Hi [[ session.user.profile.firstName ]]

IT Security

  • ExtraHop 7.0: Know the Shape of Your Enterprise - APAC
    ExtraHop 7.0: Know the Shape of Your Enterprise - APAC Isaac Roybal, Director of Product Marketing and Daniel Chu, Director of Systems Engineering Oct 17 2017 2:00 am UTC 75 mins
    Many teams throughout the enterprise—security, network, IT operations—lack the insights needed to make confident, data-driven decisions. People cannot access the data they need quickly, resulting in waste, slow response times, and expensive incidents.

    With the announcement of version 7.0, ExtraHop provides real-time and empirical data all teams can benefit from through complete visibility, faster incident resolution, and stronger security.

    In this webinar, we will cover the new ways we are helping our customers reveal the shape and context of their digital enterprise by demonstrating:
    • Live activity maps that allow for unprecedented visual environment exploration
    • Automated anomaly workflows—including new security anomalies
    • Scheduled reports that share real-time views of the information that matters most to each user
  • 2017 State of Cybercrime
    2017 State of Cybercrime Alex Tilley, CTU E-Crimes Lead Oct 17 2017 3:00 am UTC 60 mins
    Whether you are an individual or an organisation, it is useful to understand the inner workings of the cybercriminal world and to be aware of the threats targeting you, your money and your information.

    One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.

    Join the Counter Threat Units E-Crime lead Alex Tilley as he talks through the undergorund like never before.

    This webinar will cover:
    * Key findings from our visibility into criminal forums and technical monitoring of global criminal activity
    * Cybercrime categories and the significant risk to individuals ad organisations
    * The complexity of the criminal landscape and diverse capabilities of threat actors
    * The continuation of online crime as a market economy
  • Gartner 2017 Magic Quadrant for Enterprise Firewalls
    Gartner 2017 Magic Quadrant for Enterprise Firewalls John Maddison, Sr. Vice President, Products and Solutions, Fortinet Oct 17 2017 6:00 am UTC 60 mins
    Fortinet's Enterprise Firewall is an industry leader in completeness of vision on how to protect your network from the edge to the core to the cloud. Attend this webinar to understand how the Fortinet Enterprise Firewall.
    - Leverages FortiGate, FortiGuard, FortiManager and the recently released FortiOS 5.6 to provide the highest performing and most flexible protection of your network
    - Is deployed by enterprises like the Pittsburgh Steelers to ensure the toughest defense against threats; and
    - How and why the solution has been recognized as a leader by top analyst firms in the industry
  • A predictive cybersecurity approach to ransomware protection
    A predictive cybersecurity approach to ransomware protection Charles Lim: - Frost & Sullivan; Zhanwei Chan - Dimension Data; Kevin Leahy - Dimension Data; Al Huger - Cisco Oct 17 2017 1:00 pm UTC 60 mins
    We invite you to join Frost & Sullivan and our panel of experts as they discuss the growing threat of ransomware, and provide practical advice on raising your cybersecurity defences using a predictive cybersecurity approach to ransomware protection.

    Panel of speakers

    Charles Lim: Industry Principal - Cybersecurity Practice, Frost & Sullivan
    Zhanwei Chan: Group Security Senior Product Manager, Dimension Data
    Kevin Leahy: Senior Vice President, Data Centre, Dimension Data
    Al Huger: VP Engineering - Security, Cisco
  • Digital Business is Here - Is your Trust Infrastructure Ready?
    Digital Business is Here - Is your Trust Infrastructure Ready? Mike Hathaway, Aaron Davis Oct 17 2017 3:00 pm UTC 60 mins
    The move to digital business is exposing the limits of existing trust infrastructures. Rapid growth in the number of deployed certificate authorities (CAs). Increased burden on multiple PKI point solutions deployed to address specific problems. And while IT grapples to support tactical implementations of PKI, the demands of digital business overwhelmingly require a more strategic and holistic approach.

    What's required is a centralized yet agile overarching trust framework that can easily accommodate multiple use cases today and in the future.

    This webinar looks at the steps you can take to build an agile trust infrastructure with a centralized PKI deployment.

    * Digital Trust at Scale Learn how to build a PKI that supports endpoint diversity, evolving and multiple use cases and integration with complimentary solutions.
    * Streamline PKI Deployment Discover how a trust infrastructure can be deployed and managed across your organization to mete the requirements of today's dynamic and distributed business models
    * Simplify 3rd Party CA Key Migration Find out how you can migrate certificates from other vendor systems without having to distribute a new trust anchor and without the need to generate new keys and certificates.
  • Simplifying your Secure Access solution with the latest software release
    Simplifying your Secure Access solution with the latest software release Prashant Batra, Ganesh Nakhawa, and Scott Erickson Oct 17 2017 3:00 pm UTC 60 mins
    Learn how Pulse Secure’s latest Secure Access solutions are protecting the latest information architecture transformation and investment.

