The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Thanks to a growing number of use cases — from failover to Parallel Networks, M2M-IoT, and primary WAN connectivity — the popularity of 4G LTE as a cost-effective network is on the rise, no matter what size the business. However, a new trend is emerging, combining LTE and Software-Defined Networking (SDN). This trend is enabling the WAN to be as pervasive as today’s wireless LAN.
Join Cradlepoint’s Todd Krautkremer (SVP of Strategy) and renowned industry analyst Dr. Jim Metzler for a discussion hosted by SpiceWorks on how 4G LTE and SDN will enable enterprises to do more by wiring less.
Companies used to know where their data was at all times: It was in the data center, surrounded by physical walls. But today, your data is everywhere your employees and customers are — on phones, on tablets, on laptops, in the cloud. Anywhere, anytime access provides more work-life balance and helps employees stay productive, but it also puts data security at considerable risk. The challenge companies consequently face is how to provide fast, simple access to enterprise applications, data and resources without compromising security.
Join Mark Hewett, senior product manager for Dell SonicWALL Secure Mobile Access, and Steven Sanderson, senior product marketing manager for Dell SonicWALL Secure Mobile Access, for a webcast on how to manage and provision mobile devices to protect company data and networks from cyber attacks, viruses, malware and other threats.
•Ensure that only authorized users have access to appropriate data and through approved devices
•Quickly and easily provision secure mobile access and role-based privileges
•Keep company data secure in-flight and at-rest on devices
No security posture is 100% effective against attackers. That is why IT teams must proactively identify and protect sensitive and regulated data whether “at rest” in file stores or “in motion” as it is sent or received.
Proofpoint Information Protection is the only cloud-based suite of solutions designed from the ground up to provide visibility and control of sensitive data across cloud-based email such as Microsoft Office 365, on-premises email, file shares, storage area networks (SAN), network attached storage (NAS), and SharePoint — all with out-of-the-box policies that provide insight to your attack surface in just 24 hours.
- Proofpoint Data Discover: Quickly discover exposed sensitive and confidential information in shared drives, NAS, SAN and SharePoint sites
- Proofpoint Email DLP: Prevent accidental negligence by employees with greater accuracy and control
- Proofpoint Email Encryption: Communicate securely with policy-based encryption of messages and attachments
It has been said that there are two types of companies: those who have discovered they have been breached, and those who have not discovered it yet. Although unsettling, this rationale is conducive to constructing a healthy attitude towards your organization’s’ security practices. This hour long webinar will help guide your security process to protect your organization’s most valuable assets by applying the scientific method—specifically, forming and testing hypotheses about potential incursions, and then acting upon the results.
In this webinar, you will learn:
1. How to apply a hypothesis-driven approach to security activities
2. Applying this mindset across time past, present and future—to enhance defenses
3. How DomainTools data and tools enable you to apply this strategy to your own organization
Attend this session to discover Microsoft's Cloud App Security (CAS) as we take you through an in depth demo of this cloud technology . We will explore how Microsoft's CAS allows you to benefit from using cloud applications within your organization, without compromising the security of your organization's data.
With Datadog’s cloud-scale performance monitoring capabilities, users obtain invaluable operational data about their cloud environment and applications. IMMUNIO is the latest addition to the list of more than 100 turnkey Datadog integrations (a group that also includes Amazon Web Services, Docker, and Slack). The IMMUNIO integration makes your existing Datadog monitoring even more powerful. By using IMMUNIO with Datadog, you gain critical insights into how attacks are affecting your system -- and you get the tools you need to stop the attacks immediately.
The data provided by your IMMUNIO integration with Datadog helps you determine what’s normal for your system and your apps -- so you can quickly zero in on abnormal activity, determine whether it’s malicious, and immediately safeguard your apps.
Join IMMUNIO and Datadog for this informative webinar and get the scoop on all the benefits of the IMMUNIO integration, including the ability to:
- Correlate CPU usage spikes with a brute force login attack
- Diagnose database query latency by matching to a blind SQL Injection attack
- Use IMMUNIO to stop bots by automatically serving CAPTCHAs, and set a Datadog alert based on number of CAPTCHAs served.
- Harden your application against Cross-Site Scripting, SQL Injection, Remote Command Execution, and other vulnerabilities -- even many zero-day attacks
Medical devices (biomed) introduce many cybersecurity challenges into healthcare delivery organizations, but what can you do? Connecting medical devices to your network and in turn to your physicians and EMR system increases clinical workflow while opening security holes. Much is out of your control. Device manufacturers control patch cycles and vulnerabilities persist so you segment your network which introduces administration overhead and increases the possibility of breaches due to misconfigurations. As you try harder to improve efficiency, is your environment becoming less secure due to improved connectivity? And what about patient safety when medical devices are connected directly to patients?
