Hi [[ session.user.profile.firstName ]]

IT Security

  • Key Insights from NTT Security's Threat Intelligence Report
    Key Insights from NTT Security's Threat Intelligence Report Christopher Camejo, Director of Product Management – Threat Intelligence, NTT Security Recorded: Jan 18 2018 61 mins
    Cyber attacks are as unique as the attackers behind them and the organizations they target: both attackers and the organizations they target have different objectives. Analysis of attack trends can help determine where security efforts should be focused to prepare for the most common attack types and protect from the highest risk.

    In this talk we will walk through the latest data from NTT Security’s Threat Intelligence Reports to show the most common threats facing organizations in various sectors and geographies today.
  • DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems
    DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems Andy Shoemaker, Founder, NimbusDDOS & Kim Lambert, Sr. Product Marketing Manager, Imperva Incapsula Recorded: Jan 18 2018 47 mins
    Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.

    In this webinar you will:
    · Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
    · Watch a live DDoS attack from the attacker's perspective
    · Participate in a live Q&A with DDoS experts
  • Manual Incident Response Costs Organizations A Fortune & Ruins People’s Lives!
    Manual Incident Response Costs Organizations A Fortune & Ruins People’s Lives! Vincent Geffray, Everbridge Recorded: Jan 18 2018 57 mins
    In the digital world we all live in, a majority of IT operations and support center organizations still rely on spreadsheets and spray-and-pray emails to entire teams to communicate major IT events due to application failures, network outages, cyberattacks, datacenter outages… During this session, Vincent Geffray will share the eye-opening results from various surveys on state of incident management and best performing companies practices and will explain how the lack of response automation hurts business and negatively impacts IT employees’ work-life balance.

    During this session you will:

    * Understand why quickly engaging the right team of IT experts is such a hard thing to do
    * Understand the mechanisms which lead to a call storm and learn how to prevent it
    * Learn how you can improve your incident response process and streamline the communication between the Service Desk, your IT teams and the impacted business users

    Presenter Info:
    Vincent Geffray is Senior Director of Product Marketing with focus on IT Incident Response Automation, IT Service Alerting, team Collaboration and Process Orchestration at Everbridge. He has over seventeen years of experience in Digital Operations and Service Management with expertise in Critical Communications, Application Performance Management, IT Process, Runbook and Workload Automation. Vincent has an international experience and he worked in Europe and in North America.
  • Supercharge Your SIEM with Big Data and Machine Learning
    Supercharge Your SIEM with Big Data and Machine Learning TJ Laher, Cybersecurity Solutions Lead, Cloudera Recorded: Jan 18 2018 44 mins
    Security Information Event Management (SIEMs) systems have become the go-to application for cybersecurity practitioners, but it doesn’t come without a hefty cost or tradeoffs. These costs can include historic data being unreachable, advanced analytic limitations, and reduced enterprise visibility. Pairing SIEMs with a big data machine learning platform allows enterprises to proactively assess risk by accelerating anomaly detection, investigation, and response with machine learning and complete enterprise visibility.

    Join TJ Laher, Cybersecurity Solutions Lead, as he discusses how big data and machine learning empowers cybersecurity innovators to optimize SIEM deployments. During this discussion, you will learn how open source technology is helping optimize SIEM deployments allowing organizations to:
    • Infinitely scale data storage, access, and machine learning
    • Deploy a community defined open data model to break vendor lock-in and gain complete enterprise visibility
    • Open up application flexibility while building on a future-proofed architecture
  • Machine Learning and Microsegmentation
    Machine Learning and Microsegmentation John O'Neil, Edgewise Chief Data Scientist Recorded: Jan 18 2018 37 mins
    “Make the trust zones smaller” is the rallying cry behind microsegmentation projects. Break up the network into smaller pieces and put firewalls in between those pieces to ensure attackers can’t get from one part of the network to the next. But making microsegmentation projects work relies on a great deal of knowledge of the network and attack pathways. And it’s an incredibly heavy lift–configuring and deploying a microsegmentation solution takes an immense amount of time and resources. Machine learning can significantly reduce the hurdles by learning the network’s intended state and defining the attack pathways that need to be secured, automating the microsegmentation process.

