Hi [[ session.user.profile.firstName ]]

IT Security

  • Hacktivism Culture: DDoS 101 Hacktivism Culture: DDoS 101 Larry Collins, Product Manager at HOSTING and James Askham, Solutions Engineer at CloudFlare Live 60 mins
    The threat of Distributed Denial of Service (DDoS) attacks is a growing problem for mission-critical websites, such as eCommerce shops, SaaS applications, gaming forums, and University portals; in addition, politically or artistically important organizations and journalists can be especially at risk of attack, due to the nature of their website content.

    The company CloudFlare delivers DDoS protection to over 4,000,000 websites globally, from personal blogs to large enterprises, while also offering a free protection program for respected free speech, public interest, and civil society organizations, called “Project Galileo”.

    Join Larry Collins, Product Manager at HOSTING, and special guest, James Askham, Solutions Engineer at CloudFlare, on October 20th at 3 PM EST for the webinar Hacktivism Culture: DDoS 101. During the live event, they will go over:

    •What a DDoS attack is from a technical perspective
    •The most common types of DDoS attacks
    •Best practices for mitigating against these attacks and how CloudFlare’s “Project Galileo” protects political and artistic organizations.
  • Ransomware in Healthcare Ransomware in Healthcare Matt Mellen - Security Architect & Healthcare Solution Lead - Palo Alto Networks Recorded: Oct 20 2016 46 mins
    The business model behind crimeware has changed. As the price of stolen records has plummeted, many attackers looking for new sources of income. Many attackers have turned to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data.

    Join this informative webinar where a former Information Security Lead at a hospital, will discuss practical steps healthcare organizations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will cover practical steps healthcare organizations can take on systems and network devices to prevent exposure to this rampant attack.

    Register today to learn more about:

    • How the most current variants of ransomware work
    • How to prevent successful ransomware attacks in Healthcare

  • Make the Case for a Cloud Access Security Broker (CASB) in 4 Steps Make the Case for a Cloud Access Security Broker (CASB) in 4 Steps Steve Zalewski, Chief Security Architect at Levi Strauss & Co. | Robert Mally, CFO Palerra Recorded: Oct 20 2016 57 mins
    58% of security professionals expect their budgets to stay the same next year. If you’re like them, you’re trying to secure a growing number of cloud services and infrastructure without a bigger budget.  

    What do you do? Make a bulletproof business case for a Cloud Access Security Broker (CASB).

    In this webinar you'll learn:

    - How to demonstrate the financial exposure of not having a cloud security solution
    - How to align cloud security spending with business objectives
    - How to demonstrate savings in cybersecurity expertise through automation
  • Threat Detection 101: Why Advanced Monitoring Is Key To Ensuring Cybersecurity Threat Detection 101: Why Advanced Monitoring Is Key To Ensuring Cybersecurity Matt Thurston, Chief Architect at Arctic Wolf Networks Recorded: Oct 20 2016 35 mins
    Advanced persistent threat detection is part art and part science. This presentation provides a simple, straightforward explanation for non-technical people to help them understand how threat detection works. Having the best firewall and antivirus in the world will not keep you safe from cyber attacks. Attend this webinar to see why advanced monitoring is the only way to ensure vigilant cybersecurity.
  • Improved Cluster Performance: Proactive Support with SmartSense 1.3 Improved Cluster Performance: Proactive Support with SmartSense 1.3 Paul Codding, Sr. Product Manager, Hortonworks Recorded: Oct 20 2016 49 mins
    Hortonworks launched SmartSense to help customers quickly collect cluster configuration, metrics, and logs to proactively detect issues, and expedite support case resolution. In this webinar, Paul Codding, Senior Product Manager for SmartSense will walk the audience through the new functionality that has been launched as part of SmartSense 1.3. Learn how SmartSense 1.3 changes the game for HDP operators and help them make better business decisions to manage their clusters.
  • Gen 4 Attacks: Web Behavior Analytics to Protect Websites Gen 4 Attacks: Web Behavior Analytics to Protect Websites Eric Ogren, Senior Analyst at 451 Research, & Omri Iluz, CEO of PerimeterX Recorded: Oct 20 2016 58 mins
    Join Eric Ogren, Senior Security Analyst at 451 Research, and Omri Iluz, CEO of PerimeterX, as they discuss how your best defense against automated website attacks rests with an approach founded on analyzing the behavior of humans and bots. 451 Research has talked with organizations that have saved millions in fraudulent transactions after embracing a behavioral analysis approach to security.

    Sophisticated attackers are commercially motivated, using automated attacks to inflict damage. By abusing encoded business logic, they utilize real browsers to take over accounts, perform fraudulent purchases and scrape intellectual property, without triggering traditional security mechanisms. Through advanced techniques of cloaking from the world of malware, they disguise their nefarious intentions. Signature-based bot detection and WAFs are blind to these new threats, leaving your organization’s website defenseless.

