The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
KTMD - A Corporate Cybersecurity Strategy to meet digital disruption challenges
Join our technical team in our first session to explore the dedicated features that gives Kaspersky Threat Management and Defense an edge.
- how KTMD exposes advanced attacks with precision machine learning and behavioral analytics, plus how it minimizes false positives to help ensure high levels of productivity for security teams, powered by the Kaspersky Security Network (KSN).
- discover what the Threats Landscape actually looks like
- what challenges Enterprises have today and explore how to mitigate against Advanced Threats whilst protecting against Complex Threats
At the end of the session you'll learn how to effectively PREVENT the threats, Rapidly DETECT the breach and RESPOND to incidents with our Multi-dimensional Advanced Threat Detection with Machine Learning.
Dan Pitman, Principal Security ArchitectRecorded: Apr 25 201953 mins
Financial organisations fall victim to cyber-attacks more frequently than any other industries. The growth in volume and sophistication of cyber-threats, combined with regulatory changes, mean that financial institutions are having to improve their IT security postures notably.
Facing modern cyber-threats head-on requires organisations to follow well-defined processes and mature IT security tools that need to be closely monitored and managed. Additionally, financial businesses handle highly confidential data that must be stored in a compliant manner and managed securely. A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.
Get the inside scoop on a new approach to threat management that gives financial organisations the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman, to learn more about this more effective approach to cybersecurity and threat management in the financial world.
• The state of cybersecurity at financial institutions
• Integrating security and compliance within Financial Services
• Understand how today’s vulnerabilities are being exploited
• Find out how to achieve the right level of leverage for the optimal level of investment
Richard Leadbetter, Technical Sales Specialist, EMEARecorded: Apr 25 201939 mins
By 2019, 92% of industrial organizations will have adopted Internet of Things (IoT) technology and 77% believe it will transform manufacturing. But, how are business executives using IoT today and what do they expect from it in the future? Join us and find out
Mit der einfachen, vollautomatischen Implementierung nutzt SonicWall Secure SD-WAN einen Low-Cost-Internetzugriff, um Remote-Standorte miteinander zu verbinden. Dies ermöglicht Einsparungen von bis zu 60 Prozent im Vergleich zu veralteten WAN-Technologien wie MPLS oder Frame-Relay.
Con una semplice implementazione zero-touch, SonicWall Secure SD-WAN utilizza l'accesso Internet a basso costo per connettere le sedi remote e consente di risparmiare fino al 60% rispetto a tecnologie WAN tradizionali come MPLS o frame relay
Grâce à la simplicité du déploiement sans intervention, SonicWall Secure SD-WAN utilise un accès Internet peu onéreux pour la connexion des sites distants et permet d'économiser jusqu'à 60 % par rapport aux technologies WAN existantes comme le MPLS ou le relais de trames.
Anand Visvanathan, Director of Product Management, Symantec and Linda Park, Sr. Manager IaaS, Security & Compliance, SymantecRecorded: Apr 25 201945 mins
Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.
Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.
Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.
During this webinar, you'll learn:
• Why traditional security monitoring tools cannot provide visibility into cloud compliance risks
• Why Security and DevOps teams need automated cloud security
posture management (CSPM) tools to remove compliance bottlenecks
• How to migrate your legacy infrastructure to the cloud without compromising security and compliance
Zack Allen, Director of Threat Operations, ZeroFOX and Ryan Trost, Chief Technology Officer, ThreatQuotientRecorded: Apr 24 201941 mins
How to identify and mitigate social media and digital risk
Financial service organizations have a massive footprint and attack surface on social media & external digital platforms — all of which is ungoverned, unmonitored and unprotected by the existing security perimeter. Understanding the threats on these platforms is critical, from financial fraud, phishing and malware spread on social media, customer scams, impersonating accounts and mobile apps, and more. Join ZeroFOX and ThreatQuotient to learn the top risks facing financial institutions on social and digital channels and key tactics for addressing those risks.
-Understand top trends and threats facing financial institutions on social and digital channels
-Gain knowledge of key tactics for addressing social and digital threats
-Learn about the tools available to your organization for mitigating risk
Omar Zarabi - CEO and founder of Port53 Technologies, Nathan Chan - Sr SE at OneLoginRecorded: Apr 24 201939 mins
Companies are moving to the cloud to compete more effectively and employees are using an increasing number of SaaS cloud applications. Unfortunately, these apps come with hidden risks and vulnerabilities when IT is not involved in securing and managing them. This issue is known as Shadow IT.
