drivers, technology considerations, and deployment options that will help in the assessment of SD-WAN in your organization. We’ll be examining the benefits of:
· Converging networking and security functions at the WAN edge
· Augmenting or replacing existing connections with lower cost internet and higher reliability
· Building a platform for application performance, strong security, and easy extension to the cloud
· Leveraging a service provider to help with design, deployment, and management Additionally, we’ll get some perspective on how several Citrix customers went through their journey to SD-WAN and what benefits their organizations realized.
Mehul Patel, Director, Product Marketing - Menlo Security, Inc. & Steve Piper, Founder & CEO - CyberEdge GroupRecorded: Dec 11 201949 mins
According to research from CyberEdge Group, nearly four in five organizations were affected by successful cyberattacks last year. With enterprises increasingly turning to the cloud, and with the cyberthreat landscape growing in sophistication, the stakes are getting even higher.
How will cloud transformation impact your organization? And what’s in store for enterprise IT security teams next year?
In this webinar, hear from industry experts as we walk through the top 5 security predictions for 2020 in the era of cloud transformation. Topics for discussion include:
• Understanding cybersecurity’s “weakest links”
• Addressing critical gaps in IT security personnel
• Leveraging the cloud for protecting the cloud
• And much more!
Colin McCarthy, Senior Solutions Architect, Red HatRecorded: Dec 11 201921 mins
Introducing automation into your security practices is easy, but planning is required to ensure to implement it in production and at scale. Learn how to architect your Security Automation practice with Ansible, future-proofing its usage to speed up threat analysis and perform remediations.
Zach Hill, Anchore Chief Architect and Michael Michael, Harbor Core MaintainerRecorded: Dec 11 201928 mins
Zach Hill, Anchore Chief Architect, is joined by Michael Michael, Harbor Core Maintainer, for this short discussion about Anchore deep image scanning for the Harbor registry. Using Anchore, registry operators can define policies that validate or reject containers, enforcing security best practices.
Edna Menon, Sr Product Manager & Paul Barrett Systems SpecialistRecorded: Dec 11 201945 mins
Teradici PCoIP Management Console 2019.11 offers significant upgradeability, usability, and security enhancements!
In this webinar, we’ll be showing you a demo covering some of the new features, including:
•General availability of Redhat Package Manager (RPM) for blazing fast upgrades
•Account lockout enhancements for improved security
•Support for User Principal Name (UPN) for simplified login with Active Directory
•Ability to enable OPUS audio codec and dual audio output in Zero Clients from Management Console
Ray Jones, Senior Director, NETSCOUTRecorded: Dec 11 201951 mins
In today’s threat landscape, more tools means more security, right? Not necessarily. The resulting tool sprawl places new and stressful demands on security and network operations. The challenges are especially acute when it comes to active (inline) security systems that are designed to act on live network traffic. Every change or upgrade means a potential network disruption. Trying to deal with this sprawl can be a true IT nightmare.
Please join Ray Jones, Senior Director at NETSCOUT as we discuss how full packet visibility empowers your security systems to perform at their utmost efficiency – by processing the traffic they are designed to see. In the webinar you will learn:
How to get unified visibility that allows multiple IT groups to access packet flows without creating disruptions
Real world examples of how to optimize the flow of traffic from the network to your security systems and monitoring tools
Ways you can leverage NETSCOUT’s cost-effective and flexible software-driven network packet brokers- at scale
Brandon Cooper, Sales Support EngineerRecorded: Dec 11 201931 mins
Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability. Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do. We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately. Sign up to test drive CMD+CTRL!
Brandon Cooper, Sales Support Engineer
Keywords: cyber defense, cyber security, application security, training security, vulnerability
Shane Cooper | Sales EngineerRecorded: Dec 11 201940 mins
We can all agree: it’s the nature of technology to advance. Cybercrime is no exception to this rule, and neither are the tools we use to stop attacks. However, you’d be surprised how much a business can accomplish in terms of their own security simply by keeping existing systems up to date and using technology to their best advantage.