    In this webinar you will learn:

    •How bots have evolved from simple scripts to sophisticated Man-in-the-Browser attacks
    •How to protect against advanced modern attacks utilizing real-user browsers
    •How to detect malicious behavior with Web Behavior Analytics (WBA) technologies
    •Real-world attacks and how organizations use behavioral analysis to prevent them
    •How to future-proof your business and your infrastructure
  • Vote Cyber! Modern Day Threats to Democracy Vote Cyber! Modern Day Threats to Democracy Simon Crosby, CTO of Bromium Recorded: Oct 20 2016 37 mins
    The US election and its voting infrastructure are under attack. The result is ugly and shows the extent to which we need to plan for and protect against the influence of cyber-related attacks on US elections in future. In this brief discussion, Simon Crosby, CTO of Bromium will review the underpinnings of Democracy, and how we might defend it when it is in everyone’s interest to subvert it.
  • Introducing New Band 14 & Cat 4 Modems for North America Introducing New Band 14 & Cat 4 Modems for North America Cradlepoint's Product Management Team Recorded: Oct 20 2016 32 mins
    Cradlepoint recently announced that first responders will now be able to seamlessly transition to the Band 14 National Public Safety Broadband Network (NPSBN) developed by the First Responder Network Authority (FirstNet) and meet the mandates of the federal government.

    Cradlepoint’s new MC400L2 modem is the first solution with a full range of applications needed to coordinate emergency response efforts across public and private first responder networks. It is the first Band 14 solution that—when integrated with the AER product family—features full Unified Threat Management (UTM) security.

    Benefits of the new release include: routers can be deployed now and upgraded later when FirstNet is available; maximum reliability when paired with commercial LTE service; Ethernet WAN, or WiFi as WAN; and faster speeds with the Category 4 modem for AER, ARC, and COR product families.

    Additionally, Cradlepoint also announced new Category 4 modems for the AER, ARC, and compatible COR series products. This new modem will perform at higher speeds, support additional bands, and take advantage of carrier network improvements. The new modem will be embedded in the AER1600 and available as an accessory MC400 modem for the rest of the AER and ARC products, as well as a second-modem accessory for the COR products with a dock.

    Join us for this webinar to learn more about Cradlepoint's new modem products for North America.
  • Your Mobile Devices - Wi-Fi Attacks and Vulnerabilities Your Mobile Devices - Wi-Fi Attacks and Vulnerabilities David Jevans, VP Mobile Security, Proofpoint Recorded: Oct 20 2016 40 mins
    Mobile device users interact with numerous Wi-Fi networks at work, home, airports, coffee shops and more. Connecting to wifi networks is second nature, with users’ accepting terms and conditions without realizing the risk of data-loss from malwareless and softwareless wifi attacks. This webcast will help you understand the common attacks and vulnerabilities that users are exposed to when traveling, and what you can do about them.
  • Practical Recommendations To Make Smarter Security Decisions Practical Recommendations To Make Smarter Security Decisions Joseph Blankenship, Senior Analyst at Forrester Research, Venkat Rajaji, SVP of Marketing at Core Security Recorded: Oct 20 2016 55 mins
    Security teams are taking in more data – such as device telemetry, vulnerability data, and threat intelligence - than ever before as they try to keep pace with threats and compliance mandates. Unfortunately, more data doesn’t translate directly to better protection. In fact, too much data can overwhelm security teams and make it more difficult to recognize threats. Gaining useful insight and making security data operational is the only way to shorten time to detection and time to remediation. In this webinar, guest Forrester analyst Joseph Blankenship and Core Security will cover:

    •Enabling action with data
    •Gaining insights with intelligence
    •Increasing efficiency with workflow
  • Phishing, Malware and Incidents – Why You Need Phishing Incident Response Phishing, Malware and Incidents – Why You Need Phishing Incident Response Brendan Griffin, Threat Intelligence Manager, William Galway, Director of Product Management, Adrian Davis, (ISC)² Recorded: Oct 20 2016 62 mins
    During the first half of 2016, encryption ransomware grew to become the most common type of malware used through soft-targeting and massively distributed attacks. Encryption ransomware now accounts for 50% of all malware delivery configurations, meaning that it is no longer considered simply a means for making a quick profit, but a permanent fixture on the threat landscape. Daily email-based attacks require an unattainable perfect response – every time. However, teams are constantly working within constraints and breaches continue to occur in record number. Technology has been introduced to help but has failed time and time again.
    Join PhishMe’s Brendan Griffin and Will Galway to hear why it’s not all doom and gloom. In this session, you’ll learn about:

    •Ransomware trends and monetization for the first half of 2016
    •How simple attacks can still inflict massive damage
    •How PhishMe Triage creates fast and effective phishing incident response process to combat email-based attacks
  • Tools and Services for Energy Management - ICTFOOTPRINT.eu Tools and Services for Energy Management - ICTFOOTPRINT.eu Jaak Vlasveld (Director of GreenIT Amsterdam) and Rahib Bashroush (Coordinator of Eureca project) Recorded: Oct 20 2016 61 mins
    “Tools and Services for energy management”, with crucial information about tools to all those who want to improve ICT energy efficiency in their business.

