Hi [[ session.user.profile.firstName ]]

IT Security

  • Architectural Decision-Making for Secure, Cloud-First Office 365 Deployments
    Architectural Decision-Making for Secure, Cloud-First Office 365 Deployments Sibrina Shafique, Director of Product Marketing, Okta Marc Jordan, Group Technical Marketing Manager, Okta Recorded: Apr 26 2017 33 mins
    Customers moving to Office 365 need to make key architectural decisions as to how they will securely and effectively move their workloads to the cloud. Picking the “free” or “included” over purpose built identity management tools could be the difference between a successful Office 365 deployment and another IT horror story. Office 365 benefits like cost savings, high availability, increased security, and fulfillment of a cloud and mobile first reality may be delayed, diminished or dissipated with the wrong toolset.

    In this session, you will get a deep dive on:

    •Common pitfalls when deploying Office 365 – why they are overlooked and how to avoid similar challenges
    •Real world use cases architected around best-of-breed technologies that enabled and accelerated Office 365 deployments
    •Demonstration of IT agility in some of the most complex IT use cases (such as mergers, acquisitions and divestitures)
  • Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers
    Accelerating NFV, SD-WAN, and SDN adoption for Telcos and Service Providers Jim Pfleger, Architect at Verizon; Pascal Joly, Director at Quali; Aaron Edwards, Dir. TME at CloudGenix Recorded: Apr 26 2017 60 mins
    This educational webinar will include:

    > Verizon’s perspectives on trends in software-defined architectures and NFV
    > CloudGenix's thoughts on SD-WAN trends
    > Quali's cloud sandboxes for NFV and SDN/SD-WAN compliance
    > Demo - NFV certification in action!
  • Web Application Firewalls in the Global 2000
    Web Application Firewalls in the Global 2000 Matthew Chips, William Fisher, Michael Lynge Recorded: Apr 26 2017 23 mins
    Web application firewalls (WAFs) are designed to filter, monitor, and block HTTP conversation from web applications and protect against HTTP, or web-based, attacks.
  • Why a Secure VDI & Unified Communications Solution is Key to Business Delivery
    Why a Secure VDI & Unified Communications Solution is Key to Business Delivery Dean Suzuki, TSP, Microsoft & Derek Thorslund, Product Manager, Citrix Recorded: Apr 26 2017 23 mins
    Skype for Business is an industry-leading unified communications solution for voice, video, and collaboration. When deployed in a centralized manner for delivery within Remote Desktop Services or Virtual Desktop Infrastructure (VDI), either on-premises or in Microsoft Azure, you can maintain control and maximize security. However, there can be performance, usability, and scalability challenges with this approach.

    Citrix and Microsoft have teamed together to develop an optimized solution that offers the best of both worlds. Centralize control while delivering a consistent Windows experience of the Skype for Business client on a variety of different endpoint types.

    Join this webcast to:
    - Learn the benefits of the joint Microsoft and Citrix approach to optimized Skype for Business delivery
    - Understand the proven architecture of the solution, including unique media offload to optimize the user experience
    - Hear about customers that are using this solution today at scale
  • How Customers are Optimizing their EDW for Fast, Secure, and Effective Insights
    How Customers are Optimizing their EDW for Fast, Secure, and Effective Insights Paige Roberts, Big Data Product Manager, Syncsort Wei Wang, Senior Director, Product Marketing, Hortonworks Recorded: Apr 26 2017 46 mins
    Hortonwork’s Hadoop Powered EDW (Enterprise Data Warehouse) Optimization Solution with Syncsort DMX-h enables organizations to liberate data from across the enterprise, quickly create and populate the data lake, and deliver actionable insights.

    Customer case studies across a variety of industries will bring to life how organizations are using this solution to gain bigger insights from their enterprise data – securely and cost-effectively – with faster time to time value.

    Join our webcast to learn how:

    - Lower cost storage for EDW Data
    - Lower cost processing of non-critical loads
    - Fast BI of full data set
  • Service Provider Playbook- Building a Case for Managed DDoS Services
    Service Provider Playbook- Building a Case for Managed DDoS Services Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Recorded: Apr 26 2017 50 mins
    There is no doubt that DDoS attack activity is at an all-time high as attacks continue to plague the Internet; causing outages and impacting organizations on a scale never seen before. Regardless of the intent, the likelihood of larger and more frequent DDoS attacks is forcing service providers to plan for the inevitable. Most don’t realize there is a tremendous opportunity for service providers to protect their customers, and significantly profit from this activity. Delivering Managed DDoS Services can be very profitable due to the intensification of DDoS attacks, and the rising demand for protection.

