Hi [[ session.user.profile.firstName ]]

IT Security

  • BrightTALK Network Security & Hacking Preview BrightTALK Network Security & Hacking Preview Various Recorded: Aug 24 2016 3 mins
    This September BrightTALK will be hosting some of the industry's leading cyber speakers as they discuss Network Security & Hacking.

    Click below to register for the Summit:

    https://www.brighttalk.com/summit/3453
  • Executive Webinar Series: Cut Audit Prep with Continuous Compliance Executive Webinar Series: Cut Audit Prep with Continuous Compliance John Parmley, Area VP, Tufin Recorded: Aug 24 2016 32 mins
    Today's expectations of security executives is to do more with less: provide tighter security with less resources for a dynamic, hybrid, complex IT environment.
    As an existing Tufin customer, you can turn the Tufin Orchestration Suite from a management tool into a strategic infrastructure.

    Join us for the second webinar in our Executive Webinar Series: "Cut Audit Prep and Tighten Security with Continuous Compliance" and learn how you can maximize your Tufin investment to:
    •Cut audit preparations by enforcing continuous compliance across the hybrid network
    •Tighten security posture with a unified zone-based security policy
    •Maximize agility AND policy compliance with proactive risk analysis
    Reserve your seat now!
    We look forward to you joining us.
  • Standardization and visibility of security controls in Hybrid Standardization and visibility of security controls in Hybrid Avinash Prasad and Munish Gupta of Infosys Ltd Recorded: Aug 24 2016 50 mins
    The needs for IT agility for business, is driving adoption of flexible computing environments including IaaS, Private Cloud among others. The challenge associated with this transformation towards the Hybrid cloud environment is the assurance around the security for the workloads and data. Specific issues arise due to the “Shared security model ” of the varying Cloud environments in terms of implementation of security, compliance and optimization in these environments.

    The need of the hour is to ensure effective security governance through standardization of security controls/Policies across Hybrid cloud deployments are driven by embedded security mechanisms with lesser bolted-on overhead on the IT security teams. One successful example is the leveraging of “security for the cloud from the cloud” to provide elastic and adaptive security services for the hybrid cloud

    In this webinar, Avinash Prasad, AVP, Information & Cyber Risk Management and Munish Gupta, Principal – Information & Cyber Risk Management , Infosys (NYSE: INFY) will share their experiences with respect to standardization of security controls in Hybrid cloud environments.
  • Introducción a las pruebas de DSL: parte 2 Introducción a las pruebas de DSL: parte 2 Jesus Resendiz, Applications Engineer, EXFO Recorded: Aug 24 2016 59 mins
    Participe en este seminario web sobre las técnicas, la tecnología y las prácticas recomendadas de las pruebas de DSL.

    En este seminario trataremos los conceptos siguientes:

    •Evolución de la tecnología de DSL
    •Características y aplicaciones principales de las diferentes tecnologías de DSL
    •Técnicas y parámetros principales para las pruebas de DSL
  • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Aug 24 2016 36 mins
    Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

    The path to narrowing the time gap between compromise and discovery, and then neutralising business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

    In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

    You’ll learn:

    • How to calculate the total cost of ownership of a SIEM
    • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
    • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

    Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.
  • Preventing Ransomware in Healthcare Preventing Ransomware in Healthcare Matt Mellen, Security Market Architect, Palo Alto Networks Recorded: Aug 24 2016 36 mins
    The business model behind crimeware has changed. In recent years, the price of stolen records has plummeted, compelling cyber attackers to look for new sources of income. Many attackers have turned to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data. Now, barely a week passes without another healthcare organization experiencing a ransomware event. These events impact the quality of care clinical facilities can provide, costs organizations money in remediation efforts, and hurts their reputation as competent providers of care. But while as scary as ransomware can be, with new variations coming out all the time, there are straightforward steps organizations can take to prevent this threat.

    In this presentation, Matt Mellen, a former Information Security Lead at a hospital, will discuss practical steps healthcare organizations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will cover practical steps healthcare organizations can take on systems and network devices to prevent exposure to this rampant attack.