    In less than an hour, Jaak Vlasveld (Director of GreenIT Amsterdam) and Rahib Bashroush (Coordinator of Eureca project) - will provide their valuable insights regarding energy efficiency in ICT.

    Jaak Vlasveld will explain how to achieve energy efficiency gains without impacting the performance and stability of ICT and the potential impact of Life Cycle Assessment on buying new IT equipment.

    Rahib Bashroush will provide his expert advice on the sustainability of data centres, which will explain how to identify and procure environmentally sustainable data centres.
  • Journey To Cloud - A Financial Services Perspective Journey To Cloud - A Financial Services Perspective Ray Bricknell, Managing Director, Behind Every Cloud; Kevin Linsell, Director of Strategy & Architecture, Adapt Recorded: Oct 20 2016 33 mins
    Regulation. Risk. Choice. There is plenty to consider on your Journey to Cloud. Join us to revisit what you know and gather fresh insights and best practices to defining and executing your Journey.

    Ray Bricknell, Managing Director at Financial Services focused consultancy, Behind Every Cloud, will dish out tangible insights and best practices that will put any cloud conundrum into perspective. Areas covered include:

    - The ins & outs of today’s (ever evolving) Journey to Cloud
    - A view on the industry's regulatory landscape and its impact to IT outsourcing
    - Finding the 'Best Execution Venue' for your IT workloads
    - Dealing with legacy and the realities of migration
    - Minimising operational risk when devising a cloud migration
    - Key learnings from Financial Services Companies progressing through the Journey
  • Symantec Advanced Threat Protection (ATP) Integration with SIEM/Workflow Symantec Advanced Threat Protection (ATP) Integration with SIEM/Workflow Alan Lee, Senior Manager, Product Management, Advanced Threat Protection, Symantec Recorded: Oct 20 2016 48 mins
    Symantec Advanced Threat Protection (ATP) – the industry’s leading network, email and endpoint protection solution – is upgrading its capabilities again this October. The new release of Symantec ATP adds Security Information and Event Management (SIEM) and workflow integration with Public API, Splunk, Service Now and more.

    This upcoming webinar explores how these new integrations can simplify threat management by giving you a better view of your security posture, enabling your security teams to quickly detect and respond to internal and external attacks, minimising the risk to safeguard your business.

    Join our upcoming webinar and learn about:
    •The importance of workflow for Incidence Response
    •How ATP uses data from Symantec Global Intelligence Network to detect potential targeted attacks
    •How integrating ATP with your SIEM solution allows for a unified view into your environment to help uncover attacks
    •The integrated incident response process that supports security incident investigation and remediation
    •The follow up actions required to close an incident
  • 3 Critical Protections for your Microsoft Cloud Migration 3 Critical Protections for your Microsoft Cloud Migration Ruoting Sun, Product Marketing Manager, Duo Security Recorded: Oct 19 2016 59 mins
    As organizations migrate to cloud-based Microsoft services like Office 365, many are concerned that traditional on-premises security infrastructures are now inadequate. The most common workloads requiring this new security approach as they move to public cloud platforms are email, Windows Desktop, and directory services.

    In this webinar, you’ll learn 3 critical protections for securing your move to the Microsoft cloud:

    •Security for Exchange and Office 365 email environments, local and remote Windows desktop logon
    •Insight around endpoints and device health accessing your Microsoft apps and services
    •Integration with on-premises and Azure Active Directory for role-based access policies
  • Live Demo | Protecting your Information, DLP, Privacy Live Demo | Protecting your Information, DLP, Privacy Proofpoint Recorded: Oct 19 2016 49 mins
    Take a deep dive into the features of Proofpoint's industry-leading Data Loss Prevention and Encryption granting control over the information that leaves your organization through emails, social media and web file sharing, protecting it from exposure at all times.

    Join us as we answer the following questions

    How can I track and understand where sensitive data resides?
    How can my organization set policies that identify and categorize data to prevent sensitive data from leaving the organization?
    How can my organization maintain compliance when it comes to sensitive data?
  • Protecting the ICS through Segmentation Protecting the ICS through Segmentation Lionel Jacobs - Sr. Architect, Industrial Controls Systems - Palo Alto Networks Recorded: Oct 19 2016 50 mins
    Segmentation is a crucial element to modern network design and accepted widely as a recommended best practice. It is believed that many of the current successful cyber-attacks against ICS/SCADA infrastructures could have been prevented or contained if proper segmentation had been in place.

