The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Roi Alon, Product Manager, Tufin & Dan Rheault Sr. Product Marketing Manager, TufinLive60 mins
Ready for full automation for next generation firewalls (NGFWs)? Eager to achieve a greater understanding of your risk?
Join the Tufin product team on January 16 to learn how customers using Tufin Orchestration Suite R18-3 GA will master their Network Security Policy Management through increased automation and additional risk reporting.
Tufin Orchestration Suite R18-3 GA delivers:
- New workflow support for Cisco and Palo Alto Networks NGFWs
- Policy-based routing automation for Cisco network devices
- New reporting options
- Methods to identify risk for non-zone included IPs for risk flows
Register now to learn how automation increases your organization’s efficiency and improves risk management processes.
Tom Patterson, Chief Trust Officer, UnisysLive75 mins
Despite spending billions of dollars every year on security, companies and governments – as well as the products and services they use – often lose sight of their ultimate goal: protecting the user. Please join this webinar to hear Tom Patterson, the Chief Trust Officer for Unisys, share results and realities from the only recurring snapshot of consumer security concerns conducted globally. This year’s global Unisys Security Index survey brings to light key areas of consumer concern that are vital to understand, if society and the security sector are to be successful in achieving their goals.
Major findings affecting government services, entire business sectors and fast evolving technologies are all illuminated through the lens of the user, as opposed to the more typical providers. Learn what’s most important to the consumer in each region of the world, and across key demographic categories. This clarity of vision, brought by thousands of statistically significant consumers from around the world, is a voice that needs to be heard.
Tom will use this year’s results, juxtaposed with over a decade of survey history and informed by global events and leaders from both government and industry, to provide a cogent report on the state of global security from the perspective that matters most—the user.
Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.
In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:
- How to define cybersecurity success
- Common approaches that fall short
- Risk-based cybersecurity strategy planning
Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
Anant Krishna Vadlamani, Brian Westnedge, Steve WhittleLive60 mins
In this webinar, we’ll go in depth on Symantec Email Fraud Protection, a new automated DMARC enforcement solution that provides another layer of defence to eliminate the single biggest phishing attack vector: exact-domain impersonation.
Gary Hayslip (Webroot) | Dan Lohrmann (Security Mentor) | Mark Weatherford (vArmour) | Amos Stern (Siemplify)Recorded: Jan 16 201959 mins
Learn how the role of Chief Information Security Officer (CISO) has changed in the age of data breaches and high-profile cyber attacks.
Join well-known CISOs at the top of their game for an interactive discussion on:
- How the role of CISO has changed in the last few years
- Hiring and retaining a CISO
- Top challenges for CISOs
- Dealing with stress & pressure associated with the role
- How to keep your security team happy
- Tools, technology and policies CISOs swear by
- What keeps CISOs up at night
- Why leadership buy-in is essential to boost cybersecurity
- Future trends and predictions
- Gary Hayslip, CISO, Webroot
- Mark Weatherford, Chief Cybersecurity Strategist, vArmour
- Dan Lohrmann, Chief Strategist & CSO, Security Mentor
- Amos Stern, CEO, Siemplify
This exclusive CISO webinar originally aired during National Cyber Security Awareness Month (NCSAM).
Guido Kragten, Sales Enablement Cloud Platforms, EMEARecorded: Jan 16 201952 mins
Seventy percent of today's Midsize businesses are investing in technology to customize the user experience, improve customer satisfaction, build loyalty, and gain a competitive advantage. But the ability to deliver amazing user experiences is dependent on high-performance, reliable connectivity. It requires a business-class network.
Join us on 16th January, as we showcase the Top 5 business-class features your network must have for you to automate and optimize the delivery of network services to drive your business success.
A high-level discussion will be followed by a demo of Aruba Central, network management in the Cloud.
Antonio Cancellara & Marco OttaviRecorded: Jan 16 201951 mins
Stai progettando la migrazione al cloud? Sei sicuro che la tua infrastruttura cloud e le tue applicazioni aziendali siano realmente protette?
Partecipa a questo webinar esclusivo in cui gli esperti di SonicWall spiegano come proteggere la tua infrastruttura cloud pubblica e privata dalle minacce avanzate.
