Hi [[ session.user.profile.firstName ]]

IT Security

  • Spotlight on INDIA – Beyond Compliance: Conquering Data Security in Pharma Spotlight on INDIA – Beyond Compliance: Conquering Data Security in Pharma Chaitanya Singh Rathore, Pre Sales Engineer Feb 22 2017 9:30 am UTC 60 mins
    Economies hit annually with billions through cybercrime & implications of cybercrime within the pharmaceutical and healthcare industry go beyond the obvious financial damage because of the:

    •Intellectual property
    •Lack of right Data Security strategy to protect against cyber-attacks
    •Insiders rather than external hackers who hold large amounts of valuable IP and trade secrets (DuPont breach in 2012)

    Key learnings:
    •The best way to protect sensitive information, including Patent Files, Legal filings, Prescription Records, Insurance Records, and Sales Details from breaches
    •How to secure private data from theft or loss to reduce liability
    •How to manage a multi-device complex IT environment with ease
  • Die aktuelle Lage beim Endgeräteschutz - wie maschinelles Lernen Angriffe stoppt Die aktuelle Lage beim Endgeräteschutz - wie maschinelles Lernen Angriffe stoppt Sven von Kreyfeld & Thomas Hemker Feb 22 2017 10:00 am UTC 60 mins
    In der Welt von Endgerätesicherheit und Virenschutz sind in den letzten fünf Jahren sage und schreibe 37 neue Endpoint Security-Produkte auf den Markt gekommen, von denen jedes von sich behauptet, die Herausforderungen der sich wandelnden Sicherheitslandschaft anzugehen. Doch ist das alles nur Hype?

    Erfahren Sie mehr über maschinelles Lernen – was es ist, wie es funktioniert und was Sie sonst noch benötigen, um sich an allen Angriffspunkten schützen zu können.

    Wichtigste Lernziele:

    • Wie die aktuelle Lage in der Branche im Hinblick auf Endpoint Protection-Technologie ist

    • Warum maschinelles Lernen nicht ausreichend ist

    • Entdecken Sie, wie Sie die Anzahl der auf Endgeräten installierten Agenten reduzieren können – mit einem leistungsstarken, ressourcenschonenden Agenten, der Advanced Machine Learning, Exploit-Schutz, Anti-Malware und weitere Funktionen umfasst.
  • Securing The Multi-Dimensional Cloud Securing The Multi-Dimensional Cloud Ronen Shpirer, Security Solutions Architect, Fortinet Feb 22 2017 10:00 am UTC 45 mins
    Software is eating the world – driving digital transformation and changing the way businesses do business. Cloud is a core enabler in every enterprise’s digital transformation voyage - facilitating innovation, agility and cost efficiency.

    But harnessing the power of the cloud creates a multi-dimensional environment where applications, data and information are borderless and yet, regardless of their changing location and existence, must be protected and secured as part of the enterprise overall security strategy and posture.

    This session will provide an overview of the unique security challenges in a multi-dimensional cloud environment, and the solution framework required for empowering and securing digital transformation.
  • Panel Discussion - AI & Machine Learning in Cyber Security Panel Discussion - AI & Machine Learning in Cyber Security Josh Downs, BrightTALK; John Laliberte, FireEye; Natalino Busa, TeraData & Neill Gernon, AI.Dublin and Atrovate Feb 22 2017 11:00 am UTC 60 mins
    A live online panel discussion focused on the debate around AI and machine learning and how they can automate cyber security; catch more threats and malicious attacks and prove a useful weapon against cyber crime.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - John Laliberte, VP, Endpoint and ICE, FireEye

    - Natalino Busa, Head of Applied Data, TeraData

    - Neil Gernon, MD, Atrovate & Founder, Dublin.AI
  • State of Endpoint Protection & How Machine Learning Helps Stop The Attacks State of Endpoint Protection & How Machine Learning Helps Stop The Attacks Robert Arandjelovic & Jose Carlos Cerezo Feb 22 2017 12:00 pm UTC 60 mins
    In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?

    Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.

    Key Learning Objectives:

    •What is the state of the industry for Endpoint Protection technology
    •Why machine learning is not enough
    •Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more
  • Rise of the Zombie Army - A Study of Botnets Rise of the Zombie Army - A Study of Botnets Ronan Lavelle, General Manager EMEA, Zenedge Feb 22 2017 1:00 pm UTC 45 mins
    From Haitian folklore to George A. Romero’s Dawn of the Dead, the use of Zombies in fictional settings has experienced a strong resurgence in recent years. With fact mirroring fiction, the real world has also faced the terror of dealing with a rise of mindless automatons capable of creating mass devastation on an international scale.

    We are of course talking about the rise of Botnets.

    Come join us for an interactive presentation with chief zombie-wrangler, Ronan Lavelle, on the insidious rise of this threat looking at recent attacks, the link in growth to insecure IoT devices and just what we can do to combat them.