The good news is that, as serious as the Shadow IT is, it’s a solvable problem. By joining this webinar, you will learn:
- Measure the scope and risk of the Shadow IT within your business
- Gain back full control of your cybersecurity
- Bring visibility into corporate cloud application usage
- Get data driven recommendations no matter if your IT team is big or small
We will be showing a live demo of Cloud Risk Assessment Tool and walk you through a real customer case study.
So, join our two cloud security experts, Omar Zarabi CEO & Founder of Port53 Technologies, and Nathan Chan Sr SE at OneLogin on April 24th 10am PT for this webinar.
Can’t make it to the webinar? Register anyway, and we’ll send you a link to the on-demand recording once available.
Wesley Simpson, (ISC)²; Christopher Pierson, BLACKCLOAK & Marija Atanasova, BrightTALKRecorded: Apr 24 201963 mins
Find out what's trending in BrightTALK's IT Security community and the challenges keeping security professionals up at night.
Join Wesley Simpson, COO of (ISC)², Dr. Christopher Pierson, Founder & CEO of BLACKCLOAK and Marija Atanasova, Sr. Content Strategist from BrightTALK for an interactive Q&A session to learn more about:
- Topic trends & key insights
- What security professionals care about
- Events in the community
- What to expect in Q2 2019 and beyond
Brandon Cooper, Sales Support EngineerRecorded: Apr 24 201925 mins
Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability. Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do. We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately. Sign up to test drive CMD+CTRL!
Brian McHenry and Graham AldersonRecorded: Apr 24 201935 mins
Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.
Join us for this webinar to learn:
- How bots infect, propagate, and attack applications
- What types of application attacks are commonly performed by bots
- How you can defend against bad bots without disrupting the good ones
Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, ProofpointRecorded: Apr 24 201966 mins
Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?
Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.
· How business transformation like the rise of Office 365 has driven cybersecurity transformation
· Why you should pivot your transformation around people and culture, rather than infrastructure
· 6 principles for successful cybersecurity transformation
Rani Osnat, Aqua Security and Mark Bouchard, CyberEdgeRecorded: Apr 24 201953 mins
A joint presentation by Aqua Security and CyberEdge
Based on findings published in CyberEdge’s 6th annual 2019 Cyberthreat Defense Report*, containers are highlighted as one of this year’s “weakest links” in IT security given the lowest overall security posture score.
Mostly this can be attributed to the challenges enterprises face as they transition their containerized applications from the Dev/Test environment into production. Containers require a new approach to security as the traditional security infrastructure is not applicable to cloud native and serverless deployments. Rather they must leverage the cloud-native principles of immutability, microservices and portability using machine-learned behavioral whitelisting, integrity controls and nano-segmentation.
We will discuss :
•Key findings from the 2019 Cyberthreat Defense Report
•The unique security challenges (and benefits) of containers
•What leading enterprises are doing to automate their container security
•What you should look for in a container security solution
Elie Khoury, Principal Research Scientist and Manager, Ph.DRecorded: Apr 24 201920 mins
AI presents exciting but uncharted territory. And as AI forges its way into organizations’ voice interface, like any disruptive technology, benefits for your organization exist alongside new opportunities for criminals to use this technology against you and your customer:.
This webinar will explore potential pitfalls to your voice channels such as :
- Synthetic voice -- the arrival of synthetic voice introduces a whole new realm of fraud possibilities and ethical debates
- Chatbots and the new hacks fraudsters use to attack this channel
- The leaky IVR and the newest brute force attack trends you may be overlooking
Cradlepoint’s Roger Billings, Chief Architect, and Matt Thueson, Solutions EngineerRecorded: Apr 24 201958 mins
Wireless LAN isn’t just for offices and coffee shops. Today, IoT is everywhere, making the mobility and flexibility of wireless crucial even across large, sprawling areas such as warehouses, mines, airports, manufacturing facilities, hospitals, and even entire cities.
The need for large-scale wireless LAN is immense, but the ability of WiFi to meet that need is limited. Many organizations are instead deploying Private LTE, which can use a range of spectrums — including CBRS — to reduce congestion, enhance traffic flow, improve information security, and dramatically drive down costs.
