IT Security

Community information
The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
  • Many organizations have struggled with BYOD programs due to MDM/MAM deployment challenges, user privacy concerns, and low adoption. This is causing some to question BYOD altogether. Fortunately, data shows that there is huge demand for BYOD, but such programs must meet employee needs in addition to IT needs.

    In this webinar, you'll learn where existing BYOD programs have fallen short, and how the next-generation of mobile security products will ensure secure, broad adoption of BYOD.

    Receive (ISC)² CPE credits for attending this webinar.
  • Next-generation firewalls and sandboxes stop attacks at various steps, but they only react to malicious communications and code after attacks have launched.

    There’s another way—observing where attacks are ‘staged’.

    We’re going to demonstrate how we can visualize Internet infrastructures for visibility into where attacks will emerge. Then, we’ll know where advanced malware will be downloaded and where compromised systems will callback—before attacks launch.

    In this live session, you’ll learn:

    7 steps of an attack and how you can use this data to get ahead of new security events.
    3 ways to uncover malicious activity by looking at domain names, IP addresses, and autonomous system numbers (ASNs).
    How to apply this intelligence to your current defenses.
  • Every day, your organization is creating more data that is critical to the operational success of your company. Making sure that you have a proper backup solution to recover data is not only important, it’s vital to the long term success of your business.

    Even though users are creating more mission critical data than we have ever seen in the past, that doesn’t mean your backup solution has to be expensive. In this webinar we cover a wide range of options about how you can effectively backup your content without breaking the bank.

    The solutions we will cover will take into account being highly fault-tolerant, mindful of high performance, and assurance that your data will be available when you need it.
  • In this 30-minute webcast, industry experts Mike Rothman, President of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise.

    During this webcast, attendees will learn
    * Which tactics have the greatest effect on fostering cyber security awareness throughout the enterprise

    * How to foster a risk-aware security culture while still encouraging trust among your employees and partners

    * How to bridge the gap between IT security and IT operations (hint: knowing more about your assets is the first step)
  • "Managing the process of writing secure code in a timely manner" is the first class in our series “Secure Code — Now and in the Future."

    Writing secure code is a constant challenge. You must have the right policies, processes, and tools in place. Day 1 of this three-day class will start from the beginning, ensuring that your first step is in the right direction, then outline how security touches each point in the product life cycle, some of the pitfalls you will likely encounter and how to steer clear, and survey existing standards and guidelines with examples of good, bad, and ugly code.
  • Wishful thinking or a cursory security assessment may have worked in the past but dealing with persistent and advanced threats requires an equally sophisticated and mature approach.

    While APT’s are on the rise and the use of zero-day vulnerabilities can be one of the weapons for such attacks, reality is that the large majority of incidents – advanced or not – occur using known vulnerabilities. Resolving these is, therefore, paramount to reducing the attack surface for cyber criminals.

    Join Amar as he shares his tips on adopting a mature and continuing vulnerability management process that can help organizations reduce risk and be better prepared to respond to APT’s.
  • According to Verizon’s “2015 Data Breach Investigation Report,” the cyberattacks are becoming increasingly sophisticated. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. Under these conditions, what would be your approach to dealing with security threats?

    Join us for a live webinar session and discover how auditing can help mitigate the risk of data breaches and solidify your security strategy overall. During the session, we will talk about:
    - The latest data breaches and their ramifications;
    - How auditing complements threat-defense mechanisms;
    - What should be audited and why.
  • Today’s cyber attacks have become increasingly more sophisticated, requiring organisations to embrace an agile and ever more adaptive approach to their cyber security strategy. Join our webinar as we discuss the changing landscape of advanced threats in EMEA, look into the anatomy of APTs and explain why conventional security methods are no longer equipped to deal with these advanced attacks. In addition, we’ll share insights into real-life case studies of advanced threat actors using zero-day attacks and how an adaptive defense model allows FireEye to quickly respond, detect and remediate such attacks.
  • Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
  • Jason will introduce some of the major challenges associated with monitoring and logging cyber security events, highlighting the need to identify indicators of compromise at a much earlier stage and in a more consistent, insightful manner.

    He will present a cyber-security monitoring framework, emphasising the benefits of taking a balanced, intelligence-led approach, based on fundamental log management and situational awareness. He will then look at what a cyber-security incident actually is and outline how to prepare for and respond to a cyber-security incident effectively – ensuring that it is properly followed up - helping to reduce the frequency and impact of future cyber security incidents.

    Finally, Jason will introduce a cyber-security incident response maturity model, showing how you can measure the maturity of a cyber-security incident response capability.
  • It is increasingly evident that organizations can realize the full potential value of their data assets by combining the structured transactional data with semi-structured and unstructured data. Businesses also notice that to be agile and react to situations in real time, access to transactional data with low latency is essential. Low-latency transactional data brings additional value especially for dynamically changing operations that day-old data, structured or unstructured, cannot deliver. Streaming transactional data into big data solutions in real time, without degrading the performance of the source production systems will lay the foundation for more efficient operations and improved customer experience.

    In this webinar you will learn how Oracle GoldenGate 12c empowers organizations to capture, route, and deliver transactional data from Oracle and non-Oracle databases. Oracle GoldenGate for Big Data provides optimized and high performance delivery to Hadoop targets such as Flume, HDFS, Hive, Hbase, NoSQL, Kafka, Spark and others to support customers with their real-time big data analytics initiatives.