Hi [[ session.user.profile.firstName ]]

IT Security

  • Beyond the Equifax Breach - Lessons and Actions to Take
    Beyond the Equifax Breach - Lessons and Actions to Take Dr. Chris Pierson (Viewpost), Sarah Squire (Engage Identity), Debra Farber (The Privacy Pact), Dr. Ravi Rajamiyer (Cavirin) Recorded: Sep 22 2017 64 mins
    The recent Equifax data breach, which may have jeopardized the personal information of 143 million U.S. consumers, will likely haunt us for years to come.

    Join this interactive panel with experts from the cyber security, identity and privacy space to learn more about:
    - What we know occurred or is likely to have occurred
    - Data Breach Timeline - too slow or too fast
    - External communications - how has the breach been handled and communicated
    - Internal Actions - security remediation, work with law enforcement, root cause, incident response
    - External forces - lawsuits, media scrutiny, and customer communications

    Speakers:
    - Dr. Christopher Pierson, CSO, Viewpost
    - Sarah Squire, Founder and Principal Consultant, Engage Identity
    - Dr. Ravi Rajamiyer, VP of Engineering, Cavirin
    - Debra J. Farber Executive Privacy & Security Consultant, Cranium USA & Host of "The Privacy Pact," ITSPmagazine
  • VRM Roadmap: Navigating to an Effective Vendor Risk Management Program
    VRM Roadmap: Navigating to an Effective Vendor Risk Management Program Sam Abadir, Director of Product Management, LockPath Recorded: Sep 22 2017 17 mins
    In this webinar, LockPath's Sam Abadir answers 5 questions on the road to reaching an effective vendor risk management program:

    • What encompasses Vendor Risk Management?

    • Who needs to know about Vendor Risk Management?

    • How does someone approach building a VRM program?

    • What does that approach look like today?

    • What will that approach look like in the future?
  • Prevent Service Outages with Operational Intelligence
    Prevent Service Outages with Operational Intelligence Joshua Lin (Senior Product Marketing Manager ITOM) and Puru Amradkar (Senior Product Manager Operational Intelligence) Recorded: Sep 22 2017 62 mins
    See infrastructure anomalies in real-time before services fail.

    Join us for this webinar to learn how to:
    •Proactively analyze infrastructure performance and thresholds
    •Detect anomalies that may indicate service outages
    •Transform from a reactive to proactive approach
  • Taking Windows Defender ATP into new territory: Protect, detect, and respond
    Taking Windows Defender ATP into new territory: Protect, detect, and respond Heike Ritter, Sr. Product Marketing Manager for Windows Defender ATP Recorded: Sep 21 2017 64 mins
    Join us to learn how Windows is raising the bar on security with the next version of Windows Defender Advanced Threat Protection (WD ATP). WD ATP expands into a completely new market category that will blur the lines between endpoint protection (EPP) and endpoint detection and response (EDR). WD ATP will provide one-stop shopping for detection and response, and even preventative protection that can help prevent breaches from starting in the first place.
  • Career Conversations with Women in Cyber Security featuring Elena Steinke
    Career Conversations with Women in Cyber Security featuring Elena Steinke Featured Guest: Elena Steinke, Information Security Strategic & Tactical Architect and Jessica Gulick, VP of WSC Recorded: Sep 21 2017 47 mins
    Join us at our next Career Conversations with Women in Cyber Security session. This webinar gives WSC members the opportunity to connect with female career professionals. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Featured Guest: Elena Steinke, Information Security Strategic & Tactical Architect

    Jessica Gulick, VP of the Women's Society of Cyberjutsu board will moderate discussions.