    Unfortunately, many existing ICS/SCADA systems predate modern best practices. Owner-operators are challenged to face cybersecurity risks with outdated defense mechanisms. Implemented during an era where air gaps existed, the use of commercially available off-the-shelf products (COTS) have connected the serial based on brownfield systems into the industrial Internet of things (IIoT). In doing so exposing the ICS/SCADA to the same threats and perils as its enterprise counterpart. Come join us as we discuss ways and techniques that Palo Alto Networks NGFW can be used to achieve ideal network segmentation.
  • Identity & KYC Webinar Series Identity & KYC Webinar Series Robert Prigge Recorded: Oct 19 2016 33 mins
    Millennials in Banking: Millennials speak out on their global view of banking
  • How to manage Hortonworks HDB resources with YARN How to manage Hortonworks HDB resources with YARN Hortonworks; Pivotal Recorded: Oct 19 2016 49 mins
    Part three in a five-part series, this webcast will be a demonstration of the integration of Hortonworks HDB and Apache Hadoop YARN. YARN provides the global resource management for HDB for cluster-level hardware efficiency, while the in-database resource queues and operators provide the database and query-level resource management for workload prioritization and query optimization. This webinar will focus on demonstrating the installation process as well as discuss the various YARN and HDB parameters and best practice settings.
  • The Total Economic Impact Of Software Testing Tools: Coverity & Defensics The Total Economic Impact Of Software Testing Tools: Coverity & Defensics Yan Huang, Coverity Product Manager; Sami Petaejaesoja, Defensics Product Manager; Mark Van Elderen, Moderator Recorded: Oct 19 2016 48 mins
    Commissioned study conducted by Forrester Consulting on behalf of Synopsys. Join Yan Huang, Sr. Product Marketing Manager - Coverity, and Sami Pataejaesoja, Sr. Product Marketing Manager - Defensics, as they dive deeper into the "The Total Economic Impact of Synopsys Testing Tools: Coverity and Defensics," case study. In this webinar, learn how to use the Total Economic Impact (TEI) framework to assess the potential return on investment your organization can realize by deploying Coverity and Defensics. Watch this webinar to learn how to achieve: faster time to market, fewer post release business disruptions, and best practices from existing customers with years of experience using security testing tools.
  • Defeating the Insider Threat:  Don't Have Your Head in the Clouds Defeating the Insider Threat: Don't Have Your Head in the Clouds Evelyn De Souza and Mary Beth Borgwing Recorded: Oct 19 2016 44 mins
    Everything we know about defeating the Insider Threat seems not be solving the problem. That's why the Cloud Security Alliance with special commentary from LemonFish Technologies undertook new research to understand the extent of this issue.

    Join the Cloud Security Alliance Strategy Advisor, Evelyn de Souza, Mary Beth Borgwing, President of LemonFish Technologies...
    -Uncover the extent of insider threats
    -Learn what happens to data after its being exfiltrated
    -Tools to mitigate insider threats going forward.
  • The Data Breach War: How banks can step up their line of defence The Data Breach War: How banks can step up their line of defence JP Vergne (Scotiabank Lab, Ivey B-School), Nik Walser (EY), Mario Maawad (CaixaBank), Lawrence Chin (Palo Alto Networks) Recorded: Oct 19 2016 62 mins
    As holders of valuable client and financial data, banks have been prime targets for hackers and thieves. Entire payment systems can be compromised in the blink of an eye and clients also risk having their identities stolen.

    Join this panel session where our experts will discuss:

    -Best practices for preventing cyberattacks at every stage
    -Top mistakes banks and financial institutions make when dealing with valuable data
    -What makes you a target?
    -Using real-time analytics to identify anomalies and act on them immediately
    -Malware, threat prevention, next-generation security — what are they, what do you need to know?
  • Next Level Threats: Stopping Ransomware & CEO Email Fraud Next Level Threats: Stopping Ransomware & CEO Email Fraud Chris Harget, Senior Product Marketing Manager at Trustwave Recorded: Oct 19 2016 61 mins
    Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. These next level threats are so lucrative that they are accelerating hacking innovations and exploding attack frequencies. Ransomware damages user productivity, creates emergency work for IT and at least one CEO has been fired because of CEO email fraud. Security solutions and users have to be smarter than ever before.

    Our Trustwave SpiderLabs researchers, security experts and thought leaders have gathered valuable insights and examples on how to help prevent ransomware and CEO fraud. We will be sharing their findings with you during this webinar, including:

    • What these attacks look like to your users.
    • The essentials and limitations of user training.
    • Which automated techniques are most effective at stopping unknown attacks.
  • Crisis Communication After an Attack Crisis Communication After an Attack Chris Leach, Chief Technologist (HPE). Vitor De Souza, VP, Global Communications (FireEye) Recorded: Oct 19 2016 62 mins
    Are you prepared?
    It’s headline news. Cyber attackers are increasingly more sophisticated and data breaches are becoming common place. Some say “it’s not a question of if you’ll be breached, but when”. You need a plan.