Join Dan McWhorter, Chief Intelligence Strategist at FireEye, and John Klassen, Sr Director Solutions Marketing, on this webinar to learn:
•The impact on Healthcare cybersecurity from complex medical device ecosystems
•What kind of attacks connected medical devices are vulnerable to
•Strategies and tools to lower your risk from compromised devices
Register today to understand this emerging threat landscape.
The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.
CISOs are often asked to justify a growing budget by showing ROI. But at the end of the day the security organization spends a lot of money and the answer to what is the ROI is that nothing happened. Because when the security leader is doing their job they are invisible. That is a very difficult conversation to have when you are trying to justify growing budget. The challenge is to change the perception as a cost center and become visible. This webinar will explore how to overcome these challenges by influencing the larger company’s budget to eliminate security concerns.
•Thinking Differently about ROI as companies build IoT businesses and move into cloud-based environments where there are no walls
•Mind Mapping the Business: The ROI Mind-Set of Security
•How Threat Detection and Incident Management Becomes a Competitive Advantage
•The Vision for Next Gen Automated Cybersecurity
Speaker: Michael Schiebel
45 Minutes Presentation/15 Minutes for Q & A/Crowdchat
How can companies effectively measure their company’s risk of a data breach? Which security metrics are most important when it comes to determining cyber risk? How do different types of security compromises, whether botnet infections or brand name SSL vulnerabilities, contribute to an organization’s risk profile?
In this presentation, BitSight’s Chief Technology Officer Stephen Boyer and Senior Data Scientist Jay Jacobs answer these questions and more. This data-driven webinar will highlight the extensive analysis that the BitSight Data Science team undertakes to make security signals into concrete risk mitigation actions. Perhaps most importantly, the speakers will give guidance on how security and risk professionals at every level - from the board room to the server room - can drive positive change throughout their organizations.
Lightning-fast and impeccable application delivery performance has nowadays became a modern standard in digitalized world, therefore a daily struggle to deal with increasing network loads has been undertaken into a large amount of attention and work to enable consistent flow in the delivery chain. Applications have become the new gold and protecting application delivery is the most important task for your business.
Application performance and availability is impacted by a wide variety of factors, therefore Comtrade’s SCOM Management Pack for F5 BIG-IP identifies specific nodes affecting applications and enables complete approach for resolving and maintaining operational functionality.
In this webinar, you will:
- Learn how to identify application servers which are unavailable or under heavy load
- See how to track selected load balancing algorithm performance for the specific application delivery
- See how repetitive issues can impact overall application delivery
Data centers are under unprecedented threat from hackers, malware, and insider threats. Yet modern data centers require security that doesn't compromise speed, performance or functionality.
Join the data center security webinar "Five Steps to Protect Your Data Center Against Cyber Threats" and learn how to secure your data center and achieve consistent security across physical, virtual, and cloud environments.
In this webinar, data center security expert Christina Hausman (Product Marketing Manager, Cisco Data Center Security) will share with you how to:
- Identify gaps in your data center security posture
- Gain visibility and control over custom data center applications
- Address the full attack continuum before, during, and after an attack
- Manage traffic flows securely between devices and data centers
- Adapt fluidly as data centers and threat landscapes evolve
- Reduce risk and accelerate business outcomes
When it comes to analysing and managing insurance claims, the market still runs in a very old school manner — human intervention, lots of paperwork and phone calls. This unfortunately also poses a real threat when it comes to fraudulent claims and applications. With digital advances and the rise of InsurTech, these risks can be minimised and fraudulent applications detected way before they can do any harm.
Join this panel where we’ll discuss:
-How predictive analytics can help spot fraudulent applications before they can do proper damage
-How new technologies can help investigate and monitor specific claims
-The need for more transparency throughout the claiming process and the importance of identity validation
-Improving the customer journey by empowering the individual to report and settle claims online or through mobile devices
As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.
If you’re focused on addressing user threats, User Behavior Analytics (UBA) can be a powerful tool in your kit. In this webcast David Gorton and Mark Settle from LogRhythm, discuss the elements of an effective user threat detection program. You’ll learn:
- Why detecting user threats is so important—and so difficult
- Different approaches to UBA
- The value of data from across your enterprise
- How to maximize the efficiency of your security analysts
Watch the webcast to learn how UBA can help you discover hidden user threats, reduce false-positives, and properly prioritize the most concerning threats.
Let our experienced Avaleris consultants paint a picture of the Microsoft Security solutions from end to end. See the mosaic of Microsoft security tools in this webinar, and we will help you wrap your head around the many solutions available to you and your organization.
There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/compliance issues. Join us for the insightful webcast where we will show how many organizations are tackling these concerns faster and easier than they thought possible. Come away from the webcast with your action plan on how you can start or continue your journey to the cloud without the challenges that may have been holding you back.
