The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Dr. V. N. Berlin, CEO Mission Critical InstituteRecorded: Nov 17 201826 mins
New Hands-On Cloud Cyber Security Certification: Learn how to qualify and fast-track your cyber career in this 3 part series
Includes Free CISSP Adaptive Exam Prep
In this three part webinar series you will learn about the new Certified Cloud Risk Management Professional (CCRMP) certification—
• How the CCRMP helps you fast-track your cloud security career
• Employers who hire CCRMPs
• Cybersecurity jobs CCRMPs are getting
• How veterans have benefited
• How to qualify for the CCRMP
• Why the free CISSP Adaptive Exam Prep is offered to CCRMPs
Employers seek cloud risk management professionals who are job-ready to utilize the NIST Risk Management Framework (RMF) and FedRAMP– the de facto U.S. standards for cloud security risk management. FedRAMP employs the NIST RMF as the tool of choice and requires all Cloud Service Providers for the federal government to comply with FedRAMP, and thus the NIST RMF. Similarly, cloud risk management professionals seek a certification which validates they are job-ready to implement the NIST RMF and FedRAMP. To meet the needs of employers and candidates Mission Critical Institute (MCI) has launched the only performance-based NIST RMF certification, the Certified Cloud Risk Management Professional (CCRMP) to address:
• Accelerating cybersecurity staffing shortages
• Scarcity of “job-ready” NIST RMF/FedRAMP specialists
• Need for performance-based certifications, as opposed to exam-based certifications
Benefits of the CCRMP
The benefits of earning the CCRMP include:
• 100% hands-on—no exam
• NIST RMF/FedRAMP virtual internship
• Earn 15 graduate credits for your accredited cloud security MSIS or MBA
• Validation you are NIST RMF/FedRAMP job-ready
• Cyber career development support to help you find a top cyber job
• NIST RMF/FedRAMP project experience employers seek
• Recognition of curriculum by Department of Homeland Security
• Pay increase potential even while earning your CCRMP
Maranda Cigna, Director of Product Marketing, Rapid7Recorded: Nov 16 201847 mins
Wondering how your peers are solving some of today’s most common incident detection and response challenges? Struggling to implement a security orchestration and automation strategy that can complement your SIEM?
Join a group of Rapid7 customers as they discuss how they have built their incident detection and response programs to combat today’s most prevalent cybersecurity threats. No matter where you are in your cybersecurity journey, our panel of experts will be able to guide you to security success.
Our experts will cover a variety of today’s hottest security topics, including:
1. How they have built their incident detection and response programs with Rapid7
2. Today’s modern threat landscape and the most common threats they are facing
3. Metrics from detection and response programs that are most important to share with executive staff
Wade Woolwine, Director of Managed Services, Rapid7Recorded: Nov 16 201858 mins
Considering adding 24/7 SOC coverage to your incident detection and response programs? Experiencing challenges with operating your existing SOC? Simply adding a SOC to your portfolio without adequate preparation is going to result in poor performance in threat detection, high turnover in valuable resources, and a general underperformance of a heavy financial investment.
In order to get the most from your investment, SOC analysts require full visibility through the right technology, a well-defined mission, team structure, and leadership, and most importantly the SOC must augment existing high-performance security programs.
Join Wade Woolwine, Director of Rapid7’s MDR service and SOC, to learn some of the key considerations that should be in place before hiring your first SOC analyst.
Scott King, Senior Director, Advisory ServicesRecorded: Nov 16 201856 mins
Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout.
Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?
Join Rapid7 experts for an engaging discussion where you’ll learn:
1. Key considerations that should be in place before implementing automation
2. When is the right time to add automation (and when it isn’t)
3. Which common security tasks are ideal to automate
4. How to prepare your organization for SOAR
Mark Smiley and Matt WaltonRecorded: Nov 16 201836 mins
There is a great amount of focus (rightly so) that goes into managing contact centers. Driving down the cost per contact is one of the primary objectives of a support organization, and our associates at Cask work closely with our clients to maximize efficiency while maintaining exceptional levels of customer service. Working with the ServiceNow platform, contact center costs can be decreased substantially by enabling a world-class self-service support channel. Our expertise at Cask helps to maximize the potential of self-service by designing the support portal and fortifying it with a top-notch knowledge management process, ensuring that your customers have easy access to relevant and timely information when they need it.