    Palo Alto Networks invite you to attend a webinar where you can learn how to protect your healthcare organization from ransomware attacks. We will cover:
    - How the most current variants of ransomware work
    - How to prevent successful ransomware attacks in Healthcare

    Ransomware Prevention Recommendations:
    https://www.paloaltonetworks.com/content/dam/adobe-campaign/Email-Assets/APJ/DG%20Hub/industries/ransomware-prevention-recommendations.pdf
  • 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 周德振(Adam), 高级解决方案顾问, Akamai Technologies Recorded: Aug 24 2016 59 mins
    *This webinar will be conducted in Mandarin
    Organizations are turning to leverage big data and analytics to ‘look’ for indicators of intent or indicators of compromise, thus helping organizations focus their security resources on the threats at hand. The challenge though is how to process the vast amount of data, and furthermore, keep it relevant, timely, actionable – contextual. The challenge becomes harder when threat actors utilize a variety of techniques to maintain anonymity, reduce their ‘fingerprint’ and mask their intent.

    In this webinar, Adam will share how Akamai leverages the vast amount of data that it sees daily to help its customers improve their security decisions, when the threat would otherwise be unclear. John will showcase how Akamai’s big data and analytics platform, Cloud Security Intelligence, powers its Client Reputation service. A service that provides the ability to forecast intent and protect applications against Distributed Denial of Service (DDoS) and application layer attacks, and how active defence can be applied to a variety of response mechanisms, delivering an intelligent contextually aware defence.

    各家机构正越来越倾向于使用大数据资源来“查找”各种恶意行为的迹象、甚至是破坏的先兆,来帮助机构把有限的安全资源集中在关注现有的威胁之上。但是,挑战在于如何处理这样大量的数据,而且保证数据的相关性、及时性和可用性不会受到影响。而且,随着安全威胁使用了更多样的技术来保证其匿名性、减少留痕并掩盖其意图,机构所面临的安全挑战也越来越严峻。

    在本次的网络研讨会中,Akamai 高级解决方案顾问-周德振先生(Adam),将会向您展示Akamai是如何在威胁尙不明确的情况下,使用每日承载的海量数据来帮助客户做出更加明智的网络安全决策的。Adam将会展示Akamai的大数据及分析平台、云安全智能是如何强化其客户端信誉(Client Reputation)服务。这种服务能够提前预告各种行为的迹象,并保护应用程序不会受到DDoS和应用层攻击。此外,您还将看到这种积极的安全防御是如何帮助各种响应机制,是如何交付智能化、高度关联的防御。

    8月24日(周三)| 时长60分钟 | 北京时间 14:00
    演讲人: 周德振(Adam), 高级解决方案顾问, Akamai Technologies
    主持人: 毛宇, CISSP, AMBCI, CCNP, PRINCE2, (ISC)²官方授权讲师


    预留席位,就在此刻!

    *This webinar will be conducted in Mandarin
  • Preventing Ransomware in Healthcare Preventing Ransomware in Healthcare Matt Mellen, Security Market Architect, Palo Alto Networks Recorded: Aug 24 2016 35 mins
    The business model behind crimeware has changed. In recent years, the price of stolen records has plummeted, compelling cyber attackers to look for new sources of income. Many attackers have turned to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data. Now, barely a week passes without another healthcare organization experiencing a ransomware event. These events impact the quality of care clinical facilities can provide, costs organizations money in remediation efforts, and hurts their reputation as competent providers of care. But while as scary as ransomware can be, with new variations coming out all the time, there are straightforward steps organizations can take to prevent this threat.

    In this presentation, Matt Mellen, a former Information Security Lead at a hospital, will discuss practical steps healthcare organizations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will cover practical steps healthcare organizations can take on systems and network devices to prevent exposure to this rampant attack.

    Palo Alto Networks invite you to attend a webinar where you can learn how to protect your healthcare organization from ransomware attacks. We will cover:
    - How the most current variants of ransomware work
    - How to prevent successful ransomware attacks in Healthcare

    Ransomware Prevention Recommendations:
    https://www.paloaltonetworks.com/content/dam/adobe-campaign/Email-Assets/APJ/DG%20Hub/industries/ransomware-prevention-recommendations.pdf
  • New Legal Requirements for Mobile Security – EMM is not Optional New Legal Requirements for Mobile Security – EMM is not Optional Ojas Rege, MobileIron VP Strategy, and Carl Spataro, MobileIron Chief Privacy Officer Recorded: Aug 23 2016 36 mins
    As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.