In a live webinar on April 24, Cradlepoint’s Roger Billings, chief architect, and Matt Thueson, solutions engineer, will explore the benefits of Private LTE vs. WiFi for wireless LAN, and the potential ramifications within various commercial and public sector use cases.
Duncan Brown, Dr. Margaret Cunningham & Dr. Richard FordRecorded: Apr 24 201940 mins
Trust forms the foundations of any relationship. For businesses, trust provides a platform for building strategic partnerships, establishing a reputation, and embracing innovation and change. But large-scale data breaches and privacy abuses are undermining trust - 63% of senior executives at large enterprises say that trust has eroded over the past two years*.
What can be done to reverse this trend? In this webcast, our panel discuss:
- The factors and relationships that influence trust.
- How to foster a culture of trust within the organization.
- How technology can play a part in facilitating trust.
Watch this webcast and learn how you can help your organization become a trust leader.
Duncan Brown, Sr. Director Security Strategist, Forcepoint
Dr. Margaret Cunningham, Principal Research Scientist for Human Behavior, Forcepoint X-Labs
Dr. Richard Ford, Chief Scientist, Forcepoint
*Cultivating Trust To Gain Competitive Advantage, by Harvard Business Review Analytic Services, March 2019
Andi Mann, Chief Technology Advocate, Splunk, Inc. and Pankaj Prasad, Sr Principal Analyst, GartnerRecorded: Apr 24 201975 mins
IT Ops teams are now critical to an organization’s success and require a strategy that aligns with the organization’s objectives and its external stakeholders. Most infrastructure monitoring solutions haven’t caught up to meet these new requirements, forcing IT teams to resort to traditional monitoring strategies that don’t allow for innovation and growth.
Join Gartner analyst Pankaj Prasad and Splunk’s Chief Technology Advocate, Andi Mann, as we discuss new trends in IT monitoring strategy, best practices, and new IT models to implement in your organization.
Here’s what you’ll learn:
•How to effectively approach your IT monitoring strategy in this new world of IT
•Build a successful IT infrastructure operating model to get to market faster, innovate, and respond in real-time
•Best practices for integrating LOB owners, application developers and external stakeholders into your strategy
Tom McNash, Senior Solutions Engineer, CyrenApr 25 20192:00 pmUTC60 mins
In this webinar, Senior Solutions Engineer Tom McNash will review how new threat attack vectors are working, how cyber criminals are building threats in new ways today—whether for malware, phishing or denial-of-service attacks--and what security approach businesses need to be adapting to defend against these attacks. He will also explain how the profile of attackers targeting businesses is changing, and how one traditional form of defence against sophisticated attacks—the appliance sandbox—has itself become the object of attacks.
Jeff Barto and Angelique Pereira, Trust Strategists at DigiCertApr 25 20193:00 pmUTC60 mins
Stay updated on April 2019’s news regarding the trends and threats in digital certificates including TLS, SSL and code signing, plus PKI, IoT, encryption, identity and trust.
This month's briefing covers EV Extended Validation and OV Organization Validated certificates, Tumblr, HTTPS, eCommerce, code-signed malware-infected software updates, ACME and the IETF, US Senate bills Corporate Executive Accountability Act and Cyber Resiliency Act, the Weather Channel's ransomware attack, GDPR compliance, blockchain, cryptocurrency, Ethereum, weak passwords, weak private keys, AES, PQC post quantum cryptography, QKD quantum key distribution, IE Internet Explorer, zero day vulnerability with MHT files, Apache and nginx web servers, a suspicious uninvited Chinese guest at Mar-a-Lago, hacked Wi-Fi, Starz vs TorrentFreak, APT34 and OilRig, the Read My Lips and Lab Dookhtegan channel on Telegram, CryptoPokemon ransomware decrypter, charities, and free internet security training for citizens in Aurora, Illinois.
Join IBC365 on Thursday 25 April at 4pm BST to explore why creators are turning to cloud to transform the way they make great content and how virtualised workflows are unlocking the ability to work in new ways: faster, more collaborative, more efficient and more creative.
This webinar goes inside some of the world's leading content creators, production and post-production operations to hear how they are embracing cloud technology to transform the creative processes used to make, produce and deliver video.