    Edgewise’s Chief Data Scientist John O’Neil will deep-dive into the role of machine learning in microsegmentation and demonstrate how a machine learning driven solution could reduce the time and energy needed to deploy microsegmentation from months to hours.
  • The Auditor's Perspective: An Insider's Guide to Regulatory Compliance
    The Auditor's Perspective: An Insider's Guide to Regulatory Compliance Divya Jeyachandran, Sr. Manager - Payments, Cloud & Technology, Coalfire Recorded: Jan 18 2018 46 mins
    Every business that handles personally identifiable data is subject to privacy regulations and standards, such as PCI-DSS for credit card transaction data, HIPAA for medical records privacy, SOC 2 for any organization that delivers services (including SaaS-delivered solutions) and the European Union’s soon-to-be-enacted GDPR (General Data Protection Regulation). There are also privacy and breach disclosure laws that vary from country to country (even state to state in the US), making it a big challenge to keep up with them all. Failure to comply can result in daily penalties and fines, and a data breach resulting from non-compliance could cost millions in settlements, legal fees, and loss of reputation.

    Join special guest, Divya Jeyachandran of Coalfire and John McLeod, CISO of AlienVault to hear what auditors are looking for and how to best prepare for your next audit.

    Topics covered:

    Overview of common compliance requirements
    Best practices for preparing for and demonstrating compliance
    Keys to overcoming challenges in your on-premises and cloud environments
    How a unified security toolset can greatly simplify this process

    Hosted By
    Divya Jeyachandran
    Sr. Manager - Payments, Cloud & Technology, Coalfire
    Divya is a Senior Manager in the Payments practice at Coalfire focusing on data security in cloud environments. She advises and assesses client environments to meet security and compliance requirements such as the PCI DSS. With 8 years of experience in cloud technology, IT security and audit, and network and systems administration combined with understanding the applicability of regulatory security and compliance requirements towards IT solutions, Divya has been the lead QSA for some of the major cloud service providers and security service providers in the industry.
  • Fighting Financial Crime in the World of Blockchain
    Fighting Financial Crime in the World of Blockchain Zilvinas Bareisis, Senior Analyst, Celent and Alenka Grealish, Senior Analyst, Celent Recorded: Jan 18 2018 49 mins
    With banks worldwide running proofs of concept for a number of use cases based on blockchain technology. It has become a question of when, not if, many of these initiatives will move into the production stage.

    Now is a good time to consider what the expected adoption of blockchain and cryptocurrencies are likely to mean for fraud in banking and commerce.

    Attend the webinar to learn:
    -How banks and businesses are adopting distributed ledger technologies (DLT)
    -What fraud and financial crime implications are created by the use of DLT
    -What tools will be required in the future to mitigate DLT-related fraud
  • Secrets Revealed: Effective Protection Against Ransomware
    Secrets Revealed: Effective Protection Against Ransomware Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec Recorded: Jan 18 2018 62 mins
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • Continuous Security and Compliance Monitoring for Global IT Assets
    Continuous Security and Compliance Monitoring for Global IT Assets Chris Carlson, VP Product Management, Qualys Recorded: Jan 18 2018 45 mins
    Learn how enterprises can achieve immediate visibility across on-premises, endpoint, and cloud IT environments with Qualys Cloud Platform and its powerful, natively integrated security and compliance applications.
  • Key Considerations for Building Stronger Security
    Key Considerations for Building Stronger Security John Bambenek (Fidelis) | Mike Bruemmer (Experian) | Kevin Lee (Sift Science) | Dennis Leber (Commonwealth of Kentucky) Recorded: Jan 18 2018 60 mins
    In the age of breaches and increased cyber attacks, security professionals are looking for the best ways to secure their organizations and prepare against upcoming cyber threats. Join this panel of experts are they look back the biggest events of 2017 and provide their recommendations for CISO's on what to look out for in the next months and how to improve their organization's cyber security in 2018.

    - Breaches and (Compromised) Identity
    - Lessons learned from 2017's major breaches (Equifax, Uber, etc.)
    - Fighting cyber fraud, identity theft, account takeovers
    - The likelihood of GDPR leading to companies not disclosing breaches
    - Cyber attack trends on the horizon
    - How to protect against these attacks and build a more resilient enterprise

    - John Bambenek, Threat Systems Manager, Fidelis Cybersecurity
    - Dennis Leber, CISO at Cabinet for Health and Family Services, Commonwealth of Kentucky
    - Kevin Lee, Trust and Safety Architect, Sift Science
    - Michael Bruemmer, VP Consumer Protection, Experian Consumer Services
  • Playing Through the Pain: Strategies for Working in the Real World
    Playing Through the Pain: Strategies for Working in the Real World Richard Thieme, Author and Professional Speaker Recorded: Jan 18 2018 64 mins
    After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.

    This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.

    Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
  • Security and the Changing Value of our Data
    Security and the Changing Value of our Data Laurence Pitt, Global Security Strategy Director at Juniper Networks Recorded: Jan 18 2018 43 mins
    We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed.

    Because of this changing value, data must be secured and protected – kept away from people who might pose a threat to its integrity and value. In this world of instantly available information a news leak informed by real data is something that can quickly reduce the value of a product, or even damage the revenue and reputation of your business.

    Endpoint-based technologies can help to prevent an attack, but this is a defensive posture - we need to move and become more proactive. Understanding the data you have makes it easier to know what is ‘normal’, in turn this makes it easier to recognize unusual behavior of devices and data which might indicate a threat has breached the network. The faster you are able to see this, the faster you can react – ensuring maximum time possible to mitigate the potential damage.
  • The Future of Authentication in a Hyper Connected World
    The Future of Authentication in a Hyper Connected World Angel Grant, Dir, Identity, Fraud & Risk Mgmt., RSA; Clare Nelson; John Carnes, Anthem; Brandon Dunlap (moderator) Recorded: Jan 18 2018 59 mins
    With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
  • From Where You Are to Where You Want to be with 3DS 2.0
    From Where You Are to Where You Want to be with 3DS 2.0 Hannah Preston, Solution Strategist, Payment Security, CA Technologies Recorded: Jan 18 2018 23 mins
    3-D Secure 2.0’s impact on the financial industry will be one of the most significant in recent years. Built around the increasing popularity of mobile commerce, 3-D Secure 2.0 is predicated on risk-based authentication, leveraging data points for accurate verification, while optimizing the consumer experience.

    But, what about migration? How do you get from where you are to where you want to be? It’s time to fine-tune your authentication strategy. Join Hannah Preston, Solution Strategist, Payment Security at CA to learn how to:

    • Design the best payment security architecture for your business
    • Exploit the power of a consistent device identity across online channels
    • Incorporate a global network of devices to shut down fraud fast
  • How to Simplify and Secure Enterprise Clouds with Winmagic and Nutanix
    How to Simplify and Secure Enterprise Clouds with Winmagic and Nutanix Aaron McIntosh, Senior Marketing Manager, WinMagic | Amanda Martinez, Alliances, Nutanix | James LaPalme, VP of BD, WinMagic Recorded: Jan 18 2018 34 mins
    The future lies in turnkey cloud solutions like hyper-convergence, which is set to displace traditional server and storage models.

    WinMagic’s SecureDoc product suite, coupled with Nutanix, provides customers greater control and certainty over their data security through intelligent enterprise-controlled, cloud-agnostic key management & VM-level encryption.

    Join us as we unravel some of the most critical considerations for establishing a high performance IT infrastructure that is not only flexible, fluid, and affordable, but provides the consistent security and simplicity needed across your entire environment.

    In this webinar you will learn:
    Simplicity: Discover how to converge your entire datacenter stack into one solution, reducing silos, and simplifying your operations
    Scalability: Learn how you can flexibly and securely scale out to support dynamic workloads and evolving business needs of any size
    Manageability: Reduce the complexity of managing traditional infrastructure and security across a disparate array of platforms. Gain simplicity in meeting Compliance audits
  • Case Study Webinar: Moving Network Operations into the Future
    Case Study Webinar: Moving Network Operations into the Future Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE & Karen Crowley,Sr. Product Marketing Manager Recorded: Jan 18 2018 48 mins
    Join us on January 18th, 2018 for a lively discussion with Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE, the second largest utility provider in Germany.

    We will discuss RWE’s challenges and success in moving their network operations into the future without compromising security and compliance, including:
    • consolidating security and orchestrating connectivity across a hybrid network, including legacy firewalls and routers, next generation firewalls, and the AWS cloud platform
    • incorporating a cloud-first strategy and a heavy investment in DevOps to identify and address security violations in AWS, and allow application developers to spin up new applications without knowing IPs, protocols and ports
    • reclaiming visibility of their firewall configurations and moving from error-prone manual changes to automating the process
    • vastly improving workflows to improve audit preparation from a previously non-auditable change process

    Register now to gain amazing insight into how they have found success. We will wrap up with a live Q&A, so have your questions ready!
  • 2018 SOC Market Predictions: How Threat Intelligence Is Changing Security Ops
    2018 SOC Market Predictions: How Threat Intelligence Is Changing Security Ops Paul Kurtz, Sherri Ramsay, Tony Sager Recorded: Jan 18 2018 49 mins
    A threat intelligence entrepreneur sits down with two former NSA spooks to discuss the future of security operations.