    This webinar is perfect for cyber professionals those who want to:

    - stop data loss by defending against botnets
    - better respond to incidents and remediate
    - reduce attack surfaces and counter threats
  • Protection next-gen des terminaux et machine learning Protection next-gen des terminaux et machine learning Herve Doreau, Directeur Technique - Symantec France Feb 22 2017 2:00 pm UTC 60 mins
    Sur le marché de la sécurité des terminaux et des antivirus, pas moins de 37 nouveaux produits ont fait leur apparition au cours des 5 dernières années et chacun affirmait répondre à l’évolution des menaces. Mais peut-on vraiment s’y fier ?
    Découvrez la nouvelle technologie de machine learning, comment cela fonctionne et ce à quoi vous devez l’associer pour vous protéger sur chaque point d’attaque.

    Principaux thèmes abordés :

    • Quel est l’état de l'art des technologies de protection des terminaux

    • Pourquoi le machine learning ne suffit pas

    • Comment réduire le nombre d’agents sur les terminaux
  • Immune System Cyber Defense: Across the Cloud and Beyond Immune System Cyber Defense: Across the Cloud and Beyond Andrew Tsonchev, Principal Consultant; Simon Wilson, Senior Cyber Technician Feb 22 2017 3:00 pm UTC 45 mins
    By 2020, 92% of all business will rely on cloud infrastructure. The shift to cloud and virtualized environments is changing the nature of network borders, and creates a new frontier for cyber-attackers. How do security teams defend their organizations against emerging threats within the cloud and beyond?
  • AI & Machine Learning in CyberSecurity. What Is the Difference? AI & Machine Learning in CyberSecurity. What Is the Difference? Sven Krasser, Igor Baikalov, Stephan Jou, Engin Akyol, and Sean Martin Feb 22 2017 4:00 pm UTC 60 mins
    Artificial Intelligence and Machine Learning are becoming more pervasive in the cybersecurity space, but it is not the panacea everyone thinks it is. Lacking real case studies, many vendors must resort to simulated data and made-up scenarios to demonstrate their product capabilities. Moderator Sean Martin, Editor in Chief of ITSP Magazine, will ask the expert panelist to share their insights as to how AI and/or ML can be used to help address a variety of cybersecurity risks.

    Leading into this actionable advice, the panel will provide additional insights, including:
    • The difference is between AI and ML
    • How AI and ML can be used for good … and evil
    • What the future of AI and ML looks like

    Moderator:
    Sean Martin, Editor in Chief of ITSP Magazine

    Panelists:
    • Sven Krasser, Chief Scientist at CrowdStrike
    • Igor Baikalov, Chief Scientist at Securonix
    • Stephan Jou, CTO of Interset
    • Engin Akyol, Co-Founder & CTO of Distil Networks
  • Reducing Open Source Risk and Remediation Costs Early in the SDLC Reducing Open Source Risk and Remediation Costs Early in the SDLC Pat Durante, Senior Director Education Services; John Beaudoin, Senior Instructional Designer Feb 22 2017 4:00 pm UTC 90 mins
    Increasingly, organizations worldwide are implementing open source security and license risk assessment capabilities early in the software development lifecycle when the cost to remediate issues is lowest. This webinar will demonstrate Black Duck Hub’s effectiveness in providing comprehensive risk assessments when used in combination with our Eclipse IDE plugin, Build Tool, and CI Tool integrations. Additionally, we'll review valuable new features in Black Duck Hub 3.5.
    You’ll also learn:
    - How to improve the accuracy of your open source inventory by leverage open source dependency discovery techniques for build tools and package managers
    - Options for incorporating Hub scanning into your Continuous Integration environments
    - How to track remediation tasks using the Hub-Jira integration
    - How to streamline your component review process
    - Use cases for scanning binary repositories such as Artifactory
  • IIoT Endpoint Security – The Model in Practice IIoT Endpoint Security – The Model in Practice Marcellus Buchheit, Co-founder, Wibu-Systems AG; Terrence Barr. Head of Solutions Engineering, Electric Imp Inc. Feb 22 2017 4:00 pm UTC 60 mins
    What is your first line of defense against cyberattacks? Secure endpoints! Endpoints are everywhere in the IIoT landscape. Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.

    On February 22, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will discuss the endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document and present a real-world customer use case for an approach taken to secure an industrial system.
  • 2017 Predictions on Data Security Trends for the Banking Industry 2017 Predictions on Data Security Trends for the Banking Industry Lynne Courts VP of Global Marketing, Seclore Feb 22 2017 5:00 pm UTC 60 mins
    2016 was a wild ride, with cybersecurity and warfare dominating the headlines. The new EU General Data Protection Act (GDPR) impacts many financial services organizations globally and may be an indication of what’s ahead for North America.

    On top of that, we have the growing use of innovative, and often unsanctioned, collaboration technologies such as Enterprise File Sharing Services, further accelerating the flow of information outside of the organization’s perimeter.

    It is safe to say that ensuring the security of information is an even higher concern than ever before and that the current Information Security infrastructure isn’t making the grade.

    Join us for this webcast in the field of data-centric security will discuss the top seven security trends that will impact banks and financial institutions in 2017.

    Join this presentation to learn the top security trends that will impact banks and financial institutions in 2017, including:

    · Impacts of anticipated cybersecurity legislation and new global regulations on protecting data.

    · What’s missing the Information Security arsenal?

    · How to embrace collaboration and other technology innovations with less risk.

    · Is the shift to data-centric security the answer?