Hi [[ session.user.profile.firstName ]]

IT Security

  • Death to Traffic: How Smart Cities are Changing Transportation
    Death to Traffic: How Smart Cities are Changing Transportation Laura Schewel, CEO, StreetLight Data Recorded: Jun 23 2017 45 mins
    From automated vehicles to ride hailing apps, transportation as we know it is changing - and fast. But new technologies alone won't help communities build the efficient, equitable, and sustainable transportation networks communities want. In fact, these innovative technologies could do just the opposite, especially if they are not deployed wisely. Cities must collect the right data and enact the right policies to ensure they do not exacerbate problems like inequity and traffic, and to hold themselves accountable to the promise of new mobility technologies.

    In this webinar, you will find out why - and how - the smartest cities of tomorrow will be those that adopt data-driven transportation strategies today. Join for Laura Schewel's presentation to gain insights into:

    • Why the status quo for transportation data collection is no longer good enough
    • The types of Massive Mobile Data that are useful for transportation and urban planning
    • Algorithmic processing techniques that are critical for making this data useful
    • Case studies from California and Virginia that demonstrate why Massive Mobile Data drives more effective transportation planning
    • A forward-looking blueprint for using Massive Mobile Data to maximize the potential benefits of new transportation technologies - and minimize negative impacts

    Laura Schewel founded StreetLight Data, a mobility analytics provider, after spending more than a decade as an advanced transportation researcher and statistician at the Rocky Mountain Institute and FERC. She has particular expertise in transportation systems, sustainability and safety, and vehicle/system modeling and analysis.
  • How IoT Will Make Healthcare Healthy, Wealthy, & Wise
    How IoT Will Make Healthcare Healthy, Wealthy, & Wise Jarie Bolander, COO, Lab Sensor Solutions Recorded: Jun 23 2017 46 mins
    IoT is a technology that has the potential to make us healthy, wealthy, and wise especially in healthcare. Healthcare is just now adopting IoT to improve patient outcomes and decrease the cost of care.

    In this webinar, you’ll learn:

    - How to identify if an IoT solution will work for your use case.
    - What others in healthcare are using IoT for.
    - The challenges of IoT in healthcare
  • GDPR Mini-Webinar Series - Episode 8 - Working with Third-Parties
    GDPR Mini-Webinar Series - Episode 8 - Working with Third-Parties Amar Singh & Chris Payne Recorded: Jun 23 2017 13 mins
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss working with third-parties
  • Streamline Your Security Workflow with Security Automation and Orchestration
    Streamline Your Security Workflow with Security Automation and Orchestration LogRhythm Recorded: Jun 23 2017 6 mins
    When your SecOps team receives an alarm, investigation and rapid incident response can mean the difference between quick containment and a damaging data breach.

    Security Automation and Orchestration (SAO) accelerates threat qualification, investigation, and remediation with incident response workflow and automated playbooks. This embedded feature set in the LogRhythm platform allows your team to securely and efficiently collaborate so they can make quick and accurate decisions.

    Watch the video demo to see how LogRhythm’s embedded SAO capabilities can simplify and streamline your SecOps workflow.
  • Breach Prevention Week: High-Performance, Intelligent, Centralized Management
    Breach Prevention Week: High-Performance, Intelligent, Centralized Management Navneet Singh from Palo alto Networks Recorded: Jun 23 2017 23 mins
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • Your Car Is Betraying You -- Why Robust Security is Essential on the Road
    Your Car Is Betraying You -- Why Robust Security is Essential on the Road Toby Weir-Jones, CEO, Weir-Jones and Associates Recorded: Jun 22 2017 58 mins
    Modern vehicles are, as Bruce Schneier recently put it, actually computers with wheels rather than cars with a computer added on. Every part of the vehicle's operation is supervised, logged, and managed by digital signals on a complex vehicle network. If you have a crash, your car will tell investigators if you were speeding or swerved to avoid the impact. If you spend too long dawdling at the convenience store instead of visiting your customers, your employer will know about it. If you waste fuel, drive dangerously, or don't turn your lights on when you should, it'll be recorded.

    This introduces a lot of familiar debates in security circles. Who owns the data? What counts as personally identifiable? What are acceptable standards for logging, retention, and disclosure? What happens if we get it wrong?

    The bad news is the vehicle landscape, like enterprise security, is badly fragmented. The good news is we've learned a lot of useful lessons over the past 20 years which can be brought to bear on the problem, so solving it shouldn't take another 20.

    In this presentation we'll review some of the mechanics of how vehicle data is generated, who can see it, and how it can be used and abused. We'll then talk about points of leverage for the industry, the manufacturers, the owners, and law enforcement, and see what common ground exists. Finally, we'll lay out some basic ideas any fleet operator or concerned individual can use to make decisions about what vehicles to use and how to manage the data footprints they generate.
  • Optimize Agility and Management with Voice Services & Unified Communications
    Optimize Agility and Management with Voice Services & Unified Communications Tariq Hameed, Technical Architect, Unified Communications Recorded: Jun 22 2017 46 mins
    Cloud PBX in Office 365 provides the features you need to eliminate traditional PBX systems and the associated costs. It includes common calling features like transfer, hold, and call resume, allowing your assistance to receive calls on your behalf or answer calls for other team members when they're unavailable.

