Hi [[ session.user.profile.firstName ]]

IT Security

  • Symantec Cloud Workload Protection Product Demo Video Symantec Cloud Workload Protection Product Demo Video Symantec Recorded: Feb 24 2017 2 mins
    Symantec Cloud Workload Protection, our latest offering for securing enterprise data center migrations into the public cloud. This new offering adds workload security to Symantec’s security portfolio for the cloud generation.

    Cloud Workload Protection provides elastic security for AWS and Microsoft Azure workloads via cloud-native integration, enabling businesses to enjoy public cloud benefits without worrying about the security and integrity of their brand as they offer new services to their customers.

    To learn more, visit the Symantec Cloud Workload Protection product page: https://www.symantec.com/products/threat-protection/cloud-workload-protection
  • [VIDEO] Cyber Security Lessons for the Financial Sector [VIDEO] Cyber Security Lessons for the Financial Sector Josh Downs, Community Manager, BrightTALK & Ian Glover, President, CREST Recorded: Feb 24 2017 11 mins
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • 2017 Cybersecurity Threat Insights Report for Leaders 2017 Cybersecurity Threat Insights Report for Leaders Chris Yule, Senior Researcher, Counter Threat Unit Recorded: Feb 24 2017 53 mins
    In our “Cybersecurity Threat Insights Report for Leaders”, we shared several key findings and observations from our client engagements and about the security industry. This webcast will cover our findings and observations but will also provide you with clear direction on where you need to focus your resources to evoke positive action in your security program.

    During this webcast one of our lead Counter Threat Unit™ researchers, Chris Yule, who helped develop the report, will give his perspective, observations and guidance through responses to a series of questions led by our EMEA Marketing Manager, Andy Patton.
  • Comment protéger et surveiller vos données sensibles en tous lieux Comment protéger et surveiller vos données sensibles en tous lieux Hervé Doreau, Directeur Technique - Symantec France Recorded: Feb 24 2017 44 mins
    À l’heure où 5 grandes entreprises sur 6 sont la cible d’attaques avancées, la protection des données est votre meilleure stratégie pour éviter de faire la une des journaux. En quoi consiste la protection des données ?
    Lors de ce webcast, nos experts vous montreront les atouts des technologies Symantec pour mettre en œuvre une approche intégrée en : 
    - Limitant et contrôlant l’accès aux données aux seuls utilisateurs légitimes grâce à une authentification multifacteurs renforcée, quel que soit le périphérique utilisé, même un appareil personnel.
    - Surveillant le flux des données où qu'elles se trouvent : dans le cloud, sur site, sur des appareils mobiles, ou sur un stockage à long terme.- Évitant les pertes de données par l'adoption de politiques de chiffrement ou de blocage des informations critiques avant qu’elles ne quittent le périmètre de protection.
  • The Art of Preventing Ransomware The Art of Preventing Ransomware Bitdefender Recorded: Feb 23 2017 3 mins
    See how ransomware attacks and how Bitdefender is able to prevent those attacks.
  • SECOPS Automation on the Rise: Challenges, Directions, Futures SECOPS Automation on the Rise: Challenges, Directions, Futures Tom Gorup, Director of Security Operations at Rook Security Recorded: Feb 23 2017 33 mins
    With the growing number of newly-released, longtime-funded automation tools and platforms, it’s clear that network security operations automation has reached an inflection point. While automation promises to provide significant value to security and network operations teams, along with hopes and promises comes concerns about limitations, potential failures, and critical oversights—especially when it comes to automating incident response. These limitations don’t stem from a lack of APIs, compute power, or the advancement of machine learning or artificial intelligence, but rather from the tools that are doing the detection, notification, and remediation.

    Security operations expert Tom Gorup addresses short- and long-term automation challenges and provides analysis on why investments should be focused on arming people with more assistive technology, rather than attempting to remove humans from the equation entirely.

