Hi [[ session.user.profile.firstName ]]

IT Security

  • How SaaS Solutions Can Be Successfully Integrated with Public Clouds How SaaS Solutions Can Be Successfully Integrated with Public Clouds Rachel Yehezkel, Technical Evangelist, Microsoft and Vineet Bhan, Director of Development, Imperva Incapsula Dec 5 2016 6:00 pm UTC 60 mins
    The capabilities of SaaS solutions integrated with public clouds is here today. Most SaaS solutions however don’t integrate with public clouds and have to be purchased directly from the SaaS companies, which is a real inconvenience to cloud customers. When customers have to visit two different interfaces to manage their SaaS solution and their public cloud deployments, it can be an operational burden.

    Website security and DDoS mitigation cloud solutions are increasingly more effective against DDoS attacks, which are getting bigger and bigger. There are a number of reasons for this which we will cover, including limitations of VM-based solutions, better coverage for both public cloud deployment, and hybrid/legacy deployments with the same solution.

    In the webinar we will explain how Incapsula cloud services and Microsoft Azure worked together to bring a leading cloud security solution to Azure marketplace thus building a model that other SaaS companies can replicate.
  • Akamai Q3 2016 State of the Internet Security Report Akamai Q3 2016 State of the Internet Security Report Jay Coley, Senior Director, Enterprise Security Architecture, Akamai Technologies Dec 6 2016 12:00 pm UTC 45 mins
    Akamai sees more than 2 trillion Internet interactions every day and mitigates 40 – 50 DDoS attacks every month. Our security experts analyse this information and share trends, observations, and findings in the quarterly State of the Internet Security report.

    Join Jay Coley, Senior Director, Enterprise Security Architecture at Akamai Technologies for an overview of what we found after analysing data from Q3 of 2016.

    Key topics covered will include:
    · Why DDoS of over 100 Mbps increased over the past quarter
    · Which country is the new leader for most sourced Web application attacks
    · Tactics Akamai used to mitigate two of the largest DDoS attacks we’ve seen
  • [Cybersecurity] Our Indigenous Apps: Securing Critical Business Data [Cybersecurity] Our Indigenous Apps: Securing Critical Business Data Senior Security Consultant, Christopher Cooper Dec 6 2016 1:00 pm UTC 45 mins
    Despite the rise of the cloud and increased reliance on web applications, native desktop applications are still highly relevant and often the delivery method of choice in enterprise IT. As penetration testers, we still see a number of very poorly architected native applications being used to protect extremely sensitive information.

    This webcast will discuss some of the core issues relating to native desktop applications, why they are so frequent, and the severe impact that their insecurity can cause.

    In the 2017 threat landscape, we propose that these flaws are not going away, and the industry isn't currently in a position to help developers resolve them effectively.
  • The 2017 Threatscape The 2017 Threatscape Steve Durbin, Managing Director, ISF Ltd Dec 6 2016 2:00 pm UTC 45 mins
    The pace and scale of information security threats continues to accelerate, endangering the integrity of trusted organisations. Although cyberspace offers opportunities for leading organisations, this environment is uncertain and potentially dangerous. It is a place where hacktivists and cybercriminals are honing their skills and governments are introducing new regulation and legislation in response to major incidents and public concerns. Organisations are forced to continually adapt and rapidly respond.

    In this webinar, Steve Durbin Managing Director at the ISF, will discuss the rapidly changing threat landscape, identify the key cyber challenges for 2017 and suggest ways of managing the associated risks.
  • The Right Transformation Model for European Businesses in 2017 The Right Transformation Model for European Businesses in 2017 Alexander Michael, Director of Consulting, Frost & Sullivan Dec 6 2016 2:00 pm UTC 60 mins
    Digital transformation affects every industry, every type of organisation and every country in Europe. It is a strategic priority for businesses to address the top drivers behind industry change: (1) changing needs of customers; (2) new distribution channels; and (3) new products entering the industry.

