Hi [[ session.user.profile.firstName ]]

IT Security

  • IoT and Blockchain: Securing Business Processes
    IoT and Blockchain: Securing Business Processes
    Syed Zaeem Hosain – CTO, Aeris Communications Recorded: Sep 17 2019 54 mins
    It started with Bitcoin, in which transactions are verified by network nodes through cryptography and recorded in a public distributed ledger called a blockchain. New technologies like IoT are creating more opportunities for the application of blockchain. Sharing information on a trusted network with embedded business logic offers many benefits for companies, especially when combined with the IoT, but this innovation raises security issues since hackers usually look for holes within a company’s infrastructure.

    Blockchain technology minimizes cyber-attacks and protects data exchanges between IoT devices. Join us for a live webinar as we explore and consider the benefits of deploying an IoT-based blockchain solution.

    You will learn about:

    -Benefits and risks of IoT and Blockchain
    -Applications of Blockchain in IoT
    -Blockchain best practices
    -Future timelines and predictions
  • 7 Best Practices for Securing the Public Cloud
    7 Best Practices for Securing the Public Cloud
    Michelle Drolet and Byron Watson Recorded: Sep 17 2019 52 mins
    Workloads in the public cloud are the new pot of gold for savvy cybercriminals. Often misconfigured and under-secured, they’re an easy way for hackers to steal data and take advantage of your processing power. If you use Amazon Web Services, Microsoft Azure, or Google Cloud Platform, or are thinking about migrating to any of these, this webinar will provide essential insight for you. We’ll cover:

    - How public cloud security differs from traditional on-premises protection
    -What you are (and aren’t) responsible for when using AWS, Azure, and GCP
    -Seven practical steps that will help you stay secure and compliant
  • Security Fundamentals: Application Security 101
    Security Fundamentals: Application Security 101
    Bria Grangard, Product Marketing Manager, Rapid7 Recorded: Sep 17 2019 57 mins
    When it comes to application security, it’s about enabling builders and defenders to jointly balance speed to production with acceptable risk. By prioritizing security earlier in the development cycle, potential downstream consequences of exposing application vulnerabilities to the wild can be avoided.

    Our panel will discuss the effective methods of integrating security into the life of an application including:

    1. Bridging the gap between security and development
    2. Security tools within the SDLC and why and when to use them
    3. Embedding security with existing tools and workflows
    4. Why DAST
    5. Ongoing monitoring and protection
  • Implementing Record Level Encryption to Ensure Data Privacy for SaaS
    Implementing Record Level Encryption to Ensure Data Privacy for SaaS
    Harold Byun, VP of Product, Baffle Recorded: Sep 17 2019 41 mins
    As concerns over data privacy and pending regulations continue to mount, companies are searching for solutions to help protect their customers' data and ensure compliance. The cost of non-compliance with these regulations exceeds most initial estimates with penalties in the range of 10 - 20% of revenue.

    The challenge that companies face is that most existing solutions to enable data protection methods at the field or record level are difficult and costly to implement. Complicating the matter further is the so-called "right to be forgotten" requirement that is evident in more recent privacy regulations such as GDPR, which mandates tracking of data and deletion.

    Attend this webinar to learn how you can implement record level encryption with data shredding techniques in a simplified manner without modifying applications. Learn how multi-tenant SaaS providers are using tenant-specific encryption models to secure data, restrict entitlements in co-mingled data environments, and accelerate compliance.

    This session will provide a review of some security and operational challenges in multi-tenant and shared data environments along with a live demonstration of simplified record level encryption.

    Join this webinar and learn about the following:

    - Common security and operational challenges in SaaS and shared data environments
    - Architectural and design considerations for building a Bring Your Own Key (BYOK) service
    - How to enable a simplified record level encryption model to protect data
    - How to enable simplified data shredding to help ensure compliance
  • Monitoring and Protecting Data in Apache Kafka
    Monitoring and Protecting Data in Apache Kafka
    Clarke Patterson - Head of Product Marketing - StreamSets Recorded: Sep 17 2019 45 mins
    According to the 2018 Apache Kafka Report, 94% of organizations plan to deploy new applications or systems using Kafka this year. At the same time, 77% of those same organizations say that staffing Kafka projects has been somewhat or extremely challenging.

    In this multi-part webinar series, StreamSets will take learnings from our customers and share practical tips for making headway with Kafka. Each session will discuss common challenges and provide step-by-step details for how to avoid them. By the end of the series you'll have many more tools at your disposal for ensuring your Kafka project is a success.

    Kafka and Tensorflow can be used together to build comprehensive machine learning solutions on streaming data. Unfortunately, both can become black boxes and it can be difficult to understand what's happening as pipelines are running. In this talk we'll explore how StreamSets can be used to build robust machine learning pipelines with Kafka.