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
Bitcoin has been making remarkable breakthroughs in the currency world. Its ability to allow users to be fully in control of their transactions along with its no-borders transfer policy have made it attractive to both investors and consumers alike.
However, recent reports have revealed a darker side to Bitcoin. The cryptocurrency is being hoarded by financial institutions as ransom money to pay off potential cyber attackers. Has Bitcoin officially crossed the line and now become a black market currency? Has its untraceable nature inspired the new generation of cyber criminals to initiate unprecedented levels of targeted Ransomware attacks?
Join this panel of industry-leading speakers, who'll be discussing the following:
-Why has Bitcoin-related ransomware become more popular in recent years?
-How can you prevent a Ransomware outbreak in your organisation?
-Is it possible to catch and subsequently prosecute blockchain criminals?
-How can authorities and financial institutions adopt and adapt in the face of rising levels of Ransomware threats?
Comment les entreprises gèrent la croissance des volumes et la variété des données sans augmenter les coûts ? Est-ce que votre architecture de données est capable de gérer les nouveaux défis du Big Data ? rejoignez-nous pour ce webinar pour apprendre comment optimiser votre architecture de données et réduire considérablement ses coûts avec Hadoop. Particulièrement, nous allons traiter les sujets suivants :
- Réduire les coûts de stockage en déplaçant les données vers Hadoop
- Optimiser les traitements type ETL et les faire sur Hadoop
- Collecter et traiter de nouvelles sources de données
CSA, along with support from key corporate members like Rackspace and Intel, has been incubating a new intelligence exchange within the CloudCISC Working Group. Join CSA and technology partner TruSTAR to discuss:
- The challenges of building effective intelligence exchange
- How the CloudCISC exchange is designed differently
- How you can get involved in the growing collection of vetted CSA members exchanging intelligence everyday!
IT, Security, and IT infrastructure teams are faced with a complex set of challenges, and identity and access management (IAM) done the old way tends to compound things. Companies who haven’t modernized their IAM infrastructure can spend months dedicated to setting up each new business application, both on premises and in the cloud, and another several months launching it to their users. It doesn’t have to be this way, with cloud-based solutions such as OneLogin reducing the time, effort, and risk of IAM modernization.
Join us for an informative webinar with OneLogin presenters Nathan Chan, Solutions Architect, and Al Sargent, Sr. Director of Product Marketing.
Healthcare organizations face increasing regulatory pressure to maintain compliance with HIPAA regulations, while also needing to significantly modernize their technology to comply with ACA, Meaningful Use, and other federal, state, and local requirements. At the same time, the Healthcare field has never had a better opportunity to increase personalized care, lower costs, and leverage technology for measurably better outcomes. Cloud computing offers nearly unlimited computing and storage capacity - but with great power comes great responsibility. The agility Healthcare is enjoying in the cloud comes with increased risk and exposure to security breaches due to lack of compliance with Healthcare regulations and industry best practices.
Cloudticity's HIPAA Compliance as a Service, using Chef's automated compliance capabilities on AWS, is a fully automated software-as-a-service solution. In this webinar, you will see firsthand how Cloudticity has mapped Chef's compliance CIS profiles directly to HIPAA CFR regulations, providing a powerful automated solution to leverage the cloud's agility while minimizing risk.
With the phenomenal growth of data and the IT trends toward cloud and mobility adoption, enterprises are facing rising threats to sensitive data from both inside and outside the organization. They need to be able to protect data end to end without introducing complexities to users, while lowering the implementation and management costs of security solutions.
Join Hewlett Packard Enterprise and (ISC)2 on Aug 03 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to protect data from end to end.
Join us for our next customer webinar where we’ll share expert tips and best practices on how to extract maximum value from your Black Duck Hub implementation through automation.
Even before you scan your first line of code, Black Duck Hub brings value to your organization. This includes the ability to define strategies around users and user roles, project and policy management in order to simplify and streamline your organization’s open source security management. You’ll also learn how to integrate Hub and its security features more tightly into your continuous code development and DevOps ecosystem to bring you from a simple, reactive scanning approach to a more mature, automated one for managing open source use across your organization.
You Will Learn
• How to architect the right user, project, and policy management for maximum impact.
• Ways to incorporate Hub scanning into your continuous code development and DevOps lifecycle.
•Leveraging Black Duck Hub integrations with DAST/SAST security testing tools for enhanced application security.
• Best practices for interpreting your Hub scanning results and establishing a triage policy to deal with open source issues that need remediation.
• Ways to leverage the built-in and third-party resources to speed up the remediation process.
• How Black Duck Hub can help you move from a reactive approach to open source management to an automated one.
Following the demonstration, we’ll leave plenty of time for you to ask our product experts questions.
