Hi [[ session.user.profile.firstName ]]

IT Security

  • CISSP Exam Clinic #2: How to pass the 1st Time---Hands-On Labs
    CISSP Exam Clinic #2: How to pass the 1st Time---Hands-On Labs
    Alan Belshaw, M.S., MBA, Senior Cybersecurity Solutions Architect| Booz Allen and Hamilton Recorded: Feb 21 2020 29 mins
    In Clinic #2 you will learn how to integrate labs into your CISSP study plan.

    If you want to pass your CISSP Exam the first time, you’ll want to get access to the six live online CISSP Exam Prep Clinics. You will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    Qualify to get access to all six Web Clinics and a full, or partial scholarship.
    https://missioncriticalinstitute.org/cybersecurity-career-readiness-assessment/

    SPONSORED BY: Mission Critical Institute
  • Prevent Phishing Attacks with Proofpoint's Security Awareness Training
    Prevent Phishing Attacks with Proofpoint's Security Awareness Training
    Andrew Brown, Account Executive at Proofpoint Recorded: Feb 21 2020 24 mins
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats

    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense

    - Enable your employees to report suspicious messages with a single mouse click
  • Perilous Peripherals - The Hidden Dangers Inside Windows and Linux Computers
    Perilous Peripherals - The Hidden Dangers Inside Windows and Linux Computers
    Jesse Michael, Principal Researcher, Eclypsium and Rick Altherr, Principal Engineer, Eclypsium Recorded: Feb 21 2020 61 mins
    Eclypsium researchers Jesse Michael and Rick Altherr will describe new research showing how unsigned firmware in WiFi adapters, USB hubs, trackpads, laptop cameras and network interface cards provides pathways for malicious attackers to compromise laptops and servers.
  • Build and scale applications with confidence using Red Hat OpenShift on Azure
    Build and scale applications with confidence using Red Hat OpenShift on Azure
    Shawn Purtell Principal Technical Marketing Manager, Red Hat and Ahmed Sabbour Product Marketing Manager, Microsoft Recorded: Feb 21 2020 38 mins
    Red Hat® OpenShift® Container Platform, based on Kubernetes, helps organizations develop, deploy, and manage container-based applications seamlessly across physical, virtual, and public cloud infrastructures. Combined with the power of the Microsoft Cloud via Azure, organizations can quickly move existing applications to the cloud, get new products to market, and deliver innovation to customers.

    Marketing managers from Microsoft and Red Hat will discuss both OpenShift Container Platform on Azure as well as Azure Red Hat OpenShift, a fully managed OpenShift service on Azure. Jointly engineered, operated, and supported service by Microsoft and Red Hat, Microsoft Azure Red Hat OpenShift enables you to quickly build and run your apps on a trusted enterprise Kubernetes platform. Empower developers to innovate with a consistent experience, built-in continuous integration/continuous delivery (CI/CD) pipelines, and a wide range of supported technologies and streamlined workflows.

    In this webinar we will cover how to:

    - Create fully managed Red Hat OpenShift clusters in minutes with self-service deployment.

    - Easily add or remove nodes to match resource demand.

    - Use Azure Active Directory integration allows control access to your cluster through an integrated sign-on experience.
  • SSL-Entschlüsselung: Stärkere Sicherheit, bessere Sichtbarkeit
    SSL-Entschlüsselung: Stärkere Sicherheit, bessere Sichtbarkeit
    Jens Egger Recorded: Feb 21 2020 55 mins
    In den letzten Jahren ist der Umfang des verschlüsselten Datenverkehrs deutlich gestiegen. Leider bietet dies neben den offensichtlichen Vorteilen der Verschlüsselung auch die Möglichkeit, böswillige Aktivitäten zu verbergen, was die Notwendigkeit einer effektiven Entschlüsselung noch dringender macht.

    Zusammen mit unserem Experten Jens Egger werfen wir einen genaueren Blick auf folgende Themen:

    - Innovationen in PAN-OS® 9.0 zur Optimierung der SSL-Entschlüsselung
    - Best-Practices und eine vollständige Übersicht über Protokolle wie HTTP/2
    - Die richtige Strategie zur Implementierung der SSL-Entschlüsselung
  • SANS TALK: How to Use OSINT for Cyber Threat Intelligence Investigations
    SANS TALK: How to Use OSINT for Cyber Threat Intelligence Investigations
    SANS expert Jake Williams and Authentic8’s Head of Special Services, Nick Espinoza Recorded: Feb 20 2020 7 mins
    Renowned SANS expert Jake Williams and Authentic8's Head of Special Services, Nick Espinoza, discuss today's use of OSINT for Cyber Threat Intelligence (CTI). The talk addresses:

    - If Counter Intelligence (CI) depends on an organization's maturity level
    - If an organization can be too small to have a CTI program
    - Why a framework for CI is so challenging to build
    - How managed attribution is like CI on steroids
    - If it's more important to prioritize spending on CTI tools or processes

    You'll also receive instructions on how to participate in the CTI 2020 Survey. Watch the talk and join in the discussion on the magnitude of OSINT in CTI.
  • Crime and Email: Real-Life Stories from the Trenches w/ the U.S. Secret Service
    Crime and Email: Real-Life Stories from the Trenches w/ the U.S. Secret Service
    Stephen Doughtery, U.S. Secret Service, Ryan Terry, Proofpoint, Christopher Pierson, BlackCloak Recorded: Feb 20 2020 124 mins
    Email—you either love it or hate it. Cybercriminals love it. We all know that email is the attack vector of choice for hackers. Why? Bottom line, it works. And they really capitalize on it. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC/CEO fraud attacks, W-2 scams, ransomware… the list goes on and on.