    In this session you'll learn:
    -How to easily build pipelines with Tensorflow and Kafka
    -Visualizing data in Tensorflow pipelines
    -Creating reusable code fragments for standardizing pipeline best practices
  • (ISC)²’s Digital Transformation Journey – Part 3
    (ISC)²’s Digital Transformation Journey – Part 3
    Bruce Beam, CIO, (ISC)²; Wes Simpson, COO, (ISC)²; Brandon Dunlap (Moderator) Recorded: Sep 17 2019 59 mins
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. In Part 3 of the (ISC)² Digital End-to-End Transformation (DETE) webcast, we will examine the “new world” of what the project has provided to internal (how we serve the members and visitors), the members (what you as members see and experience) and what’s to come. Join Wes Simpson, COO and Bruce Beam, CIO on September 17, 2019 at 1:00PM Eastern for a discussion on these items and a Q&A with our COO and CIO.
  • Is security the #1 obstacle in your journey to the cloud?
    Is security the #1 obstacle in your journey to the cloud?
    Jason Georgi, Field Chief Technology Officer for Prisma Access and SaaS at Palo Alto Networks Recorded: Sep 17 2019 54 mins
    Cloud adoption has led to branch locations and mobile users going direct-to-internet, often without connecting to remote-access VPNs. The patchwork days of backhauling data over a VPN (or MPLS) to HQ then hair pinning it to the cloud to keep up with users are over. But, it doesn't mean maintaining consistent security at different locations has to be an obstacle. To keep up, you need to use the cloud to your advantage. By building security policies directly in the cloud, you create consistent protection wherever your users are, at headquarters, branch offices, or on the go as well as your applications, in the data center, and the cloud.

    Join the webinar and learn key requirements for complete cloud security and walk away with confidence knowing you can:

    - Protect any data stored within cloud applications
    - Control access to the cloud from anywhere
    - Secure access to all applications built in the cloud
  • SD-WAN: Use Cases, Features & Latest Solutions
    SD-WAN: Use Cases, Features & Latest Solutions
    Denis Zotov Business Development for SD-WAN Solutions, Juniper Networks Recorded: Sep 17 2019 60 mins
    With the broad market interest in SD-WAN there is also a large number of SD-WAN solutions to choose from. In this session we will provide an overview of Juniper Contrail SD-WAN solution. We will look at key differentiators and the unique value Juniper solution provides to the service providers.

    In particular, we will discuss:

    • Solution building blocks
    • Solution architecture
    • Key features
    • Use cases, including SD-WAN, Security, LAN and WiFi
    • Portals for administration and customer self-management
    • Deployment and pricing models

    We will also highlight a few customer deployments.
  • [PANEL] Getting Ready for CCPA
    [PANEL] Getting Ready for CCPA
    Guy Cohen | Lisa Hawke | Joanne Furtsch | Laura Koulet Recorded: Sep 17 2019 59 mins
    The California Consumer Privacy Act (CCPA) is going into effect on January 1, 2020, making it America’s first-ever state data privacy law. It is also the most far-reaching privacy regulation in the U.S. to date.

    Join this panel of experts for an interactive Q&A session to learn more about what businesses need to do to prepare for CCPA. Attendees will also learn about the CCPA checklist, as well as dive into:
    - GDPR vs. CCPA
    - Which organizations need to plan for CCPA compliance
    - What to do to avoid the risk of fines
    - How to develop a strategy and start implementing tools to achieve compliance
    - More privacy legislation on the horizon

    Speakers:
    - Guy Cohen, Strategy and Policy Lead, Privitar
    - Lisa Hawke, VP Security and Compliance, Everlaw
    - Joanne Furtsch, Director, Deputy Data Governance Officer, TrustArc
    - Laura Koulet, Vice President, Head of Legal & Privacy, Tapad
  • The Role of IT in Compliance: To Serve, Preserve and Protect
    The Role of IT in Compliance: To Serve, Preserve and Protect
    Robert Kreuscher, Professional Services Solutions Architect Recorded: Sep 17 2019 38 mins
    The role of IT within the compliance frame work is primarily implementing and managing the systems that protect and control information. From how the content is captured and preserved to the overall system availability. Traditionally these systems were on-premises but most organizations opt for a more efficient way to manage their compliance needs by adopting cloud-based solutions. So how can you better serve, preserve and protect your end users?

    Join this webinar and learn:

    · What are the differences between on-premises and cloud-based archiving
    · Common mistakes and tips on migration
    · Top things an IT professional should know about Compliance
  • Life After Passwords
    Life After Passwords
    24by7Security, Inc Recorded: Sep 17 2019 40 mins
    In this webinar, Alessandro Chiarini will explain why authentication based on biometric factors--facial, fingerprint, and voice—is the new minimum standard. With compound biometrics, it offers the level of protection necessary to secure healthcare organizations in today’s threat environment. Two-factor authentication? Multi-factor? Through this webinar, there will be a finer understanding of the dangers companies face and the tools available to confront them. Anyone responsible for securing access to controlled data or areas will benefit by this brief and pithy webinar.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • CISSP Exam Prep Clinic #5: Difference between CISSP and CISSP Associate status
    CISSP Exam Prep Clinic #5: Difference between CISSP and CISSP Associate status
    Mission Critical Institute Recorded: Sep 17 2019 27 mins
    Learn about the CISSP employment endorsement and the CISSP Associate Status.

    In Clinic #5, you will learn about the CISSP employer endorsement and how it works. You will also learn what happens when you pass the exam but still cannot meet all of the CISSP employment requirements. Specifically, you receive information about the CISSP Associate status and how employers will respond to you when you pass the exam and still need more experience.


    If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    These five Clinics include tips for all 8 CISSP domains covered in the exam.

    Register today and move closer to your goal!

    SPONSORED BY: Mission Critical Institute
  • Investigate Security Incidents Like a Boss
    Investigate Security Incidents Like a Boss
    Jae Lee, Director, Product Marketing, Splunk Inc. Recorded: Sep 17 2019 53 mins
    For security teams, having the ability to investigate a security incident quickly and accurately is still the most fundamental skill needed to combat the majority of cyberthreats and attacks. The average organization is being attacked on a weekly basis, without the right processes and tools in place to pinpoint root cause without delay, and put the right countermeasures in place in time to minimize damage.