    In this valuable executive panel, TruSTAR co-founder and CEO Paul Kurtz will interview two former seasoned cybersecurity executives from the NSA. Based on thousands of hours managing SOC operations and operators and developing defense strategies, the panelists will discuss the biggest events of 2017 and what’s ahead in 2018.

    The panelists will also discuss what works, what doesn’t, and key gaps requiring attention in security operations centers today. Both SOC managers and operators will find Sherri and Tony’s insights helpful as we move into the new year.

    This will be an interactive discussion infused with current threat intelligence research along with professional anecdotes from our highly-seasoned panelists.

    Session Agenda:
    1. 2017 Threat Trend Review
    2. 2018 SOC Predictions and Gaps
    3. Open Q&A

    - Sherri Ramsay, Strategic Consultant and former Director of NSA's Threat Operations Center (NTOC)
    - Tony Sager, Senior Vice President and Chief Evangelist for CIS (The Center for Internet Security), Director of SANS Innovation Center
    - Paul Kurtz, Co-Founder and CEO of TruSTAR Technology
  • End-to-End Open Source Management with Hub Integrations
    End-to-End Open Source Management with Hub Integrations Utsav Sanghani, Senior Product Manager - Product Integrations and Web Services, Black Duck Software by Synopsys Recorded: Jan 18 2018 53 mins
    Agile development and DevOps are built on a foundation integrated and automated testing that happens throughout the development lifecycle. Rather than waiting for a testing phase that happens late in the cycle, software quality and security must be verified at every step. In this session you will learn how to validate open source security, compliance, and quality across the SDLC, from design phase to production deployment and beyond.
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Recorded: Jan 18 2018 63 mins
    Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.

    Register now
  • Data Driven Security: Improve Your Security Posture To Defeat Your Adversary
    Data Driven Security: Improve Your Security Posture To Defeat Your Adversary Jamie Brummell, EMEA Systems Engineer, Palo Alto Networks and Paul Davies, EMEA Senior Alliances SE, Splunk Recorded: Jan 18 2018 48 mins
    Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring these functions are efficient and effective is more important than ever.

    In this session you’ll learn how end-to-end security visibility is a critical first step to improving your security posture. By combining endpoint, network, user activity, and threat intelligence you can be truly data-driven and:

    - Identify malicious activity and gain key context to help prevent similar threats
    - Apply methods to help improve accuracy and further mitigate risk
    - Automate context gathering and response actions to accelerate investigations, and to more effectively contain and prevent threats

    Join us and get the inside view into the latest technological advancements powering today’s cybersecurity solutions.
  • Win the Battle To Secure Your Endpoints
    Win the Battle To Secure Your Endpoints Arthur Luo & Dennis Lin Recorded: Jan 18 2018 40 mins
    How the recent advanced threats execute on your endpoints and the Palo Alto Networks prevention advisory

    Traps replaces legacy antivirus and secures endpoints with a multi-method prevention approach that blocks malware and exploits, both known and unknown, before they compromise endpoints, such as laptops, desktops and servers.
    •Challenges with AV today
    •Difference between exploits and malware
    What is malware? What is an exploit? How to prevent against both attack vectors
    •Prevention is better than a cure
    Having a multiple method approach against APTs
    •Automated Prevention Platform via Palo Alto Networks
    Demo of live hack against Traps 4.1
  • Crafting An Analytics-Based InfoSec Strategy
    Crafting An Analytics-Based InfoSec Strategy Johna Till Johnson, CEO and Founder, Nemertes Research Recorded: Jan 17 2018 43 mins
    Analytics--including machine learning and AI--is changing how security professionals approach cybersecurity.

    During this webinar we will:
    • Showcase the battle-tested strategies of the most successful information security organizations
    • Survey the landscape of analytics-based security tools and solutions
    • Walk through how to build a strategy based around current (and future) analytics and automation technologies
    • Spotlight the critical security operational metrics that analytics can help improve

    We look forward to sharing this information with you!
  • The Goldilocks Problem of AI in Security: How to Find the “Just Right” Use Cases
    The Goldilocks Problem of AI in Security: How to Find the “Just Right” Use Cases Gary Golomb, Co-founder and Chief Research Officer, Awake Security Recorded: Jan 17 2018 49 mins
    Like many technologies, artificial intelligence (AI) and machine learning (ML) are "just right" for some types of problems, but are often over-sold for others they are just not well-suited for. This webinar will dive into the characteristics of problems that AI/ML can greatly help enterprise security teams solve, but also contrast those against use cases where AI/ML is a much higher risk for those same resource-strapped teams. In those situations, the technology can actually worsen the skills deficit in the organization, rather than making it better.