Join this webinar to learn some basic ways that you can future-proof your very own IT environment against sophisticated, modern malware.
Johna Till Johnson, CEO and Founder, Nemertes ResearchRecorded: Dec 11 201947 mins
There are hundreds of cybersecurity tools on the market. But which ones genuinely improve operational security? There's only one way to be certain. Find out from this webinar which technologies (and vendors) correlate with improved Mean Total Time to Contain (MTTC) threats--and which don't. From advanced analytics, AI, and machine learning to automation, you'll learn which technologies really deliver.
Businesses have turned to IT for competitive differentiation. They demanded IT bring accelerated delivery, resource conservation and cost savings. IT has responded with DevOps/cloud-based models and practices that utilize automation, autoscaling and playbooks. With this speed comes increased risk, compliance concerns and has left IT staff wondering how they can gain visibility and segmentation across their entire heterogeneous environments easily, effectively and at this new speed of innovation. With the realization that traditional methods of segmentation like VLANs, cloud security groups and firewalls are not suitable for today’s rapidly changing enterprise environments enterprises have turned to software-defined segmentation.
In this webinar come learn about how modern software-defined segmentation solutions:
Start with visibility.
Provide enterprises with easy ways to identify and label workloads.
Provide easy to implement, granular enforcement that goes way beyond IP address and port but is able to lock down by process, user and domain.
Enables DevOp automation, provisioning and management.
Is decoupled from and works in an agnostic fashion across every enterprise platform.
Provides unparalleled security while enabling compliance and ongoing compliance validation.
Robert Martin, Sr. Security Engineer, Cisco Systems, Inc.
Dave Klein, Senior Director, Engineering & Architecture, Guardicore
Jonathan Fowler, CISO, Consilio
Eric Hibbard, CISSP-ISSAP, ISSMP, ISSEP, CISA, CCSP; Steven W. Teppler, Esq.; Thomas Rivera, Chair, SNIA DPPCRecorded: Dec 11 201962 mins
Failing to protect sensitive information can put a lot of people at risk of being exploited by cybercriminals, and can make a company face enormous legal penalties.
The way information is shared and stored can put the information at risk.
It is risky to store personal information on portable devices, which are easily lost or stolen.
In addition, the consequences of a data breach can be devastating. Identity theft could lead to financial losses, and a company could face lawsuits and legal penalties.
This presentation will cover what kinds of personal information must be protected & guidelines for keeping this info safe.
After viewing this session, attendees should:
1. Understand how Privacy is defined
2. Highlight some of the Privacy regulations from around the globe
3. Understand what information to safeguard
4. Understand how these privacy regulations affect organizations that handle personal information
Ido Safruti, CTO and Co-Founder at PerimeterX and Deepak Patel, VP of Product Marketing at PerimeterXRecorded: Dec 11 201936 mins
As 2019 comes to an end, we walk away armed with even more knowledge about the cyber threats and trends we can expect to continue in 2020 and beyond. This year revealed a range of security developments from evolving bot threats and rising Magecart attacks to newly discovered carding bots. We believe that 2020 will be the wildest security year in a long time.
Tune in for a live webinar on December 11 at 10 am PT as our security experts - CTO and founder of PerimeterX Ido Safruti and VP of Product Marketing Deepak Patel - share their thoughts and observations about cybersecurity in 2020. You will learn about:
The predictions that highlight some of the most critically important trends in cybersecurity
How to protect your customers’ PII data and your brand reputation against ever-evolving ATO and Magecart attacks
What would be the next targets for digital skimming and Magecart
GDPR and CCPA - how to be proactive and prepare your online business
Frank Matzkies, Senior Security Consultant PCI QSA, Security Assurance,Verizon Business GroupDec 12 201910:00 amUTC60 mins
Manche Firmen investieren viel Zeit und Geld in Datenschutz- und Compliance-Programme. Trotz bester Absichten schafft es mehr als die Hälfte der Unternehmen nicht, ein nachhaltiges Datenschutz- und Compliance-Programm aufzusetzen und durchzuführen.