    Join us in this 1-hour webinar to learn:
    •Why investigating security and non-compliance incidents can be so difficult
    •Why machine data generated by your business is so important to security
    •How to get better at performing investigations -- regardless of the size or skill level of your security staff

    We will provide a methodology to help you align how you think about your organization’s security processes – the goal is to help you develop an investigative mindset that addresses a broad range of security and compliance concerns, in a pragmatic and targeted manner, specific to your own needs.
  • Chatbots: Uncovering an AI phenomenon
    Chatbots: Uncovering an AI phenomenon
    Dean Clayton, Service Management Automation Product Manager and Joe Leung, AI Product Marketing Manager, Micro Focus Recorded: Sep 17 2019 42 mins
    Chatbots or virtual agents are popping up everywhere. Why? According to Gartner*, virtual agents are expected to account for AI-driven business value of approximately $1T! No wonder organizations in both the commercial (e.g. Erica – Bank of America) and public (e.g. EMMA – U.S. Department of Homeland Security) sectors are rapidly adopting this technology. Most of us have interacted with some kind of a chatbot but what makes it all possible?

    Join our webinar to learn about:
    • The basics of an AI powered virtual agent
    • The enabling technologies
    • Anatomy of a real-life virtual agent
    • Virtual agent technology evaluation criteria

    *https://www.gartner.com/en/newsroom/press-releases/2018-04-25-gartner-says-global-artificial-intelligence-business-value-to-reach-1-point-2-trillion-in-2018
  • Seeking a SOC
    Seeking a SOC
    Johna Till Johnson, CEO and Founder, Nemertes Research Recorded: Sep 17 2019 49 mins
    Seeking a SOC? The Time is Right!

    If you're like most enterprise security professionals, you know you need a security operations center (SOC). But should you build out your own, engage a third party, or take a hybrid approach? This webinar provides you with the answers. Nemertes helps you make that decision, based on objective data from our research studies. And we provide a detailed playbook and roadmap for taking action.
  • Operational and Cyber Resilience Part 1
    Operational and Cyber Resilience Part 1
    Stefan Sulistyo Recorded: Sep 17 2019 60 mins
    Join the first of Alyne's two-part webinar series, which delves into the components that make up successful Operational and Cyber Resilience. Stefan Sulistyo, Alyne Co-Founder and CCO will be discussing the best practices for effective Business Continuity Management, Vendor Governance and Enterprise Risk Management.
  • How to make CI/CD automation and DevSecOps a winning combination in FinTech
    How to make CI/CD automation and DevSecOps a winning combination in FinTech
    Stéphan Hellmann, Founder of NowBe, Benny Van de Sompele, CTO, Sweagle Recorded: Sep 17 2019 35 mins
    Join Sweagle for an interactive discussion with industry expert, Stéphan Hellmann, on best practices for coping with secrets, audit trails and evidence repositories.

    This 30 minute webinar is targeted at tech leaders who are required to stay ahead of regulatory requirements. As you know, these requirements are constantly evolving, so join this session to learn how you should be balancing the need to be agile with adopting the right technologies and, all the while, empowering your DevOps teams.

    What you'll learn:

    -How to prevent compliancy violation through intelligent automation of config data.
    -How to deal with compliancy violation through enhanced visibility of config data.
    -How a detailed audit trail of config data, automated secrets management and an evidence repository will help you to meet your regulatory obligations.

    Hear about the tactics and strategies Stéphan has used to make CI/CD automation and DevSecOps a winning combination in FinTech.
  • The SaaS Operating Model: Why Software Providers Need to Think Cloud
    The SaaS Operating Model: Why Software Providers Need to Think Cloud
    Nick Mayhew, Director of Partners at UKCloud Recorded: Sep 17 2019 32 mins
    UKCloud proudly hosted a team of experts to discuss the merits of a SaaS based operating model.

    The end result? A short, 30-minute video jam-packed with hints and tips from people who have been there, done that. Must-watch viewing for anyone who’s unsure whether they should migrate their applications to the cloud.

    The Panellists
    •Nick Mayhew, Director of Partners, UKCloud
    •Chris Farthing, Founder & CEO, Advice Cloud
    •Dave Blackburn, Technical Director, Geoff Smith Associates
    •Andrew Wilson, CEO, Mylife Digital

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Digital Innovation and your Hybrid, Multi-Cloud Future
    Digital Innovation and your Hybrid, Multi-Cloud Future
    Doug Henschen, vice president and principal analyst at Constellation Research & Patrick Callaghan, solutions architect at Recorded: Sep 17 2019 58 mins
    How can you take advantage of the cloud and required on-premises deployments — without architecting and developing for two separate worlds? This is a discussion on trends in data-driven innovation. Tackling the increasingly important topic of working with cloud-scale data platforms that can span multiple clouds and on-premises deployments.
  • Myths, Facts and Challenges Facing Blockchain
    Myths, Facts and Challenges Facing Blockchain
    Ahmed Banafa, IoT-Blockchain-AI Expert & Professor, San Jose State University Recorded: Sep 17 2019 53 mins
    In this webinar Prof. Banafa will discuss Myths, Facts and Challenges facing Blockchain Technology, he will explain Libra the new cryptocurrency of Facebook , list the 7 mistakes to avoid in Blockchain projects , he will explore the job market for blockchain technology , the webinar will cover applications of blockchain technology too.