Argomenti del webcast:
•Come applicare la protezione di nuova generazione a infrastrutture cloud pubbliche e private e alle applicazioni aziendali
•Come ottenere visibilità completa sull'ambiente virtuale per prevenire le minacce
•Novità di NSv e WAF
Neil Glick, Technical Engineer, Cybersecurity Strategy - ProofpointRecorded: Jan 15 20197 mins
For this week's Interesting Threat Byte, we bring you Happy Holidays from TA505! TA505 is the designation for Threat Actor 505, one of the most prolific threat actors observed by Proofpoint. TA505 was responsible for the largest Dridex, Locky, Jaff and The Trick campaigns. Due to the variety of malware delivered by this group, demonstrates their deep connections to the underground malware scene.
Proofpoint has been watching TA505 for quite some time and has data dating back to 2014 when they launched their first Dridex campaign. When TA505 changes their tactics, other threat actors tend to follow. Just in time for the holidays, Proofpoint has noticed that TA505 is sending out fewer ransomware campaigns and instead focusing on smaller more targeted attacks. Why you ask? The value of cryptocurrency has dropped significantly, leading to threat actors looking for new and creative ways to get money from unsuspecting victims.
Max Aulakh, CEO, Ignyte Assurance PlatformRecorded: Jan 15 201938 mins
Every organization has a strategy – sometimes this is explicitly stated within various organizational documents and other times the strategic objectives are held within the minds of executive leadership. CISOs today are struggling to find the right words and narrative to set the tone from the top. How do you properly extract the right type of information from your organization that will help you build a consensus and influence with your top-level management?
As a CISOs, you need to acquire a new set of skills while maintaining your technical trench warfare knowledge (Frameworks, SIEMs, DLP, MDR, etc..). In this presentation, Max Aulakh (CEO) will present broad range of skills that are needed for the next CISO. We will also examine behaviors of some of the well known CISOs in our industry and how they interact & build influence to gain consensus.
Bryan J Smith, Sr. Cloud Architect, ORock & Matt Plummer, Sr. VP of Cloud Architecture, ORockRecorded: Jan 15 201936 mins
Migrating legacy applications and sensitive data (such as personally identifiable information (PII)) to the cloud introduces challenges that many government agencies may be unable to overcome. Challenges include lack of financial resources or internal expertise for application modernization and concerns over data security, network performance, and compliance.As a result, many agencies continue to host and process their most sensitive data and workloads on-premise or in private clouds despite growing pressure to modernize and reduce costs.
In this webinar, we’ll discuss a Red Hat solution that lets you move and host your legacy government off-the-shelf (GOTS) or commercial-off-the-shelf (COTS) applications in a FedRAMP moderate cloud while keeping your most sensitive data on-premise. This on-premise to cloud solution helps you satisfy compliance requirements while improving performance, security, and total cost of ownership.
Attend this webinar to hear more about how you can:
- Process workloads and backups in a Red Hat open source cloud.
- Keep your most sensitive data on-premise.
- Move legacy applications to a private Infrastructure-as-a-Service (IaaS) with limited-to-no refactoring.
- Transport data securely over a public internet connection without a virtual private network (VPN) connection.
- Satisfy FedRAMP, Health Insurance Portability and Accountability Act (HIPAA), Health - Information Technology for Economic and Clinical Health (HITECH) Act, and other compliance requirements for data protection.
- Prevent dedicated denial of service (DDoS) and man-in-the-middle (MITM) attacks.
Alex Tilley, Secureworks Senior Security ResearcherRecorded: Jan 15 201957 mins
From July 2017 through June 2018, Secureworks Counter Threat Unit® (CTU®) researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. Their findings, which include new data about who is conducting what types of attacks and why, will be shared in person by CTU experts on this webcast.
We’ll examine a small subset of professional criminal actors responsible for the bulk of cybercrime-related damage worldwide and explain: how they’re leveraging the underground hacker economy, why they can’t be seen by researchers and law enforcement who monitor the dark web, and how we know their tools and techniques are as sophisticated, targeted and insidious as most nation-state actors.
You’ll also learn how constant “background noise” from low-level criminality is impacting businesses around the world and see latest cost of stolen goods, hacking tools, and hacking services on the underground marketplace.
Additionally, get insight on these key findings from the report:
- Ransomware is now more sophisticated than ever. Secureworks’ CTU researchers observed no less than 257 new and distinct ransomware families in 12 months
- Cryptocurrency mining remains an extremely popular way for criminals to monetize access to infected computers. In 2017, at least one in three organizations experienced cryptocurrency mining activity on their network.