    About the Presenter:
    As Director of Security Operations for Rook Security, Tom Gorup oversees Managed Security Services and develops proprietary security operations management tools and services for organizations ranging from Fortune 100 firms to fast-growing startups. Prior to joining Rook, Tom served 6 years in the U.S. Army. As an Infantry Squad Leader, Tom served two tours in Iraq and Afghanistan, where he received a Purple Heart alongside several other awards for actions on the battlefield. Tom is GCIA certified, a participant in the GIAC mentor program and advisory board, Indiana Infragard Sector Specialist, and on the NexTech advisory board.
  • Put your IT Infrastructure First: Tips for Protecting & Securing your Networks Put your IT Infrastructure First: Tips for Protecting & Securing your Networks Alex Shteynberg, Technical Solutions Professional, Microsoft Recorded: Feb 23 2017 19 mins
    Secure your IT infrastructure on-premises and in the cloud through early detection via effective threat intelligence. Microsoft Azure dashboards/glass pane provides simple yet holistic views into what's happening, with the intent of detection-to-mitigation. We'll take you through ‘a born in the cloud approach’ to IT backend infrastructure security that has a high time-to-value, with best practices.

    Join this webcast to learn how to:
    - Collect threat intelligence with good examples such as Malicious IPs and drill down to specific machines to take action/mitigation
    - Leverage Baseline Assessments, a powerful method, that leverages 180 points of security configurations to harden your servers
    - Understand how to bring the power of analytics to configure alerts with a consolidated view
  • Cloud Security: From Strategy to Incident Response Cloud Security: From Strategy to Incident Response Ondrej Krehel, CEO/Founder, LIFARS and Michael Landewe, Co-Founder, Avanan Recorded: Feb 23 2017 49 mins
    Expert teams from Avanan and LIFARS will discuss what you must do to secure your cloud infrastructure.

    You might think your organization's cloud security posture is strong, but are there gaps you just don't know about? And if there were, how you would identify and remediate them? As companies continue to move to the cloud, it's becoming ever more important to have a multi-layered cybersecurity program in place.

    This webinar will address some of the most important trends in SaaS security, what it takes to be successful, and what you must do now to secure your cloud infrastructure and applications.

    Attendees will learn about:
    · The challenges in protecting users and data in the cloud.
    · How the cloud makes it difficult to identify and remediate security events.
    · What it takes to implement a successful SaaS security program.
    · How a multi-vendor, defense-in-depth approach can further secure their operations.
    · Why having an incident response plan for cloud security incidents is so important.
    · A new cloud security assessment solution to combat the SaaS security issues within their organization.
  • A CTO's Perspective on Creating a Template for an Incident Response Plan A CTO's Perspective on Creating a Template for an Incident Response Plan Sam McLane, CTO/Head of Security Ops; Dave Martin, Head of Product Mgmt; Sridhar Karnam, Director of Product Mktg Recorded: Feb 23 2017 49 mins
    Join us for a panel discussion featuring our CTO, head of product management, and head of product strategy as they talk about executing an incident response plan. The discussion will cover how to create a template for IR as well as the critical elements of an IR plan and the testing frequency and methods to ensure you have a good IR plan in place. For those who don’t yet have a set plan but are looking to establish one, having a template to reference can be helpful. There are number of key pieces that should be incorporated into every incident response plan.

    When you have a security incident, do you have a documented incident response plan? If not, who makes the decisions? These incidents could result in a complicated and costly legal, regulatory, and/or security proceedings. The people, process, and technology responsible for responding to these incidents are collectively known as Incident Response.
  • How safe are your email-based communications? How safe are your email-based communications? Gus Maldonado Recorded: Feb 23 2017 35 mins
    Email-based communications are a fundamental cornerstone for effectively conducting business. For that reason, however, email continues to be a popular vector for business sabotage. Email is frequently used to propagate malware – including ransomware and zero-day threats - across your network.

