Hi [[ session.user.profile.firstName ]]

IT Security

  • Social Engineering - Are you the weakest link? Social Engineering - Are you the weakest link? Greg Iddon, Technologist, Sophos Aug 30 2016 1:00 pm UTC 60 mins
    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
  • Managing Cyber Risk From Third Party Contractors Managing Cyber Risk From Third Party Contractors Jake Olcott Aug 30 2016 3:00 pm UTC 60 mins
    Many recent data breaches have exploited security weaknesses in the networks of third parties to attack businesses. With supply chains growing and business functions increasingly outsourced, the number of third party organizations with access to your company’s most sensitive data has increased dramatically. How should organizations assess and manage the cyber risk by their vendors and suppliers? What kinds of policies and controls should organizations put in place in order to mitigate third party cyber risk? How can organizations continuously monitor the cybersecurity performance of their critical vendors in real time?

    Getting familiar with third party cyber risk management best practices and industry standards is a good start towards mitigating cyber risk for your organization. Join Jake Olcott, VP of Business Development as he discusses these topics and more.
  • CSA Research: Mitigating Top Cloud Threats CSA Research: Mitigating Top Cloud Threats Salim Hafid and Rich Campagna of Bitglass, and John Yeoh of CSA Aug 30 2016 4:00 pm UTC 60 mins
    With cloud adoption on the rise, IT leaders are looking to peer organizations to understand security best practices in the cloud. Bitglass and CSA surveyed infosec professionals to uncover the top threats to cloud security and the tools most often used to secure cloud apps.

    In this webinar, John Yeoh, Senior Research Analyst at CSA, joins Bitglass to discuss the results of the "Mitigating Risk for Cloud Applications" report and to explore the major issues facing organizations in their move to the cloud, from Shadow IT and inadequate visibility to concerns around government access.
  • RANSOMWARE SURVIVAL GUIDE RANSOMWARE SURVIVAL GUIDE Jennifer Cheng Director, Product Marketing, Proofpoint Aug 30 2016 5:00 pm UTC 60 mins
    What every organization needs to know before, during, and after a ransomware attack.

    Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

    Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

    Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

    •Why ransomware is surging.
    •Where it comes from.
    •What to do before, during, and after an attack.
    •Should you pay or not? What to consider.

    Exploit kits don’t stop. Neither should your business.
  • Ask the Experts: Realizing the Value of Microsoft Azure  Ask the Experts: Realizing the Value of Microsoft Azure  Evelyn Padrino, Group Product Marketing Manager, Microsoft Aug 30 2016 6:00 pm UTC 60 mins
    Tune in for the latest in our Ask the Experts Series! This session is all-about-Azure: cloud computing and PaaS for the enterprise. During this session we will show you how and why to use the benefit/credit that comes with your Visual Studio Subscription.

    In this webcast, you will learn:

     about other available Azure programs
     application development tests on Azure
     what other customers are doing on Azure and how it is paying large dividends
  • Breach Detection Systems – Product Selection Guide Breach Detection Systems – Product Selection Guide Jason Pappalexis Aug 30 2016 6:00 pm UTC 45 mins
    Understand Breach Detection System selection criteria and what enterprises should consider prior to purchase.
  • RegTech Webinar Series RegTech Webinar Series Shane Brett Aug 31 2016 1:00 pm UTC 45 mins
    Regulatory compliance is one of the biggest immediate challenges affecting the financial services industry today. Many market participants are unsure how to meet constantly evolving reporting requirements or how to move to an open API framework in a secure and compliant way.
  • Ransomware is Here: Fundamentals Everyone Needs to Know Ransomware is Here: Fundamentals Everyone Needs to Know Jeremiah Grossman, Chief of Security Strategy Aug 31 2016 3:00 pm UTC 45 mins
    If you’re an IT professional, you probably know at least the basics of ransomware. Instead of using malware or an exploit to exfiltrate PII from an enterprise, bad actors instead find valuable data and encrypt it. Unless you happen to have an NSA-caliber data center at your disposal to break the encryption, you must pay your attacker in cold, hard bitcoins—or else wave goodbye to your PII.

    Those assumptions aren’t wrong, but they also don’t tell the whole picture. Hear from Jeremiah Grossman, SentinelOne’s Chief of Security Strategy and a 20-year cybersecurity veteran, in this on-demand webinar that will explore the foundations of ransomware, and why you truly need to worry.
  • An Asset-Centric Approach to Manage Cyber Risk An Asset-Centric Approach to Manage Cyber Risk Humphrey Christian, Vice President, Product Management, Bay Dynamics Aug 31 2016 5:00 pm UTC 60 mins
    Enterprises, both large and small, all have vulnerability management solutions. However, security teams are overwhelmed by the mountain of vulnerabilities uncovered by these solutions. Once they determine which endpoints, systems and applications are vulnerable to an attack, they do not know which steps to take next and in what order. As a result, they spend countless hours manually determining who owns the vulnerable asset, the value of that asset, if it was compromised and if there is an active threat to that asset.