We'll get hands-on with practical lessons on how cloud is enabling more collaboration, access to more talent, round-the-clock working, more content security, and slicker workflows. There's also a dose of reality, as we understand the human and technology challenges and the potential pitfalls of virtualising creative workflows.
Case studies focus on using cloud for:
•Streamlining content creation in the field
•Transforming production and post-production processes
•Efficient content delivery and backhaul
Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEAApr 25 20193:00 pmUTC60 mins
As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.
So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.
From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.
Moderator: Daniel Blander, Virtual Clarity
Joseph Feiman, Chief Strategy Officer, WhiteHat Security
Paul Farrington, CTO, Veracode EMEA
Erik Decker, CISO & CPO, University of Chicago Medicine & Ellen Sundra, VP of Engineering at ForescoutApr 25 20193:00 pmUTC60 mins
Join Erik Decker, Chief Information Security Officer and Chief Privacy Officer of the University of Chicago Medicine and Ellen Sundra, VP of Engineering at Forescout, to learn how to protect patients by applying the recommended principles and practices from Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP).
Over the past decade, threats to the health care industry has increased dramatically along with the sophistication of cyber-attacks. As a result, the Healthcare Sector Coordinating Council and the US Department of Health and Human Services collaborated to establish cybersecurity practices that can be used across the healthcare industry. Our guest, Erik Decker, serves as the industry lead on the development of, “Health Industry Cybersecurity Practices (HICP)”, which resulted from insights of the task group and over 150 health IT professionals.
Ellen Sundra leads this discussion to gain insights into actionable steps that health industry IT and HTM security professionals can establish, implement and maintain in their organizations to thwart cyber-attacks before they occur.
What you will learn in this webinar:
- How to reduce risk to the business by implementing solid security practices
- Which are top security practices to consider when facing some of healthcare’s top issues
- How using policy-based controls can simplify processes and protect the organization
Bill Belcher, Amit Kharat, Kristina ScottApr 25 20193:00 pmUTC45 mins
Recent innovations have made data security achievable for organizations of all sizes and industries. It’s now possible to quickly and effectively reduce the risk of data breaches and leaks.
Get up to speed with the 5 innovations every Security and IT professional should be aware of – to gain the confidence that their organization’s most sensitive information stays secure, these include:
1. Classification-driven protection
2. DLP-driven protection
3. Email auto-protection
4. Automated protection with enterprise applications
5. Orchestrated policy management, identity federation, and data tracking for compliance
Join this webinar to learn how integrated data classification and data protection from two industry leaders, Boldon James and Seclore, makes data security as straightforward as 1-2-3.
Vincent Geffray, Sr. Director, Product Marketing, Everbridge; Chuck Darst, Sr. Product Marketing Manager, Cherwell SoftwareApr 25 20193:00 pmUTC60 mins
IT incidents happen all the time, from outages, application slowdowns to cyber-attacks and some more critical than others. For IT incidents which require immediate attention, IT experts must be engaged in a timely manner and different groups need to be informed and/or updated. The challenge most organizations are facing is around the coordination of IT incident response when time is of essence. For instance, how to:
- Aggregate and manage all the relevant information centrally
- Identify the appropriate information share with different roles
- Ensure timely and effective response across teams
- Enable efficient collaboration regardless of people's location
In this webinar, Chuck Darst from Cherwell and Vincent Geffray from Everbridge will explain how the integrated Cherwell-Everbridge solution helps organizations manage, control and automate their response to IT incidents to minimize the impact on their IT professionals and on their business.
Jimmy Lin, Sr. Product Manager, SymantecApr 25 20193:00 pmUTC60 mins
On 29 March 2019, we further extended the capabilities of Symantec Email Security.cloud. As a SaaS security service, it undergoes many upgrades throughout the year, allowing us to make improvements and add new capabilities. We have always understood the importance of ensuring our products are designed around the user’s needs. This is critical as our customers rely on Symantec to provide a highly practical solution.
In this webinar, we’ll do a deep dive into some of the recent enhancements of our Email Security.cloud solution:
Indicators of Compromise Blacklisting
Service Configuration Health
Symantec Email Security.cloud App for QRadar
Rob Cataldo Vice President of Enterprise Sales USA, Kaspersky Lab; Chris Sherman Senior analyst serving security, ForresterApr 25 20193:30 pmUTC75 mins
To get ahead of endpoint cyberthreat complexity and protect their organizations, enterprise security and risk professionals must prioritize threat prevention and detection technologies that don’t require constant maintenance and overly manual workflows. In this webinar, attendees will learn how to identify the right combination of automatic and manual technologies commensurate with their security team’s level of expertise. This will put them in the best position to combat modern threats while also decreasing the amount of friction within their own security organization.