    This webinar examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
    Learn how this comprehensive, flexible and scalable solution can:

    •Scan a broad range of email attachment types to detect advanced threats
    •Analyze them in a multi-engine sandbox
    •Block them prior to a security verdict
    •Rapidly deploy remediation signatures
  • Report: How Security Analytics Can Address Your SIEM Pain Points Report: How Security Analytics Can Address Your SIEM Pain Points Frank Jas, Chief Architect, Cyphort Recorded: Feb 23 2017 48 mins
    New research from Cyphort and the Ponemon Institute puts the spotlight on many significant pain points affecting the productivity and satisfaction of Security Operations Center (SOC) and incident response (IR) teams in large organizations. Clearly, there is growing dissatisfaction with the value these teams are getting from their getting from their SIEMs. New research reveals the negative impact this has on the security posture of these organizations.

    The solution may lie in the emerging category of Security Analytics. Join this session to learn:

    • Key findings from the research
    • How security analytics makes life easier for overworked security teams
    • What are the key functional requirements
  • Under The Hoodie: Actionable Research from Penetration Testing Engagements Under The Hoodie: Actionable Research from Penetration Testing Engagements Tod Beardsley and Andrew Whitaker Recorded: Feb 23 2017 43 mins
    Join Andrew Whitaker and Tod Beardsley in a webcast overview of Rapid7's recently published paper, "Under the Hoodie: Actionable Research from Penetration Testing Engagements." In this webcast, Andrew and Tod will cover the major findings from our latest research, including the vulnerabilities and misconfigurations most often found on our engagements, the effects of account lockouts and two-factor authentication on pen testers, and the most effective countermeasures you can take to detect and prevent criminal hackers from breaking into your network.
  • Block The Risk Of Ransomware Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec Recorded: Feb 23 2017 31 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 2 of 5: Block The Risk Of Ransomware

    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.

    Register Today

    Watch On-Demand: SEP 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
  • 2017 Webroot Threat Brief 2017 Webroot Threat Brief Tyler Moffitt | Senior Threat Research Analyst Recorded: Feb 23 2017 36 mins
    Get insights into the threat landscape.

    Presented by Tyler Moffitt, senior threat research analyst at Webroot, this webinar is based on data derived from the Webroot Threat Intelligence Platform, Webroot’s machine learning and contextual analysis engine.

    Comprised of millions of connected sensors and endpoints, in 2016 the Webroot Threat Intelligence Platform observed:

    •94% of malware and PUAs were seen only once
    •Approximately 1/3 of URLs were high risk
    •Zero-day phishing URLs doubled
    •And more…

    Get the insights you need to stay ahead of the malware curve in 2017.

    We hope you can join us for this live, educational session!
  • Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automatio Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automatio Paul Morris, Acting CISO/Acting Director, Cybersecurity Division, TSA and Pamela Warren, Director, Palo Alto Networks Recorded: Feb 23 2017 62 mins
    Cyber security is front and center like never before, and cyber leaders are working to speed cyber response times for threat prevention, detection, and mitigation for known, and more importantly, unknown threats.

    A recent study shows Feds are losing the race against hackers– with 85% of security operations professionals taking hours, even days, to create protections against newly discovered cyber threats.

    View the on-demand “Pedal to the Metal” webinar and hear from Federal and industry cyber experts as they discuss MeriTalk’s newest cyber study findings, including:
    •How much time and manpower is expended analyzing threat intelligence?
    •What advanced automatic capabilities can Feds utilize to act rapidly and decisively against advanced threats?
    •Is threat intelligence is helping Feds prevent attacks – from never-before-seen threat actors and tactics – faster?