    About the Speaker:
    Elena Steinke has over 15 years of systems engineering, and Information Security experience in developing solutions, providing strategic direction, designing, building, and directing cybersecurity operations across continents on multi-national projects, in the financial and US Federal sectors. Steinke stood up and directed multiple Security Operation Centers, Network Operation Centers, Data Centers, and management of virtualized storage technologies and elastic cloud environments. She lead security efforts across the globe for Automotive and Mobile Security, Banknote Processing Systems, Electronic Payments, eSIM, and IoT Technologies. She built and led Threat Hunting, Vulnerability Management, Security Assessment, Penetration Testing, Risk Management, Secure Credential Management, Key Management, and Security & Awareness Training programs.
    Steinke volunteers as a Director at Women’s Society of Cyberjutsu (WSC). She holds a Bachelors IT, an MBA, and is pursuing her second Masters from Mercyhurst University in Applied Intelligence. Her certifications include CISSP, CEHv9, Security+, and Intel Threat Analyst.
  • Master chat-based collaboration tools in Microsoft Teams
    Master chat-based collaboration tools in Microsoft Teams Juliano Menegazzo, Microsoft Recorded: Sep 21 2017 70 mins
    Unique projects, workstyles, functional roles, and workforce diversity call for a complete set of collaboration tools. People are working from everywhere, and even the physical workspaces we’re all familiar with are changing. As this appetite for new ways of working together grows, Microsoft is finding new ways to support it. Office 365 offers a full set of solutions, including Office 365 ProPlus, Outlook, Yammer, SharePoint, Skype, and now, Microsoft Teams. This live demo is a deep dive into Microsoft Teams.
  • Equifax Hack and Improving Data Protection
    Equifax Hack and Improving Data Protection Satya Gupta (Virsec Systems), Shawn Burke (SungardAS), Vamshi Sriperumbudur (CipherCloud), William Leichter (Virsec) Recorded: Sep 21 2017 61 mins
    In the aftermath of the Equifax data breach, both consumers and enterprises are scrambling for ways to minimize the impact. Since highly personal information was exposed (social security numbers, addresses, birthdays), the implications of this breach could haunt us in the long-term future.

    What are the lessons of this breach to individuals, as well as organizations?

    Join this interactive panel discussion with security experts to learn:
    - The short and long-term effects of this data breach
    - What you can do to protect yourself and your organization
    - How to protect against future scams
    - Why breaches happen and how organizations can improve their breach prevention efforts, as well as employ technologies and process for faster breach detection and response
    - How to improve cyber security going into 2018

    Speakers:
    - Satya Gupta, CTO, Virsec Systems
    - Shawn Burke, Global Chief Security Officer, Sungard Availability Services
    - Vamshi Sriperumbudur, VP Marketing, CipherCloud

    Moderator:
    - William Leichter, VP Marketing, Virsec Systems
  • Using data analytics to drive your business ahead of the competition
    Using data analytics to drive your business ahead of the competition Cory Minton, Dell EMC; Steven Totman, Cloudera; Parviz Peiravi, Intel; and Nick Curcuru, Mastercard Recorded: Sep 21 2017 57 mins
    The most important topics in business today are focused on data analytics, security, the Internet of Things, machine learning, and artificial intelligence.
    How can leveraging data analytics to enable these strategic technology trends to drive your digital transformation and elevate your business? Where are you in adopting and implementing key strategies for driving your business ahead of the competition?
    Join industry leaders in data analytics including MasterCard, Cloudera, Dell EMC and Intel for a candid panel discussion on ways to drive success in business today. Examine the economic value of data and how you can use that data to build and protect your organization. Hear how data analytics strategies drive entirely new revenue streams, how security supports strategies, how data consolidation enables growth, and how insights from data elevate customer interactions.
  • Long Term Impact of PSD2 & How to Select a Strategic Partner
    Long Term Impact of PSD2 & How to Select a Strategic Partner Vanita Pandey, VP of Product Marketing at ThreatMetrix Recorded: Sep 21 2017 40 mins
    Join the Webinar: Long Term Impact of PSD2 & How to Select a Partner a Strategic Partner, featuring Vanita Pandey, VP of Product Marketing at ThreatMetrix, as she discusses the long-term impact of the Payment Service Directive (PSD2) and how to find a strategic partners in today’s crowded PSD2 landscape.

    The webinar will help you understand:

    •How the PSD2 requirements can be implemented in practice
    •Long-term impact of the PSD2 directive
    •How risk-based authentication (RBA) can be used to optimize the user experience
    •How to find a strategic partner in the crowded PSD2 landscape
  • Making the Executive Decision for Security Awareness Training
    Making the Executive Decision for Security Awareness Training Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Sep 21 2017 46 mins
    Cyber Security is on everybody’s minds these days. You can’t log in to your favorite web-based news site, it seems, without seeing a warning about ransomware, spear phishing, social engineering attacks or CEO fraud. Attackers have all the time in the world to create very targeted attacks, yet employees have seconds to decide if they will open an email, click on an attachment or even worse, install an “upgrade” supposedly sent by their IT department or software vendor.

    Today’s 20/20 panel discussion webcast will focus what you can do to train not only your users, but also your management team about these threats and how they can defend against them.
  • Protection of ePHI Not Making the Grade?   Automate Risk and Compliance
    Protection of ePHI Not Making the Grade? Automate Risk and Compliance Anupam Sahai, Vice President Product Management, Cavirin Systems Recorded: Sep 21 2017 29 mins
    Is your cybersecurity protection making the grade? Healthcare rates a 'C' in security, almost half of US residents have been compromised, and the end-user impact is tens of billions of dollars a year.