HERE'S WHAT WE DID WITH BECTON DICKINSON:
Becton Dickinson was in a position where their consumers had no automated mechanism to seek guidance or submit requests for a specific set of services that a division offered.
Cask used our capabilities in portal design, knowledge management, and case workflow design to enable consumers to skip the need to email or call a contact center to submit these orders manually. The result was a significant increase in BD’s abilities to fulfill orders, while at the same time decreasing the number of customer contacts via email and phone calls.
Tune in to find out more.
ABOUT THE SPEAKERS:
MARK SMILEY, Principal Advisor, Customer Service Management at Cask
With over 15 years of operational and consulting experience, Mark works closely with clients to enhance their support organization's capabilities to provide world class customer service in an efficient and empowering way.
MATT WALTON, Principal Consultant at Cask
Matt is a global IT leader who's worked various roles within this space over the past 17 years. He has worked in both consulting and industry positions and has focused primarily on the ServiceNow platform and strategic process improvement over the past several years.
Dan Maier, VP of Marketing at CyrenRecorded: Nov 16 201844 mins
Ransomware such as Petya and WannaCry are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defences. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.
So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.
Download this webinar to learn how ransomware attacks happen and what you can do to protect your business from them.
Jessica Gulick, MBA | PMP | CISSPRecorded: Nov 16 201860 mins
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Amélie E. Koran serves as the Deputy Chief Information Officer for the U.S. Department of Health and Human Services, Office of the Inspector General. Amélie comes to DHHS OIG via a rather circuitous route through multiple industry sectors, academia, and the public sector
including The Walt Disney Company, Carnegie Mellon University CERT/CC, Mandiant, The World Bank and The American Chemical Society. Her public sector experience started as Lead Enterprise Security Architect for the U.S. Department of the Interior, the U.S. Treasury Department leading the Continuous Diagnostics and Mitigation implementation across the entire agency and a leadership development rotation as part of the President’s Management Council
Fellowship serving the Federal CIO in supporting cybersecurity policy analysis and legislative review, including stewardship of the Open Data Initiative and help in giving “birth” to the United States Digital Service (USDS). She’s an ardent advocate for new approaches to hiring talent into and rational applications of security strategy and technologies for the Federal government space.
Kevin J Smith, Senior Vice President at Ivanti & David Martinez, Sr. Product Marketing Manager at IvantiRecorded: Nov 15 201860 mins
Every organization goes through a process of improving its operation. Despite this, many ITSM projects fail to deliver the level of effectiveness and the value promised. You have to ask why do so many ITSM projects fail to deliver the value IT teams know they can realize?
Join this session to learn:
• The approach and organizational capabilities required to continually increase ITSM efficiency and effectiveness
• The building blocks to create institutional processes and a culture of shared learning and accountability needed to deliver optimized ITSM that delivers more value to the business
Phil Richards, CISO and Leslie Bonsteel, Senior Director, MarketingRecorded: Nov 15 201857 mins
As companies become increasingly sophisticated in tracking private data, customer sensitivity and government oversight requires that they improve privacy protection and monitoring standards. This interactive conversation with Ivanti CISO Phil Richards will cover topics such as:
- How to recognize, control, and protect personal data
- The importance of asset discovery in your privacy program
- Workflows for managing transactions involving private data
- Educating other departments on their role in privacy protection
- The importance of control frameworks for protecting private data
Kevin Rollinson, Product Marketing Manager, Cisco UmbrellaRecorded: Nov 15 201841 mins
Business today happens at the branch. But where does IT work? Typically, not at the branch. So enterprises struggle to manage nontraditional users and even more connected devices across disparate branch locations.
As direct internet access increases, the risk of exposure to critical business resources rises. At the same time, application usage via multiple clouds (Office 365, G-suite, etc.) challenges the existing network architecture.
What does this add up to? Pressure for IT staff as they struggle to reduce costs, improve security measures, and application performance. Join us to learn how to gain better performance and more security effectiveness for your branch offices.
Omer Singer, Director of Security, Snowflake Computing; Dan Hubbard, Chief Product Officer at LaceworkRecorded: Nov 15 201831 mins
Security For Public Cloud + Security Analytics + Data Warehouse Innovation. Lacework and Snowflake Computing are redefining how data is managed and secured.