    Featured Speakers Include:
    •Paul Morris, Acting CISO/Acting Director, Information Assurance and Cybersecurity Division, TSA
    •Pamela Warren, Director, Government and Industry Initiatives, Palo Alto Networks
  • The State of Cybersecurity in 2017 The State of Cybersecurity in 2017 Alex Holden, Founder and CISO of Hold Security Recorded: Feb 23 2017 60 mins
    Join us in discussing the state of cyber security in 2017. What are current threats, pitfalls, and the myths hindering our defenses. Learn advanced techniques of defending your enterprise security and making it an undesirable target.

    This presentation will focus on the following:

    Overview of 2016 breaches
    • Mega Breaches – what happened to LinkedIn, MySpace, Dropbox and other major breaches from years ago
    • Yahoo Breach – why is it a game changer
    • Political hacking
    • DDoS impact
    • Ransomware Rampage
    • The year of the hacker

    State of Cyber Security in 2017
    • Will the Mega Breach revelations continue? And how we should react?
    • Would DDoS take the front seat again?
    • How to deal with Ransomware evolution?
    • What trends are feasible for hackers? Which trends are on their way to obscurity?
    • Defending your infrastructure in 2017
  • Cross Talk: How Network & Security Tools Can Communicate For Better Security Cross Talk: How Network & Security Tools Can Communicate For Better Security Craig Sanderson, Sr. Dir. Prod Mktg, Infoblox; Dan York, Internet Society; Raghu Gadam, Security Analyst (ISC)2; B. Dunlap Recorded: Feb 23 2017 59 mins
    Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
  • Conquer Ransomware with Bitdefender Conquer Ransomware with Bitdefender Bitdefender Recorded: Feb 23 2017 2 mins
    With a unique approach to adaptive layered security and years of experience with machine learning, no other endpoint security can offer the defense provided by Bitdefender GravityZone.
  • IoT Risk Becomes Real IoT Risk Becomes Real Chris Rodriguez, Senior Industry Analyst Network Security + Tom Bienkowski, Directror Product Mkt, Arbor Networks Recorded: Feb 23 2017 64 mins
    Vulnerable IoT devices are plentiful and ripe for abuse by threat actors.
    But what exactly is the value of these devices to DDoS attackers?
  • PKI - Your Ally in the War Against Security Threats PKI - Your Ally in the War Against Security Threats Rae Barton, Enterprise PKI Expert at Gemalto Recorded: Feb 23 2017 58 mins
    PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.

    For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.

    Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:

    •PKI use cases in an enterprise environment to secure access and protect data
    •Budgeting for your PKI deployment of modernization
    •Outlining the deployment size, scope and timeline
    •Analyzing and reviewing current and/or future security policies
    •Maintenance and administration of the PKI system
    •Configuring and understanding certificate authorities
    •Developing a scalable approach to prepare for future needs
    •Addressing the protection of sensitive keys and the ecosystem integration
  • Do You Really Mean ‘I Need a SOC’? Do You Really Mean ‘I Need a SOC’? Andy Herrington, , Fujitsu Services UK Ltd, Paul McEvatt, Fujitsu Services UK Ltd, Adrian Davis, (ISC)² EMEA Feb 27 2017 12:00 pm UTC 60 mins
    Enterprises have generally responded to the security challenge, recognising that they cannot simply cross their fingers and hope to avoid a major cyber incident. Many have reached for the ‘big security technology catalogue’ and in the past couple of years we have seen increasing numbers of organisations setting out with the intention of deploying some form of SOC. While there is no getting away from the fact effectively deployed technologies and the integration of a well organised SOC can be part of the solution, very few organisations can actually set up and operate a form of SOC that will make a material difference. In this webinar, experts from Fujitsu will discuss the considerations that go into an effective SOC, identify common mistakes and recommend a SOC Strategy which is more likely to yield an improved security posture than blowing a massive budget on a ‘home-grown’ SOC.
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Feb 28 2017 2:00 am UTC 60 mins
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Feb 28 2017 8:00 am UTC 60 mins
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Facing up to Mobile Security Challenges Facing up to Mobile Security Challenges Stephen McCormack, Mobile Security Leader, IBM MaaS360, Adrian Davis, Managing Director, (ISC)² EMEA Feb 28 2017 12:00 pm UTC 60 mins
    Whether it is iOS, Android or Windows Phone, you can enable employees to be more productive and work flexibly on the go by supporting the smartphones, tablets and business applications they use on a daily basis. But what about the risks? Join me, Stephen McCormack from IBM MaaS360 as I take you step-by-step through the key challenges that mobile devices bring, and how you can easily act to ensure your organisation is protected.
  • [VIDEO] The Influence of Machine Learning and AI on Cyber Security [VIDEO] The Influence of Machine Learning and AI on Cyber Security Josh Downs, Community Manager, BrightTALK & Troels Oerting, CISO, Barclays Feb 28 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with Troels Oerting, CISO of Barclays and Josh Downs, Community Manager of the BrightTALK Information Security Community.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Operation Grand Mars: Defending Against Carbanak Cyber Attacks Operation Grand Mars: Defending Against Carbanak Cyber Attacks Thanassis Diogos, Managing Consultant, Incident Response EMEA at Trustwave Feb 28 2017 4:00 pm UTC 60 mins
    Cybercriminals are setting their sights on hospitality businesses across the U.S. and Europe with unprecedented malware attacks known as Carbanak, as part of precise and difficult-to-stop APT-style operation that we code-named 'Grand Mars'.

