The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Le débat sur l’explosion – voire la prolifération des données – est un sujet pour toutes les entreprises, quelle que soit leur taille. C’est aussi une problématique qui semble sans fin pour tous les services informatiques : quelles solutions apporter à l’augmentation exponentielle de l’information ?
Il faut mesurer le risque induit par une mauvaise protection pouvant occasionner des violations de données : risque financier bien sûr, impact sur la réputation, mais aussi et surtout, risque juridique. Les entreprises ont en effet soumises à des temps et des termes de conservation de données. Découvrez comment Symantec peut vous aider à mettre en place une bonne gouvernance de l’information dans votre entreprise. Au programme :
-Qu’est-ce que la gouvernance de l’information?
-Mettre en place une politique adaptée à votre entreprise
-Cas concrets : comment répondre aux problématiques business relatifs à la conservation et la gestion des données
Rapidly deploy and dynamically manage secure networks at geographically distributed stores, branch locations, and on the road with Cradlepoint’s Enterprise Cloud Manager. This innovative cloud platform is the next generation management and application platform that helps you improve productivity, increase security and network reliability, and reduce costs; all while enhancing the intelligence of your network and business operations.
Join us for this webinar to learn about the benefits of deploying and managing an intelligent network with Enterprise Cloud Manager. This webinar will include a live product demo.
Attendees will learn how to:
•Set up and configure groups of devices for “zero-touch” installation and continuous remote management.
•Troubleshoot their network, limit truck rolls, and reduce downtime
•Perform remote diagnostics – status reports, error logs, and alerts
•Easily upgrade firmware on multiple routers at once
•Implement best-in-breed security applications from the cloud
In this webcast we will look at how to effectively manage Macs in the enterprise as well as mobile devices leveraging your existing IT infrastructure.
The growth of Mac in the enterprise is undeniable. Apple’s success with the iPhone and iPad is bleeding over into end user preference for laptops. Where Macs used to account for only low single digit percentages of devices deployed and were therefore largely ignored, they are now growing across all verticals and industries and represent a significant challenge for IT.
Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:
- Identifying attacked endpoints
- Finding indicators of compromise
- Analyzing malicious activity
- Tracing outbound communication, and more
Practice Makes Perfect When Defending Against DDoS Attacks
DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.
In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
• Take a deep dive into multi-vector DoS attack strategies
• Learn how to attack yourself in a controlled, safe environment
• Create a DDoS Range to test your network defenses, personnel, and incident playbook
Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.
Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:
· Continuous threat prevention, detection and remediation in an easy-to-use solution
· The ability to identify all critical assets and the potential attack surfaces in your network
· Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM
· Simplified protection of your network with ONLY two products, at a price you can afford
· Continual improvement of your security posture through frequent assessment.
· Integrated threat intelligence that maximizes the efficiency of your security monitoring program
Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:
1) Executive mandate to "Do more with less"
- Free-up your time to do what you do best
- Vendor consolidation
- Outsource, focus Internal resources on strategic tasks
2) Lack of IT Expertise at remote sites
- Consistency of deployment, Office in a box
- How to make sure all locations have the same technology
- Preplanned for growth and new services
3) Sometimes lack of ownership of remote sites (Franchises)
4) Security compliance/PCI DSS
5) High availability
- Network is down, business has stopped (can't take payments)
Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen
Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
• Etablieren und Umsetzung von Security Configurations
• Automatisierung und Durchführung von regelmäßigen Configuration Assessments
• Priorisierung und Umsetzung von Remedation Workflows
Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?
Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?
Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?
Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).
Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).
Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.
Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.
Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :
• Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète
• Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.
• Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
In the age of digital transformation trust is key to the growth of services in both the public and private sectors. With more and more services evolving and innovating around digital identity there is a universal need to bridge and balance business incentives with government requirements. At Kantara Initiative we see the transformation cycle as a 4 stage process: strategy setting, innovation, deployment, and assurance. Few, if any, organizations can succeed at all of the strategic stages of change and innovation in isolation. We invite you to join us to discuss how trust frameworks will evolve to bridge the digital transformation of identity assurance.
CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:
How many were affected by a successful data breach in 2014
How many think they’ll be victimized in 2015
What portion of IT spending is dedicated to security
Which cyberthreats concern security professionals the most
Which security defenses are present or planned for acquisition
Plus two dozen additional insights from security professionals just like you
DNS security breaches are more common than you think. From hijacking of a DNS record at the registrar to cache poisoning to data exfiltration through DNS, they can cause significant damage in terms of direct revenue loss, theft of sensitive information, and brand damage. Because DNS is rarely monitored closely, malicious actors use it to avoid detection and slip under the radar. Early detection is key to minimizing damage and disrupting the cyber-kill chain at the DNS level. Join this webinar to learn the different breach tactics, the impact a security breach can have, and best practices and mitigation techniques. Keeping your DNS secure means keeping your data secure.
As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.
In this webinar, Eric and Dave will discuss:
• How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
• How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
• Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.
Attend this webinar and you will learn how to avoid:
• Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
• Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
• User Frustration - Implement ultra flexible BYOD policies without compromising security
• Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
• Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
AnubisNetworks Adds Powerful New Features to Cyberfeed Security Intelligence Service.
New Cyberfeed release delivers more visibility into cyber threat vectors and improved enrichment and correlation, providing actionable threat intelligence, as recently attested by Europol in major Ramnit takedown
Would you ever consider leaving your house for the day without locking your door? Of course not!!
It is as important to protect and control front-door access of your databases as it is to lock the front door of your house. That is why we use a suite of database discovery and activity monitoring tools to control the front door access of our databases. Yet hackers and miscreant insiders know that the back door of databases are all too often left wide open—and it is the path of least resistance to steal valuable data.
Vormetric has partnered with Intel Security to integrate with McAfee Database Activity Monitoring (DAM) and McAfee Enterprise Security Manager (ESM) to extend data-security coverage. Vormetric adds another layer of security to McAfee DAM by preventing unauthorized users and processes from accessing or viewing the database files through transparent encryption.
In this presentation, Vormetric will demonstrate:
• How to complete database security, to assure that back door entry is as locked down as the front door
• How to protect the database, and its associated files such as configuration, logs and reports, from not only physical theft, but also from insider threats and hackers
Note: You can only view this event logged into Cybrary's website.
Learn how to develop a defensive arsenal against some of today's most powerful cyber threats in Cybrary's first live classroom event. Post-Exploitation Hacking SME Joseph Perry will be presenting on the tools, process and practice strategies to mitigate cyber threats LIVE, and you're invited to have a front-row seat! Gain valuable knowledge on the defensive measures that matter most when protecting sensitive data.
Like many large universities, the University of New Brunswick (UNB) found itself increasingly targeted by a vast array of Internet threats. Originally designed to give large numbers of users broad access to data of all kinds, university IT systems like UNB’s are easy targets for cyber criminals.
Join David Shipley from UNB for this live, interactive webinar, as he describes the ambitious process that he and his colleagues undertook to implement a proactive, intelligence-based cyber security strategy that gives them real-time visibility into attacks in progress, along with actionable insights to respond quickly and effectively.
In less than an hour, David will tell you:
• Why simply reinforcing perimeter defenses was not the right approach for UNB
• How they were able to gain better security visibility and intelligence—and use it effectively
• Which solutions combined to dramatically improve UNB’s cyber security without greatly increasing resource demands
• And more…
Don’t miss this opportunity to learn from an accomplished peer, and to discover how you too can create and implement an effective, intelligence-based security strategy for your organization.
As enterprises struggle to control and secure their assets across internal file stores, an ever-increasing universe of mobile devices, and a plethora of non-secure cloud storage services, they are searching for solutions that allow them to quickly identify and isolate noncompliant data sharing and prevent unauthorized access to sensitive information.
Intel Security and Topia Technology have partnered to develop an integrated product for organizations to store, analyze and share documents from a mobile device or a cloud computing platform.