    This webcast is for Mobile IT and information security professionals and their legal and compliance teams. This webcast will cover:

    The foundational security controls now required by law
    How these controls are applied to mobile
    Best practices to achieve compliance
    The central role of Enterprise Mobility Management (EMM)
  • Following FITARA: The Changing Tech Landscape Following FITARA: The Changing Tech Landscape Presented by: Dell Recorded: Aug 23 2016 63 mins
    The implementation of Federal Information Technology Acquisition Reform Act (FITARA) brought about a major shake-up for officials across government, forcing agencies to address a variety of technology issues. By expanding oversight into IT investments and expenses, adjusting the roles of IT mission owners including the enhancement of the CIO's authority and updating the technology acquisition and procurement processes, IT leaders are working towards the common goal of an effective, efficient and secure technological landscape across all federal agencies.

    How can agencies continue to push forward in achieving the requirements laid out by FITARA and controlling IT costs in general?

    Join IT experts on August 23 as we explore how your agency can:
    - Better understand your IT environment and start gaining insight around the current software and hardware assets
    - Improve security and performance
    - Streamline and achieve FITARA compliance
    - Position itself to take advantage of technological advancements and innovate for the future
  • Cradlepoint’s Extensibility Platform, SDK & New COR Devices Cradlepoint’s Extensibility Platform, SDK & New COR Devices Cradlepoint's Product Management Team Recorded: Aug 23 2016 44 mins
    Cradlepoint announced it is delivering an innovative Router Software Development Kit (SDK) and extensibility platform to enable enterprises to customize Machine-to-Machine (M2M) and Internet of Things (IoT) connectivity to meet their specific business needs, applications, and network requirements.

    With the new Router SDK and extensibility platform, enterprises can now build and customize more intelligent, application-specific solutions on top of Cradlepoint’s latest COR IBR routers. Developers and enterprise customers can now create tailored M2M and IoT applications on top of Cradlepoint Solution Platforms that can precisely address their specific business needs.

    The extensibility platform launches in conjunction with new additions to Cradlepoint’s COR family of M2M-IoT and in-vehicle routers — the COR IBR600B and COR IBR650B. The new routers include embedded Cat4 modems that will perform at higher speeds and support additional bands. They also support auto-carrier selection that automatically connects to the U.S. wireless carrier associated with the SIM card installed.

    The new routers support the COR Extensibility Dock that enables dual modems, extra Ethernet ports, and support for a third party expansion card, as well as, Cradlepoint’s SDK and extensibility platform that enable customers, partners, and third parties to write custom scripts and then securely push those scripts down to the router fleet for distributed computing at the Networks Edge.
  • How to migrate and manage security policies in a segmented data center How to migrate and manage security policies in a segmented data center Professor Avishai Wool, AlgoSec CTO Recorded: Aug 23 2016 53 mins
    Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX, now a reality it's now far easier and quicker to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.
    Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.
    During the webinar Professor Wool will cover how to:
    · Identify and securely migrate legacy applications to a micro-segmented data center
    · Effectively define and enforce security policies for East-West traffic
    · Manage the micro-segmented data center alongside traditional on-premise security devices
    ·Identify risk and manage compliance in a micro-segmented data center
    · Use network segmentation to reduce the scope of regulatory audits
    · Identify and avoid common network segmentation mistakes
  • Hunting for Threats: tips and tricks for SOC experts Hunting for Threats: tips and tricks for SOC experts Matias Bevilacqua, Mandiant Principal Consultant Recorded: Aug 23 2016 49 mins
    Many Security Operation Centers operate in a reactive mode. They primarily respond to alerts that are being presented to them by implemented detection technologies. And we all know alerts are generated in overwhelming volumes, severely crippling SOC’s effectiveness and efficiency. Today’s threat landscape requires SOCs to operate ever more proactively to keep up with the threat actors. More and more SOCs therefor are actively ‘hunting’ for threats that may be residing in the environment they are to defend. ‘Hunting' however requires a different approach from the traditional, reactive mode, not least for the SOC experts themselves.