    Our Trustwave SpiderLabs team of incident responders and researchers have spent months analyzing Grand Mars and its elements, and unlocking strategies that can be used to identify and mitigate this insidious campaign – which may soon spread to e-commerce and retail organizations as well.

    Join our webinar where the author of the report will be sharing the findings including:

    •How the attackers make initial entry and force infection
    •How they achieve persistence
    •How they perform lateral movements
    •Which malicious files they use
    •Which signs indicate you’ve been compromised
    •Which countermeasures you should apply immediately
  • Unlocking Data and Clinical Applications with APIs: The New Face of Health IT Unlocking Data and Clinical Applications with APIs: The New Face of Health IT Matt Serna, Manager, Industry Marketing; Jonathan Ben-Hamou, Enterprise Systems Architect, ICOE Group Feb 28 2017 4:00 pm UTC 60 mins
    As healthcare organizations seek to unlock Electronic Health Record (EHR) data and develop modern clinical applications, health APIs can be used to simultaneously increase IT agility and improve data security.

    Furthermore, APIs (Application Program Interface) and API management serve as a core enabler for development on the SMART on FHIR (Fast Healthcare Interoperability Resources) platform, which promises to improve clinical care, research, and public health by supporting application interoperability.

    Join MuleSoft and ICOE Group for a discussion on how APIs can serve as a key enabler for EHR connectivity initiatives, and a live demo showcasing how MuleSoft’s Anypoint Platform can be used to develop a SMART on FHIR clinical application.

    Attendees will learn:

    - What impact upcoming legislative changes may have on health IT, and how APIs can insulate healthcare organizations from potential disruption.
    - How to build and manage APIs in a way that improves health data security and increases IT agility.​
    - How MuleSoft's Anypoint Platform enables the development and adoption of SMART on FHIR clinical applications.
  • How to Achieve Cyber Resiliency in an Evolving Threatscape - Roundtable How to Achieve Cyber Resiliency in an Evolving Threatscape - Roundtable Dante Disparte, John Bone, Ed Liebig, Sidney Pearl Feb 28 2017 4:00 pm UTC 60 mins
    Join fellow security executives for a roundtable discussion over the necessity and importance of staying secure in a dynamically evolving and competitive landscape.

    The cyber resiliency assessments are based on the U.S. Department of Defense’s mission-critical procedures and Unisys’ commercial best business practices. They provide an unbiased 3rd party expert assessment of the client’s Incident Response Capabilities, deliver a Security Enhancement Playbook, and identify the gaps in their cyber defense network that leads to improved cyber resiliency.