    In this webinar, you’ll learn:

    •The Best Way to Defeat DDoS Attacks Targeting Your Customers and Your Infrastructure
    •How to Build an Internal Case for Your Organization to Offer Managed DDoS Services
    •About the Complete Service Provider DDoS Mitigation Solution
  • Best key practices for GDPR and utilizing IncMan™ Incident Response platform
    Best key practices for GDPR and utilizing IncMan™ Incident Response platform Mike Fowler, Vice President, Professional Services and Steve Ditmore, Senior Sales Engineer for DFLabs Recorded: Apr 26 2017 34 mins
    The GDPR will apply in all EU member states in May 2018, organizations and businesses that are data owners and/or dealing with data belonging to EU citizens have the responsibility to ensure their processing abides by new data protection law and processors must themselves abide by rules to maintain records of their processing activities. If organizations and businesses are involved in a data breach, they are far more liable under GDPR than they were under the Data Protection Act.

    Complying with the new regulations requires operating to high standards of data security and protection. If suffering a data breach that puts the rights and freedoms of individuals at risk, organizations must notify the people affected and the data protection authority (Information Commissioner's Office (ICO) in the UK) within 72 hours of becoming aware of it. Data breaches occur every day - and the EU have just increased the financial liability and consequences of inadequate security.

    Hear from Mike Fowler, author of the popular white paper: Automation as a Force Multiplier in Cyber Incident Response. Mike will provide insight into how best to leverage automation to provide incident response and reporting consistency for GDPR.

    Steve Ditmore will present IncMan™ – Security Automation and Orchestration features covering:

    •Installation and set-up is measured in hours rather than days or weeks without the need for expensive professional services support.
    •Review steps involved in a mitigating and controlling a data breach.
    •Automation of menial enrichment activities, so incident responders can determine/contain and mitigate breaches more efficiently and effectively.
    •Enhanced visibility creating a layered approach to information gathering.
    •Incident management including response prioritization.
    •How incident and notification workflows are automatically assigned to an incident.
  • Enhancing Your Security Infrastructure with Infoblox Threat Intelligence
    Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Jonathan Abbe, Security Product Managerment, Infoblox; Sam Kumasarmy, Senior Product Marketing, Infoblox Recorded: Apr 26 2017 39 mins
    If your organization is like many, you've subscribed to external intelligence and/or you're using internal patchwork of threat intelligence within various departments—some information here, some information there that can't be used anywhere else—no way to integrate. And that means, you end up with gaps in your view of the threat intelligence and your defense across your infrastructure.

    Join us for an upcoming webinar and learn how Infoblox Threat Intelligence Data Exchange (TIDE) can help you:

    • Get what you need: Easily create threat intelligence data feeds to combine Infoblox’s high-quality data with the data you already have.
    • Easily deploy data: Obtain, manage and distribute data across your infrastructure from a centralized point.
    • Prevent malicious activity: Deploy threat intelligence directly within Infoblox DNS Firewall and other security technologies.

    Register today and get the complete picture.
  • Securing the Gaming Industry
    Securing the Gaming Industry Alex Winterflood Recorded: Apr 26 2017 30 mins
    Managing user privileges is an important aspect of comprehensive information security. Ideally, employees should only have access to the data and systems necessary to carry out their role. The problem is that unmanaged privileged accounts can lead to all sorts of problems for a business.

    Think of a privileged account as an access-all-areas pass to confidential business data and systems, allowing users to grant broad access rights that often go far beyond what is needed for that job function. Monitoring the actions of users is therefore paramount for security and compliance.
  • Reduce time to detect and respond to cyber threats - without adding resources
    Reduce time to detect and respond to cyber threats - without adding resources Chris Martin, LogRhythm Security Expert Recorded: Apr 26 2017 48 mins
    Today’s reality is that organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

    In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

    You’ll learn:

    • The definition and details of the TLM framework
    • How TLM enables you to sort through the noise to highlight and investigate concerning incidents
    • How TLM works to streamline processes through automated workflow
    • Specific use cases TLM can address to prevent major data breaches

    Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).
  • SecureMail with Salesforce
    SecureMail with Salesforce Matt Signorello Recorded: Apr 25 2017 4 mins
    This short video provides an overview of how to integrate the DataMotion secure email platform with Salesforce. The platform allows users and developers to easily send sensitive data in and out of Salesforce in a secure manner.
  • Cloudera Government Forum Livestream Afternoon Sessions
    Cloudera Government Forum Livestream Afternoon Sessions Cloudera Recorded: Apr 25 2017 106 mins
    Exploring the path to a more data-driven government will be the focus of the 2017 Cloudera Government Forum, planned for April 25, 2017. Government organizations have enormous data resources. Agency leaders and program management professionals seek practical, secure, and effective methods to extract the valuable information captured in their data repositories—from legacy systems to real-time.

    In its sixth year, the Cloudera Government Forum is an annual gathering to discover what’s new and what’s next for data management and advanced analytics strategies that can be applied for an immediate and positive impact on organizations and missions. Participants learn how they can leverage standards-based, cloud-enabled, and open source data strategies for meaningful digital transformation.
  • Beyond Deployment Velocity: How Technology & Process Increase DevOps Success
    Beyond Deployment Velocity: How Technology & Process Increase DevOps Success Adrian Lane, CTO, Securosis, Jeff Craty, Dir. of Engineering, Veracode, & Tim Jarrett, Sr Dir. of Product Mktg at Veracode Recorded: Apr 25 2017 61 mins
    DevOps increases teamwork, visibility and overall software quality. Yet, integrating security can be challenging for cultural and technological reasons.

    This webinar, featuring Adrian Lane of Securosis and Tim Jarrett and Jeff Cratty of Veracode, dives into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps, and discusses the challenging process and technical requirements for integrating security into DevOps.

    Learn how you can have both development velocity and security without compromising either one.
  • Next Generation Defense in Depth Model
    Next Generation Defense in Depth Model Tari Schreider, CCISO, Chief Cybersecurity Strategist & Author, Prescriptive Risk Recorded: Apr 25 2017 64 mins
    This session will focus on presenting a next generation defense in depth model and answer the question on many CISO’s minds - is it still relevant? A model of defense in depth will serve as a backdrop to introduce you to a wide range of solutions from across the cybersecurity industrial complex that just may change how you view your defense in depth approach.
  • Tackle Your Toughest Security Challenges at Ignite 2017
    Tackle Your Toughest Security Challenges at Ignite 2017 Joerg Sieber, Director, Product Marketing, Palo Alto Networks Recorded: Apr 25 2017 34 mins
    Join this webinar for a sneak preview of the content you can expect at Ignite 2017 in Vancouver, BC, Canada, June 12-15, 2017. This year will be the biggest and most advanced Ignite yet! We are expecting over 4,000 security experts gathering in beautiful Vancouver to tackle their toughest security challenges through a four-day program of hands-on educational sessions, peer-to-peer networking and multiple opportunities to explore all the capabilities and technologies of the Palo Alto Networks Next-Generation Security Platform, which is designed to put an end to the era of breaches by safely enabling applications and providing cyberthreat prevention measures at all steps in the cyberattack lifecycle. Space is limited, and you won’t want to miss this unique event, so sign up today at www.paloaltonetworksignite.com
  • Secure Your Leaky Mobile Apps: Discovery & Remediation
    Secure Your Leaky Mobile Apps: Discovery & Remediation Andrew Hoog, CEO of NowSecure & Setu Kulkarni, VP Product Management at WhiteHat Security Recorded: Apr 25 2017 55 mins
    Mobile devices are everywhere throughout the workplace, and outside the workplace, but mobile phone security as a discipline has been focused on parts of the solution such as WiFi connections, anti-virus and spyware. Mobile security apps are everywhere - but what are they securing? What is the actual security impact to your organization of insecure mobile app usage? For meaningful risk management, you need to understand both the qualitative and quantitative values of mobile security risk.

    Join WhiteHat Security and our technology partner NowSecure for a discussion on leaky apps, and how they can expose private and sensitive data - but more, what kind of data can be exposed.

    We’ll review how insecure mobile applications can create incidents, and how they impact the enterprise or organization. Finally, we will introduce you to the different ways WhiteHat can help you build mobile security into your larger DevSecOps and vulnerability management programs.

    About the Presenters:
    Andrew is the Co-founder and CEO of NowSecure. As a former CIO, Andrew has unique insight into solving enterprise mobile security problems and is driven by NowSecure’s mission to advance mobile security worldwide. He is responsible for the vision, strategy and growth of the company.