Eloy Avila, CTO Americas Darktrace; Gerald M. Segura Zúñiga, Gerente de Seguridad Informática, Banco Davivienda Costa RicaApr 25 20193:30 pmUTC30 mins
Los ciberataques se han convertido en el riesgo más grande que enfrentan las empresas de hoy, las ciudades inteligentes y la infraestructura crítica. Con un total de perdidas proyectado en un trillón de dólares en el 2019, debido al cibercrimen. En el centro de esta crisis esta el enfoque tradicional para la ciberdefensa, el cual se basa en reglas y firmas para detectar amenazas ya conocidas en un momento donde los cibercriminales lanzan ataques nunca vistas diario.
Para ponerse al día con un ambiente en evolución, Darktrace emplea un enfoque fundamentalmente distinto: basado en la inteligencia artificial. Impulsado por los recientes avances en inteligencia artificial. En lugar de predefinir las amenazas cibernéticas basadas en ataques del pasado, el Enterprise Immune System aprende un "patrón de vida" único para cada usuario, dispositivo y red que resguarda. Con esta compresión del “yo,” Darktrace puede detectar de manera sutil comportamiento anómalo e indicativo para amenazas conocidas y desconocidas, dándole la capacidad a los defensores de al fin poder luchar contra los adversarios en línea.
En este webinar, aprenderás:
-Donde los ciberdelincuentes han encontrado debilidades en los enfoques tradicionales de la seguridad.
-Por qué solo las herramientas de seguridad de autoaprendizaje pueden detener los ataques nunca vistos
-Cómo proteger su red de ataques de velocidad de máquina con Darktrace Antigena
- Lo que 100% de visibilidad puede revelar en su infraestructura digital, sobre vulnerabilidades latentes a los cuales atacantes avanzados están apuntando el día de hoy
Dale Levesque, Director – Product Management | TierPointApr 25 20194:00 pmUTC60 mins
More organizations are adopting a hybrid approach to IT and are seeking a partner to help integrate both outsourced and in-house IT services, ideally managed through a single interface.
Designed to meet the needs of our customers, the TierPoint Portal is a streamlined console that provides a comprehensive user-friendly dashboard of critical information immediately upon logging in.
From data center and managed services performance dashboards to trouble ticketing support, the TierPoint Portal is your dependable, always-on visibility tool to help manage your TierPoint IT infrastructure environment.
Join us to learn how the TierPoint Portal makes it easy to view, protect and access management tools for all facets of your environment.
Bob Maley, Normshield; Tony Rock, LockpathApr 25 20194:00 pmUTC60 mins
Interaction between the financial industry and third-parties has become more complicated due to the combined risk of the financial industry's rapid growth and an increase in third-party relationships.
In this exclusive webinar, Bob Maley, Chief Security Officer of Normshield, Inc., who designed information security programs from the ground up for major financial services organizations, will share his perspective of third-party risk in the financial services industry. He’ll discuss common financial third-party risk challenges and trends in the market, best practices and challenging scenarios from his career and how he resolved them.
As an attendee you’ll learn how his real-world third-party risk examples, best practices and recommendations can apply to your organization’s unique needs. Discover how to build and mature a successful third-party risk program in financial services by attending this educational webinar.
George Johnson, Vice President of Cyber Solutions, NC4 and Thanh Nguyen, Vice President of Technology, NC4Apr 25 20194:00 pmUTC43 mins
We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?
NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
Mark Rogan, DAST Manager, WhiteHat Security & Calvin Nguyen, Director of Product Management, WhiteHat SecurityApr 25 20194:00 pmUTC60 mins
Today’s applications touch millions if not billions of people on a daily basis. With virtually every business using applications to grow, they are critical to companies’ success—yet the vulnerabilities and risks associated with them continue to increase exponentially.
To help educate the market on avoiding breaches of this nature, the experts at the WhiteHat Security Threat Research Center (TRC) have compiled a Top 10 Application Security Vulnerabilities for Developers, detailing the most common web exploits used by malicious attackers during the past 12 months.