    These assessments provide leadership with:
    - A deeper insight into the effectiveness of decision making
    - Understanding of the vulnerabilities in their cyber defenses
    - How to enhance adaptability to the unanticipated and the capacity to emerge from a crisis faster with less damage to profitability, brand and customer loyalty.

    We will also discuss how crisis-preparedness exercises help your team experience real-world threat scenarios in order to assess the team’s ability to address, contain, respond and mitigate security threats.

    Facilitator:
    Dante Disparte, CEO of Risk Cooperative

    Panelists:
    John Bone, Global Director of Cyber Resilience, Unisys
    Ed Liebig, VP of Global Security, Professional Services, Unisys
    Sidney Pearl, Global MSS Executive Architect, Unisys
  • Hunting & Disrupting Cyber-Criminals Hunting & Disrupting Cyber-Criminals Jeremy Linden, Sr. Product Manager Cisco Umbrella, Dhia Mahjoub, Principal Engineer Cisco Umbrella Feb 28 2017 5:00 pm UTC 60 mins
    Warning. It’s Hunting Season.

    Hackers don’t wear blaze orange. Sophisticated adversaries are targeting you, your employees and your data. Let’s face it, yesterday’s traditional security defenses leave you exposed and render your corporate network open terrain. Take the target and put it on the attacker’s back.

    Join a panel of security experts: Jeremy Linden, Sr. Product Manager Cisco Umbrella, Dhia Mahjoub, Principal Engineer Cisco Umbrella, Craig Williams, Sr. Technical Leader, Cisco Talos, and Robert Simmons, Director of Research, ThreatConnect, for an inside look at how to identify attackers, stalk their internet infrastructures and disrupt cyber-criminals before they disrupt you. Hunt or be hunted.
  • Microsoft CEO: How Digital Transformation is Changing the Landscape in the US Microsoft CEO: How Digital Transformation is Changing the Landscape in the US Satya Nadella, CEO, Microsoft; Curt Kolcun, VP, US Public Sector Feb 28 2017 5:00 pm UTC 15 mins
    Microsoft’s CEO, Satya Nadella sits down with Curt Kolcun, VP US public Sector about digital transformation and the changing landscape in the United States.
  • A View of the World's Largest & Fastest Growing Data Center Spot A View of the World's Largest & Fastest Growing Data Center Spot Kelly Morgan 451 Research and Mark Kidd Iron Mountain Feb 28 2017 6:00 pm UTC 60 mins
    A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • Threat Intelligence Gateway: An Unconventional Weapon for An Unconventional War Threat Intelligence Gateway: An Unconventional Weapon for An Unconventional War Kinshuk Pahare, Director of Pruduct Development, LookingGlass Feb 28 2017 6:00 pm UTC 45 mins
    The cyber threat landscape is constantly evolving and conventional security products (Firewalls, IPS/IDS and web proxies) are unable to address emerging threats in a fast and efficient manner. LookingGlass’ newest threat mitigation appliance, the ScoutShield Threat Intelligence Gateway, provides a zero-touch solution to automate the threat response.

    Join our Director of Product Management, Kinshuk Pahare as he discusses the:
    1. Challenges with conventional security appliances and the need for a Threat Intelligence Gateway.
    2. Importance of having high quality threat intelligence.
    3. Must-have characteristics of a Threat Intelligence Gateway appliance.
  • Key Steps to Implement & Maintain PCI DSS Compliance in 2017 Key Steps to Implement & Maintain PCI DSS Compliance in 2017 Dr. Branden Williams; Smrithi Konanur, HPE Security; Kevin Eberman, Mineraltree; Asma Zubair, WhiteHat Security Feb 28 2017 6:00 pm UTC 60 mins
    In today’s digital landscape, it’s much easier for criminals to access sensitive payment card data, not only gaining direct access to a consumer’s available funds, but also their personal identity. With cyber attacks becoming much more advanced, the PCI DSS standard has been forced to adapt to address these new threats.