    Even the most security-conscious organizations are not prepared for the necessary actions needed to gain control after a cyberattack. Preparing an emergency response communication plan keeps stakeholders informed following a breach. Taking an early communication approach will combat rumor and conjecture. The breach is now a business problem. From employees and customers to partner and suppliers – people need to be confident the situation is being addressed, managed, and resolved.

    Communication is key.
    Smart organizations view their security crisis-communication plan as an ongoing necessity. Get ahead of the reactive situation and decrease the uncertainty. Involve the company’s top leaders across the cross-functional organization. Create a framework for answering questions honestly and with integrity. Share information up front and often. Frequent detailed communication couple with action timelines creates confidence.

    Get operational in real time.
    You can’t control the communication cycle without having done some work in advance. A well-developed crisis response plan with different scenarios will train your team to operate in real time when the inevitable occurs. You can take control of the situation with timely communications.

    Be prepared. Join us for our upcoming webinar to learn how to build a strong crisis-communication foundation for your organization.

    See you online!

    The HPE FireEye Team
  • Predictable and IoT-Ready: Aruba Mobile First Innovations for Higher Education Predictable and IoT-Ready: Aruba Mobile First Innovations for Higher Education Gerri Raye Hinkel, Higher Education Marketing, Aruba, a Hewlett Packard Enterprise company Oct 20 2016 8:00 pm UTC 60 mins
    Recently released innovations in Aruba OS 8.0, ClearPass, and AirWave provide Higher Education automated and predictable operations, ease of maintenance, and increased flexibility for deploying Aruba network infrastructure. Join us to learn more about our software powered and easy to consume Mobile First platform.
  • ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms ESG's 7 Core Criteria for Comparing and Evaluating ITOA Platforms Shaun Henderson & Owen Cole, ExtraHop Networks Oct 21 2016 1:00 pm UTC 30 mins
    As IT environments grow more sophisticated by the day, complexity rises and many CIOs and IT directors lose visibility of their assets and clarity into each asset's performance. The unfortunate result creates IT 'black boxes,' which bring detrimental hazards to enterprise customers when changes are required or things go wrong within interdependent environments. This problem extends beyond the walls of the data center and spans all offices and mobile workers.

    According to ESG analysts' Dan Conde and Nik Rouda - "Modern monitoring must be real-time, at scale, and capable of providing visibility wherever IT assets reside. IT Operations Analytics is at the forefront of this monitoring evolution, but understanding how these often diverse technologies fit together and what benefits they deliver to IT can be complex."

    Join us for a discussion on Conde & Rouda's seven core criteria for enterprise buyers currently evaluating ITOA and monitoring platforms.
  • Managing Cyber Risk In Your Supply Chain Managing Cyber Risk In Your Supply Chain Jake Olcott, VP at BitSight Oct 21 2016 3:00 pm UTC 60 mins
    Large data breaches have caused executives to invest significant time and resources in improving cybersecurity within their own companies. But now the attackers are targeting an organization’s weakest links - business partners and contractors who have access to the most sensitive data. How should senior leaders develop a strategy to manage third party cyber risk? Who are the most critical business partners to be concerned about? How can contractual language reduce the risk? Is there a way to gain real-time visibility into the security posture of the supply chain? And what are the regulators saying about all of this?

    Join Jake Olcott, Vice President at BitSight Technologies as he talks about:

    - Assessing your organization’s maturity with respect to managing third party cyber risk
    ​- Building a third party cyber risk management program
    - Regulatory requirements for third and fourth-party cyber risk management
    - Incorporating real-time data into your vendor risk management program
  • Data Center Colocation: Is it the Right Approach for the Enterprise? Data Center Colocation: Is it the Right Approach for the Enterprise? Kelly Morgan - 451 Research, Jim Leach- RagingWire, Bill VanCuren- NCR Oct 21 2016 3:30 pm UTC 60 mins
    Is Data Center Colocation the Right Approach for the Enterprise? A 451 Conversation with the CIO of NCR.

    Large enterprises have traditionally owned and operated their own data centers. But the capital and personnel requirements of owning and operating your own data centers as well as the strategic distraction, are causing many enterprises to consider replacing their data centers with a mix of colocation and cloud computing.