Lacework and Snowflake Computing are innovators in their respective markets; data warehousing and security for public cloud. Working together, they deliver powerful and actionable security insights, combined with the most flexible, scalable, easy to use data warehouse on the planet.
Please join Omer Singer, Director of Security, Snowflake Computing and Dan Hubbard, Chief Product Officer at Lacework Inc., to review and demonstrate their upcoming partnership.
Michael Ferranti, VP, Marketing, Portworx and Anubhav Sharma, VP, Business Development, Nirmata,Recorded: Nov 15 201860 mins
Ready to learn how to manage persistent storage for containers in the multi-cloud environment?
Kubernetes is enabling multi-cloud strategies for the Enterprise like never before. As data is a fundamental element of all Enterprise applications, without a consistent data management strategy, companies have been able to containerize 5-10% of applications, mostly stateless workloads. With Kubernetes adoption, Enterprises have to think about data management strategies because, without it, companies cannot truly adopt multi-cloud. Data backup, data portability, and DR are critical requirements that have to be addressed as part of any robust Kubernetes solution stack.
In this webinar, will be talking about best practices on managing persistent storage in a multi-cloud environment and demonstrate application portability across the clouds leveraging Nirmata and Portworx.
Anubhav Sharma, VP, Business Development, Nirmata
Michael Ferranti, VP, Marketing, Portworx,
Valerie DiMartino Senior Product Marketing Manager, Sony Kogin Principle Product Marketing, Managed Service ProviderRecorded: Nov 15 201852 mins
Azure or adopting Office 365, it’s time to look at SD-WAN to securely connect branch users and deliver and optimized experience that’s eases cloud and SaaS migration. This webinar will explain the advantages that Citrix SD-WAN brings to your Microsoft deployment including tools such as Microsoft Azure Virtual WAN and Office 365 performance.
In this session, you will learn how Citrix SD-WAN helps:
• Securely connect branches to the cloud, SaaS, and the Internet
• Optimize Office 365 connectivity and performance
• Simplify and automate large-scale branch connectivity with Azure Virtual WAN
Guy Rosefelt, Director of PM at NSFOCUS and Adrian Sanabria, VP of Strategy and Product Marketing at NopSecRecorded: Nov 15 201859 mins
Recent evidence shows that a surprisingly high portion of vulnerabilities incorporated into malware or exploit kits are ranked low or medium severity. Counter to commonly-accepted practices, focusing only on high-severity vulnerabilities and setting a ‘cut-off’ point for lower scored issues, is not a safe or effective strategy. More importantly, proof-of-concept (POC) code for lower priority vulnerabilities is appearing more quickly after 0-day announcement leading to leading to widespread attacks equally as quickly. NSFOCUS and Nopsec will delve into this recent trend, discuss some of these lower level vulnerabilities being quickly exploited, and provide some thoughts how to better protect against these in the future.
Christopher Liljenstolpe, Chief Technical Officer, Solutions at TigeraRecorded: Nov 15 201845 mins
Kubernetes is widely used to re-architect traditional applications. Many organizations first set up Kubernetes within their on-prem environment and then later expand to the public cloud. This hybrid environment often creates security and compliance challenges with workloads. Join this webinar to learn how to leverage universal security policy definition that works across a hybrid environment.
Ehab Samy, VP Product Management, PlurilockRecorded: Nov 15 201859 mins
Digital identity authentication can be challenging to do effectively. Join us to learn about the evolution of biometrics technologies, from those that determine who you ARE in the digital realm, to behavioral biometrics that determine your identity based upon what you DO and how you do it. Ehab Samy, Vice President of Product Management for Plurilock, will map which digital identity management mechanisms are best suited for particular environments including law enforcement, airport security, health care, and the workplace.
Cherie Martin, Sr. Solutions Marketing Manager - ArubaRecorded: Nov 15 201848 mins
The industry is buzzing about the soon-to-be released 802.11ax Wi-Fi standard that will greatly increase wireless speed and optimize client battery life. Are you ready to take your network to the next level? Join us as Aruba’s Cherie Martin, Sr. Solutions Marketing Manager, shares the top three things you need to consider in deciding which technology to choose to give your business, employees, and guests, simple, business-class networking without sacrifice
Ethan Hansen, Threat Stack Security AnalystRecorded: Nov 15 201830 mins
Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes. While Docker is great at managing the lifecycle of these workloads, it’s not a security tool.