    Our latest Secure Access software release includes stronger portfolio integration, expanded ecosystem interoperability, and revamped admin UX.

    Along with these highlights, we will show you the tech in action with live demos of Pulse Cloud Secure and Profiler. We are excited about securing your digital footprint with this exciting release. Don't miss out!
  • Take your Incident Response plan to a whole new level!
    Take your Incident Response plan to a whole new level! Gary Southwell, General Manager, CSPi & John Black, Cisco Oct 17 2017 3:00 pm UTC 45 mins
    In this webinar, join Cisco and CSPi as they discuss how automated breach notification takes Cisco’s incident response services to a whole new level. With FirePOWER and nVoy the incident response process can start immediately after a breach is verified and therefore be completed faster, in some cases the full impact of a breach can be determined in minutes.

    This can be extremely powerful for companies which rely on managed services providers for their cyber breach incident response strategy. With FirePOWER and nVoy Cisco’s IR professional services team will proactively monitor the solution for you and will receive email notifications when a potential incident is occurring against your organizations critical assets to trigger IR activity as per services contract.

    Shortening the breach identification and investigation phase provides several benefits:
    - Meet stringent data privacy compliance regulations, like GDPR
    - Focus efforts on effective forensic analysis and remediation
    - Limit breach exposure and the expenses related to handling breaches

    Up your incident response game!
  • Start Benefiting from PAN-OS 8.0 with User-ID and Global Protect
    Start Benefiting from PAN-OS 8.0 with User-ID and Global Protect Wiley Richardson, Security Engineer, Trainer and Cloud Architect at Cloud Harmonics Oct 17 2017 4:00 pm UTC 45 mins
    Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:

    •Learn about the key capabilities introduced by 8.0
    •See the value of the update to security deployments
    •Receive a voucher for 8.0 training course - $500 value
  • CASB 2.0: The Next Frontier for CASB
    CASB 2.0: The Next Frontier for CASB Deena Thomchick of Symantec Oct 17 2017 4:00 pm UTC 60 mins
    The rapid adoption of cloud applications and services has fueled the need for new security solutions, such as Cloud Access Security Brokers (CASBs). But how do these systems weave into your overall security infrastructure? There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security into their environment. This talk will explore this next frontier of CASB solutions.
  • SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection
    SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Oct 17 2017 5:00 pm UTC 60 mins
    SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.

    AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:

    Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
    Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
    Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
    The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
  • Are you going to access that data, FROM THERE?
    Are you going to access that data, FROM THERE? Benjamin Massin, CEO at The SCE Group & Gleb EvfaresTov, Solutions Engineer at Bitglass Oct 17 2017 5:00 pm UTC 60 mins
    The modern science of securing applications to a broad range of devices.

    Do you want people accessing your data from that device? Do you know where that device has been? Would you trust that device to protect your personal data? While cloud applications offer tremendous benefits over traditional on-premise, IT Executives face many challenges involving data security and compliance. Unmanaged devices, unauthorized access, and unsanctioned apps are all significant threats, increasing the risk of data leakage and being the next organization in the headlines. Cloud access security brokers, or “CASBs” are the tools technology leaders have turned to, protecting data across applications, and mitigating other malicious threats.

    In this webinar, Benjamin Massin, CEO of The SCE Group, and Gleb EvfaresTov, Solutions Engineer at Bitglass, will discuss how to balance the benefits of moving to the cloud, while implementing a security solution, protecting identities and data end-to-end.
  • Win the Cyberwar with Zero Trust
    Win the Cyberwar with Zero Trust John Kindervag, Field Chief Technology Officer at Palo Alto Networks Oct 17 2017 5:00 pm UTC 60 mins
    Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.

    In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
  • Adventures in TI: What is your IP Reputation?
    Adventures in TI: What is your IP Reputation? Guy Rosefelt, Director of PM, APAC Threat Intelligence & Web Security Oct 17 2017 5:00 pm UTC 45 mins
    Abstract: Can you afford not knowing how bad your provider's IP reputation is? How likely are IP addresses adjacent to you of being infected with malware or participating in botnets?