    Join BrightTALK's FinTech Insights group on LinkedIn: http://bit.ly/2PLQXG3
    Join BrightTALK's BI & Big Data group on LinkedIn: http://bit.ly/2PJlPHm
  • Curing Alert Fatigue with Risk Based Alerting, MITRE ATT&CK and Automation
    Curing Alert Fatigue with Risk Based Alerting, MITRE ATT&CK and Automation
    James Hanlon, Director, Splunk, George Panousopoulos, Security Strategist, Splunk, Brandon Dunlap, Moderator, (ISC)² Recorded: Sep 17 2019 59 mins
    The problem of alert fatigue is symptomatic of a plague within most SOC environments, regardless of the tools and platforms being used. The general process within the industry for driving and managing security incidents is broken. It’s time to change perspective and build into alert creation processes a better prioritization procedure. This can be done by aligning it to a more intelligent risk scoring approach and frameworks like MITRE ATT&CK and automation. Security teams will be better positioned to make use of their existing toolchain, scale people and processes, and deliver a much more effective security capability. Join this webinar to learn:

    •The scale of alert overload and why organisations struggle with this problem. You are not alone
    •How to combine risk based alerting, MITRE ATT&CK and automation to optimise security investigation and reduce alert fatigue
    •Insights, learnings and benefits from SecOps teams that have already made this shift
    •Tricks and tips to help you transform the security investigation process using your existing tools and industry frameworks
  • Cyberattacks: Q3 Review and Emerging Trends (EMEA)
    Cyberattacks: Q3 Review and Emerging Trends (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Sep 17 2019 54 mins
    ** This is an EMEA focused webinar **

    This webinar will recap some of the major cybersecurity highlights of the past quarter.

    From high-profile attacks making a media splash, to emerging threat trends being tracked by our researchers, a Webroot threat analyst will take attendees through the highlights and lowlights of another busy quarter for cybercrime.
  • Good Identity Governance – have you adopted a risk informed approach?
    Good Identity Governance – have you adopted a risk informed approach?
    Steve Garry, Micro Focus, Simon Wilkinson, Micro Focus, Steve Aitken, Micro Focus Recorded: Sep 17 2019 31 mins
    Often, when organisations attempt to become compliant with privacy policies and regulations, they end up with point solutions that sit on the sidelines because they don’t provide the key insights needed to help mitigate ever-present insider threats.

    At Micro Focus, we’ve worked with many different cross-industry corporations to help them successfully implement identity governance solutions. We understand the delicate balance between too little and too much access—and what it takes to get it right.

    Join us for this webinar to learn about how proactively managing security and identity risk in a centralized, structured way can help you avoid the most common issues that create risk.

    We’ll explain how a risk-based approach can ensure that:

    - Any changes to access will conform to corporate policies
    - Access already granted is appropriate
    - Violations can be proactively and automatically detected and remediated

    We’ll also highlight the tools that you can implement to achieve a risk-informed approach to Identity Governance.

    Presenters:
    Steve Garry, Identity & Access Management Sales Specialist, Micro Focus
    Simon Wilkinson, Cyber & Security Strategist, Micro Focus
    Steve Aitken, Enterprise Security Customer Success Manager, Micro Focus
  • How to deliver a high-quality & reliable workspace experience
    How to deliver a high-quality & reliable workspace experience
    Derek Thorslund & Wesley Shepherd Recorded: Sep 17 2019 36 mins
    Today's digital workspace includes a myriad of applications: SaaS, Citrix Virtual Apps and Desktops, VoIP, unified communications, and much more. Delivering a high-quality workspace experience to workers in any location may not be as easy as it seems since these apps can run in various clouds and datacenters.

    Come learn how customer Fast Pace Urgent Care uses Citrix SD-WAN to deliver a consistent experience for Citrix apps, even over imperfect network conditions.
  • SD-WAN: Use Cases, Features & Latest Solutions [EMEA]
    SD-WAN: Use Cases, Features & Latest Solutions [EMEA]
    Denis Zotov Business Development for SD-WAN Solutions, Juniper Networks Recorded: Sep 17 2019 60 mins
    With the broad market interest in SD-WAN there is also a large number of SD-WAN solutions to choose from. In this session we will provide an overview of Juniper Contrail SD-WAN solution. We will look at key differentiators and the unique value Juniper solution provides to the service providers.

    In particular, we will discuss:

    • Solution building blocks
    • Solution architecture
    • Key features
    • Use cases, including SD-WAN, Security, LAN and WiFi
    • Portals for administration and customer self-management
    • Deployment and pricing models

    We will also highlight a few customer deployments.
  • 人手による脆弱性管理の限界と最適な解決策
    人手による脆弱性管理の限界と最適な解決策
    花檀 明伸, Security Engineer, Tenable Sep 18 2019 7:00 am UTC 60 mins
    2018年に公開された脆弱性は1万6千を超えます。限られた人員と時間で、数多の脆弱性に対応するにはどうすればよいのでしょうか。最新の脆弱性管理は、悪用されている脆弱性や悪用される可能性が高い脆弱性のみにフォーカスする機能が提供されています。実際の画面をご覧いただきながら、最新の脆弱性管理プラットフォームについてご紹介いたします。

    Presenter: 花檀 明伸, Security Engineer, Tenable
    Moderator: 小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Raus aus dem Datensumpf – Bringen Sie Qualität in Ihren Data Lake
    Raus aus dem Datensumpf – Bringen Sie Qualität in Ihren Data Lake
    Marco Kopp, Senior Sales Engineer, Syncsort GmbH Sep 18 2019 8:00 am UTC 26 mins
    Daten sind der Treibstoff für Big Data, KI und maschinelles Lernen. Zum Schlüsselfaktor des wirtschaftlichen Erfolgs solcher Unternehmensinitiativen werden aber erst qualitätsgesicherte Daten.