Im Payment Security Report, den Verizon 2019 wieder herausgegeben hat, wird gezeigt, wie diese Aufgaben erfüllt werden können und welche Möglichkeiten und Hilfsmittel es gibt, Ihr Compliance Management auf eine neue Ebene zu heben.
Zum ersten Mal enthält der Report Bewertungsdaten auch von anderen qualifizierten Bewertungsfirmen der Zahlungssicherheit. Dadurch erweitert sich die Datenbasis und das Blickfeld im Vergleich zu vergangenen Reports.
Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving SpecialistDec 12 201910:00 amUTC48 mins
GDPR, Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.
So what is best practice with respect to developing and implementing a new secure approach to your data archiving challenges?
Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:
In this demo, we'll share how you can:
- Mitigate reputational risk
- Stay compliant with industry rules and regulations
- Improve visibility into your archived data
Chris Eng, Chief Research Officer, VeracodeDec 12 201911:00 amUTC37 mins
We consistently come across organizations that think they can check the AppSec box if they’re scanning their code, or who are quantifying success by how many scans they can run a day, rather than by how many flaws they were able to fix. Unfortunately, you can’t scan your way to secure code.
At this session will walk you through three critical steps an organization must take beyond scanning to develop more secure code: educating your developers so they learn secure coding skills, fixing the vulnerable code that’s found, and scaling the AppSec program to cover your entire application landscape.
- Learn how to move your AppSec program from a find focus to a fix focus
- Find out why training plays a critical role in AppSec
- Understand what it takes to scale your AppSec program
Ade Taylor, CTO, ITC SecureDec 12 201911:00 amUTC29 mins
Technical detection is now just the starting point for a series of exercises which will see the entire business work together to identify what happened and to mitigate the results.
In this session, you will learn:
- How EDR and MDR are morphing into BDR
- Why BDR is a challenge for the whole business
- How technology can help, and how it doesn’t
In this 30 minute webinar Ade will discuss how the world of cyber-security detection and response is changing, fast. From IT and technical analysts to the CEO via HR, this is a problem for the whole business to solve together.
Carmen Puccio (Solutions Architect, AWS) & Shiri Ivtsan (Product Manager, WhiteSource)Dec 12 201912:00 pmUTC59 mins
Thanks to containerization and automation, applications are being developed and delivered faster than ever. With tools such as AWS ECR, developers are able to store, manage and deploy Docker container images without having to worry about operating their own container repositories or scaling the underlying infrastructure. With this, however, arise challenges around managing the security and compliance aspect of your container images. With tools such as WhiteSource, developers are able to manage the security of their containers and container images with no impact on agility and speed.
Join Shiri Ivtsan, Product Manager at WhiteSource and Carmen Puccio, Solutions Architect at AWS, as they discuss the following:
- Effectively managing and deploying your container images
- Gaining full visibility into your container images
- Building and automating security into each layer of the container environment to ensure a continuous process throughout the SDLC
- Demonstrating a live example using a vulnerable container image
Jason McFall, CTO, Privitar; Bob Canaway, CMO, Privitar & Matt Pitchford, Principal Solutions Architect, AWSDec 12 201912:00 pmUTC53 mins
Finance leaders are fast realizing that their current approach to protecting their data isn’t working – for them or for their customers.
As well as the obvious financial and legal penalties, financial institutions are facing a trust crisis. Every new data breach erodes consumer confidence in the industry itself. It’s time for data leaders in financial services to take back control; to build a new narrative around their respect for customer data.