Join 451 Research to learn how IoT and connectivity are shifting user behavior and payment vendors' offerings, and will ultimately make transactions far more integrated while far less visible to consumers and enterprises. In this webinar we’ll examine previous attempts at integrated commerce, discuss what worked and what didn't, and detail the drivers underpinning the next frontier of commerce. Throughout the discussion, 451 will leverage recent insights from its Voice of the Connected User Landscape and Voice of the Enterprise: IoT surveys to paint a 360 degree picture of the key opportunities rapidly emerging at the intersection of IoT and payments.
In a digital economy, we shift to empowering employees and customers to innovate while embracing new business models and approaches. The new world requires reevaluation of how you improve productivity, move faster, do more with your infrastructure, and do it all securely.
In this webcast, viewers will learn:
•Key reasons why businesses are moving to the cloud
•How to empower employees through improved productivity
•Optimizing operations through leveraging cloud solutions
The usage of SaaS applications continues to grow rapidly whether they are enabled by IT or your end users. SaaS-based application usage has grown 46 percent over the past three years as shown in the latest Application Usage and Threat Report from Palo Alto Networks. The attackers are now adapting to leverage these applications as a point of insertion and a medium for malware to proliferate.
Join us for this live webinar where you will hear from Unit 42, the Palo Alto Networks threat research team, on how malware is using SaaS applications. You will also learn how to:
• Protect against the new insertion and distribution points for malware
• Gain visibility and granular, context-based control of SaaS applications
• Secure corporate data from malicious and inadvertent data exposure
Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.
Join us for an interactive discussion and learn more about:
• How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection
• What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack
• Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems
• How risk assessment plays a role in strengthening your security to preempt future attacks
The cloud's promise of on-demand functionality for a lower cost has arrived to business applications. The use of Microsoft Office 365 across the globe is growing rapidly, with a clear value proposition to re-invent productivity for organizations of all sizes. But the transition to the cloud is not without challenges. Office 365 offers concerns in terms of privacy, compliance and security which can be addressed through the use of end-to-end encryption for all e-mails and files sent to Office 365. Join HPE and (ISC)2 on August 4, 2016 at 1:00PM Eastern for an examination of the steps for an Office 365 migration, security and privacy concerns for the cloud environment and how to achieve end-to-end encryption.
When a disruptive technology emerges, it is often met with skepticism. A good case in point is ForeScout CounterACT®. It’s gaining a lot of traction in cybersecurity circles, with more than 2,000 large and medium enterprises and government agencies worldwide using the product as of April 2016. But for those IT professionals who might think its capabilities are too good to be true, ForeScout enlisted Miercom, a leading independent testing and consultancy, to provide unbiased, hands-on testing of CounterACT capabilities. Miercom’s findings are what this webinar is all about.
Please join us as Miercom President and CEO Rob Smithers talks about his lab’s findings with regard to CounterACT’s:
• Visibility (discovery, classification and compliance assessment) of network-connected corporate, BYOD, guest and IoT endpoints without use of agents or previous device knowledge
• Detection and full classification of hundreds of endpoints in seconds
• Policy-based control of devices by enabling IT staff to grant the appropriate level of network access to people, applications and devices
• Ability to integrate with leading network infrastructure and endpoint protection technologies
Join Rodney Landrum, Consulting Services Manager at Ntirety, a division of HOSTING, as he demonstrates the various reports available for SQL Server database security and compliance, both scheduled and automated. During the webinar, Rodney will be showing how to:
- Monitor changes to activity as the schema/table, code, database and instance level
- Review user and role security and reporting (meets SOX compliance needs)
- Capture and report on user access and modification of data down to the column level
- Uncover security weaknesses
Increasingly, high-profile data breaches are tracked to compromised third-parties or privileged accounts, which is often the attack pathway taken by cyber criminals. Privileged account credentials with connections to valuable systems give hackers access to critical systems without triggering any alarms, making those people and roles ideal targets. This webinar will offer insight into results from Bomgar’s groundbreaking research on why third-party vulnerabilities exist, and offer solutions for what companies can do to increase their security posture and mitigate the threat from third-party access.
Your business naturally needs to change over time, so how do you ensure your IT solutions keep pace? One solution: get the best of both worlds by leveraging your current infrastructure while accessing cloud resources to flexibly scale to meet demand.
In this webcast, viewers will learn:
•What flexible, scalable IT infrastructure looks like
•How to move workloads to the public cloud while maintaining a complete view of your existing infrastructure
•How to think about storage, backup and recovery for mission critical activities
The main areas covered in this webinar will be the latest smartphone threats and malicious back doors. How Hackers are gaining access into user's mobile phone and reach into financial information just by deceiving user just with one application.
We all make transactions through smartphone apps, and these need to be safe and alert. The audience will learn about how to defeat hackers by using smartphone smartly.