    Join Matias Bevilacqua, Mandiant Principal Incident Response Consultant, as he discusses tips and tricks for hunting for those lurking threats: what to look for, what tools to use, etc.? You will leave the session with some hands-on material to start turning over stones and uncover threats you never knew were there.
  • eSummit Session 3: Under the Shadow of the Cloud eSummit Session 3: Under the Shadow of the Cloud Rik Ferguson, Vice President Security Research, Trend Micro, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Aug 23 2016 49 mins
    This presentation will enumerate some of the risks, old and new, of migrating to a cloud infrastructure as well as the risks posed by consumer and employee “cloud creep”. I will detail how your business could impacted and illustrate some architectural and procedural changes that can help to mitigate these risks.
  • eSummit Session 2: Cloud Breach – Detection and Response eSummit Session 2: Cloud Breach – Detection and Response Matthias Maier, Product Manager EMEA, Splunk, Adrian Davis, Managing Director (ISC)² Recorded: Aug 23 2016 47 mins
    Your next breach or insider attack will most likely have you digging for evidence in the cloud. Are you prepared? The old styles of imaging disks and tapping networks won't work. They will not scale. Join this webinar to discover response scenarios for cloud enabled and cloud dependent enterprises, a model for preparing for cloud response and examples of cloud breach investigations.
  • Lessons Learned from Data Breaches at Banks Lessons Learned from Data Breaches at Banks Lawrence Chin, Security Market Architect, Palo Alto Networks Recorded: Aug 23 2016 40 mins
    In recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has come to light. Join this webinar for a review of these attacks, the role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council). Additionally, learn about some best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.
  • eSummit Session 1: Protecting Cardholder Data in the Cloud – A PCI Perspective eSummit Session 1: Protecting Cardholder Data in the Cloud – A PCI Perspective Jeremy King, International Director PCI Security Standards Council, Adrian Davis, Managing Director (ISC)² Recorded: Aug 23 2016 46 mins
    With more and more organisations using the services of a cloud provider, what impact does this have on securing Cardholder Data. This presentation will give an general overview of the PCI SSC, and then focus specifically on the issues relating to storing data in the cloud. Especially it will look at the key issues of “Who is responsible?” and “What happens when there is a data breach”. In addition the presentation will look briefly at the impact of the recent GDPR on cloud storage and cloud providers.
  • Lessons Learned from Data Breaches at Banks Lessons Learned from Data Breaches at Banks Lawrence Chin, Security Market Architect, Palo Alto Networks Recorded: Aug 23 2016 40 mins
    In recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has come to light. Join this webinar for a review of these attacks, the role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council). Additionally, learn about some best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.
  • 2016 Webroot Quarterly Threat Update 2016 Webroot Quarterly Threat Update Tyler Moffitt | Security Threat Research Analyst Recorded: Aug 22 2016 48 mins
    According to the latest annual Webroot Threat Brief, 97% of malware is unique to a specific endpoint, rendering static, signature-database security virtually useless. In fact, many attacks are staged, delivered, and terminated within a matter of hours, or even minutes, having harvested user credentials and other sensitive information. With the rising popularity of polymorphism and other trends, it is more crucial than ever that organizations strengthen their security postures with next-generation endpoint protection and real-time, highly accurate threat intelligence. Join this webinar for an in-depth discussion of the most recent quarter’s malware stats and trends, and how businesses can leverage this data to keep themselves, their users, and their customers safe from advanced attacks.
  • The modern way of hunting  - How three CTOs tackle incident response The modern way of hunting - How three CTOs tackle incident response OpenDNS CTO, Dan Hubbard, Lancope CTO, TK Keanini, and Threat Grid CTO, Dean De Beer Recorded: Aug 22 2016 53 mins
    Your corporate network is open terrain. And it's hunting season. Malware, ransomware, and phishing scams are lurking. It's time to identify these threats to the enterprise earlier in the kill-chain and protect your employees, your data, and your network. The next evolution of Incident Response is here.