    Join us for a live webinar on Wednesday, August 31, 2016 at 10am PT as Humphrey Christian, Vice President, Product Management, Bay Dynamics, discusses why organizations and business stakeholders, need an asset-centric approach to provide a fully integrated view of threats, vulnerabilities, asset value and business context. He will also give a live demonstration of the Bay Dynamics Risk Fabric cyber risk platform and provide examples of how our customers have used it to build asset-centric risk management programs that allow security teams, line-of-business leaders, C-level executives and boards of directors to determine which threats and associated vulnerabilities could lead to a compromise of their most valued assets and what steps need to be taken in order to reduce that risk.

    Register for the live webinar to learn more about:
    • Understanding your Assets at Risk by protecting your high value assets that can be exploited by threats and vulnerabilities
    • Why it is important to take an asset-centric approach to effectively manage cyber risk
    • How Risk Fabric cyber risk analytics platform servers as a centerpiece for this asset-centric approach through a live demonstration
  • Webcast: Do More with ESET Remote Administrator Webcast: Do More with ESET Remote Administrator Ben Reed, Sr. Technical Content Strategist and Sales Engineer Aug 31 2016 5:00 pm UTC 60 mins
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • Security by Design: The Alignment of Security and Agility Security by Design: The Alignment of Security and Agility Uri Sarid, CTO, MuleSoft; Kevin Paige, Head of Security, MuleSoft Aug 31 2016 5:00 pm UTC 60 mins
    By 2020, Gartner predicts 60% of digital businesses will suffer major service failures due to the inability of the IT security team to manage digital risk in new technology and use cases. With Target, Apple, Nissan, and Twitter all making the news recently for their security failures, CIOs and CISOs are under tremendous pressure to keep the business secure -- without slowing the business down.

    In this session, Uri Sarid, MuleSoft CTO and Kevin Paige, MuleSoft Head of Security, discuss the application networks and an emerging approach that CIOs and CISOs are driving together to deliver both security and business agility.

    Attendees will learn:

    – How to deal with security no longer resting in the hands of the security team due to shadow IT and other factors
    – How a well-defined API strategy can reduce risk
    – How application networks have emerged as an approach to deliver security and agility
    – How CISOs can drive agility and promote security by shifting mindsets
  • Office 365 Security: How to safeguard your data Office 365 Security: How to safeguard your data Greg Schaffer, CISO for FirstBank & Rich Campagna, VP of Products for Bitglass Aug 31 2016 5:00 pm UTC 60 mins
    Public cloud apps like Office 365 are being widely adopted in every major industry, with security & compliance at the top of the list of concerns. In this webinar, Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, will provide practical cloud security advice that you can apply immediately in your organization. Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and will give examples of how your peers have responded to the cloud security challenge.
  • How to improve network visibility and ease IT frustration How to improve network visibility and ease IT frustration Neela Sambandam Aug 31 2016 6:00 pm UTC 60 mins
    Today’s new generation of mobile-centric users and the sheer number of authentications due to mobility is driving the need for better visibility into who and what is on the network.

    Join Neela Sambandam, ClearPass Product Manager, to learn how the Insight reporting package within the ClearPass solution gives you:
    •Unsurpassed views into the users, devices and connections on your network
    •An easy-to-use dashboard and analytics engine
    •Triggered alerts based on pre-defined metrics
    •Improved reporting with pre-configured templates

    Learn how ClearPass Insights can improve network performance and user experience, as well as about future enhancements.
  • Roundtable:Threats, Vulnerabilities & Actors: (ISC)² Security Congress EMEA 2016 Roundtable:Threats, Vulnerabilities & Actors: (ISC)² Security Congress EMEA 2016 Aviram Zrahia, Juniper Networks, Dominique Brack, Swisscom, Alexander Haynes, CDL, Adrian Davis, (ISC)2 EMEA Sep 1 2016 11:00 am UTC 60 mins
    Offering a preview of what to expect from Track 2 of Security Congress EMEA, this session brings together speakers that examine varied developments in the threat landscape. Tackling trends from the role of social engineering in Industry 4.0 to the latest Tactics and Drivers behind DDoS Attacks and the Casino-style tactics deployed by hackers, delegates will gain both an overarching view of current concerns from the front- lines of defence, and an opportunity to examine a few questions that are rattling the security industry today:
    Is it time to accept breach as inevitable?
    Are we prepared for the aftermath?
    Should we welcome vulnerability disclosure?
    Can we do a good job of sharing and warning each other?
  • Briefings Part 1: The Digital Marketplace & Cybersecurity Briefings Part 1: The Digital Marketplace & Cybersecurity Michelle Waugh, Security Business, CA Technologies; Brandon Dunlap Sep 1 2016 5:00 pm UTC 75 mins
    Your business is part of a new digital reality and the digital relationships you have with individuals are your greatest assets. They are also the new perimeter, where identities are the unifying control point across apps & data and users demand access and insight with an exceptional user experience. While all this drives your business, it also opens you up to attacks and breaches. Join CA Technologies and (ISC)2 on September 1, 2016 at 1:00PM Eastern for this first event of a six-part webcast series where you will learn how leaders can adapt to the new digital reality -- embrace new identity and access management strategies that allow you to innovate in ways you never imagined.
  • The Digital Strategy that will Shape Your Future The Digital Strategy that will Shape Your Future Jonathan Murray, EVP and CTO at Digital Prism Advisors; Ross Mason, Founder and VP of Product Strategy, MuleSoft Sep 1 2016 5:00 pm UTC 90 mins
    According to Gartner, half of CEOs believe that their industries will be unrecognizable in five years. Their top priority is transforming their organizations to ensure their organizations stay competitive in the midst of digital disruption.