- Criminal gangs have combined advanced social engineering and network intrusion techniques with POS malware to generate millions of dollars of revenue through stolen payment card data. According to the FBI, business email compromise and business email spoofing alone have now generated $12B in financial losses since October 2013.
Scott King, Rapid7; Shawn Valle, Rapid7; Gary Hayslip, Webroot; Vito Sardanopoli, Vantage CyberRisk PartnersRecorded: Jan 15 201945 mins
With the ever-changing threat environment and increasing prevalence of data breaches, today’s CISOs face a daunting task of securing their organization from a variety of threats. But, with so many priorities and a finite budget, it can sometimes feel like an impossible task to decide where to focus. So, what does 2019 have in store for cybersecurity and what are CISOs’ top priorities?
Join Rapid7 and our panel of expert CISOs for our 2019 predictions. Some of the topics our panel will cover include:
1. What are the top cybersecurity predictions for 2019?
2. How will CISOs’ priorities change in 2019? What will become new areas of focus and what will decrease in priority?
3. How will CISO’s investments change in 2019? What areas of cybersecurity do they see receiving more funding?
4. Actionable insights for how to improve your organization’s cybersecurity strategy in 2019
Louis Evans, Product Marketing Manager - Arctic Wolf NetworksRecorded: Jan 15 201946 mins
As the rapid digitization of business processes continues, the risks from cyberattacks have become increasingly daunting. Data breaches can disrupt business operations and cause significant economic damage, especially to businesses that don't have the resources to build a fully operational Security Operations Center (SOC). Smaller businesses often incorrectly assume that investing in endpoint and perimeter security products is enough to keep them safe. This approach is now outdated and ineffective.
A recent survey commissioned by Arctic Wolf of over 400 cybersecurity professionals indicates an increasing shift towards outsourced security operations across businesses in a variety of industries. Join this webinar as cybersecurity expert from Arctic Wolf, Louis Evans, explores:
● Why investing in antivirus or perimeter security solutions alone is not enough
● The top reasons why a SOC-as-a-Service is the right choice for security operations
● What you can do to transform your business overnight with outsourced security
To see why SOCaaS is the Right Choice, save your seat now!
Alex Holden, CISO, Hold SecurityRecorded: Jan 15 201962 mins
Learn what kind of challenges the next generations of technology will bring to cybersecurity and what kind of safeguards we are building. From our history of technologies becoming obsolete, to the rise and fall of hacker techniques; we can derive our lessons and not only fantasize about our future but predict it based on a solid track record from the past.
Rahel Anne Bailie, Chief Knowledge Officer at ScrollRecorded: Jan 15 201961 mins
Content operations, ContentOps for short, has been around for a long time, though the average content professional would be hard-pressed to define it. ContentOps means having a system for content production, day in and day out, that allows us to deliver content at scale. Processes that include copy-and-paste have limited capacity, and it's time for organizations to change their processes that have lots of administrative overhead. It's time to replace outdated production methods with streamlined operational models.
Join Scott Abel, The Content Wrangler, and his special guest, Rahel Anne Bailie, Chief Knowledge Officer at Scroll UK for this free, one-hour webinar. Come learn why ContentOps works nicely with DevOps, which helps software developers uses established processes to create and manage code efficiently, and DesignOps, which helps designers use established processes to create and manage aspects of design more efficiently. We'll talk about why organizations have been slow to adopt ContentOps, and how to move toward using content processes to be able to develop and manage great content efficiently and effectively.
ABOUT RAHEL ANNE BAILIE
Rahel Anne Bailie is Chief Knowledge Officer at Scroll, an STC Fellow, an industry author, and a results-driven content strategist. She has a strong track record of developing successful digital content projects, tackling the complexities of managing content for clients globally. Her strength is diagnostics: calculating how to use content to deliver compelling experiences.
Rani Osnat, VP of Product Marketing, Aqua SecurityRecorded: Jan 15 201934 mins
The growing adoption of containers and the availability of scalable orchestration tools (e.g. Kubernetes) are creating opportunities to develop more agile, easy-to-update applications that combine stateful and stateless modes. The emerging architecture combines both modalities, that have very different security considerations and risk profiles.