    Isn't it time you adapted your security stack to gain visibility into threats across you endpoints, network, and cloud? We can arm you with the tools you need most to see what’s happening not just on your network and your endpoints, but also out on the Internet in the wild.

    Join the product CTO’s from both OpenDNS and our Advanced Threats Groups, Dan Hubbard, Dean De Beer, and TK Keanini as they review how to modernize your response with critical solutions that provide visibility into the network, endpoint, and cloud and additionally talk about how to use these tools to investigate threats in the present, retrospectively, and into the future.

    Join not one, but three CTOs from OpenDNS, AMP Threat Grid and Lancope for a complete review of what it takes to accelerate investigations, decrease incident response times, and uncover potential attacks before they are launched.

    Hear from OpenDNS CTO, Dan Hubbard, Lancope CTO, TK Keanini, and Threat Grid CTO, Dean De Beer on August 22nd at 10am PT. You’ll learn:

    -Strategies for addressing customer incident response challenges across Network, Endpoint and Cloud
    -Three unique approaches for digging deeper into what happened before, during, and after an attack
    -How together OpenDNS, AMP Threat Grid and Lancope combine to give you the best incident response portfolio

    Register now and let the hunting begin.
  • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Aug 18 2016 35 mins
    Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

    The path to narrowing the time gap between compromise and discovery, and then neutralizing business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

    In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

    You’ll learn:

    • How to calculate the total cost of ownership of a SIEM
    • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
    • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

    Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.
  • Creating Truly Personalized Apps with Transaction Data Insights Creating Truly Personalized Apps with Transaction Data Insights Evan Schuman, Moderator, VentureBeat Aug 24 2016 5:00 pm UTC 60 mins
    Rapidly evolving trends among digital financial services are driving fintech developers to create much more personalized customer experiences within their applications. By harnessing the power of consumer transaction data, these industry innovators can enhance customer engagement and drive more targeted cross-sell and upsell revenue opportunities.

    Analyzing consumers’ financial data is quickly becoming the future of online banking and those in the fintech community that can leverage this information quickly and effectively will have the edge and be able to deliver the personalized services necessary to attract and retain the next generation of banking customers.

    Join us on August 24 to hear from a panel of industry experts as we discuss the evolution of consumer transaction data analytics and how to leverage it to create a more contextualized and personalized user experience.

    We’ll discuss:
    * The increasing demand for fintech apps to create an individualized digital banking experience
    * The rapid advancement of gathering and analyzing consumer transactional data
    * How fintech developers can leverage contextual data to improve customer products

    Speakers include:

    * Alex Cram, Co-Founder and Chief Technology Officer, Track Technologies
    * Robin Verderosa, Senior Product Manager, Envestnet | Yodlee
    * Jim Del Favero, Chief Product Officer at Personal Capital
    * Mani Fazeli, VP of Product, Wave
    * Evan Schuman, Moderator, VentureBeat

    Register for this free event today!

    Sponsored by: Yodlee
  • Security in the Boardroom Series: Keeping Your Seat at the Table Security in the Boardroom Series: Keeping Your Seat at the Table Ashley Ferguson, Director, SecureWorks Governance, Risk & Compliance Aug 24 2016 6:00 pm UTC 60 mins
    This webinar will explore another aspect of the CISO’s role as an essential business leader: guiding the organization through the crisis of a breach.

    Featuring insights from CISOs and C-suite leaders who have been there and done that, the program will address incident response planning, setting C-suite and board expectations, and tips for providing the right information in a breach crisis situation to aid decision-making and public disclosures. Learn how to establish your role as part of the solution team, and how to avoid a reactionary response that too often leads to finger-pointing at the security team. You’ll take away actionable insights to apply to your own journey as an essential business leader.
  • Using Container Technologies for Agile, Scalable Application Releases Using Container Technologies for Agile, Scalable Application Releases Ian Philpot, Sr. Technical Evangelist, Microsoft Corporation and John Willis, Director of Ecosystems Development, Docker Aug 24 2016 6:00 pm UTC 60 mins
    Want faster time to deployment? Need to quickly scale your applications? Microsoft can help.

    Microsoft offers a comprehensive set of container technologies for scalable, high availability, and agile release cadence. Join us for an overview of how containers can improve your organization's application development lifecycle. The session will leverage real world examples and highlight Docker.