In this webinar, Ethan Hansen, Security Analyst for Threat Stack’s Cloud Security Operations Program, will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection. He’ll also provide examples of what to watch for in your logs, cryptojacking and container breakout attempts among them.
Sujay Doshi, Sr. SIEM Solution EngineerRecorded: Nov 15 201851 mins
Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect the sophisticated techniques used by hackers. By integrating your SIEM with your SSO/IDM solution, SOC analysts can gain the visibility needed to prevent these access based attacks.
Attend this webinar to hear about:
- Why password access based attacks in cloud environments?
- Threat detection and threat hunting use cases for password-based attacks
- User account based orchestration and incident response actions
- Walkthrough of Securonix - Okta integration with a live demo
Fernando Montengro of 451 Research & Mitchell Bezzina of Palo Alto NetworksRecorded: Nov 15 201863 mins
Visibility is an undeniable requirement of all security teams, but it shouldn’t come at a cost. EDR products are positioned as our last chance to improve defenses though since inception discovery and response times have only increased. Is EDR really enough? Do we need more visibility from other sources? Are security operations actually improving? We’ve surveyed over 300 of your peers to answer one important question, “Will Endpoint Detection and Response help me?”
Join 451 Research Senior Industry Analyst on Information Security, Fernando Montenegro and Palo Alto Networks Director of Product, Mitchell Bezzina to learn more about:
•The state of EDR technology and the challenges it faces in today’s threat landscape
•The need for visibility beyond the endpoint
•The future of detection and response with XDR
Peter Mackenzie, Malware Escalations Manager, SophosRecorded: Nov 15 201847 mins
Join Peter Mackenzie as he discusses the rise of targeted ransomware and why attacks like SamSam, Dharma and BitPaymer are making headlines. Watch a live demo of a ransomware payload being unleashed and the steps you need to protect your organization from similar attacks.
Steve Mulhearn, Director Enhanced Technology FortinetNov 19 201810:00 amUTC45 mins
In the rapidly changing threat landscape one of the top concerns for most organisations is the introduction of IOT.
While some organisations have attempted to prevent the connection of these devices due to their lack or non existence of any security, many organisations and Enterprises have now reached the reality that they are here to stay.
With this in mind what risk does this pose to your organisation and how to reduce this risk to an acceptable level? We will walk through some of the options available and how they may help Enterprise manage the changing landscape.
Timothy Fong, Security Product Expert at Cloudflare | John Esterline, Solutions Engineer at CloudflareNov 19 20182:00 pmUTC45 mins
As the web application security landscape evolves, companies are facing increased pressures to strengthen their security posture. Recently, the world’s largest distributed denial of service (DDoS) recorded attacked GitHub at 1.35 Tbps. While the big attacks get all the headlines, at Cloudflare we have learned about other forms of attacks that can unexpectedly bring your site down.
Join this webinar to learn about:
- How small DDoS attacks can still bring your site down
- A little known way attackers can bypass traditional DDoS protections
- Why TCP services may make you vulnerable to a DDoS attack
- Pros and cons of multiple solutions: BGP, MPLS, and building your own
- How to augment Cloudflare’s unmetered DDoS solution with Spectrum, Rate Limiting, and Argo Tunnel
Yoni Geva, Product ManagerNov 19 20183:00 pmUTC60 mins
Are you still implementing firewall changes manually? Are you still trying to keep track of all the changes and their ramifications with spreadsheets?
Network security policy automation gives you quick, accurate change management across even the most complex hybrid networks, avoiding security holes, compliance issues and costly outages. With automation, you don’t have to choose between agility and security. You can have both.
In this webinar, Yoni Geva, Product Manager at AlgoSec, explains how security policies can be updated automatically and accurately.
Join our webinar to learn how to take advantage of:
•Automated security policy automation with zero touch
•Security policy management that keeps up with business requirements
•Automatic identification of risk
•Enhanced compliance with quick audit reports on demand
Anthony Giandomenico, Senior Security Strategist; Damien Lim, ATP Product Marketing; Aamir Lakhani, Sr. Security StrategistNov 19 20186:00 pmUTC61 mins
A recent threat landscape assessment reports a double-digit growth of cryptojacking. Organizations will soon be facing a phenomenon similar to ransomware if their security posture is not ready to address this new issue.