    Email fraud is an expensive cybercrime for its victims. All it takes is one mistake, one erroneous mouse click of an email to let an attacker in. That is how it starts. Then attackers move around your email or network and learn more about your employees and company than you do. Eventually they strike—when the time is right. Do they get away with the cash? Or did you arm your employees with the tools and training they need to recognize email fraud and ransomware and stop a possible BEC attack?

    On this web conference, our three experts will share real-world examples of these heinous crimes: what went down, how they got caught, what they got away with, and lessons learned.

    Tune in and get an understanding of how these attacks work and what you can do to make it more difficult for hackers to fool your end-users.
  • Joint Security Solutions that Protect your Business with F5 Networks,Cisco & SHI
    Joint Security Solutions that Protect your Business with F5 Networks,Cisco & SHI
    Bill Lijewski, SHI | Kevin Gallaugher,F5 Networks | Doug Hurd,Cisco Security | Pradeep Pokhariyal, Cisco Security Recorded: Feb 20 2020 38 mins
    Encryption is everywhere today—and while it’s great for privacy and data security, encryption also lets attackers embed malware and other malicious threats in encrypted traffic, creating security blind spots for organizations.

    Cisco Firepower Threat Defense (FTD) and Web Security Appliance (WSA) are built to block threats, and quickly mitigate any that breach your defenses. But if you deploy Cisco FTD and WSA along with F5 SSL Orchestrator, not only do you optimize their threat mitigation and performance capabilities, you also optimize their ability to stop encrypted threats.

    Together, F5 SSL Orchestrator and Cisco’s FTD and WSA deliver top-of-the-line actionability, availability, and superior orchestration. They increase your security posture and threat mitigation, future-proof your existing investments in security solutions, meet or surpass regulatory compliance requirements, and ensure a superior user experience.

    Join this webinar to learn more about our joint Cisco & F5 Security Solutions.

    We’ll discuss:

    •Common pain points of dealing with encrypted traffic, manual versus automated management scenarios, defocusing core function of existing security solutions, and meeting regulatory compliance pain points

    •The benefits and alignment of a joint Cisco Firepower Threat Defense or Web Security Appliance and F5 SSL Orchestrator solution

    •New ways to manage and solve encrypted traffic blind spots and encrypted threat mitigation

    Register Now
  • Securing the Modern Enterprise: Software Total Risk Management (SToRM) Framework
    Securing the Modern Enterprise: Software Total Risk Management (SToRM) Framework
    Ed Adams, President and CEO, Security Innovation Recorded: Feb 20 2020 55 mins
    The proliferation and complexity of software-enabled systems have amplified risk for many organizations. Conventional approaches to software security don’t work, typically encompassing no more running vulnerability scanning. Executives need a better way to understand which products, systems, and teams are putting their enterprise at most risk – and deploy appropriate action plans.

    SToRM represents a new approach for enterprises to more effectively assess and protect software-dependent IT systems. Change your approach – evolve from a vulnerability focused approached to risk-based one. Learn pragmatic steps to ensure you’re mitigating the most risk with limited resources, time, and budget.

    Topics include:

    • Why traditional approaches aren’t working
    • How to identify risks at the business workflow and IT system levels
    • Techniques to calibrate assessment and mitigation efforts
  • NextGen Compliance Series Part 2: How to Scale Compliance for Global Business
    NextGen Compliance Series Part 2: How to Scale Compliance for Global Business
    Francie Rawlings, Global Leader of Digital Innovation and Social Engagement, & Cory Hartlen, Director, Client Engagement Recorded: Feb 20 2020 31 mins
    Pharmaceutical companies have taken a page from leading customer experience models by engaging directly through social and digital channels, such as Facebook, Twitter and WhatsApp, to better serve their customers and patients by meeting users where they spend their time. But digital transformation is not just about technology, it’s about shaping entirely new business processes to support innovation and engagement.


    Digital transformation is a team sport, and challenges organizations to develop stronger, more dynamic cross functional teams to enable this level of customer and patient experience. In this webinar, you’ll hear ideas on how collaboration drives innovation with new thinking, how to avoid the pitfalls that hold organizations behind the social networking curve, and how to secure these business processes.