    However, PCI compliance is something that any organization can successfully achieve. The requirements of PCI DSS are clear, but it takes work to accomplish compliance across an organization. On this webinar our panel will discuss some best practices, and solutions that provides your business with an easy, cost effective and highly automated way to achieve compliance with PCI DSS in 2017.
  • Doing More With Symantec Control Compliance Suite Doing More With Symantec Control Compliance Suite Anand Visvanathan, Principal Product Manager, Symantec Feb 28 2017 6:00 pm UTC 60 mins
    In the past year, Symantec Control Compliance Suite (CCS) has added several new features that provide additional flexibility and platform coverage including:

    • IT Compliance and security assessments for custom applications and services

    • Security assessments across devices, servers and endpoints

    • Security baselines for newer technologies like Docker

    Please join us for this special webcast to learn how:

    The new features will simplify and enhance your ability to assess the compliance of your data center and get an update on the product roadmap

    Register today
  • Key Considerations for Migrating Graphics Workloads to the Cloud Key Considerations for Migrating Graphics Workloads to the Cloud Alex Herrera, Sr. Analyst, Jon Peddie Research & Ziad Lammam, Teradici Feb 28 2017 6:00 pm UTC 45 mins
    Moving to “The Cloud” is becoming a norm these days as it now provides better security and flexibility that enterprises are looking for in today’s ever growing “Big Data” landscape! Organizations with graphics workloads and interactive applications are looking for ways to consolidate their workstations to decrease CapEx and OpEx while ensuring data security for a disperse and mobile workforce.

    Alex Herrera, a senior analyst with Jon Peddie Research, author, and consultant to the world’s leading computer graphics and semiconductor companies will talk about on how enterprises can collocate their graphics intensive applications and workstations in the cloud to increase productivity and enhance collaborative working environment for creative professionals and design engineers in various verticals like: Media & Entertainment, Automotive & Manufacturing, Architecture, Engineering, Construction.

    This webinar will introduce key considerations in moving high-performance workstation to the cloud and provide valuable insights including:

    • Physical workstations vs. virtual workstations in the cloud
    • Choosing among cloud workstations - Private, Public or Hybrid
    • What to consider when moving to the cloud

    Teradici’s CTO Randy Groves will share how Cloud Access Software and PCoIP technology can enable you to securely migrate graphics intensive workloads and applications to the cloud while providing a seamless and “workstation-like” end user experience.

    Those who attend the webinar will receive a copy of the slide deck.

    Q&A will follow at the end of the session.
  • Secure Digital Transformation: What’s New for Winter 2017 Secure Digital Transformation: What’s New for Winter 2017 Sherif Messiha Feb 28 2017 6:30 pm UTC 60 mins
    In this webinar, we ask one of our senior consultants to weigh-in on the newest changes and updates to the Enterprise Mobility + Security suite of Microsoft products, and how those changes can affect your business.
  • Swimming in the Sea of Compliance: Become NCUA Compliant with Gemalto Swimming in the Sea of Compliance: Become NCUA Compliant with Gemalto Alex Hanway, Encryption Marketing at Gemalto Feb 28 2017 7:00 pm UTC 60 mins
    The National Credit Union Administration (NCUA) requires every credit union to protect their members’ personal, private data. But with a host of mandates and a range of technology options, where should credit union IT administrators begin? Encryption and key management can address a number of the requirements set out in these guidelines. Together they can help credit unions become compliant and can keep customer data safe.
    Join our live webinar "Navigating the National Credit Union Administration (NCUA) Privacy Guidelines:
    Securing Customer Records with Encryption and Key Management" on February 7th to learn about:
    •Which specific guidelines concern customer information at rest and in transit
    •How encryption and key management addresses these requirements
    •The benefits of a centralized encryption management