    PSTN Calling offers local, long distance, and international calling, so you can reach the people who are important to your business with a choice of calling plans.

    Join this webcast to:
    - Learn how to protect your privacy and intellectual property with built-in encryption
    - Find out about rapid provisioning to get, assign, and use new phone numbers in minutes
    - Discover number porting, which allows you to use your existing phone numbers with Microsoft calling plans

    This webcast is part of our Complete cloud communications series. Sign up for this session, or the entire series today!
  • Hunter Spotlight: Interview with Danny Akacki, Fortune 100 Hunter
    Hunter Spotlight: Interview with Danny Akacki, Fortune 100 Hunter Danny Akacki, Threat Hunter, Fortune 100 Company Recorded: Jun 22 2017 33 mins
    Danny Akacki works on the Hunt Team for a Fortune 100 Finance Company. In this interview, Danny will share his experiences hunting and discuss:

    1. What makes a good hunter?
    2. What makes a good hunt program?
    3. How mature does an org need to be in order to benefit from a hunting program?
    4. Why should you avoid hunting before your org is ready?
    5.What's the difference between an investigation and a hunt?
  • Trends in Call Automation
    Trends in Call Automation Unify Recorded: Jun 22 2017 54 mins
    Improving Department of Defense Incident Response and Public Safety with Next Generation 9-1-1

    Effective incident response at Department of Defense (DoD) bases calls for seamless conversations between stakeholders on the base as well as with external civilian law enforcement and emergency services personnel. What should a modern dispatch solution look like -- one that brings together diverse channels and media, simplifies the dispatch environment while also addressing technical integration challenges to ensure next generation safety and response?

    This webcast explores how the DoD can improve incident response and interagency collaboration with a smart network strategy that saves lives and millions of dollars.
  • What Can be Done to Secure a Connected Vehicle?
    What Can be Done to Secure a Connected Vehicle? Mike Nelson, VP, Critical Infrastructure at DigiCert, Mike Ahmadi, Global Director of Critical Systems Security at Synopsys Recorded: Jun 22 2017 60 mins
    As self-driving vehicles are coming off the production line, automakers are deploying technology to improve the driving experience, from the infotainment system to enhancing brake and fuel efficiency. Yet, adequate cyber security measures still need to catch up. Whether it’s the hacked Jeep or the Nissan Leaf app vulnerability, connected vehicles often fail to implement basic authentication and encryption measures to protect users.

    Mike Nelson and Mike Ahmadi will cover the following topics:

    - Insight into the state of connected vehicle security and the need for interoperable standards-based solutions.
    - How connected device manufacturers are using public key infrastructure (PKI) to provide scalable authentication, encryption and data integrity for the vehicle and its thousands of connected parts.
    - Specific steps security teams can take beginning today.
  • Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security
    Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security Heidi Shey - Senior Analyst at Forrester and Nico Popp - SVP Engineering, Information Protection at Symantec Recorded: Jun 22 2017 57 mins
    Keeping data safe pays dividends for protecting your reputation and retaining trust. No-one wants to suffer a breach, let alone a mega breach, but how should you invest time and resources to prevent this?

    In this webinar, guest speaker Heidi Shey (Senior Analyst at Forrester) will join Nico Popp (SVP Engineering, Information Protection at Symantec) as they guide you through the evolving world of data protection and explain how a holistic approach to data security and identity puts you back in control.

    Such a data centric approach combines data discovery, protection and identity and delivers two key benefits:

    •Ensures data is only available to the right users, irrespective of location (including cloud), organization or device

    •Provides protection throughout the data lifecycle

    The webcast will include a review of best practices to help you understand how a proactive, data-centric approach makes best use of your resources, and safeguards your – and your customers’ – critical data.
  • Using Sysmon v6.01 to See What's Happening on Endpoints
    Using Sysmon v6.01 to See What's Happening on Endpoints Randy Franklin Smith (Windows Security expert) and Jake Reynolds (LogRhythm technical alliances engineer) Recorded: Jun 22 2017 91 mins
    Sysmon v6.01 is out from Windows Sysinternals and it’s even better than ever. This free tool runs in the background of your machine and provides efficient and powerful tracking of key security activity data that you can use to catch threat actors.

    In this webcast, Jake Reynolds, technical alliances engineer, joins Randy Franklin Smith, Windows Security subject matter expert, to discuss how Sysmon works and how to set it up to properly generate insightful information. Together they also demonstrate how LogRhythm’s analytics capabilities can help you detect threats by correlating Sysmon logs with other logs from your IT environment.