Register for our webinar to get a deeper understanding of how leading financial services organizations go about protecting their customers’ data – while encouraging innovation with data
- Learn how to overcome barriers to the full use of data in the age of data privacy
- Understand how to transform data use in your own organization
- Discover how to build a best in class business case for safer, better data use
Derek Thorslund & Wesley ShepherdDec 12 20191:00 pmUTC36 mins
Today's digital workspace includes a myriad of applications: SaaS, Citrix Virtual Apps and Desktops, VoIP, unified communications, and much more. Delivering a high-quality workspace experience to workers in any location may not be as easy as it seems since these apps can run in various clouds and datacenters. Come learn how customer Fast Pace Urgent Care uses Citrix SD-WAN to deliver a consistent experience for Citrix apps, even over imperfect network conditions.
Danna Bethlehem, Access Management Product EvangelistDec 12 20192:30 pmUTC30 mins
As organizations migrate to Office 365 and move their core IT applications and infrastructure needs to the cloud, they face new and varied security challenges. These challenges include increased exposure to phishing attacks, the need to successfully bridge existing security frameworks to Office 365, and the question of having to secure non-Microsoft applications. Join Danna Bethlehem, for the first of a new series of “Coffee Break” conversations focusing on Trusted Access. This first session will discuss how organizations are addressing security concerns by utilizing different access management approaches they can take to protect their Office 365 and their Microsoft environments without having to rip and replace their existing security frameworks. Specifically, attendees to this webinar will learn:
• What are the security implications of Office 365
• What are the weaknesses of Office 365 security
• How do you manage secure access to both cloud apps like Office 365 and on-premise corporate apps
Stuart Reed - VP Products, NominetDec 12 20193:00 pmUTC28 mins
Nominet recently surveyed around 300 security professionals from across the UK and US about their organization’s security position, the barriers to confidence and what they believe will aid cyber confidence.
In this webinar, we outline our key findings, including:
- The state of cyber confidence for modern security professionals
- The risks facing organizations’ cyber confidence and the ways in which they can be mitigated
- Future priorities and investment within these companies
Mission Critical InstituteDec 12 20195:00 pmUTC41 mins
Learn how to analyze exam answer choices so you can select the best answers.
In Clinic #4, you will learn tactics for analyzing the answer choices and then selecting the “best answer”. Often there is no “right” answer and you need to eliminate the less likely answers.
If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:
• The new CISSP exam format, the “adaptive exam format”
• How hands-on labs will help you prepare for your exam
• Tactics to select the best answer for each question
• How to get your employment endorsement and what happens if you need more experience
These five Clinics include tips for all 8 CISSP domains covered in the exam.
Chris Stafford, Senior Manager, M&A Advisory West Monroe Partners, Paul Cotter, Senior Architect West Monroe PartnersDec 12 20195:00 pmUTC60 mins
With extensive experience in M&A, West Monroe Partners is on the front line of tech due diligence, and they’ve seen a few trends emerge when it comes to open source and M&A deals. Buyers and sellers alike need to understand these trends to get the most value out of any transaction.
Join us for this live webinar to learn what buyers and sellers need to know and how they operate during a transaction. We’ll cover:
•Why OSS management should fit into a broader security program
•How (and when) sellers need to prepare for a transaction
•How buyers are becoming more sophisticated in transactions
Don’t miss this informative webinar. Register today.
One of the best ways to get out ahead of malicious actors is with cyberthreat hunting, the act of proactively and aggressively eliminating adversaries as early as possible. The quicker you can locate and track your adversaries’ tactics, techniques and procedures, the less impact attackers will have on your business. Hear from Michael Sci, Senior Solutions Engineer from eSentire talk in-depth about Managed detection and response (MDR) and how it provides organizations with threat hunting services and responds to threats once they are discovered.
Hormazd Romer, VP Product Marketing, Yubico and Jon Wojan,Partner Technical Architect, MicrosoftDec 12 20195:00 pmUTC52 mins
Secure passwordless authentication is coming to a computer near you! WebAuthn, a new standard published by the W3C, along with the FIDO2 spec now make this promise a reality. Microsoft’s upcoming support for Windows 10 passwordless login via Azure Active Directory means soon hundreds of millions of users will be able to experience the convenience of passwordless login at a higher level of security than the traditional combination of password and multi-factor authentication (MFA).