While Cloud Foundry Application Runtime is well-suited to 12-factor application development, Cloud Foundry Container Runtime is better for flexible, rapidly-updated apps that can scale-out specific parts of the application in a very elastic way. However, from a security standpoint, CFCR presents challenges in the form of 3rd party open-source inflow, developer-driven code changes, and frequent updates. It also presents benefits in the form of immutability, better network segmentation, and lack of persistence on the host (the notion we sometimes refer to as “reverse uptime”).
This webinar describes how to approach these divergent needs and demonstrates some of the methods and tools that can be used to mitigate risk without slowing down development.
Tony Bradley, Senior Manager of Content Marketing, Alert Logic and Lee Ramsey, Co-Founder of Pre-FiRecorded: Jan 15 201933 mins
Maintaining and proving PCI DSS compliance can be a constant headache.
Without the right tools and resources, monitoring your PCI compliance can be complex and involve lots of time and costs.
Join us as we share the three best practices for monitoring PCI compliance .. Alert Logic’s automated security controls streamline assessment and detection of vulnerabilities and suspicious behavior that could jeopardize your compliance status.
We’ll discuss product features and show you:
-What data to monitor for PCI compliance
-How to look for issues related to PCI compliance
-What logs to review and make available for auditors
Hear from our experts about these capabilities and more in this ’staying ahead of PCI compliance webinar.
Additionally, this webinar will feature a Q&A session with Alert Logic customer Lee Ramsey, Co-founder of Pre-Fi, a provider of pre-qualification tools for consumer loan approvals. Lee will share how Alert Logic solutions help with PCI compliance preparedness.
Glenn Richardson, Executive Coach, LeaderSagesRecorded: Jan 15 201960 mins
Start the new year on the right foot by investing in yourself and improving your leadership skills. Join Glenn Richardson, coach and executive consultant, in this webinar that will explore the principles of leadership. We will review practical tips, supported by real-world examples, from an experienced, successful leader who specializes in coaching and developing new and emerging leaders. Gain confidence in your ability to learn and lead, and, if you’re already in a leadership role or approaching a new position with leadership expectations - congratulations! Join us on this webinar to develop a plan for continue learning, improvement and career advancement.
Donna Johnson, Cradlepoint, and Lee Doyle, principal analyst at Doyle ResearchJan 16 20195:00 pmUTC60 mins
Today’s branch networking landscape has been changed by the rise of cloud-based applications, cloud-delivered traffic, and IoT devices. These trends significantly affect how network administrators and IT teams address network uptime and security, deploy IoT devices, and manage their widely distributed endpoints. New needs often require innovative network architectures and solutions.
Join Lee Doyle, principal analyst at Doyle Research, and Donna Johnson, vice president of product and solution marketing at Cradlepoint, for a live webinar to explore the ramifications of cloud applications and IoT on branch architectures, as well as the role of flexible, cloud-managed edge solutions in meeting the diverse and ever-changing network requirements of today’s enterprises.
Mike Rothman, President, Securosis and Sam Kumarsamy, Senior Product Marketing Manager, GigamonJan 16 20196:00 pmUTC58 mins
Despite the insatiable demand for bandwidth, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB.
Join Mike Rothman, President of Securosis, and Sam Kumarsamy, Senior Product Marketing Manager at Gigamon, as they discuss how to solve the security headaches that go with these network upgrades and architectures that strengthen your security posture, simplify IT and reduce costs. You’ll learn how to:
- Increase Your Security ROI: Filter and deliver just the right data to the right tools from network traffic anywhere in the physical, virtual and cloud infrastructure
- Reduce Your Security Risk: Rethink your network security architecture by decrypting once and enabling inspection by multiple security tools
- Improve Threat Response: Separate signal from noise to identify patterns and threat vectors more quickly across heterogeneous networks
Find out how both network and security teams can collaborate faster and safer during network upgrades to solve security headaches – register today!
Salah Nasser, Director Product & GTM Strategy, Symantec and Kyle Black, Director Systems Engineering, Bay DynamicsJan 16 20197:00 pmUTC56 mins
Incident triage dominates daily efforts by Data Loss Prevention (DLP) teams. What’s more pressing is the need to expand DLP policies and channels, i.e. cloud apps and email, are creating more incidents. But more incidents arrive than can be closed - so high risk actions sometimes get missed.
New user and entity behavior analytics platforms like Symantec Information Centric Analytics (ICA) dramatically reduce false positives, so there’s time to refine processes and educate other organizations.