    You’ll learn:

    - Advantages of Sysmon over Windows Security Logs
    - How Sysmon works
    - How to configure Sysmon to work with LogRhythm
    - How to detect threats with LogRhythm’s threat detection modules using Sysmon logs

    Watch now to learn how to use Sysmon events and LogRhythm to detect malicious activity on your endpoints.
  • Building Secure Vehicular Software
    Building Secure Vehicular Software Dr. Mark Sherman, Technical Director, CERT / Software Engineering Institute, Carnegie Mellon University Recorded: Jun 22 2017 36 mins
    Software plays an expanding and critical role in the success of future vehicles such as automobiles and trucks. Novel technologies that depend on the flexibility of software create new vulnerabilities and new ways to attack systems. This talk explores the expanding landscape of vulnerabilities that accompany the increasing reliance on software and then examines some key steps to help mitigate the increased risk: development of appropriate requirements from an analysis of risks, techniques that can be applied during development, and evaluation approaches for existing systems. The talk will conclude with a view of emerging approaches to further improve the delivery and sustainment of such critical software.

    About the Presenter:
    Dr. Mark Sherman is the Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. His team focuses on foundational research on the life cycle for building secure software and on data-driven analysis of cyber security. Before coming to CERT, Dr. Sherman was at IBM and various startups, working on mobile systems, integrated hardware-software appliances, transaction processing, languages and compilers, virtualization, network protocols and databases. He has published over 50 papers on various topics in computer science.
  • Security Practices for a More Secure Cloud
    Security Practices for a More Secure Cloud Kurt Hagerman, CISO, Armor; Raj Goel, CTO, Brainlink; Keith Young, Security Official, Montgomery Cty Govt. Brandon Dunlap Recorded: Jun 22 2017 60 mins
    The cloud is full of potential – but also unwanted risks and guests. Threat actors of all skill levels and intentions seek to disrupt, destroy and derail your utilization of cloud hosting for your critical data workloads. How do you defend against this menace? Join Armor and (ISC)2 on June 22, 2017 at 1:00PM Eastern for a discussion on securing and maximizing your cloud investment. We’ll examine the expertise needed, the need to share responsibilities, leveraging proven and emerging technologies and the role integration and automation plays.
  • Threat Intelligence: Actionable Insights to Global Attack Trends
    Threat Intelligence: Actionable Insights to Global Attack Trends Dean Suzuki, Technical Architect, Microsoft; Anton Sarkisov, Technical Solutions Professional, Microsoft Recorded: Jun 22 2017 32 mins
    The average cost of a data breach has risen to $4 million, with costs incurred for litigation, brand or reputation damage, lost sales—and in some cases—complete business closure.*

    Your organization can stay ahead of threats with Office 365 Threat Intelligence, which leverages the Microsoft Intelligent Security Graph to analyze billions of data points from Microsoft global data centers, Office clients, email, user authentications, signals from our Windows and Azure ecosystems and other incidents that impact the Office 365 ecosystem. It provides information about malware families, including breach information with details down to the actual lines of code that are used for certain types of malware.

    Join this webinar to understand how your organization can become more secure through the powerful new features of Office 365 Threat Intelligence, including:

    - Interactive and intuitive tools to analyze prevalence and severity of threats in near real-time
    - Real-time and customizable threat alert notifications
    - Remediation capabilities for suspicious content


    * Source: The Ponemon Institute study
  • LTE, SD-WAN & Network Trends
    LTE, SD-WAN & Network Trends Ian Pennell, Chief Marketing Officer, Cradlepoint Recorded: Jun 22 2017 32 mins
    Today, businesses and organizations of all sizes — and from all industries — are challenged to extend their networks to more people, places, and things than ever. It’s also clear that legacy WANs — predominately based on wired, hardware-defined, and resource-intensive infrastructures — can’t keep pace with the rapidly changing needs of today’s lean and agile connected enterprise.

    Join Cradlepoint’s Ian Pennell on June 22 for a live webinar about trends in enterprise WAN architectures. Learn what Cradlepoint’s recent State of the Network 2017 report revealed about LTE adoption, software-defined WAN, and more.
  • The Results Are In: Open Source 360 Survey
    The Results Are In: Open Source 360 Survey Tim Mackey, Sr. Technology Evangelist, Black Duck; Bob Canaway, CMO, Black Duck Recorded: Jun 22 2017 60 mins
    Today, open source drives technology and development, and its worldwide adoption ranges from companies with a single employee to large corporations like Microsoft and Apple. All of these organizations rely on open source to innovate, reduce development costs, and speed time to market. Recent research reports point out that open source comprises 80% to 90% of the code in a typical application. Our Open Source 360° survey provides an update on the rapid evolution of open source development, use and management.

    The 2017 Open Source 360° survey was conducted through Black Duck’s Center for Open Source Research & Innovation (COSRI), focusing on four important areas of open source – usage, risk, contributions and governance/policies. Our respondents include input from new players, established leaders, and influencers across vertical markets and communities. This range of respondents drives broad industry awareness and discussions of these key issues.

    Please join Technology Evangelist Tim Mackey (@timintech) and CMO Bob Canaway (@bobcanaway) to review the results from the Open Source 360 Survey. Please bring your questions! 