    Nur qualitativ hochwertige Daten können die Versprechen von Big Data, KI und maschinellem Lernen wahrmachen. Falsche Daten führen dazu, dass viele Data Lake-Projekte in einem unwirtlichen Datensumpf enden.

    Was Sie tun können, um dies zu verhindern und wie Sie sicherstellen, dass Ihre Daten sauber, vollständig, präzise und hochwertig bleiben, zeigt Ihnen unser Experte Marco Kopp in unserem Webcast am 18. September 2019 um 10:00 Uhr.

    Sie erhalten alle wichtigen Informationen über
    • die Herausforderungen bei der Sicherstellung qualitativ hochwertiger Daten für KI und maschinelles Lernen.
    • Verzerrungen und andere Probleme durch minderwertige Daten.
    • die Maßnahmen zum Debugging von Daten, die dem maschinellen Lernen zugrunde liegen.

    Jetzt teilnehmen!
  • Accelerate Your Organisation’s Digital Transformation
    Accelerate Your Organisation’s Digital Transformation
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP Sep 18 2019 8:30 am UTC 18 mins
    Application-Aware Visibility
    Join us for our interactive webinar to see how application-aware network visibility can accelerate your organization’s digital transformation.

    Is explosive data growth and network complexity hindering your ability to deliver results? You’re not alone: a lack of application visibility makes it difficult to pinpoint and resolve performance issues.

    You will learn:

    • How to simplify network monitoring with granular insight into application traffic
    • How to detect, manage and isolate shadow IT, non-business apps and others
    • Why filtering unnecessary traffic is critical to improving tool efficiency

    Discover how application-aware network visibility can improve the performance of both your network and IT tools.
  • Secure app and workspace delivery in a hybrid multi-cloud world
    Secure app and workspace delivery in a hybrid multi-cloud world
    Darshant Bhagat & Robin Manke-Cassidy Sep 18 2019 9:00 am UTC 38 mins
    Hybrid cloud deployment success depends on the effectiveness of your networking and security strategy and how you manage complexity.

    In this session, we will teach you top use cases and real-world security architectural considerations to optimize and secure your apps, data, and workspaces.
  • 2019 Domain Fraud Report with Proofpoint
    2019 Domain Fraud Report with Proofpoint
    Roman Tobe, Product Marketing Manager Sep 18 2019 9:00 am UTC 48 mins
    Web domain fraud is a growing risk for businesses, employees, and their customers. Every year, threat actors register millions of domains to impersonate brands and defraud those who trust them. How can you protect your employees and customers from these fake sites?

    Join Proofpoint as our security expert discusses the latest research findings of the 2019 Domain Fraud Report, the latest trends shaping the domain landscape, and the tactics and activities of threat actors.

    In this session, we'll share:

    • Tactics threat actors take to trick employees and customers
    • Connection between fraudulent domain registrations and highly-targeted email attacks
    • How to protect your corporate domains
  • Security Attacks in Financial Services: DDos, Phishing, and Beyond
    Security Attacks in Financial Services: DDos, Phishing, and Beyond
    Martin McKeay, Editorial Director and Security Researcher, Steve Ragan, Editor, Security Research and Publications, Akamai Sep 18 2019 9:00 am UTC 57 mins
    Criminals go where the money is, and the financial services industry has attracted more than its share of malicious traffic. Akamai security experts recently reviewed 18 months of data and found some patterns that should interest security professionals in every industry.

    Join this session to hear their findings and learn about:

    - The leading DDoS and application-layer attack vectors used to target financial services institutions
    - Why criminals launch DDoS attacks against financial institutions, even when there’s little chance of success
    - The data points that tell criminals you’ve improved their odds for a successful account break-in
    - How the attack economy slices, dices, and exploits the massive troves of stolen logins you hear about on the news
    - The little-known phishing variant that resulted in almost $1.2 billion of losses in 2018
  • Applicaton-Aware Visibility
    Applicaton-Aware Visibility
    Daniela Fusaro, Senior Solutions Architect Sep 18 2019 12:00 pm UTC 8 mins
    Beschleunigen Sie die digitale Transformation Ihres Unternehmens

    Application-Aware Visibility
    Besuchen Sie unser Webinar, um zu sehen, wie Application-Aware Network Visibility die digitale Transformation Ihres Unternehmens beschleunigen kann.

    Hält Sie das explosive Wachstum und die steigende Komplexität Ihres Netzwerks davon ab, schnelle Resultate liefern zu können? Sie sind damit nicht alleine: Ein Mangel an Sichtbarkeit macht es schwierig, Performance-Probleme einzugrenzen und zu lösen.

    Sie werden sehen:
    • Wie Sie Network Monitoring durch granularen Einblick in Applikationen vereinfachen
    • Wie Sie Schatten-IT entdecken, managen und isolieren
    • Warum das Wegfiltern von unnötigem Traffic Ihre Security Tools effizienter macht

    Entdecken sie, wie Application-Aware Network Visibility die Performance Ihres Netzwerks und Ihrer Tools erhöht.
  • How to automate your privacy protection
    How to automate your privacy protection
    Dave Roberts, Senior Privacy Engineer, Privitar Sep 18 2019 12:00 pm UTC 30 mins
    Defining data protection requirements and transformations in preparation for processing datasets in batch, streaming or API modes can often prove challenging for data owners and privacy engineers.