    Attending this webinar will give you a framework for evaluating AI/ML technologies, including:

    - When can AI/ML indeed replace people, and when is it better suited to assist people?
    - What types of threats is it best suited for?
    - How does AI/ML fit in with other methodologies like security analytics, for threat detection?
    - How can AI/ML help with security investigations and incident response?
    - How can organizations evaluate vendor claims and ask them the right questions?
  • 2018 - The Best Year for Cyber Criminals. Period
    2018 - The Best Year for Cyber Criminals. Period Amar Singh, Wieland Alge, Ramses Gallego, Mark Grantz, Tushar Vartak Jan 19 2018 1:00 pm UTC 75 mins
    Meltdown and Spectre have set the scene for 2018 and make attending our webinar even more of an imperative. This year is going to see it all and we have top panellists and audience members joining. The US Secret Service’s Mark Grantz, Middle East’s top Cybersecurity executive, Tushar Vartak, Europes most recognised Cybersecurity and AI visionary Ramses Gallego, Cybersecurity SME Wieland Alge, a NATO cleared hacker and of course, your very own Amar Singh, CISO and co-founder of Wisdom of Crowds and Cyber Management Alliance Ltd.

    Join the debate, Share your opinions and hear a wide range of experts share their experience and insights.

    Cyber Management Alliance brings you our interactive and educational webinar, inaugurating the new year with an exclusive webinar on what to expect, how and what the criminals are going to do (or not do) and what you can do to protect yourself.

    Yes, we know GDPR is around the corner, but we believe there is much more ahead than just privacy concerns.
  • Returning data control to users - the next frontier for cloud security research
    Returning data control to users - the next frontier for cloud security research Ryan Ko, Associate Professor, University of Waikato Jan 22 2018 3:00 am UTC 60 mins
    From the Uber data leakage incident to cases where photographs of young or vulnerable people are stolen and misused on inappropriate websites, there is a fundamental gap: the lack of users' control over their data once it is uploaded onto the Internet. This talk introduces some of the key challenges and scientific trends in returning data control to cloud users, and how STRATUS (https://stratus.org.nz), a 6-year NZD12.23 mil (incl. GST) MBIE-funded cloud security research project, is addressing these gaps. The talk will also cover some of the Cloud Security Alliance's contributions to the STRATUS project.
  • Untether your corporate network with secure wireless and mobile access.
    Untether your corporate network with secure wireless and mobile access. John Aarsen Jan 22 2018 9:00 am UTC 60 mins
    Today’s workforce is mobile. Organizations are under pressure to provide employees with 24/7 access to network resources over any device from any location. However, enabling that access comes with risk. Join us to find out how you can embrace mobility and provide access to resources over wireless and mobile networks with the same level of security as your wired network.

    Join this webcast to learn:

    •The security risks involved with providing mobile access
    •How to protect data travelling across wireless and mobile networks
    •What components should be part of every mobility solution
  • Sfrutta il potenziale della tua rete aziendale con l’accesso wireless e mobile.
    Sfrutta il potenziale della tua rete aziendale con l’accesso wireless e mobile. Cristiano Cafferata Jan 22 2018 4:30 pm UTC 60 mins
    Oggi la forza lavoro è mobile. Le aziende sono sotto pressione per fornire ai dipendenti l’accesso alle risorse di rete 24 ore su 24, 7 giorni su 7, da qualsiasi dispositivo e da qualunque luogo. Un accesso di questo tipo comporta però diversi rischi. Partecipa a questo webinar per scoprire come adottare la mobilità e fornire l’accesso alle risorse aziendali tramite reti wireless e mobili garantendo lo stesso livello di sicurezza della tua rete cablata.

    Guarda questo webcast per scoprire:

    •I rischi per la sicurezza derivanti dall'accesso mobile
    •Come proteggere i dati nelle reti wireless e mobili
    •Quali componenti non dovrebbero mancare in una soluzione di mobilità
  • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations
    [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Palo Alto Networks Cybersecurity Experts Jan 22 2018 6:00 pm UTC 60 mins
    Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

    Here’s a sampling of some of the predictions our cybersecurity experts will review:

    •Ransomware Prevention more important than ever
    •The Internet of Things blurs the line between personal and corporate security
    •The era of Software Supply-Chain attacks has begun
    •The Cloud will accelerate channel partner migration to next-generation security innovators
    •Advances in Machine Learning will improve both patient care and cybersecurity
    •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls
  • Hong Kong & Singapore: Standing Out in the APAC MTDC Market (APAC Audience)
    Hong Kong & Singapore: Standing Out in the APAC MTDC Market (APAC Audience) Kelly Morgan, VP, Services & Dan Thompson, Senior Analyst, MTDC Jan 23 2018 3:00 am UTC 60 mins
    The multi-tenant datacenter market in Asia is expected to grow at a 15% CAGR from 2015-2020, and is the fastest-growing region after Latin America. Hong Kong and Singapore continue to be key markets in that region for growth, despite Singapore having a slower year in 2017, when considering new datacenter builds. In this webinar, we will discuss our most recent findings on the major players and trends in these top markets. We will also preview our research plans for 2018, including the new Asian markets we expect to cover.
  • Libérez le réseau de votre entreprise avec un accès sans fil et mobile
    Libérez le réseau de votre entreprise avec un accès sans fil et mobile Sylvain Stahl Jan 23 2018 9:00 am UTC 60 mins
    Aujourd’hui, le personnel est mobile. Les entreprises doivent fournir à leurs employés un accès 24 heures sur 24 et 7 jours sur 7 aux ressources du réseau, sur tous les appareils, où qu’ils se trouvent. Mais cet accès ne va pas sans risque. Rejoignez-nous pour découvrir comment adopter la mobilité et fournir un accès aux ressources sur les réseaux sans fil et mobiles à un niveau de sécurité équivalent à celui de votre réseau filaire.

    Dans ce webcast, vous découvrirez :

    •Les risques de sécurité liés à l’accès mobile
    •Comment protéger les données circulant sur les réseaux sans fil et mobiles
    •Quels sont les composants essentiels de toutes les solutions de mobilité
  • Hunting the Hunters or Can you cover your cyber tracks to avoid being caught?
    Hunting the Hunters or Can you cover your cyber tracks to avoid being caught? Patrick Grillo, Senior Director, Security Solutions, Fortinet Jan 23 2018 10:00 am UTC 45 mins
    While some hackers crave the attention of a high profile attack or data breach, others prefer to work in shadows either trying to hide their tracks or are indifferent all together.

    Regardless, accurately understanding where an attack comes from is very helpful in defending against future attacks. More importantly, when companies and key organizations work together it is possible to tie together a multitude of individual footprints into a single, conclusive trail back to the originator.

    This session will focus on the importance of attribution and includes a case study of how a major cyber criminal was taken down, from the lowest foot soldier to the kingpin himself.
  • Cyber Security Webinar: The Journey Towards GDPR Compliance
    Cyber Security Webinar: The Journey Towards GDPR Compliance Fred Streefland, senior product marketing manager at Palo Alto Networks and Mark Child, managing director at Xcina Consulting Jan 23 2018 10:30 am UTC 60 mins
    Learn the pragmatic and simple approach to deal with GDPR

    Join Fred Streefland, senior product marketing manager at Palo Alto Networks and guest speaker Mark Child, managing director at Xcina Consulting, for an informative webinar about taking a pragmatic approach to the GDPR and compliance.

    Attend this event to understand:

    - New cybersecurity legislation and the main elements of the GDPR
    - What’s in the GDPR and what’s not
    - Security-specific recitals and articles
    - The U.K. Data Protection Bill and modifications to the GDPR
    - How Palo Alto Networks can help you become GDPR-compliant

    We do hope you can join us for this exclusive webinar.
  • Saque el máximo partido a su red con acceso inalámbrico y móvil seguro
    Saque el máximo partido a su red con acceso inalámbrico y móvil seguro Alex Vazquez Jan 23 2018 10:30 am UTC 60 mins
    Hoy en día, los trabajadores son móviles. Las organizaciones se ven obligadas a proporcionar a los empleados acceso las 24 horas a los recursos de la red desde cualquier dispositivo y ubicación. Sin embargo, proporcionar ese acceso conlleva cierto riesgo. Participe en nuestro evento y vea cómo puede adoptar iniciativas de movilidad y proporcionar acceso a los recursos a través de redes inalámbricas y móviles con el mismo nivel de seguridad que ofrece su red por cable.