Experts from Yubico and Microsoft will provide an overview of the journey to passwordless, its key benefits, and why it is more secure than typical MFA.
Attend this webinar to learn:
* The roadmap to passwordless
* Use cases and advantages of the WebAuthn and FIDO2 standards
* How passwordless will work with Windows 10 and Azure AD
* How to get started with passwordless authentication
Ben Chinoy, Security Researcher, Adobe & Jason Joy, Sr. Enterprise Security Engineer, AdobeDec 12 20195:00 pmUTC60 mins
As many companies transform to multi-cloud environments, managing firewall changes at the speed of development teams can be challenging. Teams across Adobe are constantly evolving cloud services to continue to delight our customers. But one of the major challenges is in helping to ensure that the firewall change requests to support their work happen efficiently and securely. They receive hundreds of access requests each month for access to services. However, manually reviewing each one can be a time-consuming process that comes with the risk of human error. Adobe set out to try and mitigate this potential risk by automating as much of the process as possible.
This webcast Ben Chinoy, Security Researcher at Adobe and Jason Joy, Senior Enterprise Security Engineer at Adobe, will discuss the issues they faced in automating this common process in cloud app development securely and introduce the tooling they developed to assist.
Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat CitrixDec 12 20195:00 pmUTC46 mins
Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.
This on-demand webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
Kevin Livelli, Director of Threat Intelligence and Matthew Maley, Practice Director for Red Team ServicesDec 12 20195:00 pmUTC54 mins
The red line distinguishing legitimate pentesting services from threat actor behavior has thinned and, in some cases, blurred out entirely in recent years due to the lack of universally accepted industry standards for practicing pentesting tradecraft. Join us and take a closer look at the current state of pentesting tradecraft and key findings from a provocative new Threat Intelligence report, Thin Red Line, Penetration Practices Examined.
• Latest Report from the BlackBerry Cylance Threat Intelligence Team, Thin Red Line: Penetration Testing Practices Examined
• Insecurity Podcast: The Thin Red Line – Lifting the Veil on Penetration Testing
Fernando Montenegro, Principal Analyst, 451 Research / Rich Noguera, VP of Security Services, vArmourDec 12 20196:00 pmUTC30 mins
Enterprises today are leveraging multiple clouds for the cost and scale benefits that cloud brings, but rapid adoption is creating new challenges for CISOs and their teams. As complexity increases across environments and applications, security teams struggle to maintain visibility of critical workloads and their dependencies. Without a way to understand application relationships across the environment, vulnerabilities become hard to manage and addressing risk becomes risky itself.
In this 30-minute webinar for CISOs, Security Engineers, Architects, and SOC Teams, learn how to gain the visibility and context necessary to properly secure multi-cloud applications. You'll learn:
-The complexities of application security in multi-cloud environments
-How limited visibility increases cloud risk and exposure
-How understanding application relationships provides critical context for security
-How to turbocharge multi-cloud security with existing data sources
Fernando Montenegro, Principal Analyst at 451 Research & 20-year security industry veteran
Rich Noguera, VP of Security Services at vArmour & former CISO of Gap and Yapstone
Ryan Witt, Healthcare Industry Practice Leader & Matt Nesser, Account Executive of ProofpointDec 12 20196:00 pmUTC45 mins
The 2019 HIMSS Cybersecurity indicated that email is the initial point of compromises for healthcare cyber-attacks – phishing, hacking, BEC – or negligent activity from hospital staff…someone inadvertently clicking on a link or downloading a file. Clearly people are under attack, yet they are also a health system’s first line of defense. So how do you best protect your people and prepare for them for continuous stream of cyber-attacks?
Join this live demo to see Proofpoint Security Awareness Training in action, and how it safeguards against advance threats and compliance risks.