    Join Francie Rawlings, a global leader of digital innovation and social engagement who has worked in and around the top pharma companies for 20 years, to learn about perspectives and ideas on how to make digital transformation a team sport. Hear from a leader on the front lines of supporting this transformation, and gain insights into how a change in mindset creates change in your culture and ultimately change that your customer can appreciate
  • How to Future-Proof Long-Lived IoT Devices with Quantum-Safe Signatures
    How to Future-Proof Long-Lived IoT Devices with Quantum-Safe Signatures
    John Ray, Thales and Alexander Truskovsky, Isara Recorded: Feb 20 2020 49 mins
    The number of IoT devices increases every day, including durable “things” that hadn’t been connected in the past such as cars, smart meters and implanted medical devices. These devices represent a unique security challenge as they must remain in use and secure for several years to come. However, with the onset of large-scale quantum computing – which will render modern security measures obsolete – IoT device manufacturers need to begin looking at different options to secure their devices or they risk being overtaken by spoofed software updates in the future.

    In this talk, Thales and ISARA will explore securing connected cars using the next-generation of digital signatures: Stateful hash-based signatures.

    Join us as we cover the following topics:
    •A brief overview of quantum computing and its effect on current public key cryptography – no PhD required!
    •Understanding the unique challenge quantum presents to durable IoT devices
    •Exploring new, quantum-safe options for signatures and roots of trust such as stateful hash-based signatures
    •Learn how quantum-safe options are different, what makes them challenging to work with and what steps needs to be taken to use them today
    •Discover Thales’ Luna HSM Post-Quantum Functionality Module (FM) - the first commercially available HSM to offer stateful hash-based signatures ready for implementation and how you can get started today
    •Learn how crypto agility can help you quickly react to cryptographic threats by implementing alternative methods of encryption
  • Get smart and proactive stability, security and compliance management
    Get smart and proactive stability, security and compliance management
    Jimmy Alvarez, Principal Technical Marketing Manager, Red Hat & John Spinks, Senior Principal Technical Marketing Manager, Re Recorded: Feb 20 2020 52 mins
    Skilled IT resources are stretched thin, so intelligent tools are needed to pinpoint and resolve specific issues. Red Hat® Insights, a proactive management solution that can help you identify and remediate threats in your Red Hat environment, is now included with all active Red Hat Enterprise Linux® subscriptions. Red Hat Smart Management combines the flexible and powerful infrastructure management capabilities with the simplicity of cloud management services for Red Hat Enterprise Linux.

    Join this webinar to discover how to:

    • Use Red Hat Insights to pinpoint risks before they become urgent issues.
    •  Use provided remediation guidance with Red Hat Satellite or Red Hat Ansible® Automation Platform to resolve issues faster.
    • Use Red Hat Smart Management to pinpoint compliance, identify vulnerability issues, and detect drift from standard operating environment configurations.

    We will highlight the solutions, demo them so you can see them first-hand, and show you how to get started on your own. Analytics and automation are critical to smooth operations and fast transformation. Discover how Red Hat Smart Management tools can help.
  • 5 Steps to Develop a Cloud Right Strategy
    5 Steps to Develop a Cloud Right Strategy
    Mark Vaughn, Engineering Director on Integrated Solutions with Presidio and Chris Laffey, Field CTO with Dell Recorded: Feb 20 2020 47 mins
    While putting your data in a public cloud offers a level of simplicity, the private cloud can offer better control of your data. How do you develop a cloud strategy that will align workload and data placement with business value?

    With a Cloud Right approach, the focus is on creating a flexible cloud strategy that will allow your workloads to move and flex along with the needs of your users and your organization.

    Join Presidio and Dell Technologies for a live Q&A to discuss considerations in determining the ideal cloud strategy for your environment.
  • 2020 Trends in Cybersecurity
    2020 Trends in Cybersecurity
    Kunal Anand, CTO, Imperva & David Gee, CMO, Imperva Recorded: Feb 20 2020 40 mins
    Join us for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.
  • Managing Non-people Identities in AWS and Azure
    Managing Non-people Identities in AWS and Azure
    Sandy Bird, CTO and Co-founder, Sonrai Security & Dan Woods, Principal Analyst, Early Adopter Research Recorded: Feb 20 2020 59 mins
    Cloud-native application development and DevOps has led to an explosion of what are called non-people identities. Non-people identities (servers, VMs, serverless, applications, etc.) can be created manually and automatically, and like identities used for people, they can be the targets for security attacks. The methods and strategies for creating a workable and effective governance program for these identities are just beginning to be understood. In this webinar,, Dan Woods, Principal Analyst at Early Adopter Research, and Sandy Bird, CTO of Sonrai Security, will look at the common mistakes made when managing non-people identities in AWS and Azure that lead to security vulnerabilities and the governance and management techniques needed to keep such identities safe. Topics covered:

    * Forces driving the explosion of non-people identities
    * Specific problems that occur in AWS and Azure
    * Security threats that often occur from mismanaged non-people identities
    * Governance and management to solve common problems in AWS, Azure, and across all clouds
  • YubiEnterprise Services: Hardware Authenticators as a Service
    YubiEnterprise Services: Hardware Authenticators as a Service
    Suresh Thiru - Vice President, Product Management; Percy Wadia - Sr. Director, Product Management Recorded: Feb 20 2020 46 mins
    Flexible purchasing, seamless upgrades and automated provisioning -

    Organizations are looking for better and more efficient ways to improve security while making it easier for users to adopt best practices and enhance productivity. Hardware based security keys provide the best security, however purchasing and provisioning them to users on a global scale can be challenging for some organizations.