    Vea este webcast y descubra:

    •Los riesgos de seguridad que conlleva el acceso móvil
    •Cómo proteger los datos que circulan por redes inalámbricas y móviles
    •Qué componentes debería incluir toda solución de movilidad
  • 4 Things to Do When Clients Pressure You for Lower Fees
    4 Things to Do When Clients Pressure You for Lower Fees Tim Robertson Jan 23 2018 11:00 am UTC 60 mins
    "Your fees are too high; can you do it for less?" In the highly competitive marketplace we hear dreaded phrases like this all of the time. The easy thing to do is to offer a discount, but that cuts into your profit margins and sets a precedent for the future. You don’t want to become a victim of discounting gone wrong. So what do you do when clients push back on your fees? This webinar runs through the 4 things you can do when clients put pressure on you to lower your fees
  • New PSD2 guidelines: Can your team respond to a security incident in 4 hours?
    New PSD2 guidelines: Can your team respond to a security incident in 4 hours? Jamie Cowper, Director, IBM Resilient, Craig Roberts, European Technical Engineer, IBM Resilient Jan 23 2018 12:00 pm UTC 60 mins
    The conversation for the upcoming Payment Services Directive (PSD2) has been centered on the digital transformation offered by the new open banking requirements. However, there are major implications for Incident Response (IR) too.

    In our upcoming webinar on Wednesday, 13th December at 12.00 GMT our security experts, Jamie Cowper and Craig Roberts, will discuss the following:

    The mandatory incident reporting requirements outlined in PSD2

    How a well-documented, audited IR process is crucial to security teams meeting the four-hour deadline

    The value security orchestration and automation strategies can provide to IR processes for staying compliant
  • How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart
    How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart A panel of Secureworks technical and strategic consultants Jan 23 2018 2:00 pm UTC 60 mins
    As the scope for security skill and expertise demanded of organisations extends, CISOs are increasingly turning to security consulting partners for strategic guidance and technical and advisory expertise.

    There are a broad range of organisations in today’s market offering security consultancy services based on best practices and standard frameworks. Partnering with one of these firms can provide your organisation with the technical expertise to improve network visibility and gain a clearer understanding of your vulnerabilities, provide the strategic and practical guidance that helps you prioritise and build out programmes that enable business objectives, as well as advise on how to effectively engage with the C-suite.

    What truly sets Secureworks’ information security consulting services apart is how we utilise our Counter Threat Unit™ and knowledge garnered from thousands of client engagements to ensure you are being consulted on the latest industry trends and threats. This way, the outcome is based on real-world scenarios that matter to your organisation.

    Join consultants across our technical and strategic practices as they share lessons learned from their most challenging engagements and the value that real-time threat intelligence has brought to those engagements.

    Key topics discussed include:

    - Examples of real-world engagements where the CTU™ and Consulting Practice improved the outcomes for clients
    - Tools consultants use to ensure that your outcome is based on real-world scenarios and threats that matter to your organisation
    - Lessons learned from our most strategic and complex engagements
  • Docker Monitoring: Best Practices for Optimal Efficiency
    Docker Monitoring: Best Practices for Optimal Efficiency Eric Carter, Product Marketing Manager, Sysdig Jan 23 2018 2:00 pm UTC 60 mins
    Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.

    Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.

    During this webinar you’ll learn:

    - How should you monitor services built on top of containers?
    - What metrics become more relevant in Docker-based environments?
    - How do you construct alerts most effectively?
    - How do you troubleshoot containers that are rapidly coming and going?

    The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
  • Leveraging Threat Hunting Techniques To Investigate Petya
    Leveraging Threat Hunting Techniques To Investigate Petya Amar Singh Jan 23 2018 2:00 pm UTC 75 mins
    Warning - this is a technical webinar.

    Since the outbreak of Petya there have been many webinars dissecting the malware, its purpose, and its attribution. We view the Petya outbreak differently. In this webinar we show you how we leveraged threat hunting techniques developed to identify and pattern malicious behaviour evident in malware like Petya.

    Join us to
    * -See a Live Demo of actual tools used to dissect the malware.
    * -Ask and interact with the specialists in threat analysis.

    Following on from our successful webinar titled A Day in the Life of a Threat Analyst, we bring you another informational and educational webinar on how an experienced threat analyst would investigate Petya.

    Sign up now for this interactive webinar.
  • The battle between two trends driving compliance: Paperless (eIDAS) vs. Privacy
    The battle between two trends driving compliance: Paperless (eIDAS) vs. Privacy Eric Avigdor, DIrector of Product Management at Gemalto Jan 23 2018 4:00 pm UTC 60 mins
    Two critical European regulations are rolling out in 2017 and 2018. The General Data Protection Regulation (GDPR) is designed to strengthen the safeguards around personal data and create a more uniform standard within the European Union (EU), while eIDAS is the European Regulation aimed at creating a framework for cross-border electronic identification and transactions across EU member countries.