- The most common attacks in today's healthcare threat landscape
- Best practices to improve your security posture
- A people-centric approach to helping you protect patient data
Ruben Spruijt, Senior Technologist at Nutanix and former CTO at FrameDec 12 20196:00 pmUTC60 mins
Nowadays business consumers expect a modern workspace to get work done, recruiting and retaining new talent has become a bigger challenge, and keeping employees engaged and productive has become more difficult than ever. IT departments are faced with an increasingly mobile workforce with devices that need to be updated, optimized, and secured no matter where they are in the world.
That's why Desktop-as-a-Service (DaaS) is disrupting end user computing and virtual desktop infrastructure, and companies like Google and Microsoft are getting into the mix. They're partnering with end user computing firms to create solutions that can run remote applications and desktops on any device, vastly improving the user experience and making the lives of your business consumers and IT department so much easier.
Data is centralized and infinitely more secure, the IT department can manage thousands of workspaces anywhere in the world from one console, and the end user's device, whether it's their own or corporate-owned is optimized, making the experience faster and easier to use than ever.
For a look at the latest developments in End User Computing (EUC), virtual desktop infrastructure (VDI), and DaaS, the pros and cons of VDI versus DaaS, unique use cases and more, don't miss this VB Live event!
Registration is free here!
+ Tips and advice for VDI and DaaS success in 2020
+ How DaaS and VDI is evolving, and how to prepare your IT department
+ Pros and cons for Desktop-as-a-Service vs. VDI
+ Best practice for DaaS in public clouds and on-premises
Troy DuMoulin, VP of R&D at Pink Elephant and Gerald Beaulieu, Director of Product Marketing at ServiceNowDec 12 20196:00 pmUTC60 mins
Both DevOps and ITIL 4 have a lot to say about deploying and releasing effectively and efficiently into production without impacting availability. However, for many these two disciplines seem to be at odds or at least very complicated and challenging to describe how they work together.
In this practical webinar, Troy DuMoulin, VP R&D at Pink Elephant and Gerald Beaulieu, Director of Product Marketing at ServiceNow will provide a clear picture of how these two set of practices are integrated and co-dependent.
- ITIL Release and Deployment integrated with Agile Project Planning
- How to scale change authorization without risk
- The role of Service Validation & Testing and Automated Testing
- The CMDB, Asset Management and DevOps environment Configuration
Geethanjali Natarajan and Saumya Saxena, Sennovate IncDec 12 20196:00 pmUTC60 mins
In today's world of IT, a robust safeguard service is required for identifying and managing applications from a single point to spot trends and see patterns that are out of the ordinary. SIEM (System Information and Event Management) is a managed security service used to gather information from end-user and even specialized security equipment like firewalls and antivirus systems. Security information and event management (SIEM) software gives security professionals both insight into and a track record of the activities within their IT environment.
While SIEM technology has been around for more than a decade, it’s become a critical component of a comprehensive security strategy in today’s threat environment.
Topics for discussion include:
- Evolution of SIEM.
- Best practices from expertise.
- Next generation SIEM – UEBA and SOAR
- SIEM solutions for some common SOC pains.
- Integrating AI and ML.
Geethanjali Natarajan, Security Solutions Lead at Sennovate Inc
Saumya Saxena, Software Engineer at Sennovate Inc
Mike Zuckerman, Consulting Product Maketing Manager, Infoblox; Brandon Dunlap, ModeratorDec 12 20196:00 pmUTC60 mins
The MITRE ATT&CK Framework is a comprehensive, up-to-date knowledge base of cyberattacker tactics and techniques gathered from actual observation of attacker behavior. The framework can help anticipate what an attacker will do and how to respond. Join Infoblox and (ISC)2 on December 12, 2019 at 1:00PM Eastern for an examination of how the MITRE ATT&CK can help you make better, faster decisions about assessing risks, deploying new security controls and stopping attacks faster and more efficiently.