    With YubiEnterprise Services, organizations can now eliminate the logistical, budgetary, or planning challenges associated with achieving company-wide security with strong authentication. Moving from CAPEX to OPEX makes predictable spending possible, introduces more flexibility, and paves the way to easily replace keys or even upgrade to the latest keys. And, with the option of Yubico handling all logistics end-to-end for keys distribution, getting users up and running on industry-leading authentication has never been easier.

    Attend this webinar to:
    - Learn how how hardware authenticators sold as a service create convenience, predictability, and expanded security
    - Discover how shifting hardware key purchases from CapEx to OpEx makes smart business sense and provides increased flexibility
    - Explore how YuboEnterprise services can remove the burden of managing and distributing YubiKeys to all your users
  • 30 minute update: Teradici Cloud Access Software
    30 minute update: Teradici Cloud Access Software
    Mirela Cunjalo Director, PM - Teradici Recorded: Feb 20 2020 30 mins
    Teradici Cloud Access Software provides high-performance remote visualization capabilities in VMs to deliver a great user experience for the most graphics-intensive applications and workloads. Built on industry-leading PCoIP® technology, it can securely deliver a rich user experience across all network conditions on a variety of desktop and mobile endpoint devices, including ultra-secure PCoIP Zero Clients. Teradici PCoIP® technology compresses and encrypts the entire computing experience securely in the cloud and transmits only pixels to the endpoints – ensuring intellectual property and sensitive data never leave the data center or cloud.
    Join us to learn about the latest updates on Cloud Access Software, including support for Wacom devices, and Cloud Access Manager. Register today!
  • 2020 Cost of Insider Threats Global Report
    2020 Cost of Insider Threats Global Report
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute & Josh Epstein, CMO from ObserveIT Recorded: Feb 20 2020 47 mins
    Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends

    How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type.

    Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover:

    ● What kinds of Insider Threats cost organizations the most
    ● How investigations are driving up the cost-per-incident for companies
    ● Which organizations, industries, and regions are being targeted the most
    ● How companies can potentially save millions by using a dedicated Insider Threat management approach

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Gain visibility and control of sensitive data in Box
    Gain visibility and control of sensitive data in Box
    Salah Nassar, Vice President of Marketing at CipherCloud and Neeraj Nayak, Sr. Manager, Product Marketing at CipherCloud Recorded: Feb 20 2020 60 mins
    Cloud collaboration are top drivers in an organization's cloud-first strategy. Office 365, Slack, Box, Dropbox, etc., have emerged as the most popular SaaS applications for internal communication and collaboration in workplaces. In our current environment of increased regulations such as CCPA and GDPR, getting visibility of data being stored, created, and shared in the cloud, open link shares, and external access. Maintaining protection of sensitive data and user control in these apps can be a nightmare, as the users can share sensitive documents through a common platform.

    Join us at 9am PST on February 20, 2020 for a live webinar discussion on how CipherCloud CASB+ Platform enables adaptive security controls and continuous governance on multiple collaboration apps through a common platform, ensuring end-to-end data protection and compliance. The webinar will focus on:
    - 360-degree visibility into user activity - files upload/download, instant messaging
    - CASB+ Information Protection, for detecting and protecting sensitive information or file shares containing PHI, PCI or PII information
    - Applying digital rights management for data protection during downloads and offline shares
    - Enabling consistent policies for emails, files and messages, meeting global compliance and data residency requirements
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Feb 20 2020 31 mins
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • The Near-Realities of AI-Powered Cyber-Attacks
    The Near-Realities of AI-Powered Cyber-Attacks
    Andrew Tsonchev, Darktrace's Director of Technology Recorded: Feb 20 2020 33 mins
    Adversarial AI will hit organizations across the globe in 2020 and will make every step of the attack chain faster, more sophisticated, and more targeted; posing serious risk to our public and private safety.

    Join Andrew Tsonchev, Darktrace’s Director of Technology, as he uncovers how weaponized AI will bring about a paradigm shift for the entire cyber-threat landscape. As algorithms battle algorithms, organizations must turn to defensive AI to fight back.

    In this webinar, discover:
    -How offensive AI will transform the attack kill chain
    -How phishing emails written entirely by AI can trick their victims
    -The far-reaching ramifications of supercharged cyber-attacks
  • Seamless Visibility for Service Assurance
    Seamless Visibility for Service Assurance
    Mike Fratto, Senior Analyst 451 Research, Nadeem Zahid, VP Product Management Recorded: Feb 20 2020 52 mins
    Digital transformation relies on creating a distributed IT environment that is optimized for business agility. The features and capabilities IT can deliver to the business quickly and reliably is far more critical than where the application, service components, or services reside. The net result is improved operational IT efficiency, selecting an operating environment that best suits the applications requirements, allowing developers to use the tools and services they know best, integrating applications with minimal disruption, ensuring business continuity, and maintaining good user-experience.