    Follow the conversation on Twitter, using the hashtag #OSS360.
  • The Future of Smart Cards: Are Cards Already Dead?
    The Future of Smart Cards: Are Cards Already Dead? Jean-Noël Georges and Nicolas Raffin, Head of Strategic Marketing & Innovation Payment, Oberthur Technologies Recorded: Jun 22 2017 56 mins
    For more than a decade, industry experts have predicted the death of smart cards. However, the embedded SIM (eSIM) has an impact on the telecommunication vertical, and many other verticals continue to benefit from the tremendous advantages of this secured device. Frost & Sullivan forecasts that, in 2017, the market will continue to grow at a 4.7% CAGR globally for all verticals, including telecommunication, banking and payment, government and ID, transportation, and physical and logical access. In a growing market, innovation is key. This is why major players have added innovative functionalities to the existing medium to strengthen security and provide a more exciting user experience.
  • Clearing the Fog Around IoT Analytics
    Clearing the Fog Around IoT Analytics Jason Stamper, Data Platforms and Analytics Analyst, 451 Research Recorded: Jun 22 2017 38 mins
    In this webinar, Jason Stamper, analyst for Data Platforms and Analytics at 451 Research, will look at some of the latest trends that are being seen in IoT and specifically analytics at the edge of the network — in other words close to where the data is generated.

    He will also identify a number of data platform and analytics themes that are becoming more critical in the IoT era: security and data governance; infrastructure including edge analytics and server less computing; data processing; data integration and messaging.
  • Rebooting the Auto Industry: When Security Affects Safety
    Rebooting the Auto Industry: When Security Affects Safety Craig Smith, Founder, Open Garages; Research Director of Transportation Security, Rapid7 Recorded: Jun 22 2017 55 mins
    We are surrounded by 2-ton IoT devices on wheels. The auto industry has rapidly evolved in the last five years; vehicles now have phone apps for remote control, built-in WiFi hot spots, heads-up displays, lane correction systems, and other Advanced Driver Assistance Systems. These convenience and road safety features are in high demand, but they also introduce cybersecurity concerns.

    Automakers are now software companies, and this talk will address some of the cybersecurity-related issues faced by the transportation industry, including some of the growing pains a “traditional” industry has when it starts to become internet connected to the outside world. Mr. Smith will share techniques currently used by hackers and show some of the security defenses being put into place. You will see the vulnerabilities of vehicles on the road today, as well as take a peek into the future of fully autonomous cars. And if your head isn’t spinning already, learn what it will mean to "own" a car in the future. Key topics will include:
    •What makes car hacking so intriguing?
    •Who are the adversaries in this space and what are they after?
    •How self-driving cars can be used as a model for corporate infrastructure.
    •How IoT can be locked down without locking out the customer.

    About the Presenter:
    Craig Smith is the Founder of Open Garages and Research Director of Transportation Security at Rapid7. Open Garages is a distributed collective of performance tuners, mechanics, security researchers and artists. Craig is also the author of the Car Hacker's Handbook and runs a Security Consulting firm that specializes in automotive reverse engineering. Craig has developed many open source utilities to teach CAN bus to students and well as security penetration tools that can uncover vulnerabilities in vehicle and diagnostic systems. He has worked in the security field for over 20 years with the last 5 years focused on automotive.
  • eIDAS: Enabling Convenience and Confidence in Digital Transactions
    eIDAS: Enabling Convenience and Confidence in Digital Transactions Juan Asenjo, Senior Manager - Partner Marketing, Thales e-Security. Recorded: Jun 22 2017 53 mins
    The EU’s Electronic Identification and Trust Services (eIDAS) Regulation establishes legally binding electronic signatures for secure cross-border transactions. Businesses and consumers alike stand to benefit from the convenience and confidence that the new capability enables. To make this digital transformation a reality, an ecosystem of trusted identity, signature, time stamping, and validation services is being deployed across the continent. Whether you are one of these trust service providers, an organization accepting digital transactions form clients, or that consumer end user, eIDAS will impact your daily life.

    Thales and its technology partners play a critical role in the eIDAS ecosystem. As qualified signature creation devices (QSCDs), Thales nShield hardware security modules (HSMs) establish the root of trust for eIDAS trust services. Join this webcast to learn how Thales is serving the eIDAS community and helping you achieve the digital transformation.

    WHAT YOU WILL LEARN:
    • What eIDAS means to organizations and consumers
    • How eIDAS is changing the way we all do business
    • Why a robust root of trust is so important for security
    • Where eIDAS is having its initial impact – case stories
  • 6 Hidden Security Risks for Industrial Environments
    6 Hidden Security Risks for Industrial Environments Rob Caldwell, ICS Manager, FireEye Recorded: Jun 22 2017 35 mins
    Industrial enterprises – like electric utilities, petroleum companies, and manufacturing organisations – invest heavily in industrial control systems (ICS) to operate industrial processes efficiently, reliably, and safely. Without technology operating the plant floor, business halts or worse.