    An easy first step is understanding the attack vectors and automating HIPAA technical controls. This automation lets you quickly understand your baseline security posture both on-premise and within the public cloud, where you have gaps, and how to remediate them.
  • Strategies for the CompTIA Security+ Exam: SYS-501
    Strategies for the CompTIA Security+ Exam: SYS-501 Matt Salmon, CyberVista Lead Instructor Recorded: Sep 21 2017 58 mins
    Are you considering in earning the Security+ certification from CompTIA? A new version of the Security+ exam debuts this fall - version SYS-501. In this webinar, cybersecurity training provider, CyberVista, dissects the structure of the new Security+ exam. We will explain the 6 Domains that comprise the test while also providing valuable strategies for test day.
  • Secure, Easy Access Management in an API Economy
    Secure, Easy Access Management in an API Economy Keith Casey, Senior Developer Evangelist at Okta Recorded: Sep 21 2017 24 mins
    The API economy creates new opportunities and business models supported by connected APIs. Unfortunately, most companies aren’t ready technically or organizationally for this shift, and the change it brings. API-driven application development requires reconsidering how identity, authorization, and accountability change for employees, partners and customers while protecting the organization.

    In this presentation, “Create a Secure Digital Identity without Borders in an API Economy”, Okta’s Senior Developer Evangelist Keith Casey (a.k.a. “The API Problem Solver”) will cover the challenges of the API economy and how Okta API Access Management can save your team time, simplify your authorization, and increase the security of your platform.

    Attend this webinar to learn:
    - What is driving the dominance of APIs
    - How to align Security Architects, Integration Architectures and Developers on API Efforts
    - How Okta API Asset Management satisfies the API Access Management needs of developers and IT and security leaders
    - How Pitney Bowes is transforming their business with APIs and the Okta Platform
  • Extend Visibility & Control to Your Private Cloud & Software-Defined Data Center
    Extend Visibility & Control to Your Private Cloud & Software-Defined Data Center Sumit Bhat: Senior Product Marketing Manager, ForeScout Technologies Recorded: Sep 21 2017 20 mins
    Private and public cloud security are logical extensions of securing managed, unmanaged and IoT devices in the physical world. ForeScout security solutions help enhance security and compliance of your virtual assets, regardless of where they are located. In addition, ForeScout’s heterogeneous platform lets you to leverage your on-premises security operations team’s skills and maximize your existing security investments. In this webinar, you’ll learn how ForeScout integrates with third-party solutions to:
    • Discover and classify virtual instances (and cloud workloads) and assess their security posture
    • Gain consolidated visibility and provide unified policy management across Data Center and cloud environments
    • Proactively identify and manage underutilized or shadow VMs
    • Allow, deny or segment virtual machines and cloud instances based upon policy compliance

    Learn how you can enforce security across your hybrid campus and cloud deployments using one solution. Join us for this live online webinar.
  • An Industrial Immune System: AI Cyber Defense for OT, Sensors & IoT Devices
    An Industrial Immune System: AI Cyber Defense for OT, Sensors & IoT Devices Jeff Cornelius, PhD., Executive Vice President of ICS Solutions; Leo Simonovich, Director of Cyber Strategy, Siemens Recorded: Sep 21 2017 31 mins
    There is an urgent need for a new approach to combat the next generation of cyber-threats beyond the data center - across Operational Technology, Industrial Control Systems (ICS), sensors and industrial IoT devices. New AI-driven technology is making its way into innovation labs and into production environments within the world’s leading energy, manufacturing, municipalities, hospitals, and construction companies. These network-connected robots, sensors and IoT devices offer improvements in automation, efficiency and even safety, but often lack built-in cyber security.

    The silver lining is that the same wave of AI that is ushering in these innovations can also be used as an approach to protect them. Darktrace’s AI-powered cyber defense, known as the Industrial Immune System, is used by some of the world’s leading energy and manufacturing companies to detect early indicators of cyber-attacks or vulnerabilities across OT, ICS, sensor and industrial IoT environments.