    Service assurance can’t be an afterthought. Ensuring applications are delivered as promised and are maintained at high service levels means monitoring that is architecturally aligned with the application environment so that it is continuous and reliable.

    In this high-touch webinar, Mike Fratto, Senior Analyst at 451 Research and Nadeem Zahid, VP of Product Management at cPacket Networks, will share their perspectives on:

    - How distributed services and applications is giving rise to digital transformation
    - The challenges of scale-in and scale-out of those services/micro-services
    - The benefits of a unified application-aware traffic view for distributed services for proper service assurance
  • Predictions 2020: IoT, Cloud and AI Tilt the Digital Industry Playing Field
    Predictions 2020: IoT, Cloud and AI Tilt the Digital Industry Playing Field
    Leif Eriksen, Insights Partner, Momenta Partners Recorded: Feb 20 2020 60 mins
    Digital Industry is fundamentally altering the dynamics of the industrial and infrastructure sectors. The rapid development of digital innovations – most notably the Internet of Things (IoT), cloud, and artificial intelligence (AI) – is radically redefining what is operationally possible while creating a great deal of organizational uncertainty and stress. Becoming defensive in the face of digital disruption will only delay the reckoning. The best strategy is to get ahead of the curve by creating a Digital Industry strategy that reflects the changes coming to your industry.

    Join leading Digital Industry practitioners as they help you understand the latest digital innovations and what they mean for organizations in the energy, manufacturing, transportation, and infrastructure arenas.

    Insights Partner Leif Eriksen will be moderating a roundtable discussion with other thought leaders including David Lafferty, President at Scientific Technical Services and Doug Harp, PE, Managing Partner at Momenta Partners.

    2020 will be a pivotal year for Digital Industry and understanding what it means for you, your organization, and your industry is critical to success.

    Are you ready?
  • Thinking Outside the Box - Network Security Re-imagined
    Thinking Outside the Box - Network Security Re-imagined
    Rob Krug - Senior Security Architect for Avast Business Recorded: Feb 20 2020 49 mins
    Join us at 11am EST on February 20 for an eye-opening discussion with Avast Business Network Security Architect, Rob Krug, who will demonstrate how appliance-based security defenses and UTMs are putting businesses at risk.

    The perimeter has evolved, the company network has left the building, data is in the cloud, and cyber threats are only getting nastier. The new Avast Business cloud-based, next-gen firewall is designed to inspect and vet every byte of internet traffic, providing comprehensive protection from today’s biggest web and internet threats.

    During this session, you will be able to:

    • See the advanced threats that are being encountered by your users and devices.
    • Identify the shortcomings of legacy-based security models and architecture.
    • Take a crash course on the Avast solution to provide a layered security solution to the entire network, no matter where your network is.
  • Designing an Effective SOC - Part II How to Build an Efficient & Effective SOC
    Designing an Effective SOC - Part II How to Build an Efficient & Effective SOC
    Chris Calvert Recorded: Feb 20 2020 42 mins
    Today’s SOC models provide two options: build a labor-intensive in-house SOC or outsource to an MSSP. In Part-1 of this two-part series Larry Ponemon shared how dissatisfied security professionals are with the inefficiencies found in both models. Now in Part II, Chris provides a practical guide for designing a new modern SOC model that combines humans and machines to deliver more efficiency and ROI.

    In this talk we’ll discuss:
    *Blueprint for designing a modern SOC
    *Using software to increase efficiencies and improve morale
    *Covering more event data without breaking the bank
    *Validating ROI to senior executives and the board
  • AML and KYC: Best practices for the new era of compliance and security
    AML and KYC: Best practices for the new era of compliance and security
    Alex Ford (Encompass), Denisse Rudich (FireDrake Consulting) Feb 24 2020 9:00 am UTC 60 mins
    -How to better handle performing client due diligence on an ongoing basis?
    -What are the challenges of the traditional AML/KYC procedures?
    -What can we expect from the AML Directive that comes into force in June of this year?
    -What are the common mistakes FIs make when managing their data?
    -How can Machine Learning and automation help?
  • Financial Crime Fighters: A Closer Look at Risks & Best Practices
    Financial Crime Fighters: A Closer Look at Risks & Best Practices
    Salma Sobhy, Compliance Officer, Emirates NBD Feb 24 2020 1:00 pm UTC 44 mins
    What are the current risks banks are facing regarding financial crimes, and what are the controls that need to be put in place to mitigate those risks? This webinar will take a closer look into best practices that financial institutions can implement to lessen the risk of fraud and protect their customers. You'll discover:

    - The security risks and threats that banks and financial institutions are facing in today's technology landscape
    - Best practices around KYC (Know Your Customer), CDD (Customer Due Diligence), (Enhanced Due Diligence) EDD and Transactions Monitoring that will strengthen data security and reduce potential for fraud
    - And more!
  • Build a solid landscape for SAP HANA and S/4HANA on AWS
    Build a solid landscape for SAP HANA and S/4HANA on AWS
    Sherry Yu, Principal Partner Success Architect, Red Hat and Sabareesan Radhakrishnan, Principal Solutions Architect, AWS Feb 24 2020 2:00 pm UTC 59 mins
    SAP HANAⓇ and S/4HANA play an important role in many companies’ global operations to support mission-critical business functions. The need for maximized system availability has become more and more crucial. Join Red Hat and AWS to review the latest, high availability (HA) solutions for SAP HANA database and applications such as S/4HANA, and how to build a strong SAP platform in a hybrid environment. This session will review the latest HA solutions based on SAP HANA System Replication in Scale-Up and HANAScale-Out, as well as HA solutions based on Enqueue Replication, including the new ENSA2 methodology. It will also review the status of SAP HA-Interface certification. The HA solutions covered in this session are ready for deployment in a hybrid environment.

    After completing this webinar, you should become more familiar with HA solutions for SAP HANA and S/4HANA and feel confident to choose Red Hat and AWS as your preferred solution provider.
  • 2020 Election – Hacking The Vote
    2020 Election – Hacking The Vote
    David Morris | Cameron Koffman | Tinatin Japaridze | Lance James Feb 24 2020 5:00 pm UTC 60 mins
    The inaugural episode of the Election Hacking series will introduce the topic of who, how and why the upcoming 2020 election will be hacked.

    Join this interactive Q&A session to learn more about election hacking, its impact, the various stakeholders, and what if anything, can be done.

    Our unique panel of individuals will bring diverse perspectives to this topic.

    - Cameron Koffman, who, if elected, would be the youngest candidate since Theodore Roosevelt running for the NY State Assembly
    - Tinatin Japaridze, former United Nations correspondent for the Russian and Ukrainian media, with expertise in bi-lateral US-Russian relations on cyber security.
    - Lance James, CEO of Unit 221B and noted cyber security expert who has assisted various law enforcement and government agencies on some of the most highly publicized hacking investigations.

    Moderator: David Morris, Executive Director at Digital Risk Management Institute
  • A Practical Data Privacy and Security Approach to FFIEC, GDPR and CCPA
    A Practical Data Privacy and Security Approach to FFIEC, GDPR and CCPA
    Ulf Mattsson, Head of Innovation, TokenEx Feb 24 2020 6:00 pm UTC 61 mins
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.

    This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.

    Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.
  • Cryptocurrency Typologies for Traditional Finance
    Cryptocurrency Typologies for Traditional Finance
    Nina Heyden, Economist, Chainalysis Feb 24 2020 7:00 pm UTC 60 mins
    As cryptocurrency adoption increases, financial institutions need to assess the opportunities and risks of this new asset class presents. The first step? Understanding who’s who on the blockchain.

    Join us for our this talk and you’ll get:

    - A rundown of the key typologies transacting with cryptocurrency today, including mining pools, exchanges, crypto ATMs, darknet markets, and more.

    - Original data and research into how these entities interact with one another.

    - Case studies and examples for each typology, with an emphasis on risk and compliance
  • Bring speed and security to the Intranet with Cloudflare for Teams
    Bring speed and security to the Intranet with Cloudflare for Teams
    Naveen Singh, Solutions Engineer @ Cloudflare & Sophie Qiu, Customer Success Manager @ Cloudflare Feb 25 2020 5:00 am UTC 60 mins
    Cloudflare was started to solve one half of every IT organization's challenge: how do you ensure the resources and infrastructure that you expose to the Internet are safe from attack, fast, and reliable? To deliver that, we built one of the world's largest networks. Today our network spans more than 200 cities worldwide and is within milliseconds of nearly everyone connected to the Intranet.

    Cloudflare for Teams is a new platform designed to solve the other half of every IT organization's challenge: ensuring the people and teams within an organization can safely access the tools they need to do their job. Now you can extend Cloudflare’s speed, reliability and protection to everything your team does on the Intranet.

    In this webinar, you’ll learn:
    - Common challenges of scaling security for your growing business
    - How to extend Zero Trust security principles to your internally managed applications
    - How to make Intranet access faster and safer for your employees
  • Hybrid + Multi Cloud strategies - Accelerate Innovation [English]
    Hybrid + Multi Cloud strategies - Accelerate Innovation [English]
    Morten Rohlfes, Director EMEA: Openshift, Cloudinfra, JBOSS, Middleware, Storage at Red Hat Feb 25 2020 9:00 am UTC 44 mins
    Hybrid + Multi Cloud strategies - Accelerate Innovation and Enterprise Transformation 5

    Agenda:
    •IT Cloud Trends - Perceived Maturity and Reality
    •Open Source - Enabling the road to cloud native
    •Why and how Hybrid or Multi Cloud makes sense
    •Hybrid Cloud Examples: BMW and Deutsche Bank
  • Webinaire: Automatisation des politiques de sécurité pour votre structure SDN av
    Webinaire: Automatisation des politiques de sécurité pour votre structure SDN av
    Anthony Le Pipe | WEMEA Sales Engineering Feb 25 2020 9:00 am UTC 60 mins
    Renforcez vos équipes grâce à l’automatisation du firewall développé par Tufin. Donnez-leur la possibilité d’apporter des changements rapides et simples, de manière efficace tout en restant conformes.