    Watch this webcast to understand:
    •The beneficial impact of adopting container technology
    •Installation, security, design considerations and deployment operations followed by a quick tour of the Docker platform
    •How container technology positively impacts operations

    Sign up now to save your space for the live event, or to receive notification when this webcast is available on-demand.
  • Active Hunting Revealed: How vSOC Identifies Threats in Your Environment Active Hunting Revealed: How vSOC Identifies Threats in Your Environment Stephen Jones, Dir. of Managed Services, GuidePoint Security & Kris Merritt, Sr. Director, Hunting Operations, CrowdStrike Aug 24 2016 6:00 pm UTC 60 mins
    The GuidePoint Virtual Security Operations Center (vSOC) was designed to address many of the common complaints and issues customers experience with other managed service providers. We use the cloud to provide dynamic scalability and cost savings. vSOC analysts provide validated security incidents that allow you to focus on what’s really important: remediation.

    vSOC Detect now integrates with CrowdStrike Falcon by leveraging the Falcon Connect API to ingest Falcon host data in to the vSOC Detect monitoring platform. This integration enables vSOC Detect to leverage the CrowdStrike platform for endpoint monitoring and allows analysts to correlate endpoint data against SIEM security logs. This added correlation within our SIEM enables active hunting by vSOC Detect analysts to discover new and emerging threats in customer environments.

    Join us to explore “Hunting with CrowdStrike”— and how our Integrations make CrowdStrike Falcon Versatile and Effective.

    Topics will include:
    - Using the CrowdStrike Integration vSOC Detect
    - Learning how analysts can:
    - Perform ad-hoc searches and queries
    - Quickly Conduct comprehensive investigations
    - Identify insider threat activity
    - Create dashboards and reports
  • Grid Cyber Lockdown: Ransomware in Critical Infrastructure Grid Cyber Lockdown: Ransomware in Critical Infrastructure - Aug 25 2016 2:00 am UTC 60 mins
    Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:
    - A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
    - A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
    - Best practices and technologies for protecting your organization against ransomware.

    Panelists
    Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
    Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
    Christopher Ellefsen, BKK Group, Senior Network Engineer
    Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
    Jack Whitsitt, EnergySec, Senior Security Strategist
    Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security
  • Grid Cyber Lockdown: Ransomware in Critical Infrastructure Grid Cyber Lockdown: Ransomware in Critical Infrastructure - Aug 25 2016 9:00 am UTC 60 mins
    Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:
    - A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
    - A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
    - Best practices and technologies for protecting your organization against ransomware.

    Panelists
    Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
    Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
    Christopher Ellefsen, BKK Group, Senior Network Engineer
    Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
    Jack Whitsitt, EnergySec, Senior Security Strategist
    Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security
  • Ransomware: How to Battle the Most Evolved Ransomware: How to Battle the Most Evolved Brendan Patterson and Ben Brobak Aug 25 2016 4:00 pm UTC 60 mins
    Large corporations are no longer the primary target for hackers, making network security for small and mid-sized businesses more important than ever before. Ransomware has evolved dramatically over the last few years, but one thing remains the same: it can wreak havoc the likes of which many businesses will never recover from.

    Join Brendan Patterson, Director of Product Management, and Ben Brobak, Technical Marketing Engineer, as they take a look at the evolution of Ransomware – and the best ways for businesses to protect themselves.
  • The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software Aug 25 2016 5:00 pm UTC 60 mins
    Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

    Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.

    Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
  • Breach Detection Systems The final protection? Breach Detection Systems The final protection? Thomas Skybakmoen Aug 25 2016 6:00 pm UTC 45 mins
    Find out how a breach detection system, which is designed to detect the activity of malware inside your network after a breach has occurred, can strengthen your defense.
  • Secure Storage: Keys to Successful State and Local Data Strategy Secure Storage: Keys to Successful State and Local Data Strategy Presented by: Veritas Aug 25 2016 6:00 pm UTC 60 mins
    As citizens increasingly demand faster and more responsive government platforms, harnessing the enormous amounts of data state, county and municipal governments generate is essential to optimizing operations and delivering these services. Left siloed and unattended, big data proves a costly headache; however, when properly managed, this data is a treasure trove that can fundamentally change the way services are delivered.