    In this webinar, Kelly Morgan, Vice President at 451 Research and one of the leading authorities on the economics and finances of the data center and hosting industries, will present the key considerations for enterprises as they evaluate colocation. Then, William VanCuren, Chief Information Officer at NCR, will join Kelly for a discussion on NCR’s hybrid cloud strategy, including their convergence of public cloud and colocation to support the enterprise
  • Emerging Tech in the Start-Up World [Emerging Tech Virtual Summit] Emerging Tech in the Start-Up World [Emerging Tech Virtual Summit] Tereza Nemessanyi, Microsoft, Kevin O’Brien, GreatHorn and Kristen Smith, littleBits Oct 21 2016 4:00 pm UTC 30 mins
    In this session, you’ll hear about innovative ways start-ups are using emerging technologies. Microsoft’s own Entrepreneur-in-Residence will tell us what’s happening in the start-up world, and two start-up moguls, Kevin O’Brien of GreatHorn and Kristen Smith of littleBits, will tell us how their companies are using emerging tech.

    In a constantly-evolving world of technology, it's near impossible to stay up to date with all the new advancements in tech. Whether you're launching a start-up, working for one, or in the planning stages, join us to hear from entrepreneur experts in cyber security, cloud communication, infrastructure, inventions and more!
  • Breached Elections - How Hackers Are Influencing Politics Breached Elections - How Hackers Are Influencing Politics Alex Holden, Founder and CISO of Hold Security, LLC Oct 21 2016 5:00 pm UTC 60 mins
    Political elections shape our society for the years to come. While the foreign hackers are no longer watching our politics out of interest, they are electronically directly interfering with our politics. The Sony Pictures breach was more of a political statement, than a data loss event. With US elections around the corner, we are more of a cyber breach target than ever. Wikileaks is releasing documents, Russian hackers allegedly breaching DNC, and there is more to come. We will examine the current trends, look at the history of the worst manifestations of hackers influencing politics. Then we will draw conclusions on how the politics are changing under a threat of a constant privacy breach.
  • What's Next in Emerging Tech? [Emerging Tech Virtual Summit] What's Next in Emerging Tech? [Emerging Tech Virtual Summit] Eric Horvitz, Technical Fellow & Managing Director, Microsoft Research Oct 21 2016 6:00 pm UTC 30 mins
    By the end of this event, you’ll be asking, “what’s next?” In this final session of our virtual summit, Technical Fellow & Managing Director at Microsoft Research, Eric Horvitz, will discuss the next generation of emerging technology, with a particular eye to artificial intelligence.
  • Risk Based Security in a Hyper-Connected World Risk Based Security in a Hyper-Connected World Dr. Pierre Tagle, Head of Governance and Risk for SecureWorks for Asia South Oct 23 2016 11:00 pm UTC 60 mins
    For many organisations, investments in new processes and technologies is on top of the priorities list. From behavioral analytics, big data solutions, and "one touch" processes that require no manual intervention, companies are always on the lookout for technology innovations that can achieve a considerable return on investment. When companies consider cybersecurity in such a technology dependent world, most ask, "How can we secure our business and comply with the changing legal and regulatory standards?" instead of, "How do we make business focused, intelligent investments given the cyber security risks we face?"

    In this webcast, Dr. Pierre Tagle, Head of Governance and Risk for SecureWorks for Asia South, will discuss the risk-based cybersecurity operating model to help companies identify and protect their most critical information assets and business processes. Dr. Tagle will focus on the most critical actions for any organisation building a risk-based security program.

    Key topics covered include:

    - Prioritising information assets based on value to the organisation
    - Identifying and prioritisng risks to the assets
    - Reduce risks with quick wins
    - Build and deliver a security plan that aligns business and technology
    - Ensure continuous business engagement on the topic of cyber security
  • Breach Defense: Prepare & Respond Breach Defense: Prepare & Respond Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India Oct 25 2016 5:00 am UTC 60 mins
    Are you ready to handle a security breach? In the age of relentless cyber crimes and nation state sponsored cyber attacks, companies need to be breach-ready, and be proactive in their incident preparedness. This could essentially save organisations from devastating cost.
    Incident preparedness is more than having an incident response plan, it’s more than having skilled personnel on staff. Come join us for a discussion on key elements that every company should consider. Major security breaches have become part of everyone’s daily news feed—from the front page of the newspaper to the top of every security blog—you can’t miss the steady flood of new breaches impacting the world today. In today’s ever-changing world of business and technology, breaches are inevitable: you must be prepared and know how to respond before they happen
  • Pega Government Empowered 2016 Livestream Pega Government Empowered 2016 Livestream Presented by: Pegasystems Oct 25 2016 12:30 pm UTC 255 mins
    Empowering agencies to improve lives through more agile and efficient government services.