    As part of Privitar’s mission to make advanced privacy protection techniques available to the entire organisation, Publisher 3.0 introduces a new set of HTTPS REST APIs that can be used to programmatically manage and protect a large number of datasets, while reducing human intervention.

    With the new automation APIs in Publisher 3.0, organisations can automate and drive their data privacy policy definitions by leveraging information already present in organisational metadata catalogues and schema repositories.

    Data provisioning pipelines can also be automated, so that data can be made available for analysis quickly and safely.
  • Building a Cloud Center of Excellence Using the AWS Well-Architected Framework
    Building a Cloud Center of Excellence Using the AWS Well-Architected Framework
    Todd Bernhard, CloudCheckr Product Marketing Director Sep 18 2019 1:00 pm UTC 27 mins
    The Public Cloud may be new to many enterprises, but it has been around long enough for Best Practices to have been established. As organisations migrate to the cloud, they do not have to start from scratch. They can leverage policies and frameworks established by cloud leaders and avoid repeating the mistakes of the early adopters. It is also important to get buy-in from different departments, so establishing a Cloud Center of Excellence is highly recommended.

    Attendees of this CloudCheckr webinar will learn what a Cloud Center of Excellence (CCoE) is and who should participate in one. They will also understand the pillars of the AWS Well-Architected Framework (WAF) and discover how CloudCheckr can help establish both a CCoE and WAF.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Ashish Thapar, David Kennedy and John Grim Sep 18 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the 2019 Payment Security Report and the current cybersecurity threat landscape.

    This month's theme: Payment Security Report

    We’ll cover:

    • The challenges of securing customers’ payment data
    • Insights into where companies struggle with maintaining PCI compliance
    • Expert guidance on building and improving your PCI compliance program while leveraging other security initiatives

    Our Verizon Threat Research Advisory Center presenters will be:

    •Ashish Thapar, Managing Principal, VTRAC | Investigative Response
    •David Kennedy, Managing Principal, Open Source Intelligence | VTRAC Cyber Intelligence
    •John Grim, Managing Principal, VTRAC | Innovations and Development

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • PSD2 : Forget the Deadline – Design Great Customer Journeys
    PSD2 : Forget the Deadline – Design Great Customer Journeys
    Nick Caley, ForgeRock and Jean Lambert, Thales Sep 18 2019 2:00 pm UTC 60 mins
    2019 represents a major milestone in the rewrite of Europe's Financial Services due to the deadlines required by PSD2. This webinar will take a look at how Account Providers are partnering with Thales and ForgeRock to design and deliver new Banking and Payment Journeys with Strong Customer Authentication.

    Having a clear focus on compliance with the PSD2 Regulatory Technical Standard, many Account Providers are redesigning customer journeys and introducing new methods of authentication. Customers have come to expect security and convenience, so how are you striking the right balance of just enough friction whilst offering a first class digital experience?

    Banking services are increasingly driven by a need to deliver a more personalised user experience with the benefit of a low touch, friction-free interaction. The flexibility of various authentication methods can provide a competitive edge when combined with modern Identity Management and state-of-the-art security across all the channels for a seamless user experience.


    In this webinar, you’ll learn about:

    - How Strong Customer Authentication can improve your competitive advantage
    - How you can leverage adaptive security methods to strike the right balance between security and convenience
    - How to avoid abandoned customer journeys through context driven analytics
    - From Onboarding to Transactions, how Identity Orchestration delivers the right digital outcomes


    By registering for this webinar you agree ForgeRock will maintain and process your personal information for communicating with you.
    The following partner(s) of the the above webinar(s) will have access to the list of registrants, including your contact information:
    Thales https://www.thalesesecurity.co.uk/privacy-policy
  • Four Ways to Publish a Book
    Four Ways to Publish a Book
    Michelle Tillis Lederman, CSP, PCC Sep 18 2019 3:00 pm UTC 60 mins
    In this webinar, Michelle Tillis Lederman joins us to discuss executive essentials.

    Michelle is known for her energetic, engaging, and authentic presentations. An expert on workplace communications and relationships, Michelle's mission is to help people work better together and advance their individual impact. She is an accomplished speaker, trainer, coach, and author of four books including the #1 new release The Connectors Advantage and the internationally recognized, The 11 Laws of Likability.
  • A Risk Adaptive Approach to Data Protection
    A Risk Adaptive Approach to Data Protection
    Karlene Berger, Director Product Marketing Sep 18 2019 3:00 pm UTC 9 mins
    Are You Taking a Risk-Adaptive Approach to Dynamic Data Protection?
    Why are data loss events increasing even while Cybersecurity spending is soaring? Because legacy DLP solutions are still focused on traditional threat blocking policies and haven't evolved to address today's modern security threats.

    Learn more about how taking a risk-adaptive approach combined with behavioral analytics can enable your security to fluctuate based on the threat environment.
  • Addressing Vulnerabilities and Threats from Dark Web Attacks
    Addressing Vulnerabilities and Threats from Dark Web Attacks
    Jack Danahy, SVP, Security of Alert Logic and Jeffrey Pearl, CEO of OTG Consulting Sep 18 2019 3:00 pm UTC 30 mins
    Ever wonder how cheap it is to purchase malware or ransomware on the dark web? A recent study by a security firm, published the following dark web pricing:
    - Hacking a site and gaining full control over a web application costs only $150
    - Average cost of ransomware is $270 (In 2017, ransomware including WannaCry, NotPeyta, BadRabbit, Locky, and Cerber epidemics racked up attacks in excess of $1.5 billion)

    As the costs go down and the cyber threats go up using dark web technologies to infiltrate, you need an innovative security partner that stays ahead of the evolving threat landscape.