    What is your organization’s strategy for digital transformation? Join Jonathan Murray, EVP and CTO at Digital Prism Advisors and formerly with Warner Music Group and the NY Times and MuleSoft founder and VP of Product Strategy Ross Mason as they explore the digital strategy that can help your company compete and win.

    Attendees will learn:

    – The definition of a composable enterprise, and how you can adopt that model for your own business
    – Case studies of global businesses achieving digital transformation with a composable enterprise
    – Best practices for business agility leveraging Anypoint Platform
  • How Software Eats Hardware in the Datacenter: Reducing Cost and Complexity How Software Eats Hardware in the Datacenter: Reducing Cost and Complexity Andy Ryan, Cloud Solutions Architect at vArmour Sep 1 2016 5:00 pm UTC 45 mins

    As organizations move to virtual data centers and multi-cloud environments in a dangerous threat climate, they are faced with new security challenges they must overcome. But, they must do this without exponentially increasing the manpower, products, or resources they need, so they still get the most of their valuable security budgets. These challenges include:

    -Improving visibility inside data centers and cloud
    -Reducing the attack surface
    -Maintaining regulatory compliance standards.


    vArmour will explore trends in data center security that include the rise of software to replace firewalls inside the data center, segmentation and micro-segmentation as security techniques, and shifting ideas about how software defined networking that:

    -Eliminate under-utilized zones and choke points
    -Avoid costly hardware refresh cycles and on-going maintenance
    -Lower the time it takes to see and stop threats
    -Reduce the time and complexity to process security changes
    -Increase speed of secure application delivery


    Andy Ryan, Cloud Solutions Architect at vArmour
  • Enterprise Knowledge & Unified Communications Drives Impact Enterprise Knowledge & Unified Communications Drives Impact Microsoft Sep 1 2016 6:00 pm UTC 60 mins
    Get your employees in the loop with easily accessible knowledge!

    Some of the biggest drains on employee productivity and engagement come from one thing: a lack of available knowledge. Whether its an IT, HR, or customer service question, having to search multiple places for the answer, or contact another employee for it, wastes valuable time and effort. Having the right knowledge in the right place at the right time empowers people to work better, and the latest advancements in cloud applications and collaboration tools can help.

    In this webcast, you will learn how to:

     Increase employee engagement, productivity, and satisfaction by providing easy access to a consistent, authoritative, and searchable knowledge base.

     Reduce service cost and effort by deflecting questions from high cost channels (assisted-service) to more cost effective channels (self-service) for “help desk” functions enterprise–wide, including HR, IT, Compliance, Finance, Customer Service, and more.

     Reinforce adherence to policies and procedures by making corporate compliance guidelines easily available to all employees.
  • S'entraîner, se préparer, se juger, réagir face aux attaques ciblées S'entraîner, se préparer, se juger, réagir face aux attaques ciblées David Grout, Technical Director, Southern Europe, FireEye Sep 2 2016 9:00 am UTC 45 mins
    Aujourd’hui la question n’est plus “vais-je être victime d’une attaque ou d’une tentative d’attaque ? » mais plutôt « quand vais-je l’être ? ». Comme pour le sport de haut niveau, la gestion de la sécurité d’une infrastructure nécessite de la préparation, de l’entrainement et de la compétition. Fort de notre expérience en victimologie avec nos équipes Mandiant et de notre vision des groupes d’attaquants à travers Isight Partners, nous avons mis en place différents programmes qui vous permettent d’être prêt le jour J et de régir le cas échéant. Venez découvrir comment nous pouvons vous accompagner dans toutes les phases amont et aval à travers nos prestations de consulting.
  • Endpoint Protection Beyond Antivirus Endpoint Protection Beyond Antivirus Steve Gerrard and Usman Durrani, Cyber Security Solutions, Palo Alto Networks Sep 6 2016 9:00 am UTC 60 mins
    It’s time to protect your users from threats that easily bypass antivirus.

    Join us for a live webinar on endpoint security

    •What hidden costs traditional AV imposes on your organization
    •How to determine the true value of any endpoint security solution
    •Which five capabilities are critical to protect your users, systems and endpoints
    •How Traps v3.4 prevents security breaches in your organization – without traditional AV.

    Protect yourself against antivirus.