    Government Empowered brings together government leaders, industry experts and analysts with the goal to improve government service while reducing costs through modernization. You will leave the conference with valuable tools and practical insights on:

    · Approaching mission and modernization objectives
    · Achieving constituent-centric government
    · Understanding best practices and lessons learned from other government leaders

    Learn firsthand from presentations and live demonstrations from the U.S. Department of Veterans Affairs, U.S. Department of Agriculture, New Jersey Courts, U.S. Department of Justice, U.S. Department of the Treasury and other state and federal agencies.
  • Tips on Anyalyzing and Modeling Complex Data Sets Tips on Anyalyzing and Modeling Complex Data Sets Scott Dallon, BrainStorm, Inc. Oct 25 2016 2:00 pm UTC 30 mins
    Discover how businesses turn big data into meaningful insights to help make organizations work smarter, and make better decisions faster.

    Join Scott Dallon to learn tips on analyzing and modeling complex data sets!
  • Ransomware - To pay or not to pay? Ransomware - To pay or not to pay? Peter Mackenzie, Malware Escalations Manager, Sophos Oct 25 2016 2:00 pm UTC 60 mins
    Flying spiders, snakes, and ghosts are long gone. Ransomware is now the stuff of nightmares and it’s easy to see why.

    Ransomware has become one of the most widespread and damaging threats internet users now face. Since the infamous CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and Exploit Kits, extorting money from home users and businesses alike.

    Join Sophos ransomware pro, Peter Mackenzie, as he shows us how ransomware attacks work, explains why so many new infections keep surfacing, and what practical precautions you can take to protect your organisation.

    If this webinar doesn’t help an IT Hero sleep at night, we don’t know what will.
  • Best Practices: Architecting Security for Microsoft Azure VMs Best Practices: Architecting Security for Microsoft Azure VMs Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Oct 25 2016 2:00 pm UTC 60 mins
    Do you know if your workloads are secure? Do you have the same security and compliance coverage across all of the cloud platforms and datacenters running your critical applications? Are you having to design your security framework each time you deploy to a new region or datacentre?

    Whether you’re working with multiple cloud environments or exclusively on Azure, there are certain things you should consider when moving assets to Azure. As with any cloud deployment, security is a top priority, and moving your workloads to the cloud doesn’t mean you’re not responsible for the security of your operating system, applications and data. Building on the security of the Azure infrastructure, this shared security responsibility starts with making sure your Azure environment is secure.

    Register for this impactful webinar as we discuss step-by-step what you need to do to secure access at the administrative, application and network layers.

    In this webinar, we will take a look at:
    • The Shared Security Model: What security you are responsible for to protect your content, application, systems and networks
    • Best practices for how to protect your environment from the latest threats
    • Learn how traditional security approaches may have limitations in the cloud
    • How to build a scalable secure cloud infrastructure on Azure
  • Automating Security and License Compliance in Agile DevOps Environments Automating Security and License Compliance in Agile DevOps Environments Utsav Sanghani Product Manager Integrations, Partnerships & On-Demand, Black Duck Oct 25 2016 3:00 pm UTC 60 mins
    Yes, it’s possible to automate open source security and license compliance processes and maintain DevOps agility. In this webinar, Product Manager Utsav Sanghani will demonstrate how Black Duck Hub plugs into Jenkins to address open source license compliance and security risks as part of an overall release process. He will cover:
    - Automating and managing open source security as part of the SDLC
    - Defining and implementing custom policies that prevent potential open source risks
    - Issue management and remediation workflow, with ideas on how going left translates into greater savings
  • Attain PCI Compliance without AV Attain PCI Compliance without AV Michael Moshiri Director, Advanced Endpoint Protection Oct 25 2016 4:00 pm UTC 60 mins
    Many PCI-compliant organizations continue to deploy traditional AV -- not because of its superior security capabilities, but because they wrongly assume it’s required to remain PCI compliant. Join us for this webinar to learn how to achieve and maintain PCI compliance while replacing traditional AV with superior security capabilities, specifically:

    •Which PCI requirements prescribe the use of traditional AV
    •How auditors and Qualified Security Assessors (QSA)s interpret those requirements today
    •How Palo Alto Networks customers replace traditional AV with real prevention -- while maintaining PCI compliance
  • Compliance as Code with InSpec 1.0 Compliance as Code with InSpec 1.0 Christoph Hartmann, InSpec core contributor & George Miranda, Product Marketing Manager Oct 25 2016 5:00 pm UTC 60 mins
    InSpec is an open-source testing framework with a human-readable language for specifying compliance, security and other policy requirements. Just as Chef treats infrastructure as code, InSpec treats compliance as code. The shift away from having people act directly on machines to having people act on code means that compliance testing becomes automated, repeatable, and versionable.

    Traditionally, compliance policies are stored in a spreadsheet, PDF, or Word document. Those policies are then translated into manual processes and tests that often occur only after a product is developed or deployed. With InSpec, you replace abstract policy descriptions with tangible tests that have a clear intent, and can catch any issues early in the development process. You can apply those tests to every environment across your organization to make sure that they all adhere to policy and are consistent with compliance requirements.