Join our panel of experts for a round table discussion around these types of threats and the tactics cybercriminals are leveraging today plus learn about how Fortinet’s advanced threat protection (ATP) Fabric-enabled approach stops the delivery of malicious crypto-mining malware across the dynamic attack surface targeting end-users and servers from the campus to the cloud.
Matthew Gyde, Group Executive, Cybersecurity at Dimension DataNov 19 20186:30 pmUTC60 mins
CyberConversations around the strength of a company’s cybersecurity has never been more pertinent. We’re generating more data than we know how to deal with, and as the opportunities for cybercriminals proliferate, so does their approach to attacks mature.
A key piece of advice? Trust no-one. With the cloud continuing to aid digital transformation, and AI/machine learning finally realising their potential, cybersecurity defences are beginning to migrate to a more predictive model. This will allow companies to create digital fingerprints of their employees, improve access to data and applications, and predict attacks before they happen.
Join Matthew Gyde, Group Executive, Cybersecurity at Dimension Data, as he reveals the main findings from Dimension Data’s Technology Trends 2019 report, exploring how the cybersecurity landscape will shift in 2019, and what measures companies can take to keep the bad guys out.
This webinar will cover:
•How zero trust is maturing into digital trust, and the evolution of predictive threat detection.
•Why organisations are focusing on cloud-based security platforms.
•Why organisations now aim to be secure by design.
•How cybersecurity is becoming intelligence driven.
•Why tighter regulation is affecting risk profiles.
Ian Farquhar, Distinguished Sales Engineer, WW Security Subject Matter Expert, GigamonNov 20 20186:00 amUTC62 mins
Sign up for this webinar and find out how to increase the efficiency of your security tools. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance.
Discover how to select and deploy new security tools faster and more easily than you ever thought possible.
You’ll learn how to:
• Implement strategies for keeping up with ever-changing security tools.
• Test multiple tools under consideration without impacting network performance.
• Set up tests for inline tools.
• Strengthen testing and streamline deployment of tools.
See how to eliminate the challenges of testing and deploying security tools with a security delivery platform.
Join Gigamon and (ISC)² to learn how to select and deploy new security tools faster.
Presenter: Ian Farquhar, Distinguished Sales Engineer, WW Security Subject Matter Expert, Gigamon
Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
Ettienne Reinecke, Group CTO at Dimension DataNov 20 20186:00 amUTC60 mins
Until now, the tech sector has spoken about innovative technologies somewhat theoretically, without providing a clear picture of how these powerful innovations will be used and what they will look like in practice. This has left people without a solid understanding of how these solutions will ultimately manifest in our work and personal lives.
Join Ettienne Reinecke, Group CTO at Dimension Data, as he reveals the game-changing approaches that will transform the tech landscape during 2019 and beyond, and how companies can ensure emerging solutions – such as AI, machine learning, robotics and AR/VR – become firmly embedded in their core processes. Ettienne will explore:
•Why easier access will accelerate the adoption of game-changing technologies.
•How identity will emerge as the killer app for blockchain.
•How companies can extract value from data, while respecting privacy.
•Why the Internet of Things (IoT) will change our lives for the better.
•How disruption will drive consolidation among tech vendors.
Lionel Meoni, Systems Enginee Manager, Rubrik FranceNov 20 20189:00 amUTC33 mins
Rubrik a développé la première plateforme Cloud Data Management conçue pour la gestion de données convergées avec la protection des données, la recherche, l’analyse, l’archivage et la copie de données pour le cloud hybride entreprise
Rejoignez Lionel Meoni pour assister à une présentation et une démo et découvrir comment Rubrik remplace les logiciels de sauvegarde par une appliance « plug-and-play » capable d'assurer l'orchestration des données, la gestion des catalogues et la déduplication du stockage. Il vous présentera également la plate-forme SaaS Polaris.
Tom Berry, Adenike Cosgrove, Swati Lay, Naveen Vasudeva, Graham Edwards and Clive RoomNov 20 201810:00 amUTC60 mins
In today's ever evolving threat landscape, the attackers are increasingly targeting people rather than technology.
For CISOs and security professionals, the top priority is to strike the perfect balance between technology and employee empowerment. You need to build defences that start with and work for your organisation's most important asset - your people!
Join us and our line up of industry experts at this live panel discussion, part of our Hacking Human Nature Summit to hear how they are building people centric strategies.