    Join our webcast to discuss six key plant floor weaknesses that adversaries exploit to undermine plant operations. Subversive and difficult to detect, explore the implications and a step-by-step checklist for mitigating these risks firsthand with our experts.
  • Breach Prevention Week: Use Breakthrough Performance HW to Secure your Network
    Breach Prevention Week: Use Breakthrough Performance HW to Secure your Network Navneet Singh and Sai Balabhadrapatruni from Palo alto Networks Recorded: Jun 22 2017 29 mins
    Secure Increasingly Encrypted Traffic and Enable Cloud Adoption

    The increasing use of encrypted traffic and rapid consumption of cloud-based applications, coupled with ever-increasing data center consolidation, are driving new processing power, performance and capacity requirements. We will discuss how high-performance hardware appliances help deliver next-generation security capabilities anywhere in the network, including data center cores and enterprise perimeters, as well as branch and remote offices.
  • Scaling Fraud Management Like The World's Best Ecommerce Companies
    Scaling Fraud Management Like The World's Best Ecommerce Companies Skye Spear, VP of Partnerships at Signifyd Jun 26 2017 5:00 pm UTC 30 mins
    As ecommerce merchants scale their business to meet rising demand, the manner in which they manage fraud changes dramatically. Join Skye Spear as he walks through real-world examples of ecommerce pioneers who have grown rapidly while reducing fraud losses.

    ABOUT THE SPEAKER:
    Skye Spear is the Vice President of Partnerships at Signifyd, the world's largest provider of Guaranteed Fraud Protection. Signifyd eliminates fraud losses with a 100% financial guarantee against fraud, allowing merchants to enter new markets and accept significantly more orders. Skye manages Signifyd's strategic relationships with partners and key ecommerce players. Prior to joining Signifyd, Skye held key positions at Silver Tail Systems and RSA Security.
  • Lessons Learned from the S3 Breach
    Lessons Learned from the S3 Breach Todd Bernhard, Product Marketing Manager, CloudCheckr Jun 26 2017 6:00 pm UTC 60 mins
    Industry-leading security analysts have identified publicly available S3 storage buckets on at least one high profile site. While this is a legitimate concern, it presents a timely opportunity for all cloud administrators to revisit their own security policies and take action. Security breaches can rapidly burn through budgets—and destroy businesses.

    While public cloud providers provide the foundational security services, the responsibility is on organizations and end users to ensure their cloud infrastructure is secure. CloudCheckr’s Best Practice Checks enable proactive security monitoring and automation to prevent hacks through available S3 buckets, vulnerable ports, and more. Join us to learn tools and tips to keep your cloud secure:

    - Best Practice Checks that can detect such concerns before they become an issue
    - Fix Now automation tools that can automatically correct such issues
    - Regulatory tools to ensure compliance with security standards
  • Best Practices and Future Direction of Security Awareness Training
    Best Practices and Future Direction of Security Awareness Training Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 Jun 26 2017 6:00 pm UTC 60 mins
    While reported numbers fluctuate from industry study to industry study, they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ – but they often don’t know where to start.

    Join security awareness expert Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 and former Gartner Research Analyst for this live webinar “Best Practices and Future Direction of Security Awareness Training”. We will discuss emerging industry trends and provide the actionable information you need to train your last line of defense, your employees.

    Perry will cover these topics:

    - Practical security awareness and behavior management tips
    - Outline how and where tools are helpful
    - Discuss emerging industry trends
    - How to create a “human firewall”
  • What should you do when a director gets arrested?
    What should you do when a director gets arrested? Chin Yong Kwek, Associate Managing Director, Kroll Jun 27 2017 5:00 am UTC 90 mins
    Join Kroll’s expert as we discuss some of the issues relating to the legal, operational, reputational risks which companies must consider when facing such incidents, and how these risks can be mitigated.
  • Enabling Agile Development: Automation & Microservices
    Enabling Agile Development: Automation & Microservices Mark Duhm, Hyperscale Practice Lead, Datapipe Europe, Hiten Mistry, Senior Solution Architect Jun 27 2017 8:00 am UTC 60 mins
    Join us for a mini deep-dive into Automation & Microservices in the context of enabling Agile development.

    We will discuss what a transition from a Monolithic to a Microservices Architecture looks like and share perspectives and best practices on Project Methodologies, Automation, Tooling and deploying code.

    Duration: 30 minutes

    Presenters:
    Mark Duhm, Hyperscale Practice Lead, Datapipe Europe
    Hiten Mistry, Senior Solution Architect
  • Identifier rapidement ses assets et gérer au mieux les attaques type WannaCry
    Identifier rapidement ses assets et gérer au mieux les attaques type WannaCry Leif Kremkow, Directeur Technique, SEMEA Jun 27 2017 8:00 am UTC 60 mins
    On ne vous explique plus ce qu’est WannaCry et l’impact que le ransomware a eu avec plus de 200 000 infections dans 150 pays depuis le 12 mai dernier.

    Vous savez également que Wannacry utilise l’exploit ETERNALBLUE et vise donc la vulnérabilité Microsoft (MS17-010).
    Mais ce que vous ne savez peut-être pas c’est que seulement 28 jours sont nécessaires pour que l’attaque soit effective​ ​!
    Autrement dit, les entreprises qui scannent leurs vulnérabilités mensuellement ou moins fréquemment sont à risque.