    Paperless vs. Privacy is a real issue facing business in the EU, and around the world. Both eIDAS and GDPR have global ramifications and affect a broad group of industries. Complying with both of these regulations can be a real hardship for some small to mid-size companies.

    Please join us for our BrighTalk webinar where our resident Public Key Infrastructure expert, Eric Avigdor, will help you tread the waters of eIDAS vs. GDPR. Which one is most important for your business? What are the consequences of non-compliance? We will also discuss how to comply with multi-factor authentication, physical access, and encryption requirements.
  • Go Beyond PSD2 Compliance with Digital Identity
    Go Beyond PSD2 Compliance with Digital Identity Nick Caley, VP Financial Services and Regulatory, ForgeRock Jan 23 2018 4:00 pm UTC 45 mins
    As European financial institutions work towards compliance with PSD2, there's an intense focus on securing customer data as it's opened up to third parties.

    Essential requirements around securing APIs to enable direct payments and account aggregation are accompanied by increased regulations for strong customer authentication. Financial institutions are looking to improve their management of digital identities to ensure customer data remains private.

    Not only can a modern digital identity platform help companies with API security and authentication requirements, it can also drive innovation in areas like consent management, with dashboards that allow customers to control their personal data at a granular level. Banks can embed identity into their digital platforms in order to use PSD2 as a strategic opportunity to build trusted relationships with their customers.
  • ISSA International Series:  2017 Year in Review & Predictions for 2018
    ISSA International Series: 2017 Year in Review & Predictions for 2018 Keyaan Williams - ISSA, Kim Jones - Arizona State University, Jedidiah Bracy - IAPP, Shivaun Albright - HP Jan 23 2018 5:00 pm UTC 120 mins
    2017 was a horrendous year in cyber security every month was filled with major breaches, hacks, and attacks surfacing. The nature and range of the attacks varied from email hacking to recently announced vulnerabilities being exploited, from minor incursions to (potentially) everyone’s financial history being stolen. 2017 will probably go down as the worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2018 bear the full weight and impact of the events of 2017, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2018 landscape?

    Join us, make notes, and then check back in a year to see how our panel of experts did in providing insight and making predictions for the 2018 challenges to InfoSec.
  • Breaking Down Cloud Security: Discover What it Means to You
    Breaking Down Cloud Security: Discover What it Means to You Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Jan 23 2018 5:00 pm UTC 45 mins
    Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.

    Join us as we discuss:

    - How cloud security differs from a public cloud, a private cloud or a hybrid cloud
    - How cloud technologies impact a company's security options
    - How do you defend against attacks of third-party providers of IT services
    - How to develop policies and procedures to test and evaluate servers over which you have no physical control

    To better understand what cloud security means to you, register now.
  • Trends in Container and Cloud Native Cybersecurity
    Trends in Container and Cloud Native Cybersecurity Josh Thorngren, VP of Marketing at Twistlock Jan 23 2018 6:00 pm UTC 60 mins
    As software eats the world, cloud native tools and methodologies — like containers and devops— are continuously evolving. Organizations that can identify the major trends in this ever-changing landscape and then successfully secure a new cloud native environment will have an advantage in the market.

    Join Twistlock's VP of Marketing, Josh Thorngren, as he shares the macro trends he’s seeing in the cloud native security space and the extended cloud native ecosystem in 2018.

    Specifically, we’ll cover:
    * Rethinking your organization’s approach to defend against the proliferation of easy-to-use, easy-to acquire hacks, exploits and malware
    * How to shift security left by developing an entirely new paradigm and set of principles for software delivery and protection
    * How to modernize legacy workloads with containers
  • Apple IT Trends for 2018
    Apple IT Trends for 2018 Nick Thompson, Product Manager, Jamf Jan 23 2018 7:00 pm UTC 60 mins
    It’s been a busy year for Apple. From unveiling new products and operating systems to forming new enterprise relationships, Apple continues to evolve its capabilities and best practices for managing Mac, iPad, iPhone and Apple TV devices. Before you finalize your IT plans for next year, join us for a look back at major Apple milestones and enjoy a glimpse at where Apple may be headed in the future. 

    In our webinar, Apple IT Trends for 2018, we’ll examine the strategic moves made by Apple and explain what they mean for you in the new year.
    We'll cover:
    •Apple IT accomplishments in 2017
    •Predictions for Apple IT trends in 2018
    •IT initiatives to consider and provide examples of organizations already implementing them