    Participez à ce webinaire le 25 février pour découvrir comment les améliorations apportées à Tufin Orchestration Suite R19-3 GA peuvent vous aider :

    •Automatisez les modifications des règles du firewall grâce à un processus entièrement vérifiable à l’aide de SecureChange.
    •Simplifiez l’adoption de VMware NSX-T.
    •Obtenez une meilleure visibilité et une meilleure analyse du chemin d’accès pour Cisco ACI.

    Inscrivez-vous dès aujourd’hui pour connaître tous les avantages que présente le déploiement de Tufin Orchestration Suite R19-3.

    Si vous ne pouvez pas participer au webinaire en direct, inscrivez-vous ici et nous vous enverrons l’enregistrement.
  • Airheads Tech Talks: Aruba Central 2.5.0 - New features and enhancements
    Airheads Tech Talks: Aruba Central 2.5.0 - New features and enhancements
    Dinesh Kumar: Senior Network Engineer - Aruba ERT Feb 25 2020 10:00 am UTC 60 mins
    This webinar will cover interface changes, workflow for quick deployment and reporting enhancements. Dinesh will also talk through configuration and troubleshooting.
  • State of the Phish 2020
    State of the Phish 2020
    Paul Down, Director, Proofpoint EMEA Feb 25 2020 10:00 am UTC 60 mins
    Do you have a good sense of how well your users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting social engineering attacks?

    Our sixth annual State of the Phish report delivers critical, actionable insights into the current state of the phishing threat, including:

    - End-user awareness and knowledge gaps that could be hurting your cybersecurity defences
    - Impacts of phishing attacks and the ways infosec pros are trying to combat these threats
    - How Proofpoint customers are approaching phishing awareness training, and the ways we’re helping them measure success
    - Download our report to learn how organizations can take a more inward, people-centric view of their vulnerabilities and empower users to become a stronger line of defence.

    Join us for an in-depth look at user awareness, vulnerability and resilience.

    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber-attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint to mitigate their most critical security and compliance risks across email, the cloud, social media, and the web. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Swedish Public Employment Service - Digital Transformation Journey [English]
    Swedish Public Employment Service - Digital Transformation Journey [English]
    Robert Börjesson, Business Development Manager, IT Service Manager at Arbetsförmedlingen (Swedish Public Employment Service) Feb 25 2020 10:00 am UTC 39 mins
    Hear about the Swedish Public Employment Service Digital Transformation Journey with Red Hat - live from Open Hybrid Cloud Connection
  • Identify Critical Vulnerabilities and Easily Deploy Patches
    Identify Critical Vulnerabilities and Easily Deploy Patches
    Paul Fenwick, Sales Engineer - Avast Business Feb 25 2020 10:00 am UTC 45 mins
    Join us to learn how you can reduce costs and keep systems secure and patched for your SMB customers.

    Patch management plays a critical role in endpoint security, but many businesses are reluctant to patch because there are too many patches, patching often interrupts operations, and they can cause problems with other systems. Avast Business Patch Management takes the guesswork out of patching by identifying critical vulnerabilities and making it easy to deploy patches across all endpoints from one central dashboard.

    By attending this webinar you will learn about the following:
    - Save time with fully automated patches and policies that can be deployed across all your existing customers within minutes
    - Prevent security breaches with 3rd party and Windows system patching
    - Reduce costs with simple deployment and scheduling
    - Take the guesswork out of patching with one comprehensive overview of missing patches across all devices
  • Designing a Vault to protect your backup data from a possible ransomware breach
    Designing a Vault to protect your backup data from a possible ransomware breach
    Philipp Hobler - EMEA Chief Architect; Data Protection Division in Europe Feb 25 2020 10:00 am UTC 45 mins
    In case of a successful ransomware attack your backup data becomes your last line of defense.
    Hear from Philipp Hobler - EMEA Chief Architect with the Data Protection Division in Europe how to design a vault within your data center to protect a copy of your critical backup data.

    Join our webcast and learn how Dell EMC Cyber Recovery Solution gives you the extra certainty your organization can recover quickly, without compromise.
  • Webinar: Automatisierung von Sicherheitsrichtlinien für Ihre SDN-Fabric mit Tufi
    Webinar: Automatisierung von Sicherheitsrichtlinien für Ihre SDN-Fabric mit Tufi
    Joachim Nossek | Sales Engineering, CEMEA Feb 25 2020 10:30 am UTC 60 mins
    Stärken Sie Ihre Teams mit der Firewall-Automatisierung von Tufin. Machen Sie es ihnen leichter und schneller möglich, Änderungen effektiv durchzuführen und die Einhaltung von Vorschriften zu gewährleisten.

    Nehmen Sie an diesem Webinar am 25. Februar teil, um zu erfahren, wie die Erweiterungen der Tufin Orchestration Suite R19-3 GA Ihnen helfen können:

    Automatisieren Sie Änderungen von Firewall-Regeln durch einen vollständig prüfbaren Prozess mit SecureChange
    Vereinfachen Sie die Einführung von VMware NSX-T
    Überlegene Sichtbarkeit und Pfadanalyse für Cisco ACI

    Registrieren Sie sich noch heute, um alle Vorteile der Tufin Orchestration Suite R19-3 zu erfahren.