    Lors de ce webcast, Leif Kremkow Directeur Technique, Qualys vous expliquera comment :

    * Patcher et limiter les effets de WannaCry et d’attaque​s​ du même type
    * Détecter et obtenir une visibilité complète des assets touchés pour agir au mieux et au plus vite
    * Mettre en place un processus priorisé de remédiation des menaces pour limiter et gérer ​de façon optimum.​
    * Enfin pour lutter contre WannaCry, nous avons offert à nos clients un service gratuit et illimité de 30 jours pour identifier et remédier. Nous ferons un bilan de cette opération.

    Inscrivez-vous au webcast et découvrez comment Qualys peut vous aider.

    Session question/réponse en fin de webinar.

    Au plaisir de vous retrouver prochainement
  • Financial threats – The dark side of modern malware attacks
    Financial threats – The dark side of modern malware attacks David Balcar, Security Evangelist, Kaspersky Lab Jun 27 2017 1:00 pm UTC 60 mins
    The number of sophisticated attacks targeting banks and financial institutions is growing at a rapid pace. Any failure to quickly detect and neutralize these threats puts an organization at risk for huge losses. In fact, only 53% of businesses feel that financial organizations do enough to protect their information and 74% of companies choose a financial organization based on their security reputation. However, not all is lost; Rapid advancements in analytic capabilities changed the way data scientists, security teams and fraud analysts fight threats targeting their organizations.
    Please join our special guest – David Balcar – a globally recognized security professional, as he shares real world experience of cyber security in financial institutions.
    Here are some of the topics David is going to discuss:
    •Security budgets: current trends
    •Notable cases of threats affecting financial institutions: DDoS attack on TalkTalk
    • Targeted attacks and Mobile threats landscape
    • Adaptive Security Strategy
    • Kaspersky Enterprise portfolio - Talk about KSIS, KESS KSDC & KATA solutions
  • Mastering Operational Risk. Theory and Practice in a single package.
    Mastering Operational Risk. Theory and Practice in a single package. Boris Agranovich, Calvin Lee Jun 27 2017 2:00 pm UTC 90 mins
    Join me and our guest, Calvin Lee, Operations Director at RISKID, for a lively discussion as we aim to dispel confusion surrounding many of the elements of the Operational Risk framework.


    Operational risk is perhaps the most significant risk organizations face. Virtually every major loss that has taken place during the past 30 years, from Enron, Worldcom and Baring's Bank to the unauthorized trading incident at Société Générale and the subprime credit crisis, has been driven by operational failures.

    Many financial institutions have spent millions of dollars trying to develop a robust framework for measuring and managing operational risk. Yet, in spite of this huge investment, for many firms developing a viable operational risk management (ORM) program remains an elusive goal.

    This webinar is designed for both current students of the “Mastering Operational Risk” - http://www.globalriskacademy.com/p/orm online course and for other busy risk professionals who are interested in studying both theoretical and practical application of ORM but don’t have time to attend in-person classes.

    The goal is three-fold:

    1. Existing students will be able to understand more on how to work with the RISKID tool and get an opportunity to ask questions about the subject matter.
    2. People who are planning to join the course will get some explanation in what is the course about, how the e-learning system works.
    3. People who are just interested to know more about ORM

    During the webinar we will cover:

    1. 3 things most organizations are focusing on right now.
    2. What are the major steps to take control of operational risks.
    3. How to use Collaborative Risk Management tools to conduct your ORM operations and why traditional risk management practices involving risk registers and Excel are not effective anymore.
  • 3 Reasons Network Security Policy Management is a Big Deal
    3 Reasons Network Security Policy Management is a Big Deal Ron Kehoe CISSP, CISA, CISM, GCIH Senior Solutions Engineer Jun 27 2017 3:00 pm UTC 45 mins
    If you missed Data Center World conference in April 2017, then you also missed the session explaining what is Network Security Policy Management (NSPM) and why it's a big deal.
    Join this Webinar to learn how the complex nature of data centers today drives the adoption of NSPM and what are the benefits to your organization.

    Ron Kehoe has over 30 years of experience in security solutions architecture and consulting, and was a network security manager at First Republic Bank prior to joining Tufin as a senior solutions engineer.
  • 3 Pro Tips for Black Duck Hub & Ask the Experts
    3 Pro Tips for Black Duck Hub & Ask the Experts Black Duck Product and Implementation Team Jun 27 2017 3:00 pm UTC 60 mins
    Join our next customer webinar where YOU are the star of the show! Our Ask the Experts panel features Hal Hearst, Principal Product Manager; Utsav Sanghani, Product Manager; and Don Mulrenan, Manager Implementation Services. They’ll present their top three tips for scanning your code, helping you use Black Duck Hub’s features most effectively. We’ll leave plenty of time for Q&A with the panel. Submit your questions now by emailing jenny@blackducksoftware.com, or ask them during the webinar. We’re excited to have this opportunity to answer your questions and hear your feedback about Black Duck Hub. Register today.
  • Data-Centric Security for GDPR Compliance
    Data-Centric Security for GDPR Compliance Moderated by Brandon Dunlap, Amazon; Carole Murphy, HPE; Les McMonagle, Blue Talon; Cheryl Tang, Imperva; Mark Chaplin, ISF. Jun 27 2017 5:00 pm UTC 75 mins
    In today’s threat landscape, traditional approaches to securing data are falling short. Since 2015 we have seen some of the largest data breaches ever and it is clear that no industry or organization is immune from cyber attacks. The threat landscape is increasingly dangerous, while new technologies are distributing sensitive data farther across locations, devices and repositories. Starting in May 2018, enforcement will kick in on the European Union’s General Data Protection Regulation (GDPR), a move that could have a stronger privacy/security standardization effect than any technological effort has to date. Globalization efforts will make GDPR compliance essential for global companies wherever they are located.