    A unified suite of applications running off of a single database answers these challenges efficiently, and Frost & Sullivan research finds that businesses increasingly see cloud as a solution to the challenges of industry transformation, competition, and as a means to facilitate global expansion. They are turning to the cloud for its agility, scalability and flexibility, and reaping the rewards by delivering innovative products and services that are transforming industries.
  • Artificial Intelligence Attacks: The Cyber Arms Race Artificial Intelligence Attacks: The Cyber Arms Race Dave Palmer, Director of Technology Dec 6 2016 3:00 pm UTC 45 mins
    Advances in artificial intelligence are leading to developments in cyber-attack technology, making threats faster and more sophisticated than ever. From smart ransomware through to sophisticated, customized malwares that blend into the network, security teams are struggling to keep up with the new generation of threats. In this cyber arms race, a new approach is needed to identify and respond to AI attacks and other subtle, advanced adversaries. During this webinar, Darktrace’s Director of Technology, Dave Palmer, will examine this challenge and explain why immune system technology, powered by unsupervised machine learning, will be critical in the future of cyber defense.
  • [Video Interview] The Cyber Year in Review: Ian Glover, President, CREST [Video Interview] The Cyber Year in Review: Ian Glover, President, CREST Ian Glover, President, CREST & Josh Downs, Information Security Community Manager, BrightTALK Dec 6 2016 4:00 pm UTC 45 mins
    Join this engaging session as BrightTALK conducts an in-depth interview with Ian Glover, President of CREST.

    It's been a crucial year for cyber security with big breaches and newsworthy hacks. BrightTALK's Information Security Community Manager Josh Downs will be quizzing Ian for his thoughts on the cyber security industry and in particular:

    - The big breaches of 2016 and lessons to be learnt
    - The current threatscape
    - The big vulnerabilities on the horizon
    - Ian's insights into how to keep your company secure in 2017

    We look forward to you joining us for the session.
  • The Rise of Security Orchestration:  Myths and Truths The Rise of Security Orchestration: Myths and Truths Paul Nguyen, VP of Orchestration & Integration, FireEye. Joseph Blankenship, Sr. Analyst, Forrester. Dec 6 2016 4:00 pm UTC 60 mins
    Most security programs are understaffed and overwhelmed with alerts, often defined by processes that rely on manual intervention and containment. They must keep pace with attackers who have access to intellectual resources, computing power and the backbone of the fastest digital delivery networks.

    Security orchestration levels the battlefield by bringing together disparate technologies and incident handling processes into a single console and facilitates processes with automation. The goal is to improve response time, reduce risk exposure and maintain consistent security processes.

    Join this webinar with Paul Nguyen, VP of Orchestration and Integration at FireEye and guest speaker Joseph Blankenship of Forrester to learn what orchestration really is, how to use it, and how to recognize a quality orchestration solution. You’ll discover:

    •Why we are seeing a rise in security orchestration
    •Where the market is movingHow to get the most out of orchestration
    •Which orchestration capabilities are essential and which are differentiators
    •What drivers and functional capabilities will define the market
    •How to best evaluate and deploy orchestration solutions

    Register today for the latest on orchestration from FireEye and Forrester experts.

    The FireEye Team
  • 5 Ways Black Duck Hub Can Improve Open Source Security & Compliance 5 Ways Black Duck Hub Can Improve Open Source Security & Compliance Pat Durante, Senior Director Education Services; John Beaudoin, Senior Instructional Designer; Dave Gruber, VP of Product Dec 6 2016 4:00 pm UTC 60 mins
    During our next customer webinar, we’ll share expert tips and best practices on how to extract maximum value from the latest features available in Black Duck Hub. The new integrations and features help improve both open source security and compliance. You’ll learn how to:

    •Track remediation tasks using the new Hub-Jira integration
    •Leverage new open source discovery techniques for Ruby Gems and Node.js as well as build integrations for Maven/Gradle to improve the accuracy of your open source inventory
    •Customize your notices file so that all open source is properly attributed
    •Leverage the new Hub-Email Extension to push notifications via email
    •Incorporate Hub scanning into your Jenkins pipeline projects