    Join Darktrace’s Executive Vice President, Jeff Cornelius, PhD., to learn how Darktrace’s self-learning technology can be leveraged to help defend digital supply chains and ICS environments from cyber-attacks.
  • Investigation or Exasperation? The State of Security Operations
    Investigation or Exasperation? The State of Security Operations Duncan Brown, Associate Vice President, Security Practice, IDC & Jae Lee, Security Product Marketing, Splunk Recorded: Sep 21 2017 45 mins
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent* of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, associate vice president, security practice, IDC, and Jae Lee, security product marketing, Splunk, and discover:

    ● The time and associated cost security teams spend on incident response and how you compare to your peers
    ● How organizations are coping with an average of 40 actionable security incidents per week
    ● Where teams are focusing their security efforts
    ● Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • 10 Steps for Combating DDoS in Real Time
    10 Steps for Combating DDoS in Real Time David Holmes, Principal Threat Research Evangelist Recorded: Sep 21 2017 49 mins
    Please join us for the 10 Steps for Combating DDoS in Real Time Webinar.

    While the nature of distributed denial-of-service (DDoS) attacks is constantly evolving, two things are clear: the volume of attacks is increasing and every business is at risk.

    Join fellow IT Security Professionals for an interactive webinar presentation. You'll learn:
    - The importance of having a plan in place before attacks happen
    - The four basic types of DDoS attacks and what you can do to protect yourself against them
    - How to build your response plan using the customizable playbook and action plan
  • Protecting the business with SD-WAN segmentation
    Protecting the business with SD-WAN segmentation Robert McBride, Director of Enterprise and Telco Solutions Recorded: Sep 21 2017 33 mins
    Guest Wi-Fi services, partner networks and multi-tenancy all are drivers to segment the branch and WAN infrastructure to secure and prevent unauthorized access of corporate assets. However, what is segmentation when it comes to the next-generation branch architecture and SD-WAN? Is it really only VLANs and encrypted traffic?

    Attend this webinar to understand what is segmentation and how it is applied to software-defined WAN to address:

    •Optimal application experience
    •Secure and authorized connectivity
    •Third party network access and integration
    •Local guest services like Wi-Fi
  • CIS Checklist: How to Secure macOS like a Pro
    CIS Checklist: How to Secure macOS like a Pro Nick Thompson, Product Manager, Jamf Recorded: Sep 21 2017 30 mins
    The Center for Internet Security (CIS), a well-known independent organization, provides a recommended checklist for best securing macOS. Widely considered the standard in the security industry, organizations that adhere to the CIS checklist reduce the risk of vulnerabilities and maximize the protection of their computers and infrastructure. So how do organizations ensure they are implementing the guidelines correctly?

    In our webinar, CIS Checklist: How to Secure macOS like a Pro, we’ll explain how organizations can leverage and put to use the CIS checklist recommendations — in conjunction with Jamf Pro — to meet industry regulations and keep their Mac environment secure.

    We’ll cover:

    •An overview of the CIS checklist and why it’s important
    •Ways to accomplish specific tasks outlined in the security checklist
    •The impact on users when Macs are properly secured
    •Other security standards in the industry and how to meet them

    About the Presenter:

    Nick Thompson is on the product team at Jamf, an Apple device management solution for IT professionals. Nick is passionate about technology in the enterprise and closely follows the enterprise mobility management industry. He previously worked at Apple helping companies implement Mac and iOS deployments.
  • Cloud Security in 30 Minutes
    Cloud Security in 30 Minutes Michael Landewe, Cofounder Avanan Recorded: Sep 21 2017 25 mins
    If you are considering a CASB or email MTA gateway, you should see this video first. Securing Office 365, GSuite, Amazon and every other SaaS and IaaS has never been easier. Protect your data from malware, data leakage and malicious users.

    In this webinar, we will describe the next generation Security-as-a-Service platform that makes it easy to protect your data with the industry's highest rated technology for anti-phishing, sandboxing, antivirus, file sanitization, data leak prevention, compliance and more.


    About Avanan: Any SaaS | Any Security | One Click
    Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry's most trusted security vendors, Avanan offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.
  • How blockchain is revolutionising  financial services
    How blockchain is revolutionising financial services Steve van den Heever- Dimension Data, Isaac Arruebarrena, & Josep Alvarez Perez - everis UK Recorded: Sep 21 2017 62 mins
    Blockchain technology burst onto the scene in 2009 and has emerged as one of the digital era’s most promising innovations. From frictionless money transfers and lower transaction costs to seamless real-time payments, blockchain is completely reinventing the global transaction settlement process.