    The development of a comprehensive data-centric security program, including data discovery, classification, encryption, and file protection, can uniquely position your organization to protect what matters most, and make security move with your data to comply with global regulations such as GDPR. On this webinar our panel of experts will discuss the key points that you should consider when developing such a program for your organization.
  • Breach Detection: The Fly In The Cyber Ointment
    Breach Detection: The Fly In The Cyber Ointment Jim Ambrosini, Managing Director, CohnReznick and Tony Thompson, GM Threat Detection, SS8 Jun 27 2017 5:00 pm UTC 45 mins
    Most companies list cyber security as one of their top priorities. Many have implemented various technologies and increased headcount to protect their digital assets and comply with regulations. However, despite making these investments, they continue to struggle with identifying a breach and knowing what to do or how to respond when it happens. In this Webinar, “The Fly in the Cyber Ointment – The Ability to Identify and Assess Indicators of Compromise,” cyber security risk expert Jim Ambrosini from CohnReznick will join Tony Thompson from SS8 Networks to discuss current trends in cyber security, the evolving threat landscape and present best practices on how to identify and respond to breaches.
  • The RNC Files: Inside the Largest US Voter Data Leak
    The RNC Files: Inside the Largest US Voter Data Leak Dan O'Sullivan, UpGuard Analyst Jun 27 2017 5:00 pm UTC 45 mins
    In what is the largest known data exposure of its kind, UpGuard's Cyber Risk Team confirmed that a misconfigured database containing the sensitive personal details of over 198 million American voters was left exposed to the internet by a firm working on behalf of the Republican National Committee (RNC).

    Dan O'Sullivan takes us through exactly what happened and why. As the analyst who first broke the story that is now being referenced in the House Intelligence Committee hearing, he will shed more light on the events leading up to the finding and what was exposed.

    For the original article: www.upguard.com/breaches/the-rnc-files
  • Next Generation Firewalls (NGFW) – 2017 Group Test Results
    Next Generation Firewalls (NGFW) – 2017 Group Test Results Thomas Skybakmoen, Bhaarath Venkateswaran, Michael Lynge Jun 27 2017 6:00 pm UTC 45 mins
    The Next Generation Firewall (NGFW) market is one of the largest and most mature security markets. You might expect that the seventh iteration of an NSS Labs NGFW Group Test would prove that leading vendors were catching all attack traffic. However, the test results tell a different story. Most vendors missed evasions which contributed to four products receiving a Caution rating. This webinar will step through the test methodology and group test results. Make sure to watch and find out how your NGFW did.
  • Compliance-as-a-Crisis: Managing Cloud Compliance
    Compliance-as-a-Crisis: Managing Cloud Compliance Tricia Pattee, VP of Product at HOSTING, Brandon Bennett, VP of Customer Success, and Jeff Bennett, CEO of Allgress Jun 27 2017 6:00 pm UTC 60 mins
    The minimum investment to meet cloud compliance obligations is $200,000 per year, and the fees for not complying can start at $100,000. So while the investment is worthwhile, many companies are unable to achieve such standards due mainly to budget constraints and a lack of expertise.

    Join Tricia Pattee, VP of Product at HOSTING, Brandon Bennett, VP of Customer Success at Allgress, and Jeff Bennett, CEO of Allgress for the webinar, Compliance as a Crisis: Managing Compliance in the Cloud. During the live event, they will discuss the following:

    •Public cloud (AWS and Azure) compliance considerations
    •Compliance standards and common industry trends
    •SecComp cloud best practices
    •Factors that contribute to a Compliance Crisis

    We’ll also demo a couple new solutions such as an industry-leading compliance dashboard and a (free) Compliance Posture Evaluation tool recently launched to provide you with actionable items for passing an audit.
  • Best Practices for Applying Threat Intelligence
    Best Practices for Applying Threat Intelligence Chris Pace Technology Advocate - EMEA, Recorded Future Jun 27 2017 6:00 pm UTC 45 mins
    Threat intelligence is certainly one of the most talked-about areas of information security today. Recent research conducted by SC Media revealed that 46 percent of security professionals expect threat intelligence to be a very important part of their strategy in 2017.

    But when it comes time to choose threat intelligence services and products it can be hard to know where to start. During this webinar, we’ll look at what types of intelligence will prove truly beneficial to your organization and how to get the greatest return on your investment.