    Inspec applies DevOps principles to security and risk management. It provides a single collaborative testing framework allowing you to create a code base that is accessible to everyone on your team. Compliance tests can become part of an automated deployment pipeline and be continuously applied. InSpec can be integrated into your software development process starting from day zero and should be applied continuously as a part of any CI/CD lifecycle.

    In this webinar, we’ll explore how InSpec can improve compliance across your applications and infrastructure.

    Join us to learn about:
    - What’s new in InSpec 1.0
    - InSpec enhancements for Microsoft Windows systems
    - Integration between InSpec and Chef Automate

    Who should attend:
    Security experts, system administrators, software developers, or anyone striving to improve and harden their systems one test at a time.
  • Rethink Security for SaaS: Power of the Platform Rethink Security for SaaS: Power of the Platform Anuj Sawani, Product Marketing Manager, Navneet Singh, Product Marketing Director Oct 25 2016 5:00 pm UTC 60 mins
    The challenges of SaaS applications such as Office 365 or Box are already here whether they are enabled by IT or end users themselves. With the adoption of SaaS, your data is now outside your traditional network perimeter and any changes to how the data is shared, who it is shared with and if it is free of malware is no longer known by your organization. History has shown that when a significant risk arises, a point solution is applied to address it. Defenses made up of multiple point products that do not integrate leave gaps that may expose your organization to attack.

    Join us for this live webinar where we will examine the various stages of a real-world attack targeting your SaaS applications. You will learn how to prevent these attacks at every single point in the security kill chain with a natively integrated Next Generation Security Platform and learn how to:

    * Gain visibility and granular, context-based control of SaaS applications

    * Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.

    *Satisfy compliance requirements while still maintaining the benefits of SaaS based application services
  • Racing Against Nation States on the Automation Continuum Racing Against Nation States on the Automation Continuum CP Morey, VP Products & Marketing at Phantom Cyber Oct 25 2016 5:00 pm UTC 60 mins
    Both Presidential candidates agree on the need for increased spending on our nation’s infrastructure. While we tend to think first of bridges, roads, and other physical features, cyber is also an area impossible to ignore given the pervasiveness of technology in our lives.

    Without question, the speed, sophistication, and volume of cyber security attacks is constantly changing. In the case of nation states, the motives are also shifting from spying and surveillance to using offensive capabilities to attack critical infrastructure, national security assets, and even the political system itself. It’s no longer just about the money; safety and even lives may be at stake.

    Adversaries are attacking us at an unmanageable scale. For instance, research sponsored by Department of Homeland Security and NSA showed environments with security event traffic of more than 1 billion alerts per day. Even after reducing the load to 1 million alerts per day with correlation and other tools, more than 20,000 human analysts would be needed to respond.

    State-backed adversaries are using automation against us. It’s time we do the same, and projects like Integrated Adaptive Cyber Defense at Johns Hopkins Applied Physics Lab are leading us there.

    Join our webcast to learn how public and private organizations are progressing on the security automation continuum from simple security lifecycle management to predictive response strategies.
  • Finding the Holy Grail: Data Security AND Privacy Finding the Holy Grail: Data Security AND Privacy Robert Ball, Global Privacy Officer and Chief Legal Officer at Ionic Security, Inc. Oct 25 2016 6:00 pm UTC 60 mins
    Privacy vs. security, security vs. privacy… the debate is ongoing. Why can’t we have both? Good news: by leveraging the appropriate mix of policies, procedures and enabling technologies, it is possible to secure data AND control access to it in a way that ensures proper application of privacy policies.
  • Auto Scaling Next-Gen Firewalls on AWS Auto Scaling Next-Gen Firewalls on AWS Matt Keil, Director of Product Marketing, Data Center and Warby Warburton, Manager, Technical Marketing Engineering Oct 25 2016 8:00 pm UTC 60 mins
    Through integration with AWS services, like Auto Scaling and AWS Elastic Load Balancing (AWS ELB), you can now build a next-generation security infrastructure that will dynamically, yet independently, scale to protect your AWS workloads as their traffic patterns fluctuate. This architecture will allow you to reduce costs by utilizing the firewall capacities intelligently and efficiently based on user-defined metrics. By scaling the security separately from the application workloads, this solution allows each firewall to be identically configured and managed centrally, resulting in lower administrative costs.

    Join us for an educational webinar to learn how you can scale next-generation security using AWS Auto Scaling and ELB. Using native AWS Services and VM-Series automation features, you can now dynamically, yet independently scale the VM-Series next-generation firewalls on AWS.

    This webinar will cover
    • Auto Scaling the VM-Series architecture
    • Auto Scaling and ELB integration details
    • Alternative architectures for protecting many VPCs