Key questions answered include:
-How to expand existing Data Protection to cover more channels while reducing incident management?
-What’s abnormal but dangerous activity? and how dangerous is it?
-How to address more incidents and risky users without changing policies?
Troy Kent, Threat Researcher, Awake SecurityJan 16 20197:00 pmUTC60 mins
Everyone talks about alert fatigue and the unfortunate reality of overworked and undertrained analysts. What happens though when attackers start to focus on that reality as a point of failure? In this webinar, we will discuss how trivial this can be for an attacker. Using minimal time and open source tools, we will fly under the radar by taking advantage of analyst biases and assumptions. We'll specifically explore how we can edit an open source miner to make it fileless, and then use it for command and control and to exfiltrate data. We will then show how artificial intelligence and advanced network traffic analysis tools detect threats such as these and enable you to respond decisively.
Key Learning Objectives include:
- Discuss the not-so-obvious challenges alert fatigue poses
- Illustrate with an example how attackers hide in plain sight
- See how AI can help the analyst find and then respond to these attackers
¿Quiere migrar a la nube? ¿En qué medida confía en la seguridad de su infraestructura de nube y de sus aplicaciones de negocio?
Participe en este seminario virtual exclusivo, en el que los expertos de SonicWall hablarán sobre cómo proteger su infraestructura de nube pública y privada contra las amenazas avanzadas.
Obtenga información sobre:
•Cómo utilizar seguridad de próxima generación para su infraestructura de nube pública y privada y para sus aplicaciones de negocio
•Cómo obtener visibilidad completa sobre su entorno virtual para disfrutar de prevención de amenazas
•Las novedades de NSv y WAF
Helen Oswell, Cyber Security EngineerJan 17 201911:00 amUTC45 mins
The biggest threat to any organization is it’s own people, particularly when they have access to its most sensitive data. This talk is about limiting the internal threat through RBAC and segregation of duties, and how to implement these using Active Directory.
Helen has a masters in electronic engineering, specializing in machine learning. She moved into Cyber Security at 10x Future Technologies, a fintech start up founded by the ex-CEO of Barclays Anthony Jenkins. She is now working with 6point6 to provide SME services to HM Government, designing and building a number of Cyber Security tools.
Bogdan Botezatu, Director of Threat Research and Reporting, BitdefenderJan 17 20191:00 pmUTC45 mins
What threats can we expect to see in 2019, and how do we make sure we're prepared?
Join Bitdefender Director of Threat Research and Reporting, Bogdan Botezatu to discuss research-based predictions on the biggest threats of 2019. He'll walk through the future of cryptojacking, advanced persistent threats (APTs), network-level exploits, IoT attacks, and others and provide recommendations on the industry's best defenses against these threats.
Corie Chung - Chief Strategy Officer; Shlomi Levin - Co-founder and CTO; Michael Aminov Co-founder & Chief ArchitectJan 17 20194:00 pmUTC45 mins
Nearly 90% of businesses are pursuing a digital-first strategy as their processes become digitized as data-driven.
However, with the promise of great leaps in growth and productivity, also come major security loopholes. From new communication channels to problematic security policies to legacy systems, there are many ways in which the digital-first business may be exposed - a risk brands simply can't afford to take.
Join our founders to learn more about the digital transformation phenomena, its IT enablers, and how to close some of the major loopholes leaving organizations exposed.
Hear predictions from our security experts about the evolving threat landscape so you can get prepared with actionable recommendations to improve your cybersecurity posture for 2019.
The attack landscape is shifting with increased automation and cunning new distribution methods. There’s no discrimination when it comes to a security breach any more: everyone is at risk. How are you preparing to stay ahead of attackers, and not just for their existing attack methods but new and emerging ones as well?
Alert Logic security experts have a front row seat on current and emerging attacks across more than 4,000 clients. Join this webinar to hear their predictions for 2019 along with practical guidance on how you can stay a step ahead and better protect your business.
Wayne Murphy, Sec-1 Ltd.; Ben Rafferty, SemafoneJan 17 20194:00 pmUTC60 mins
Over the last seven years, the technologies used by call and contact centers to communicate with customers and complete card transactions have changed drastically. Networking methodologies like VoIP have since become widely adopted, while the number of applications organizations employ to process customer information has risen dramatically. For this reason, the PCI SSC recently released their highly anticipated updated “Guidance for Protecting Telephone-Based Card Payments” for the first time since 2011, offering several much-needed clarifications for organizations looking to achieve PCI DSS compliance inside their contact centers.