    Wenn Sie am Live-Webinar nicht teilnehmen können, melden Sie sich hier an, und wir senden Ihnen die Aufzeichnung.
  • Data at Work - Skills, Part 1
    Data at Work - Skills, Part 1
    Graeme McDermott, Caroline Carruthers and Mark Stubbs Feb 25 2020 11:00 am UTC 24 mins
    Data at Work - Skills, Part 1: Siloed Pockets of Data Expertise. Unearthing Them, Unpacking Them, and Unleashing Their Potential

    In part 1 of our Podcast focusing on Data Skills, our panel of experts ask the question: How the isolated packets of data and data know-how buried across the typical organization - the dreaded data siloes - can be formalized, structured, and transformed to drive wider data strategies and value. And why people, culture, ecosystem, and 'Data Cheerleaders' are crucial to the process. Once you have listened to this podcast, please listen to the extended discussion in part 2.

    Watch also the introduction webinar to learn more about the series: https://www.brighttalk.com/webcast/15913/382721
  • Enterprise Digital Transformation & Innovation with Containers [English]
    Enterprise Digital Transformation & Innovation with Containers [English]
    Graham Berry, EMEA Sales Lead, OpenShift at Red Hat Feb 25 2020 11:00 am UTC 47 mins
    Learn about digital transformation and innovation with containers - live from Open Hybrid Cloud Connection
  • Trends in eCommerce, Mobile and Cross-Border Payments
    Trends in eCommerce, Mobile and Cross-Border Payments
    Monique Morrow, Alberto Azevedo and Mehran Zarrebini Feb 25 2020 11:00 am UTC 48 mins
    Speakers will present trends in the E-Commerce, Mobile and Cross Border Payment Systems. The speakers will provide examples of these trends and present a view of where the market is going.

    At the end of the webinar, the attendees will have be able to assess opportunities in the payments innovation space.
  • Hybrid Cloud Storage - Enabling workload portability [English]
    Hybrid Cloud Storage - Enabling workload portability [English]
    Johan Robinson, Storage SSA EMEA at Red Hat Feb 25 2020 12:00 pm UTC 44 mins
    Listen to Johan Robinson discuss enabling workload portability through data services - live at Open Hybrid Cloud Connection
  • Release Budget and Ease Adoption of Hybrid Multi-Cloud [English]
    Release Budget and Ease Adoption of Hybrid Multi-Cloud [English]
    Karl Stevens, Business Development Manager - Cloud Infrastructure at Red Hat Feb 25 2020 1:00 pm UTC 48 mins
    Discover how you can release budget and ease adoption of Hybrid Cloud, with Red Hat's infrastructure migration solution - live at Open Hybrid Cloud Connection
  • Webinar: automazione dei criteri di sicurezza per il tessuto SDN con Tufin R19-3
    Webinar: automazione dei criteri di sicurezza per il tessuto SDN con Tufin R19-3
    Flavio Di Cosmo | Sales Engineering, SEMEA Feb 25 2020 1:00 pm UTC 60 mins
    Offri al tuo team l’automazione dei firewall proposta da Tufin. Permetti al tuo team di apportare modifiche efficacemente e rimanere in conformità in maniera più rapida e semplice.

    Partecipa a questo webinar il 25 febbraio per scoprire come i miglioramenti di Tufin Orchestration Suite R19-3 GA possono aiutarti a:

    •Automatizzare le regole di modifica dei firewall attraverso un processo interamente verificabile con SecureChange
    •Semplificare l’adozione di VMware NSX-T
    •Guadagnare visibilità superiore e analisi di percorso per Cisco ACI

    Registrati oggi per conoscere tutti i vantaggi dell’installazione di Tufin Orchestration Suite R19-3.

    Se non puoi partecipare al live webinar, iscriviti qui e ti invieremo la registrazione.
  • What Zero Trust Networking means for Network Visibility
    What Zero Trust Networking means for Network Visibility
    Ollie Sheridan, Principal Engineer, EMEA, Gigamon, Brandon Dunlap, Moderator, (ISC)² Feb 25 2020 1:00 pm UTC 60 mins
    There is much talk in the Industry with regards to Zero Trust Networking (ZTN) - but what does it involve and what does this mean for Network Visibility? In this Webinar we will explore the reason for ZTN, some of the current ideas surrounding the implementations of ZTN and where Network Visibility plays a key role in securing such environments. With one of the key concepts of ZTN being the encryption and authentication of data in motion, we will also discuss the need for Metadata and why this can be an advantage over traditional methods of monitoring.

    Join us for this webinar to learn more about how you can:

    - Understand the ZTN trust model at a high level

    - See which components are important within ZTN and why

    - Understand why the perimeter is changing and why the need for segmentation goes beyond physical devices

    - How Metadata can play a key role in understanding the activity of applications on your network