    NSFOCUS has been tracking the reputation of IP addresses globally by ASN for over a year and recently released the August 2017 Global IP Reputation report. Some interesting patterns have emerged worldwide as the number of IP addresses added to reputation lists continues to increase due to Mirai, WannaCry and other malware infecting the Internet of Things.

    NSFOCUS SecLab is tracking IP reputation across 9 categories, including SPAM, DDoS, botnets, and web attackers. This talk will present global IP reputation trends and rank the countries with the worst IP reputation…and it may not be China.
  • How to Use the NIST CSF to Recover from a Healthcare Breach
    How to Use the NIST CSF to Recover from a Healthcare Breach Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Oct 17 2017 5:00 pm UTC 60 mins
    Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?

    This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:

    • Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.

    • Improvements: Planning and processes are improved by incorporating lessons learned.

    • Communications: Restoration activities are coordinated with internal and external parties.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
  • Manage your Secure Access with one view via Pulse One
    Manage your Secure Access with one view via Pulse One Jim Hebler, Partner Velocity Director & Greg Bassett, Senior Director - Solutions Architecture Oct 17 2017 6:00 pm UTC 30 mins
    How much visibility do you have via Secure Access end-points – from the Data Center, to the Cloud, to Devices and Applications hitting your network?

    Join Pulse Secure for a compelling Webinar Centered on Pulse One – its’ leading edge Monitoring-Visibility Solution. Configured correctly, Pulse One also enhances compliance alliance, segmentation and pro-active management and consolidation for Secure Access at the front-edge of your network.
  • Controlling access to infrastructure and applications, in cloud and on-prem
    Controlling access to infrastructure and applications, in cloud and on-prem Ulf Mattsson, CTO at Atlantic BT. Alex Hanway, Product Marketing Manager at Gemalto, David Morris, Pioneer in Cybersecurity Oct 17 2017 6:00 pm UTC 60 mins
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
    This session will discuss Identity and Data Protection solutions for enterprise security, organizations can take a data-centric approach to their security posture, all while controlling access to the infrastructure and applications they rely upon — both on-premises, and in public and private clouds.
  • The Path to E-commerce Growth
    The Path to E-commerce Growth Signifyd | Coalition Technologies | BigCommerce Oct 17 2017 6:00 pm UTC 60 mins
    Join ecommerce and cybersecurity experts from BigCommerce, Coalition Technologies and Signifyd for an in-depth discussion on the opportunities and pitfalls associated with various methods of growing your business.
  • How Do I Get the Cyber/Cloud Security Project Experience Employers Want?
    How Do I Get the Cyber/Cloud Security Project Experience Employers Want? Michael Van Heesch Oct 17 2017 11:00 pm UTC 30 mins
    In this Q&A Session we will explain how you can get the hands-on cyber/cloud security project experience in high-demand.
  • Detection of Ransomware and Prevention Strategies
    Detection of Ransomware and Prevention Strategies James Brodsky, Sr. Security SME, Splunk Oct 18 2017 12:00 am UTC 60 mins
    Ransomware has moved from a nuisance targeting consumers to a serious threat to businesses and government agencies.

    In this session you will learn more about what ransomware is and how it works, followed by a live Splunk demonstration with data from a Windows ransomware infection.

    You will learn:

    - How to use Splunk Enterprise to hunt for ransomware IOCs
    - How to detect malicious endpoint behavior
    - Strategies for prevention
  • Securing All of Your Data on All of Your Clouds
    Securing All of Your Data on All of Your Clouds Ronen Shpirer, Security Solutions Architect, Fortinet Oct 18 2017 9:00 am UTC 45 mins
    Your data is created, processed and consumed everywhere in your data center, and in an multi-dimensional hybrid cloud environment.

    Securing and protecting this data seamlessly across these environments in a coherent way is crucial to the effectiveness of your security posture.

    This session will provide a mix of information and live demonstrations on seamlessly securing all of your data on all of your clouds.
  • Cultivating Your Strategic and Creative Thinking
    Cultivating Your Strategic and Creative Thinking Dr. Ted Marra Oct 18 2017 2:00 pm UTC 75 mins
    Join our guest, Dr. Ted Marra as he introduces his new strategic leadership course in Global Risk Academy.

    During the webinar we will cover:

    How does a truly strategic organization think? What is strategic thinking versus strategic planning? What are the vital few factors that will determine your organisation’s long-term success or failure and are they on your radar screen?

    Who should attend.

    People with 10 years management experience minimum up to and including C-Level in all disciplines responsible for strategic decisions or large scale operational issues - so they have large budget and many people reporting to them.