Join Semafone and Sec-1 Ltd. for this insightful webinar into the most pertinent changes, featuring two of the members of the PCI SSC’s Special Interest Group – Ben Rafferty, Chief Innovation Officer at Semafone, and Wayne Murphy, Senior Security Consultant at Sec-1 Ltd. We’ll cover the following:
• How to avoid scope-creep inside the contact center during PCI DSS compliance
• How Pause and Resume call recording solutions create more problems than they solve
• How most 3rd party services are now in scope for PCI DSS compliance
• How devices that control SIP Redirection are now also in scope
Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVaultJan 17 20195:00 pmUTC60 mins
Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.
In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.
Join us for this webcast to learn:
- The most common challenges in meeting and maintaining compliance with PCI DSS
- Best practices to help you plan and prepare for an audit
- The core security capabilities you need to demonstrate compliance
- How AlienVault Unified Security Management can simplify the compliance process
VP of Product Marketing at AlienVault
Qualified Security Assessor (QSA) with Terra Verde
Sales Engineer at AlienVault
Jasson Casey - CTO at SecurityScorecardJan 17 20195:00 pmUTC60 mins
Please join us on the 17th of January as Jasson Casey, CTO at SecurityScorecard, describes the state of cybersecurity in the modern world, and what best practices are for measuring it - differently. He will discuss the importance of behavioral analytics, and how to make use of an “outside-in approach” when measuring cybersecurity.
He will relate how to apply security analytics to different facets of our business, including devops. With 20 years in the industry, Jasson will discuss his perspective on what tactics work, and which do not. Please join us to learn more.
Dean Nicolls, VP of Marketing, Jumio Corp.Jan 17 20195:00 pmUTC27 mins
Customer acquisition is top of mind for most financial service organizations and their boards. Normally, when banks and other financial service institutions think customer acquisition, they think about launching a new advertising campaign with the hope of driving more online or in-branch traffic -- but these campaigns are iffy at best.
Instead, why not rethink your online account opening process where FSIs lose about 20% of their prospects through abandonment. If you can plug that leaky funnel, you will see an immediate improvement in customer acquisition.
Join us for this informative “how-to” webinar and discover how to…
- Dissect the abandonment problem
- Reduce the number of identity verification screens & clicks
- Cast a wider net with omni-channel verification
- To say “no” to verification “maybes”
Dr. V.N. Berlin, CEO, Mission Critical InstituteJan 17 20195:00 pmUTC30 mins
Looking to break into or advance your career in the lucrative field of cybersecurity? Want to know how to get recruited by employers for $100K+ cybersecurity jobs? Join our webinar to find out!
Mission Critical Institute is an industry leader in producing job-ready, cybersecurity experts through our academic and training partners. Our innovative programs are custom-built to meet industry standards and advance your cybersecurity career.
There is a growing shortage of trained cybersecurity professionals, with over 3.5 million unfilled jobs projected by 2021, and employers need candidates now. Join us and learn how to start your cybersecurity today!
Sign up for this webinar to learn:
• How do you get recruited for a $100K+ cybersecurity job?
• What are employers looking for in cybersecurity professionals?
• What certifications do you need to get recruited?
• What experience do you need to become a cybersecurity professional?
• Why are companies willing to pay $100K+ for trained cybersecurity professionals?
Join our webinar today and learn how you can be the next $100K+ cybersecurity professional!
Chris McCormack, Firewall Product Specialist, SophosJan 17 20196:00 pmUTC60 mins
Sophos XG Firewall gives you everything you need to secure your network against advanced threats like ransomware, bots, worms, hacks, breaches and APTs. In addition, you get unparalleled network visibility that no other firewall on the market can deliver.
Join this webcast to see how XG Firewall can transform your network security and performance. You’ll see:
- How the threat landscape is evolving
- How ransomware gets onto your network and spreads – fast
- Essential protection you need in your firewall to secure your network
- Best practices for deploying your firewall to provide a solid defense
The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.
Attend this webinar to learn how Docker can help you meet migration deadlines by providing a validated methodology for containerizing legacy Windows applications, quickly. The combination of the Docker Enterprise container platform and purpose-built tools, allow you to upgrade and improve application security and reliability; all while cutting costs by up to 50%.