•Secrata deployed with McAfee provides a unified file sync and share experience with military-grade security, to address this need.
•McAfee Enterprise Security Manager enables businesses with true, real-time situational awareness and the speed and scale required to identify critical threats, respond intelligently, and ensure continuous compliance monitoring.
Osterman Research and (ISC)2 recently conducted a survey of individuals in mid-sized and large organizations on how they choose off-the-shelf applications, how they develop custom applications, and how they select third-party application developers. Join (ISC)², Michael Osterman and a panel of experts for a discussion about the findings from the survey and the state of software development quality on Tuesday, April 7th at 1:00pm Eastern. Attendees will also have the opportunity to download the entire survey report.
Join FireEye Labs Advanced Reverse Engineering (FLARE) team members Matt Graeber and Dimiter Andonov for another exciting deep dive on new malware case studies found during Mandiant investigations. FLARE is dedicated to malware analysis and the development of tools to assist reverse engineering. The two malware they’ll dissect as part of this interactive discussion include:
1.Steganogram Shellcode Backdoor - The malware is a downloader and launcher that uses steganography to extract shellcode, commands, and data from PNG images. Which results in advanced modular backdoor capable of collecting wide range information related to the compromised system and executing even more shellcode!
2.Hybrid 32/64-bit Malware - The malware mixes 32-bit and 64-bit code to inject into the explorer.exe process depending upon the target architecture. We’ll show how this broke our malware tools and our solution.
Despite years of headlines, and countless examples, many organizations are still under the impression that DDoS attacks are a problem for somebody else (i.e. their ISP), or that it’s a problem that can be defended using an existing on-premise security solution, such as their firewall or IPS. In a risk obsessed world, these organizations are ignoring the very real likelihood of becoming a target for DDoS attacks, along with the severe operational and business consequences of falling victim to an attack.
It’s time to debunk some misconceptions about DDoS.
Attend this webinar to learn:
- Why a single layer of DDoS protection isn’t enough
- How the impact of a DDoS attack is significantly more costly than protection options
- The correlation between DDoS attacks and advanced threats revealed in our latest research and how both are used during multiple phases of an advanced threat campaign.
The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.
The growing presence of widely known and used Commercial Off-the-Shelf (COTS) systems in Industrial Control Systems (ICS) provides an increased opportunity for cyber attacks against ICS equipment. Such attacks, if successful, could have severe impact to not only process availability but also safety. Patch management is one particular area of cybersecurity which requires special attention when applied to ICS. It is part of a comprehensive cybersecurity strategy that increases cybersecurity through the installation of patches that resolve bugs, operability, reliability, and cyber security vulnerabilities. The ISA-TR62443‑2‑3 technical report, developed by the ISA 99 Working Group 6, addresses the patch management aspect of ICS cyber security. Also part of an effective strategy is the use of compensating cybersecurity controls to protect ICS systems from exploits and malware in between often long patching cycles. Novel network and host based technologies have recently become available to address even zero-day threats which bypass conventional signature-based approaches.
Attendees of this webinar will leave with a better understanding of:
-The unique aspects of ICS that entail a different and more rigorous approach to patch management than that used in business networks
- An overview of the ISA 99 standards efforts with detail review of the main aspects of the ISA-TR62443-2-3 Technical Report on Patch Management in IACS
- Advancements in compensating cybersecurity controls for protecting systems from zero-day threats
ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
Sans cesse en évolution, les menaces sont de plus en plus difficiles à contrer, sauf lorsque l'on a la pleine visibilité sur les potentielles failles de son infrastructure. Découvrez comment Qualys vous donne ce pouvoir.
Constantly evolving threats can be more difficult to counter—unless you have full visibility into potential vulnerabilities of your infrastructure. Built on the leading cloud security and compliance platform, Qualys gives you immediate, global visibility of IT vulnerabilities. Join this webcast to learn more.
In today’s online and mobile environment, financial service organizations are struggling to comply with a multitude of regulatory requirements that impede online and mobile customer signups. What is the best way to signup customers while still complying with regulations and mitigating fraud?