•Swati Lay, CISO, Funding Circle
•Graham Edwards, Former Head of Group Security, Nationwide
•Naveen Vasudeva, MD & Co-founder, CyberCorre
•Clive Room, Chairman, White Hat Ball
•Adenike Cosgrove, International Cybersecurity Strategist, Proofpoint
Moderated by: Tom Berry, Advisory Board Member, ClubCISO
Robert Holmes, VP Email Security ProductsNov 20 201811:30 amUTC43 mins
In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology.
Join this webinar to learn:
- Findings from our latest Email Fraud study
- Email Fraud trends from 2017 and threats to look out for in 2018
- Helpful tips to protect your people, data and brand against Email Fraud
- Live Q&A with the speakers
Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.
Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.
• Block malicious emails spoofing your domains before they reach your employees and customers
• Monitor all emails (inbound and outbound) from your domains and those of third parties
• Accurately distinguish between legitimate emails and fraudulent emails
Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbHNov 20 20181:00 pmUTC59 mins
Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
Paul Down, Wombat SpecialistNov 20 20181:30 pmUTC45 mins
Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.
Join us for this webinar where you will learn:
* About the latest trends and tactics used by threat actors that target your organization
* How to assess your users’ susceptibility to phishing attacks
* To respond to threats through end-user training and reporting
Chardy N'Diki, Directeur Regional, Europe du SudNov 20 20182:00 pmUTC30 mins
La sécurité doit non seulement être simple mais doit aussi aider les différents métiers d’une entreprise à être plus efficient.
Dans des environnements où le cloud et la mobilité deviennent la norme, comment réduisez-vous les risques associés à ses usages tout en augmentant la productivité ?
Durant ce webinaire nous allons vous présentez la plateforme Zéro Trust de Centrify et comment nous pouvons unifier la gestion des accès, des habilitations, la traçabilité en tenant des différents contextes d’usages et des facteurs risque qui y sont associés.
Lindsay Drabwell, Head of Membership, (ISC)² EMEA, Richard Archdeacon, Duo, Daniel Cuthbert, Banco SantanderNov 20 20182:00 pmUTC60 mins
As early as 2003 the Jericho Forum was created to tackle "de-perimeterisation" and later in 2014 Google released their "BeyondCorp" paper detailing how they made it happen. However, have Zero-Trust security models been adopted in the enterprise and what challenges do organisations face when considering de-perimeterisation?
Join the discussion between Richard Archdeacon from Duo Security and Daniel Cuthbert from Banco Santander in Part 2 of the Zero Trust series and learn about Zero Trust deployments within the enterprise.
Richard Archdeacon, Advisory CISO, Duo Security
Daniel Cuthbert, Global Head of Cybersecurity Research, Banco Santander
For Part 1 in the Zero Trust Series, copy and paste this link into your browser: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars?commid=334792&Part2
Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab’s Global Research and Analysis TeamNov 20 20182:00 pmUTC60 mins
Kaspersky Lab will share its predictions for what the world’s major threat actors could have planned for the coming year. The webinar will explore some of the key trends in terms of tools, techniques and processes likely to be used by such groups against government organizations, enterprises, critical infrastructure, society at large, and more – and consider what that means for organizations, the security community and international cyberspace.
The aim of the webinar is to stimulate debate among IT security professionals in all industries and to increase awareness and understanding that will help them to defend their organization against these threats.
Jen Gough, Sales Engineer, ProofpointNov 20 20183:00 pmUTC45 mins
What are the key components of a best-in-class solution for phishing simulation and training?
Join us for a live demo of Wombat Security to see for yourself!
Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.
You’ll learn how to:
- Assess your users’ susceptibility to phishing and spear phishing attacks
- Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
- Allow your employees to report suspicious messages with a single mouse click
George Anderson, Director of Product Marketing at WebrootNov 20 20183:00 pmUTC60 mins
Recently, new and established security vendors have upped their use of the fancy-sounding term "machine learning". While the technology isn't new (Webroot won an innovation Edison Award for work in the field over 6 years ago in 2012), it has resurfaced as a marketing buzzword and created some confusion in the industry.
We’d like to invite you to join Webroot director of product marketing George Anderson for a 30-minute webinar to learn how Machine Learning is used in cybersecurity and how Webroot has been applying it for more than 10 years to create actionable threat intelligence for stopping a wide range of threats.