Chris Murdock, Senior Security Engineer at CongaJan 17 20196:00 pmUTC60 mins
In a world of evolving, complex cloud infrastructure – there is no shortage of advanced security technologies that monitor for potential threats. People look for better ways to gain security insights from large datasets and are tasked with the responsibility of communicating associated business risk throughout the entire organization.
In this webinar, Senior Security Engineer Chris Murdock from Conga will explore how to democratize the security of your next-gen infrastructure by building measurement directly into systems, factoring in security-related KPIs and OKRs. Tune in to learn how to securely scale your infrastructure while continuing to enable innovation at the speed of business.
Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace.Jan 17 20196:00 pmUTC75 mins
With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.
Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:
- Implement security analytics for incident detection and response.
- Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
- Leverage AI to autonomously respond to emerging threats before they can do serious damage.
- Understand key information that needs to be communicated to various stakeholders in the event of a breach.
- Apply a “standard of due care” in order to prove compliance to regulatory agencies.
Josh Bartolomie, Dir, Res & Dev, Cofense; Sharon Smith, Fndr, C-Suite Results; Theresa Frommel, Act Dep CISO, State of MOJan 17 20196:00 pmUTC60 mins
Process automation delivers a lot of promises. A car can be assembled in less than a day and vegetables can go from vine to can in hours. Sensors look for obvious flaws, but at points in the production process there is human oversight in the form of quality control. The same holds true for protecting against phishing threats. Automation can help weed out some of the bad stuff, but bad actors and new threats constantly outsmart the latest sensors. Join Cofense and (ISC)2 on January 17, 2019 at 1:00PM Eastern for a panel discussion examining strategies on how to enable your workforce to be quality control when it comes to malicious emails to know when something isn’t right and what to do when they see something.
John Kindervag, Field CTO, Palo Alto NetworksJan 17 20196:00 pmUTC60 mins
“Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks
Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?
High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.
Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.
Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:
• Learn specific outcomes of implementing a Zero Trust architecture
• Hear recommendations on where to start when planning and implementing a Zero Trust framework
• See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
• Get your questions answered in our Live Q&A
Tonia Dudley, Security Solutions Advisor, Jeffrey Rogers, VP Customer Success, at CofenseJan 17 20197:00 pmUTC45 mins
New year. New resolutions. Every year we make the pledge to eat healthier and get more exercise. What is good for the waistline is also good for your phishing defense posture. With more than 90% of breaches attributed to successful phishing campaigns – now is the time to think about how to prepare and prevent attacks. In this session, you’ll hear about 10 resolutions for your phishing defense programs that will make your organization more secure.
Some of the topics covered include:
- How to empower humans to be part of the solution
- Best practices to balance automation with human intuition
- How the latest features and technologies can make your life easier
Vous envisagez de migrer vers le cloud ? Avez-vous la certitude que votre infrastructure cloud et vos applications métier sont sécurisées ?
Participez à un webinaire exclusif où des experts SonicWall vous diront comment protéger votre infrastructure cloud public et privé contre les menaces évoluées modernes.
•Comment faire bénéficier votre infrastructure cloud public et privé et vos applications métier d’une sécurité de nouvelle génération
•Comment obtenir une visibilité totale sur votre environnement virtuel pour la prévention des menaces
•Quelles nouveautés apportent les produits NSv et WAF
Taly Walsh, Executive Director, WiCySJan 18 20196:00 pmUTC60 mins
A new study has updated the ratio of women to men in the cybersecurity workforce – from 11% to 20%. Yet more than 300,000 cybersecurity jobs are unfilled today, a number that is exponentially growing into the millions. Let's do something to move the needle to 50% women in cybersecurity!
Women in CyberSecurity (WiCyS), a non-profit organization with deep roots in academia, government and industry, is driving to increase recruitment, retention and advancement of women in cybersecurity.
During this engaging webinar for diversity recruiters and women in various stages of cybersecurity careers, we will interview two WiCyS Board Members who offer stats and important guidelines for recruitment and retention of women in cybersecurity.
Dr. Janell Straach, Chairman of the Board, WiCyS - Director, Center for Engaging Women in Cybersecurity, University of Texas Dallas
Dr. Costis Toregas, Treasurer, WiCyS - Director, Cyber Security and Privacy Research Institute, George Washington University