    In this viewcast, we'll take a look at the results of a recent Government Business Council research survey on how state and local officials are dealing with unstructured data and their strategies for organizing, protecting and leveraging it. Data experts will explore case studies and best practices on managing and processing big data at the state, county and municipal level.

    Join us to hear about the following:
    - Storing data with effective and cost-efficient methods
    - Securing data through the cloud
    - Using data to deliver more services faster and at a higher quality
  • How to (effectively) prevent ransomware infections How to (effectively) prevent ransomware infections Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Aug 26 2016 2:00 am UTC 60 mins
    Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.

    In this webinar you learn how Palo Alto Networks addresses today’s issues of network complexity, overwhelming data flows, and convoluted security rules with the Panorama network security management solution.
  • How to (effectively) prevent ransomware infections How to (effectively) prevent ransomware infections Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Aug 26 2016 9:00 am UTC 60 mins
    Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.

    In this webinar you learn how Palo Alto Networks addresses today’s issues of network complexity, overwhelming data flows, and convoluted security rules with the Panorama network security management solution.
  • Thunderstorm in the Cloud Thunderstorm in the Cloud Mathias Fuchs, Senior Incident Response Consultant, Mandiant Aug 26 2016 12:00 pm UTC 45 mins
    Immer größer wird die Anzahl der Unternehmen die ihre IT-Services teilweise oder ganz an Clouddienstleister abgeben. Dies führt zu einem erhöhten Aufwand und einigen Komplikationen wenn es zu Sicherheitsvorfällen kommt.
    In diesem Webinar präsentiert Mathias Fuchs Strategien wie Unternehmen trotzdem effizient Sicherheitsvorfälle untersuchen und eindämmen können. Anhand einer Fallstudie wir gezeigt wie sich cloudbasierte Untersuchungen von herkömmlichen unterscheiden.
  • Social Engineering - Are you the weakest link? Social Engineering - Are you the weakest link? Greg Iddon, Technologist, Sophos Aug 30 2016 1:00 pm UTC 60 mins
    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
  • Managing Cyber Risk From Third Party Contractors Managing Cyber Risk From Third Party Contractors Jake Olcott Aug 30 2016 3:00 pm UTC 60 mins
    Many recent data breaches have exploited security weaknesses in the networks of third parties to attack businesses. With supply chains growing and business functions increasingly outsourced, the number of third party organizations with access to your company’s most sensitive data has increased dramatically. How should organizations assess and manage the cyber risk by their vendors and suppliers? What kinds of policies and controls should organizations put in place in order to mitigate third party cyber risk? How can organizations continuously monitor the cybersecurity performance of their critical vendors in real time?

    Getting familiar with third party cyber risk management best practices and industry standards is a good start towards mitigating cyber risk for your organization. Join Jake Olcott, VP of Business Development as he discusses these topics and more.
  • CSA Research: Mitigating Top Cloud Threats CSA Research: Mitigating Top Cloud Threats Salim Hafid and Rich Campagna of Bitglass, and John Yeoh of CSA Aug 30 2016 4:00 pm UTC 60 mins
    With cloud adoption on the rise, IT leaders are looking to peer organizations to understand security best practices in the cloud. Bitglass and CSA surveyed infosec professionals to uncover the top threats to cloud security and the tools most often used to secure cloud apps.

    In this webinar, John Yeoh, Senior Research Analyst at CSA, joins Bitglass to discuss the results of the "Mitigating Risk for Cloud Applications" report and to explore the major issues facing organizations in their move to the cloud, from Shadow IT and inadequate visibility to concerns around government access.
  • RANSOMWARE SURVIVAL GUIDE RANSOMWARE SURVIVAL GUIDE Jennifer Cheng Director, Product Marketing, Proofpoint Aug 30 2016 5:00 pm UTC 60 mins
    What every organization needs to know before, during, and after a ransomware attack.

    Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

    Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

    Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

    •Why ransomware is surging.
    •Where it comes from.
    •What to do before, during, and after an attack.
    •Should you pay or not? What to consider.

    Exploit kits don’t stop. Neither should your business.