Join Mark Rogan from the WhiteHat Security Threat Research Center and Calvin Nguyen, Director of Product Management, as they discuss the top vulnerabilities and give valuable prevention tips for enterprises to implement.
Dr. V. N. Berlin, CEO, Mission Critical Institute, Rob Chubbuck, Information Assurance Systems Engineer, CACI InternationalApr 25 20194:30 pmUTC60 mins
Hear from a top cyber security employer exactly how you can get hired for a cyber breach prevention job without a degree in this four-part webinar series.
Let Rob Chubbuck, senior cyber security expert at CACI International, tell you how he decides to hire candidates without degrees to cyber security teams.
This webinar series will take you inside the recruiting process and you will learn the answers to these questions:
1. How big is the opportunity for cyber breach prevention?
2. How fast is that opportunity growing?
3. Why will he consider candidates without a degree?
4. What skills does he look for in a candidate?
5. What tools does he want a candidate to have experience using?
6. What experience should a candidate have for him to consider without a degree?
7. What personal characteristics are essential to him?
8. What academic credentials does he want a candidate to have?
9. What additional academic credentials does he want a candidate to earn?
10. What certifications does he want a candidate to have?
11. What additional certifications does he want a candidate to earn?
12. What does he look for in a resume to schedule a phone screen?
13. What must a candidate do in a phone screen to get the interview?
14. What kinds of questions are asked in the interview?
15. What answers does he look for?
16. What professional development plans does he want candidates to have?
This unique webinar series will tell you exactly what motivates an employer to hire a candidate without a degree into a top cyber breach prevention position.
Seating is limited to 75, so register now to reserve your spot!
ADDED WEBINAR BENEFITS: Register for the webinar and download the attachments to prepare for the interview. Download the CCRMP Career Readiness Assessment and schedule an interview with an MCI Cybersecurity Education Specialist to fast-track your cyber security career today.
Also included are complimentary $500 CISSP Exam Vouchers and $1995 CISSP Exam Prep Course Vouchers.
Matt Hurley - VP of Channels and Alliances at OneLoginApr 25 20195:00 pmUTC30 mins
This webinar is to give our partners quarterly updates about OneLogin Accelerate, partner program including active incentive programs, new sales plays and other program updates.
Presenter : Matt Hurley - VP of Channels and Alliances at OneLogin
Kim Lambert, Senior Product Marketing Manager, Imperva; Tim Garon (Moderator)Apr 25 20195:00 pmUTC60 mins
In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities that will allow them to establish a silent foothold into your environment. Join Imperva and (ISC)2 on April 25, 2019 at 1:00PM Eastern and discover a defense in depth security strategy to protect your most valuable web applications and your business from damaging cyber-attacks.
David Cohn Middleware Solutions Sales Specialist, Red HatApr 25 20195:00 pmUTC59 mins
Powerful tools are needed to design scalable, distributed systems that can take advantage of the agility and organizational efficiencies promised by microservices. Tools like Istio, and service mesh in general, solve some difficult problems like observability, security, and resilience, and are highly encouraged for cloud-native application deployments.
Join this webinar for:
An overview on the current cloud-native landscape from a technology perspective including technologies like Kubernetes, Istio, Kafka, and Apache Camel.
A discussion on how to "glue" your heterogenous environments, tools, and approaches together in a cohesive cloud-ready strategy.
Red Hat's approach to agile integration, including some government case studies.
Reference architecture for an open hybrid cloud, supporting both current and cloud-native strategies.
Luis Rico (LogRhythm) and Randy Franklin Smith (UWS)Apr 25 20195:00 pmUTC91 mins
Too often, when looking for malicious network traffic you either search for known bad or investigate anomalous traffic that doesn’t look normal. That reactive approach is time consuming, and potentially over-reliant on searching for larger concerns. Fortunately, new solutions use advanced analytics to proactively identify, enrich and alert on malicious traffic.
Why is this important?
Detecting known bad traffic is great when it works, but it’s a lot like signature-based AV (which is rigid and unable to detect unknown threats):
**Only really effective for widespread, generalized attacks – not so great for unique targeted attacks
**There’s an indefinite amount of time before the malicious traffic signature, domain name or IP makes it into the pattern updates and threat intel feeds from your vendors
**Detecting anomalous traffic can address the aforementioned weaknesses, but in practice it depends heavily on how – and how well – you define anomalous traffic, and how quickly (accurately) you can spot it.