    Join us for 30 minutes on Wednesday, September 18 at 10:00 a.m. CT and learn how Alert Logic protects you against cyber-attacks. During this session, we will discuss:
    - Importance of threat monitoring and intrusion detection
    - Realities of SQL injection, DoS attacks, URL tampering, cross-site scripting attacks can have on your business
    - Advantages of detection capabilities including dark web scanning to spot and block malicious activity

    This is a session you don’t want to miss! Register today.
  • Surviving PSD2 without affecting your customers' users experience
    Surviving PSD2 without affecting your customers' users experience
    Gustavo Mora Sep 18 2019 3:00 pm UTC 45 mins
    On September 14 the first phase of the PSD2 and RTS regulation comes into force, and there are some questions about the possible impact that the regulation may have on customers’ user experience. Regarding this, each company has decided to implement the regulatory standards in different ways.

    Technologies like Behavioral Biometrics and agentless Malware detection can assist easily to the compliance with PSD2 without adding any friction to the customers’ user experience and even having the chance to improve it. A great opportunity for finance companies to increasing competitiveness, value and security at the same time.

    Join this webinar to hear on how buguroo can help banking and finance industry companies to be PSD2 compliance by incorporating invisible fraud prevention and security technology that facilitates the compliance with the following topics of the standard:

    · Implementation of Strong Customer Authentication (SCA)
    · Detection of malware in the customer’s online session
    · Identification of customer´s risky transactions in real time
  • IT Incident Response in Financial Services
    IT Incident Response in Financial Services
    Mike Beckett, Senior Solution Consultant, IT Alerting Everbridge Sep 18 2019 3:00 pm UTC 60 mins
    In today's high demand for digital banking with the explosion of fintech, IT has no choice but deliver first class quality services and of course they need to quickly restore them when they fail. But how can IT respond to this new pressure?

    Everbridge and FinTech Futures have surveyed the industry to create a detailed view on IT response management in banking and fintech, gathering responses from a range of IT professionals in financial services, investment and banking companies.

    In this webinar, we'll look at:
    * How they do things
    *What challenges they're facing
    * What the current situation in their company is

    Join Everbridge's Mike Beckett to review and address these somewhat surprising results.
  • How free software can be more expensive than paid alternatives
    How free software can be more expensive than paid alternatives
    Al Gillen, Group Vice President, Software Development and Open Source, IDC Sep 18 2019 3:00 pm UTC 57 mins
    Learn how paid subscriptions for open source software increase operational efficiency and reduce costs

    It's a common, unfortunate myth that community-supported, free, open source software is a better value, lower cost solution for running highly available, reliable, and critical workloads in data centers and cloud deployments. In the context of the larger investment, though, the reality is that the expense of commercially supported open source software is an investment that produces more secure platforms that deliver better availability, greater agility, and lower long-term operational costs.

    Join Al Gillen, IDC Vice President, as he reviews IDC research about the use of Red Hat® commercially supported, enterprise products and their cost and business benefits to customers.
  • Machine Learning and AI in a Brave New Cloud World
    Machine Learning and AI in a Brave New Cloud World
    Ulf Mattsson, Head of Innovation, TokenEx Sep 18 2019 5:00 pm UTC 60 mins
    Machine learning platforms are one of the fastest growing services of the public cloud. ML, an approach and set of technologies that use Artificial Intelligence (AI) concepts, is directly related to pattern recognition and computational learning. Early adopters of AI have now rolled out cloud-based services that are bringing AI to the masses.

    How are AI, deep learning, machine learning, big data, and cloud related? Can machine learning algorithms enable the use of an individual’s comprehensive biological information to predict or diagnose diseases, and to find or develop the best therapy for that individual? How is Quantum Computing in the Cloud related to the use of AI and Cybersecurity?

    Join this webinar to learn more about:
    - Machine Learning, Data Discovery and Cloud
    - Cloud-Based ML Applications and ML services from AWS and Google Cloud
    - How to Automate Machine Learning

    ----------------------------------------
    Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU
  • API Security: Discover Complete Visibility Throughout Your API Endpoints
    API Security: Discover Complete Visibility Throughout Your API Endpoints
    Ziv Grinberg, Imperva Principal Product Manager, API Security and Michael Wright, Imperva Senior Product Marketing Manager Sep 18 2019 5:00 pm UTC 60 mins
    Gartner predicts that by 2022, API abuse will become the most frequent attack vector resulting in data breaches for enterprise web applications. Join our API Security Principal Product Manager, Ziv Grinberg and Senior Product Marketing Manager Michael Wright as they discuss and showcase how Imperva is leading the fight against cybercriminals and the threat they pose to APIs. During this webinar our team will demonstrate the simplicity of uploading a Swagger file, how our API Security solution automatically enforces a positive security model based on the OpenAPI Specification file and in turn empowers your DevOps teams with the confidence and agility they need to publish and secure their APIs.
  • Is the Cloud Transforming Security?
    Is the Cloud Transforming Security?
    Tim Olson, VP Engineering & Andy Anchev, Director, Product Management - Menlo Security Sep 18 2019 5:00 pm UTC 36 mins
    Everyone is moving to the cloud. It’s faster, scalable, seamless, agile, and less costly. Securing your infrastructure in the cloud, however, doesn’t cut down on time spent protecting applications, workloads, and data. You still need people to process alerts and manage a security solution.