    Join this webinar to:

    • Get best practices and case studies for implementing threat intelligence as part of your own information security strategy.
    • Understand the important distinction between threat data and intelligence.
    • Gain insight into the value of different intelligence sources and how to work with them.
    • Learn about the importance of context in threat intelligence.
  • Discover Hidden Threats with User Behaviour Analytics (UBA)
    Discover Hidden Threats with User Behaviour Analytics (UBA) Tom Salmon, Sales Engineer, LogRhythm Jun 28 2017 12:00 am UTC 60 mins
    As a cyber security professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage - and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Behaviour Analytics (UBA), which can help you detect and respond to user threats, such as when:
    - An insider turns against your organisation
    - A cyber attacker steals a user’s credentials
    - An administrator abuses account privileges

    If you’re focused on addressing user threats, UBA can be a powerful tool in your kit.

    Join Tom Salmon from LogRhythm, as he discusses the elements of an effective user threat detection program. You’ll learn:
    - Why detecting user threats is so important—and so difficult
    - Different approaches to UBA
    - The value of data from across your business
    - How to maximise the efficiency of your security analysts

    Watch this on-demand webinar to learn how UBA can help you discover hidden user threats, reduce false-positives and prioritise the most concerning threats.
  • Financial threats – The dark side of modern malware attacks
    Financial threats – The dark side of modern malware attacks David Balcar, Security Evangelist, Kaspersky Lab Jun 28 2017 3:00 am UTC 60 mins
    The number of sophisticated attacks targeting banks and financial institutions is growing at a rapid pace. Any failure to quickly detect and neutralize these threats puts an organization at risk for huge losses. In fact, only 53% of businesses feel that financial organizations do enough to protect their information and 74% of companies choose a financial organization based on their security reputation. However, not all is lost; Rapid advancements in analytic capabilities changed the way data scientists, security teams and fraud analysts fight threats targeting their organizations.
    Please join our special guest – David Balcar – a globally recognized security professional, as he shares real world experience of cyber security in financial institutions.
    Here are some of the topics David is going to discuss:
    • Security budgets: current trends
    • Notable cases of threats affecting financial institutions: DDoS attack on TalkTalk
    • Targeted attacks and Mobile threats landscape
    • Adaptive Security Strategy
    • Kaspersky Enterprise portfolio - Talk about KSIS, KESS KSDC & KATA solutions
  • Big Data on Azure Overview
    Big Data on Azure Overview Darmadi Komo, Product Marketing Manager, Microsoft Jun 28 2017 3:00 am UTC 20 mins
    Darmadi Komo, Product Marketing Manager, talks about Microsoft's best in class big data and analytics solutions and how it can power your journey into adopting, analyzing and utilizing big data.
  • Driving Digital Transformation with Azure IoT (Full Track)
    Driving Digital Transformation with Azure IoT (Full Track) Microsoft Jun 28 2017 3:00 am UTC 90 mins
    Digital transformation can help businesses modernize products, enter new markets and drive change. In the Internet of Things (IoT) era, it's becoming increasingly important to modernize your legacy applications in order to transcend the digital transformation, as well as enhance security of your IoT solutions and connected device authentication across multiple platforms.

    Learn how Azure's IoT cloud solutions took these companies from ground-up to the cloud without costly infrastructure investments.
  • Harnessing Digital Transformation to Drive Change
    Harnessing Digital Transformation to Drive Change Grant Fenn, CEO, Downer Group Jun 28 2017 3:00 am UTC 30 mins
    Grant Fenn, CEO of Downer Group, talks about how a venerable business in the engineering and infrastructure management services industry harnessed Digital Transformation to drive the next generation of operational capabilities.

    With customers spanning a broad range of industries, including public and private transport, energy, infrastructure, communications and resources sectors, it's vital for Downer Group to implement a digital transformation strategy that can encompass platforms, systems, integrations and needs across the board. Join this webcast to discuss a strategic, fool-proof approach to modernizing your IT operations.
  • Power-up Your Business with Big Data (Full Track)
    Power-up Your Business with Big Data (Full Track) Just Analytics & Microsoft Jun 28 2017 3:00 am UTC 90 mins
    Your customers are creating data at a rapid pace. The data can be overwhelming if not properly managed, categorized, and visualized. Businesses fall short at every stage, and often all three. This webinar will cover how to get to customer insights easier, quicker and at scale, minus infrastructural challenges. Speakers from Just Analytics and Microsoft will discuss how to create a big data journey that leads actionable insight with examples from the real world.

    For enterprises to embrace the full power of digital transformation, both technology and business leaders must work together to ensure they leverage the power of the cloud to stay ahead of the game. Join this webinar to discover ways to not let your big data make a big mess.
  • How UEM Uses Machine Learning to Transform Building Management
    How UEM Uses Machine Learning to Transform Building Management Microsoft & UEM Jun 28 2017 3:00 am UTC 20 mins
    Our buildings now talk, they tell us what ails them, when they need servicing. Through the power of machine learning, they have their own nervous system.

    Listen to how UEM gained new insights from data and now leverage the power of machine learning to digitally transform the way we think about building management.