Security practitioners are getting better by the day at looking for anomalies. Here’s just a few:
**Unrecognized port protocol numbers
**Malformed/non-compliant traffic compared to protocol expected on known port
**Protocols you don’t want or at least don’t expect to see in the given context
**High bandwidth usage for that protocol
**Disproportionate inbound/outbound bandwidth usage for a given endpoint
**Suspicious Destination/Source IP combinations
In this real training for free event, we will explore how to analyze your network so that you can learn and understand its traffic patterns and get a handle for what’s normal. You’ll then be able to take this information and look for anomalous traffic, build known-bad detections and make your network detection and response (NDR) technologies and efforts smarter.
Neil Thacker, CISO, NetskopeApr 25 20195:00 pmUTC60 mins
In a globally connected world where the number of cloud applications consumed by organisations rises daily, the challenges associated with protecting data and individual’s privacy are therefore also on the rise.
In this webcast we will look at some of the challenges associated with privacy including:
- Understanding contractual obligations
- Managing the geolocation of data
- Applying data transfers mechanisms and controls
Social networks today are undergoing a massive paradigm shift when it comes to content moderation. From tragic shootings broadcast live on Facebook, to YouTube removing comments on children's videos due to child predator concerns, social platforms are under fire from users, governments, and law enforcement to adopt better technology and strengthen their content moderation practices.
It’s not all bad news. Business leaders have also realized that accurate, efficient moderation, coupled with positive reinforcement, can increase user retention and encourage growth.
But who is responsible for enforcing these policies and practices? How did hate speech, abuse, and extremism become the "cost of being online"? And how can like-minded businesses band together to raise the bar and make their social platforms engaging, safe for all users, and ultimately, more profitable?
Join Two Hat CEO and founder Chris Priebe and veteran analyst and market influencer Brian Solis for an insightful talk about the changing landscape of online conversations and the role of content moderation. Social abuse and objectionable materials need no longer be the price of admission.
Register today for this free event!
* How to start a dialogue in your organization around protecting your audience without imposing on free speech
* The business benefits of joining the growing movement to "raise the bar"
* Practical tips and content moderation strategies from industry veterans
* Why Two Hat’s blend of AI+HI (artificial intelligence + human interaction) is the first step towards solving today’s content moderation challenges
* Brian Solis, Principal Digital Analyst at Altimeter, author of "Lifescale"
* Chris Priebe, CEO & founder of Two Hat Security
* Stewart Rogers, VentureBeat
Andy Wyatt, Senior Product Marketing Manager, InstartApr 25 20195:00 pmUTC45 mins
Delivering exceptional web experiences today requires a CDN that can go beyond the edge, and actually give you control and optimizations in the browser.
As the web quickly changes, your customers expect more secure and performant web experiences. It’s crucial that your CDN does more than just cache static files and be available all around the world.
The truth is, almost 50% of the requests an average website makes comes from a third party, which means a traditional CDN is only delivering half of your web experience. On top of that, the browser, not the edge, is becoming the point where optimizations and control need to be applied to give every user a great experience with your website.
In this webinar, we’ll cover:
- What makes up a modern website: public cloud, third-party tags, and dynamic content all coming together in the browser
- Why modern websites need more than just caching and delivery to enable exceptional customer experiences
- What optimizations and controls you should be looking for in a modern CDN
Cherie Martin, Sr. Solutions Marketing Mgr (Aruba), Josh Jaster, Systems Engineer (Aruba)Apr 25 20195:00 pmUTC35 mins
Is attracting new customers and increasing sales at the top of your business’s priority list for 2019? You’re not alone. In fact, roughly 70% of SMBs are investing or planning to invest over the next 1-2 years in technology to personalize and improve customer experience.
Join us as Cherie Martin, Sr. Solutions Marketing Manager, and Josh Jaster, System Engineer, review two core features your network must have to gain insight to your customer base and take engagement to the next level.
Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
Mark Sarbiewski and John KlassenApr 25 20195:00 pmUTC45 mins
Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can IT take control of the off-the-shelf unmanageable non-secure app that comes with our computers? Join this webinar to learn how IT can take control using a more secure, anonymous, disposable, productive, and compliant option to the web browser.