    Managers and senior management from all areas of the organisation having responsibility for planning and achievement of key business objectives.

    Why you should attend.

    - Reflect on how you got where you are as an organisation;

    - What factors were critical to your success? What factors were the basis for your success?

    - What held you back – prevented you from being even more successful?
    - What could you have done differently

    Understand what are the most critical factors that will better ensure your organisation is a “winner” in the future (e.g., next 3-5 years).

    Find out which ones you may be missing and what to do about it before it’s too late and you become just an “average or good” organisation when, with a little effort and the right strategic thinking and creativity, you could take the organisation to the next level of performance and move toward “greatness”.

    How to build exceptional stakeholder relationships and why doing this is critical in especially in turbulent times.
  • Parallel Networks Provide Stronger Security at the Elastic Edge
    Parallel Networks Provide Stronger Security at the Elastic Edge Ken Hosac, VP of Business Development, Cradlepoint Oct 18 2017 4:00 pm UTC 60 mins
    Enterprises are seeking ways to reduce the scope and complexity of securing their Network’s Edge. Data breaches can cost companies millions of dollars in reduced revenue, shareholder value, fines, and diminished brand loyalty.

    IT managers concerned about their connected-network systems have turned to Parallel Networking to create application-specific networks to protect cardholder data while enabling customer engagement and improving operations.

    Parallel Networking enables organizations with hundreds or thousands of distributed locations to enhance security and PCI Compliance at the Network’s Edge.

    Join Cradlepoint for a webinar to learn about the benefits of Parallel Networking, real customer success examples, and best practices for greater security at the Elastic EdgeSM. 
  • SOC Talk: Automation and Visibility for Faster, More Accurate Response
    SOC Talk: Automation and Visibility for Faster, More Accurate Response Simon Gibson, CISO / Security Architect, Jack Hamm, Principal Information Security Engineer, Graham Melville, Sr. Director Oct 18 2017 4:00 pm UTC 45 mins
    Join Jack Hamm and Simon Gibson from the Gigamon SecOps as they demonstrate how to use automation and visibility to take the boredom out of repetitive tasks. One of the featured use case will be how to automate tasks to find and block Kaspersky in government organizations.
    Security practitioners use a variety of tools and information sources to spot potential threats, evaluate each event and then act to mitigate. They are challenged by little interoperability between security tools, plus the cost of these tools across the network and cloud can be prohibitive.
    During this lively webinar, hosted by Security Solutions leader, Graham Melville, you will see how Gigamon and the Phantom security automation and orchestration platform can help you reduce mean time to resolution. The team will show how you can provide wider visibility and automate the tasks your security staff repeats on a frequent basis. 

    Simon and Jack will demonstrate:

    •How to generate indicators of compromise to trigger Phantom to execute customized playbooks with specific actions.
    •How to automate tasks to find and block the use of Kaspersky in government organizations.
    •How to streamline dozens of sources to gain insight into security events.
    •How to gain visibility to the necessary traffic from all segments of your networks without buying more security tools.
    •How you can reduce the load and turn on more features on your security tools such as Next Gen Firewalls.
  • Advancing UEBA: The Impact of AI, ML and Cloud Infrastructure
    Advancing UEBA: The Impact of AI, ML and Cloud Infrastructure Samir Jain, Senior Product Manager (LogRhythm) Mark Settle, Product Marketing Manager (LogRhythm) Oct 18 2017 5:00 pm UTC 60 mins
    Alongside an expanding attack surface resulting from the growth of cloud, mobile and IoT, organizations are now increasingly faced by internal threats. Insider threats, compromised accounts, administrator abuse and other user-based threats are some of the most damaging vulnerabilities and the hardest to detect. This has led to the evolution of user and entity-based analytics (UEBA) solutions, designed to address user based threats, and through the use of artificial intelligence (AI) and machine learning these solutions are advancing threat detection capabilities in modern security operation centers.

    In this webinar, Mark Settle, LogRhythm Product Marketing Manager, and Samir Jain, Senior Product Manager, UEBA, will discuss the evolving UEBA market, and advancements in the technology fueling these solutions.

    Webinar attendees will learn:
    •How advancements in AI and machine learning technology are enabling security analytics and in particular UEBA.
    •Why security analytics solutions are moving to cloud infrastructure, and the security implications compared to on premise platforms.
    •What security mature organizations are asking for versus what is being delivered
    •Whether UEBA solutions are better delivered via security analytics/SIEM platforms, or via stand alone solutions