    Setu Kulkarni is the VP of Product Management at WhiteHat Security. Setu is responsible for product vision, strategy, and direction at WhiteHat Security. Setu joins the WhiteHat leadership team after a 10+ year stint at TIBCO Software Inc., where he most recently led product management and strategy for the Operational Intelligence product portfolio.
  • Walk this way - First steps towards firewall automation
    Walk this way - First steps towards firewall automation Erez Tadmor, Senior Product Manager, Tufin & Joe Schreiber, Technical Director, Business Development, Tufin Recorded: Apr 25 2017 61 mins
    Automation systems bring a great deal of value. Having the ability to produce better, faster, and more reliable results can go a long way in improving business agility and simplifying day-to-day tasks. Firewall automation also helps tighten security posture and ensure continuous compliance with internal policies and industry regulations.

    Tufin presents the recommended steps to start your journey towards firewall automation. Join us for the first webinar of the series, focusing on rule decommissioning, to learn how you can initiate an immediate and substantial impact on your organization.
  • How to Avoid Business Outages from Misconfigured Network Devices
    How to Avoid Business Outages from Misconfigured Network Devices Joe DiPietro, SE Director at AlgoSec Recorded: Apr 25 2017 36 mins
    A single change to a network device can have far reaching effects on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill – as we have recently seen in the news!

    This technical webinar will walk you through a variety of scenarios that can cause device misconfigurations, including a basic device change, business application connectivity changes, and data center migrations. It will provide both best practices and demonstrate specific techniques to help you understand and avoid misconfigurations and ultimately prevent damage to your business, including how to:

    * Understand and map your enterprise infrastructure topology before you make a change
    * Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    * Common mistakes to avoid when making changes to your network security devices
    * How to better understand business requirements from the network security perspective
  • Five Ways to Transform Your IT With Analytics and Machine Learning
    Five Ways to Transform Your IT With Analytics and Machine Learning Priya Balakrishnan, Director, Solutions Marketing at Splunk; Alok Bhide, Director, Product Management at Splunk Recorded: Apr 25 2017 69 mins
    The status quo of old monitoring solutions and approaches can't handle today's complex, highly distributed service-oriented architectures. We’ve all tried implementing solutions in the past, expecting that they’d offer more visibility and control. But eventually all we got was just one more tool to maintain that didn't provide much value.

    Splunk IT Service Intelligence (ITSI) solves this problem. The solution delivers an advanced data-centric approach to service monitoring driven by machine learning and analytics—taking operations and service intelligence to the next level.

    Join us in this webinar for a live demo to see how you can:
    - Gain service context by combining event and performance data
    - Get the big picture of your environment to streamline operations
    - Accelerate root-cause analysis and get ahead of customer-impacting outages
    - Prioritize incident investigation and reduce time-to-resolution with events analytics
    - Understand how analytics and machine learning can enhance service intelligence

    Featured Speakers:
    Priya Balakrishnan, Director, Solutions Marketing at Splunk
    Alok Bhide, Director, Product Management at Splunk
  • Cloudera Government Forum Livestream 2017
    Cloudera Government Forum Livestream 2017 Cloudera Recorded: Apr 25 2017 177 mins
    Exploring the path to a more data-driven government will be the focus of the 2017 Cloudera Government Forum, planned for April 25, 2017. Government organizations have enormous data resources. Agency leaders and program management professionals seek practical, secure, and effective methods to extract the valuable information captured in their data repositories—from legacy systems to real-time.

    In its sixth year, the Cloudera Government Forum is an annual gathering to discover what’s new and what’s next for data management and advanced analytics strategies that can be applied for an immediate and positive impact on organizations and missions. Participants learn how they can leverage standards-based, cloud-enabled, and open source data strategies for meaningful digital transformation.
  • Is Your Organisation GDPR Ready?
    Is Your Organisation GDPR Ready? Steve Durbin, Managing Director, ISF LTD Recorded: Apr 25 2017 49 mins
    Many organisations are still unclear as to how they will meet the requirements of the EU GDPR legislation which will come into effect in May 2018. Fundamentally organisations need to start preparing for this now.

    In this webinar Steve addresses some of the key questions organisations are asking such as: does the EU GDPR regulation apply to me? how should I prepare for this legislation? and what additional resources do I need?