• Understanding Machine Learning (ML)
• How ML can stop zero-day and never-before-seen threats
• The importance of contextual analysis and predictive analytics
• Real-world results from the “new” ML technology
• How ML Directly Benefits your Customers
Defining Process & Metrics to Demonstrate Policy awareness and adherence.
Policies are no good if they are left to be documents that are written and forgotten, stored on a physical or electronic shelf collecting real or digital dust. Organizations need policies that are correctly written, but also clearly understood and enforced in the environment. This webinar looks at the key metrics and process to effectively communicate policies in the environment, track awareness, enforce policies, and monitor metrics of policy adherence.
Attendees will specifically learn how to:
•Write policies that are clearly understood
•Develop a policy communication and awareness plan
•Demonstrate understanding of policies by individuals
•Enforce policy compliance/adherence
•Measure and monitor effectiveness of policies
Kiran Khokhar, Product Marketing ManagerNov 20 20184:00 pmUTC45 mins
Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information.This event focuses on both.
Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:
•Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
•Approaches for identifying suspicious messages
•The latest in security software to fight against advanced threats
Device Authority – Rob Dobson, PTC – Stefan Küsgen, SyroCon – Thomas BaumgartNov 20 20184:00 pmUTC60 mins
The Internet of Medical Things, or Healthcare IoT, refers to a connected infrastructure of medical devices and software applications that can communicate with various healthcare IT systems. Frost & Sullivan estimates that there were 4.5 billion IoMT devices in 2015, a number that they expect to increase to between 20 and 30 billion by 2020.
As the IoMT device landscape heats up and hospitals delve more into remote care, healthcare systems need to protect each and every IoT device from potential cybersecurity risks. To do this, medical device manufacturers should integrate the power of automation into a rock-solid digital technology foundation, making it easier to stay on top of the security needed to protect both the device and the patient, while also adhering to regulatory compliance.
Hear from Device Authority, SyroCon and PTC on a real customer use case which encourages building secure connected IoT medical devices. Learn about potential benefits, best practices and key challenges, and how they can be solved with out of the box solutions and integrations between PTC, SyroCon and Device Authority.
Joe Catalanotti, Dell EMC; Eric Sheppard, IDC; Mark Geel, Dell EMCNov 20 20185:00 pmUTC30 mins
With its flexible architecture, simplified IT operations and a path to delivering cloud services, the VxBlock 1000 is changing the way you think of CI. Learn what sets Dell EMC Unity apart from other storage options, hear what a leading analyst has to say about converged systems, and see why you should consider a VxBlock 1000 for your next IT infrastructure purchase.
Jason Garbis of CyxteraNov 20 20185:00 pmUTC60 mins
Want to transition on-premises workloads to the cloud, but are concerned about consistently securing access? Join us for a webinar where we discuss how you can easily and effectively apply secure access policies throughout your cloud migration, regardless of your infrastructure complexity or architectural starting point. By utilizing a modern, cloud-ready security architecture, you can maintain – and in fact, improve – your enterprise security controls throughout the entire migration process.
In this webinar, Jason Garbis, CISSP – Vice President of Products at Cyxtera, will discuss
- Challenges (real and perceived) that enterprises face when moving to the cloud
- Managing policies and permissions for cloud vs. on-premises workloads
- The pitfalls of inconsistent security
- How to secure any application, on any platform, anywhere.
This webinar is for IT / Security leadership (director, VP, CISO, CIO).
Presenter: Dean Coclin - Chairman Emeritus, CA/Browser Forum. Moderator: Jeff Barto - Trust StrategistNov 20 20186:00 pmUTC60 mins
This webinar is intended to update and prepare you for the latest trends in SSL, including what to look out for, how to prepare and what we think is up next for the online security space. Also, we’ll brief you on the latest initiatives within the CA/Browser forums including any relevant ballots and other industry developments.
Konstantin Rychkov, IDC, Senior Research AnalystNov 20 20186:00 pmUTC60 mins
The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape.
Join us for this informative webinar where IDC analyst Konstantin Rychkov will:
• Introduce the concept of endpoint protection integrated with network security components
• Demonstrate how the two together provide greater effectiveness and efficiency in security
• Detail how an integrated security stack is instrumental to holistic enterprise-wide security