    Given this paradigm, we’ve put together a webinar so you can hear from security experts as they share insights on why every business should focus on transforming their security to support their cloud transformation journey, and learn how remote browser isolation can help.

    We will share:

    - How IT teams are adopting a “Cloud First” attitude and how security should be part of this movement.

    - Why isolation is a fundamentally different approach that is transforming enterprise security architecture.

    - How core differences enable us to deliver isolation from the cloud.
  • Modernizing Your SOC: Lessons Learned with AmerisourceBergen
    Modernizing Your SOC: Lessons Learned with AmerisourceBergen
    Kumar Chandramoulie, Senior Director, AmerisourceBergen Corporation; Shareth Ben, Executive Director, Securonix Sep 18 2019 5:00 pm UTC 60 mins
    When it comes to taking your data from you, cyber criminals never rest. If they can’t get in one way, they'll try another. A sound Security Operations Center (SOC) - staffed by the right people and with the right tools - is an essential component in your cyber defense strategy.

    Join Kumar Chandramoulie, Senior Director of Global Cyber Threat and Vulnerability Management at AmerisourceBergen Corporation and Shareth Ben, Executive Director of Field Engineering at Securonix as they discuss how to:

    - How to incrementally build your cyber security program
    - How to effectively develop your team
    - Automate to reduce workloads and drive efficiency
    - Create strong KPIs and KRIs to measure success
  • Taxonomy and Metadata: DITA Content That's Easy to Find, Manage, and Reuse
    Taxonomy and Metadata: DITA Content That's Easy to Find, Manage, and Reuse
    Jarod Sickler, Information Developer Sep 18 2019 5:00 pm UTC 60 mins
    Your content architecture is the foundation for better content management within your organization. That’s why it’s vital to have a strategy for taxonomy and metadata in DITA.

    Developing a robust taxonomy and metadata strategy will help you create content that is easy to find, easy to manage, and easy to reuse.

    Join Scott Abel, The Content Wrangler, and his special guest, Jarod Sickler, Information Developer for Jorsek LLC, the makers of easyDITA, for this free one-hour webinar.
  • Response Ready Strategy for Disaster Situations
    Response Ready Strategy for Disaster Situations
    Michael Maiorana, Andis Kalnins, Tammy McLean Sep 18 2019 6:00 pm UTC 60 mins
    Others run from crisis, you run towards it. You are the first to respond to situations when every second counts. Responding to disasters effectively depends on active emergency preparation and deployment. Learn how Verizon’s Business Continuity Program utilizes 20+ years of technology and emergency management to assist first responders and their communities.

    Learn about:

    Crisis management
    Network capabilities
    Verizon Response Team
    NWS best practices for emergency preparation
    #OCR2019, a live action, crisis technology experience
  • Understanding CCPA: Preparing for California’s New Privacy Act
    Understanding CCPA: Preparing for California’s New Privacy Act
    Jessica R. Gross, Data Privacy & Security Attorney, Sheppard Mullin and Melissa Singleton, Account Executive, AccessData Sep 18 2019 6:00 pm UTC 60 mins
    As spiraling data breach incidents drive heightened privacy concerns, states are turning to the law to help control how organizations handle sensitive consumer data. With the California Consumer Privacy Act (CCPA), California is the first US state to pass a comprehensive new consumer protection law, which will go in to force on January 1, 2020.

    The CCPA includes significant changes to give consumers more control over their personal data, and regulate how organizations can collect and store private information on their customers. And it’s only the beginning – in the wake of CCPA, other states are introducing their own new privacy regulations. With just a few short months until CCPA is in force, organizations should already be taking action now to prepare. But where do you begin?

    During this webinar, co-presented by AccessData and Sheppard Mullins, we’ll discuss everything related to CCPA, including:

    • What the new law means for any organization across the US that is collecting data on California residents
    • Current areas of contention in the law, the current advice on these issues and how new legislative developments are addressing these areas
    • Best practices and tips for enforcing CCPA at your organization
    • How you can leverage technology to manage data privacy
    • And more!

    This activity has been approved for Minimum Continuing Legal Education credit by the State Bar of California. Sheppard Mullin Richter & Hampton LLP certifies that this activity conforms to the standards for approved education activities prescribed by the rules and regulations of the State Bar of California governing minimum continuing legal education.
  • Think Native Cloud Security Is Enough? Think Again
    Think Native Cloud Security Is Enough? Think Again
    Louis Evans, Product Marketing Manager at Arctic Wolf Sep 18 2019 7:00 pm UTC 60 mins
    Nearly all organizations have some cloud footprint, from traditional businesses using SaaS office applications such as Salesforce or Office365, to cloud-first firms running exclusively in AWS or Azure. These cloud solutions offer powerful new ways to drive business efficiencies—but they also expose companies to a new universe of risk.

    IT managers may mistakenly assume that cloud security is out of their hands, for better or worse. But this assumption isn’t true. That’s why it’s incumbent upon businesses to develop a sound security strategy as they migrate to the cloud, while also becoming a proactive security partner with their cloud providers. If not, they’ll find themselves vulnerable to attack.

    This webinar offers strategic insight on how to bolster your cloud security, as Arctic Wolf experts discuss:
    - The top cybersecurity risks–and best practices for securing cloud deployments
    - How Arctic Wolf™ Managed Detection and Managed Risk complement cloud-native security features across major cloud platforms
    - Arctic Wolf’s role in integrating observations from cloud and on-premise systems

    See how Arctic Wolf can secure your cloud. REGISTER NOW!