Hi [[ session.user.profile.firstName ]]

IT Security

  • Advanced Endpoint Protection (AEP) - Market Analysis and Survey Results CY2016 Advanced Endpoint Protection (AEP) - Market Analysis and Survey Results CY2016 Paula Musich, Will Fisher Recorded: Mar 1 2017 30 mins
    There is a lot of confusion in the crowded market of Advanced Endpoint Protection (AEP). This webinar will provide an overview of the NSS Labs AEP market assessment, including origins, drivers, inhibitors and major players. Included is results of a survey of buyer’s requirements, priorities and expectations.
  • Redefining Endpoint Threat Hunting with Behavioral Analysis Redefining Endpoint Threat Hunting with Behavioral Analysis Mike Vien, Malware and Forensic Expert Live 60 mins
    Join Mike Vien, Malware and Forensic Expert, for an interactive demonstration of determining the infection of know and non-know malware thru endpoint scanning using CounterTack’s powerful DDNA core that relies on behavioral intelligence, not signatures or patterns.

    Unknown threats don’t execute with any indicators and are not previously seen in an organization’s network, data center or within the user base. These are commonly referred to as zero-day threats. And most endpoint detection engines will not identify the right behaviors associated with unknown threats because they rely on signatures.

    ThreatScan PRO lets IT and security teams of any size and skill level apply the most powerful memory-based, endpoint scanning technology to determine the infection state based on malware infiltration. CounterTack delivers visibility into endpoint state for teams with a 100% cloud-delivered technology, and the expertise of a CounterTack expert to analyze critical scans. Leverages behavioral intelligence to identify malware artifacts and other indicators of potential compromise, calculating a module-level threat score, to give users the data they need, or the capability to remove it and eradicate it automatically.

    Attendees of this session will receive a limited-time only incentive to buy ThreatScan PRO.
  • How to Prevent Ransomware Infections How to Prevent Ransomware Infections Brook Chelmo Recorded: Mar 1 2017 60 mins
    With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.

    SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.

    Learn how to:
    •Stay safe from ransomware and other advanced attacks
    •Practice good security hygiene
    •Use trusted automated tools to protect your network and endpoints
  • Fighting the ‘Gap of Grief’ With Business-Driven Security Fighting the ‘Gap of Grief’ With Business-Driven Security Peter Beardmore of RSA Recorded: Mar 1 2017 35 mins
    Defending against human ingenuity demands a new way of thinking. With countless dollars spent and infinite alerts you still don’t have a true picture of what is going on. So when a breach happens, can you answer THE question: “How bad is it?” The inability to do so is what RSA calls the “gap of grief.” To answer, you must connect your security strategy and business risks.

    RSA’s cybersecurity expert, Peter Beardmore, will provide perspective on this important issue during this pointed webcast designed to help security leaders:
    - Learn how to garner the right visibility, in the right context to defend what matters most – and fast;
    - Discover the 6 steps to take command of your evolving security posture in this uncertain, high risk world; and,
    - Find out what it takes to link your security strategy with your business priorities.
  • How to Recognize and Fend Off Web-based Threats How to Recognize and Fend Off Web-based Threats Joshua Daggs Recorded: Mar 1 2017 18 mins
    Security 101: covering drive-by downloads, malvertising, watering hole attacks, plug-in vulnerabilities and much more from security experts as they guide you through the many face of cyberthreats with practical tips and tricks to protect your organization's key valuables: your data.
  • FINRA And SEC Exam Priorities For 2017 FINRA And SEC Exam Priorities For 2017 Martin Tuip, Sr Product Manager | Joanna Belbey, Compliance Subject Matter Expert | Dan Nadir, VP, Product Management Recorded: Mar 1 2017 49 mins
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2017.

    Joanna Belbey, Compliance Subject Matter Expert, Proofpoint, Dan Nadir, VP, Product Management, Proofpoint and Martin Tuip, Senior Product Marketing Manager will discuss some of the risks spotlighted for 2017:

    • Recordkeeping
    • Supervision and controls to protect investors
    • Suitability, particularly for seniors
    • Social media and electronic communications retention and supervision
    • Cybersecurity controls

    Learn how Proofpoint can help you and your firm meet these and other regulatory challenges in the year ahead. Live Q & A will follow.
    Time not convenient? Sign up anyway and we’ll send you the link to the recorded webinar plus valuable materials.
  • Forrester Total Economic Impact™ Study: Seeker® – IAST Forrester Total Economic Impact™ Study: Seeker® – IAST Liz Witherspoon, Forrester & Nadav Kotlarsky, Sr. Product Manager, Seeker Recorded: Mar 1 2017 52 mins
    Implementing Seeker, Interactive Application Security Testing by Synopsys, in your Agile development environment not only reduces time and cost to remediate security vulnerabilities, but also reduces risk of a data breach. To quantify these benefits, Synopsys commissioned Forrester Consulting to conduct an in-depth customer case study to examine the potential ROI an organization may realize from deploying Seeker.

    Join guest speaker Liz Witherspoon, Principal Consultant at Forrester Research, and Nadav Kotlarsky, Sr. Product Manager, as they explore an in-depth customer case study quantifying the potential ROI of deploying Seeker.
  • Next Generation: VPN vs. Virtual Cloud Network (VCN) Next Generation: VPN vs. Virtual Cloud Network (VCN) Bryan Embrey, Product Marketing Manager, Cradlepoint Recorded: Mar 1 2017 47 mins
    There’s no way around it: Setting up and maintaining traditional VPNs for remote access requires extensive time, energy and resources. Configuring, managing, and troubleshooting devices and applications located at the data center in headquarters and in each end device is one of the most complex and laborious aspects of network administration — especially with increased workforce mobility and IoT.