Join us for a live webinar, “Optimizing customer signup flows in your mobile and web channels” and listen in as experts in ID authentication and identity verification discuss various strategies that will help you:
· Quickly and safely signup customers through your mobile and online channels
· Remain compliant with regulatory requirements without adding additional operational overhead
· Reduce customer sign-up abandonment
Don’t loose another customer because you can’t offer a real-time sign-up process through your online and mobile channels. Join us and learn how to optimize your sign-up flows, and enable anytime, anywhere through any digital channel customer account opening.
More than 75% of organizations in the U.S. and U.K. have experienced at least one DNS attack according to SC Magazine. DNS Attacks are increasing in frequency and evolving constantly. They range from common amplification, reflection, and flood attacks to more sophisticated and stealthier types. These might have fancy names like random subdomain, phantom domain, and domain lock-up, but their effects on DNS are far from pretty. Join this webinar as we reveal the top 10 attacks on external and internal DNS servers; and the impact they have on your operations.
Join Cyveillance and Centripetal Networks as we explore the challenges in closing the breach detection gap, managing large dynamic sets of threat intelligence, and how to operationalize threat intelligence in a perimeter defense strategy. Additionally, we will demonstrate how leveraging threat intelligence in the security stack is providing large enterprises with real-time active network defense.
It's been said that defensive driving is about "driving for the other cars on the road." The same can be said for setting your organization's security strategy and "to think like your enemy". It's a sound practice which focuses on infosecurity practitioners putting themselves in the shoes of their attackers and anticipating where the next threat may be coming from. Using advanced analytics to compile simplified reporting can help to streamline your these efforts, enabling you to more clearly see the threats the attackers may be using and helping you to react faster. Join (ISC)2and NopSec on April 9, 2015 at 1:00PM for a discussion on vulnerability and threat analytics to better secure an organization.
Join Ntirety, a division of HOSTING and the leading data services organization in the country, in this discussion of the impact that database administration can have on individuals, organizations and — most importantly — bottom line revenue. This interactive webinar will cover:
•DBA Burnout and Retention
•The DBA’s Role in Major Platform Shifts and Regulatory Compliance
•The Accidental DBA Due to Staff and Skills Shortages
•The “Half a DBA” Problem -- When You Don’t Need a Full-time DBA
•The IT Budget Crunch
•Q & A
Several years ago, award-winning writer and stand-up comedian Bennett Arron was in serious debt. He owed thousands of pounds to mobile phone companies, catalogues and department stores. Only it wasn’t him. Bennett was a victim of Identity Theft, the fastest growing crime in the UK. This theft resulted in Bennett and his pregnant wife becoming penniless and homeless.
Years later, Bennett wrote a comedy show about his experience. The show was critically acclaimed at the Edinburgh Festival and led to Bennett being asked to direct and present a Documentary for Channel 4. The Documentary, How To Steal An Identity, was Pick of The Week in The Guardian and The Telegraph and was called ‘Fascinating and Disturbing’ by the TV Times. It went on to be shortlisted for a BAFTA.
In the Documentary, Bennett proved the ease of ID theft, by first stealing the identities of the general public and then stealing the identity of the then Home Secretary, Charles Clarke.This action resulted in Bennett being arrested in a dawn raid by Scotland Yard and given the code-name Operation Hydrogen.
Bennett has recently written a memoir on the subject. This book, which has received several 5 star reviews, is not only a disturbingly true yet funny account of what it's like to have your identity stolen and but also reveals the devastating consequences of making a documentary ‘in the public interest’.
He has performed as a speaker at many corporate events around the world and he was the Guest Speaker at the International Fraud Convention in Italy, the International Congress On Anti-Fraud & Anti-Corruption in Poland (twice) and the opening keynote speaker at Auscert in Australia.
Bennett has been called... 'A Welsh Seinfeld' by The Guardian, 'Genuinely Original and Funny' by The Times and ‘Case Number 2477419’ by The Metropolitan Police.