    With a next-generation Virtual Cloud Network (VCN), configuration, management, and security policies are streamlined and handled in the cloud.  This enables rapid deployment, reduces operational expenses and completely integrates with your existing infrastructure.

    At 9am PT / 12pm ET on March 1 2017, join Cradlepoint’s Bryan Embrey to explore how resilient, redundant, secure, and scalable VCNs leverage software-defined networking (SDN) and network function virtualization technologies to reduce complexity, hardware, and IT man-hours.
  • Microsoft CISO: Cybersecurity in Action Microsoft CISO: Cybersecurity in Action Bret Arsenault, Chief Information Security Officer, Microsoft Recorded: Mar 1 2017 26 mins
    Cybersecurity continues to be a top priority; leaders must constantly judge how to balance business enablement and cyber protection priorities as they support the digital transformation of their organizations.

    Join Microsoft's CISO, Bret Arsenault, as he discusses examples of this balancing act in action and where Microsoft can help to improve your security posture.
  • Network Security From the Cloud: the New Frontier  Network Security From the Cloud: the New Frontier  Mike Rothman, Analyst and President at Securosis and Ken Ammon, Chief Strategy & Technology Officer at OPĀQ Networks Recorded: Mar 1 2017 60 mins
    By 2020, 68 percent of the cloud workloads will be in public cloud.The combination of cloud computing, mobility, and IoT is disrupting traditional bolt-on network security methods and requires a new approach to ensure corporate data and systems are protected, wherever they happen to be.

    The reality is that you can't possibly scale the management of infinite perimeters without breaking down longstanding barriers between network and security management. More and more organizations are no longer thinking in terms of a single, monolithic network. Instead, they are implementing application, site and user-specific networks, leveraging policies specifically designed to meet the needs of its constituent. Controls and policies are being defined within the network, using software defined networking technologies to route traffic efficiently and layer security services where necessary.

    Join Mike and Ken to see what steps organizations are taking to eliminate the complexity of today's traditional network security approach, more easily adapt to business changes, and tighten the reins on security control. 
  • [VIDEO] The Rise of the Underground Darknet Criminal Economy [VIDEO] The Rise of the Underground Darknet Criminal Economy Josh Downs, Community Manager, BrightTALK & Rob Wainwright, Director, Europol Recorded: Mar 1 2017 11 mins
    BrightTALK will be broadcasting its in-depth interview with Europol Director Rob Wainwright and Josh Downs, Information Security Community Manager at BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Most 2FA Solutions are Insecure, Is Yours One of them? Most 2FA Solutions are Insecure, Is Yours One of them? Amar Singh & Chris Payne Recorded: Mar 1 2017 60 mins
    Everyone knows two-factor authentication right? or do you just know how to use it? Something you know and something you own is a phrase we can all recite but very few actually understand two-factor authentication and its true benefits. How it works, why two solutions are not alike or what to look for in a true secure solution are just some of the conversation topics covered in this webinar.
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks Recorded: Mar 1 2017 49 mins
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • 2017 FrostIQ – Asia-Pacific Data Center Service Providers 2017 FrostIQ – Asia-Pacific Data Center Service Providers Ajay Sunder, Vice President, Frost and Sullivan & Yu Xuan NG, Industry Analyst, Frost and Sullivan Recorded: Mar 1 2017 15 mins
    The Asia-Pacific data center services landscape is highly competitive, and dominated by telecommunications companies/carriers, wholesale/retail data center service providers, as well as managed service players. Who are the leading data center market participants in the region, based on market revenues and strategy vision? What are some initiatives taken by leading participants to stay ahead of the curve?

    The 2017 FrostIQ – Asia-Pacific Data Center Service Providers matrix provides a snapshot for industry CIOs and other decision makers, on the selection of best-in-class data center service providers in the region.
  • The Nuix Black Report: Find Out What Hackers are Really Thinking The Nuix Black Report: Find Out What Hackers are Really Thinking Christopher Pogue, Chief Information Security Officer, Nuix Recorded: Mar 1 2017 60 mins
    The Nuix Black Report takes a unique perspective on cybersecurity. Most security industry reports compile data about incidents that have already taken place or trends in data breaches—but these are clearly the symptoms of a deeper problem. Instead, Nuix has focused on the source of the threat landscape: the attackers themselves.

    Join this webinar with report author and Nuix Chief Information Security Officer Chris Pogue to discover the true nexus between attacker methodology and defensive posture:

    • Which countermeasures will actually improve your security posture (they’re not the ones you think)?
    • What is the best spend for your security dollar and why?
    • If hackers could speak to your CEO or board of directors, what would they say?

    Join Nuix and (ISC)² on Mar 1 (Wed) at 13:00 (Singapore time) and find out what hackers are really thinking.
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks Recorded: Mar 1 2017 48 mins
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Swimming in the Sea of Compliance: Become NCUA Compliant with Gemalto Swimming in the Sea of Compliance: Become NCUA Compliant with Gemalto Alex Hanway, Encryption Marketing at Gemalto Recorded: Feb 28 2017 42 mins
    The National Credit Union Administration (NCUA) requires every credit union to protect their members’ personal, private data. But with a host of mandates and a range of technology options, where should credit union IT administrators begin? Encryption and key management can address a number of the requirements set out in these guidelines. Together they can help credit unions become compliant and can keep customer data safe.
    Join our live webinar "Navigating the National Credit Union Administration (NCUA) Privacy Guidelines:
    Securing Customer Records with Encryption and Key Management" on February 7th to learn about:
    •Which specific guidelines concern customer information at rest and in transit
    •How encryption and key management addresses these requirements
    •The benefits of a centralized encryption management