    In this webinar, Financial Services experts from everis UK and Dimension Data discuss how blockchain is transforming the way value is exchanged between people, businesses and devices, and outline emerging technologies allowing financial services companies to take advantage of distributed ledgers. They also look to the future of DLTs, sharing predictions on how these will become the standard technology behind transaction settlement for banks, financial markets, and asset exchange networks in the coming decade.

    Speakers
    •Steve van den Heever, Group Sales Director, Financial Services, Dimension Data
    •Isaac Arruebarrena, Blockchain Programme Manager, everis UK
    •Josep Alvarez Perez, ‎Partner, Head of UK Banking Practice and EMEA Blockchain Strategy, everis UK
  • 5 things you can do with a security policy management solution [APAC]
    5 things you can do with a security policy management solution [APAC] Jeffrey Starr, CMO & Edy Almer, VP Product Sep 26 2017 5:00 am UTC 60 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • Why sales people fail...and what you can do about it
    Why sales people fail...and what you can do about it Nigel Dunand Sep 26 2017 10:00 am UTC 60 mins
    •Sales cycles dragging on?
    •Not getting in front of enough on-profile prospects?
    •Frustrated by prospects haggling on price?
    •Tired of hearing the same old excuses from your sales team?

    If you manage sales people, and any of these types of challenges resonate with you, then sign up for this webinar.

    •Learn the importance of having a system for selling, and coaching your people to stick to it.
    •Find out why selling features, advantages, and benefits wastes everyone's time.
    •Discover how closing for a decision, YES or NO, can improve your sales teams effectiveness and efficiency.
  • DFLabs IncMan Product Overview
    DFLabs IncMan Product Overview Oliver Rochford, VP of Security Evangelism; Mike Fowler, VP of Professional Services Sep 26 2017 12:00 pm UTC 30 mins
    Learn how DFLabs IncMan can help you automate, orchestrate and measure your incident response and security operations.

    By joining this webinar you will have the opportunity to discover DFLabs IncMan and how our solution can help you to:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the amount of handled Incidents by 300%
  • Defending your endpoints from attacks starts with effective patch management
    Defending your endpoints from attacks starts with effective patch management Symantec Sep 26 2017 1:00 pm UTC 45 mins
    Like many other attacks, the high-profile cyberattacks this year (Wannacrry, NotPetya) have exploited vulnerabilities for which patches and updates already existed.

    Register for this short webinar for an overview on the biggest attacks of the year and learn more about how Symantec Patch Management provides visibility and compliance across today’s heterogenous environments to protect against similar attacks in the future.
  • 5 things you can do with a security policy management solution [US/UK]
    5 things you can do with a security policy management solution [US/UK] Jeffrey Starr, CMO & Edy Almer, VP Product Sep 26 2017 3:00 pm UTC 60 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • The Blockchain Bubble: Identifying viable  opportunities for blockchain
    The Blockchain Bubble: Identifying viable opportunities for blockchain Joe Pindar, CTO Office Director of Strategy Sep 26 2017 3:00 pm UTC 60 mins
    Blockchain technology is popping up everywhere from the currency market to smart contracts. The growth in the technology is evident from the investments being made, for example, PwC estimated that in the last nine last nine months of 2016, $1.4 billion had been invested globally in blockchain startups. This stems from its potential to enable efficiencies and cost-saving opportunities based on moving to a decentralized approach and away from the current centralized systems. With all the hype around blockchain, companies need to cut through the hype and ask the question - when does blockchain actually make business sense?

    Blockchain is not a silver bullet and cannot solve every problem. There is also the added complexity of managing the security of many distributed nodes can only be justified by gaining business benefits from using blockchain. In this webinar, we will look at a business qualifying approach to blockchain to help you evaluate valid blockchain use cases and identify the security needs surrounding blockchain operations. Join us to learn more on:
    •Securing blockchain from the edge to the core
    •The operational benefits and pitfalls of blockchain technology
    •Our 4 step qualification process for blockchain business opportunities:
    1.Is there an established business process?
    2.Are there more 3 parties involved – i.e. is it a distributed problem?
    3.Is it important that the data being exchanged is trusted and considered to be factually accurate?
    4.Would automation improve the performance of the process?
  • Psychological Mechanisms Used in Ransomware Splash Screens
    Psychological Mechanisms Used in Ransomware Splash Screens Jeremiah Grossman, Chief of Security Strategy at SentinelOne Sep 26 2017 3:00 pm UTC 45 mins
    SentinelOne recently released a report with De Montfort University to examines the differing levels of sophistication on the part of the attackers and trends and tactics use to commission a payment from organizations.

    Join this session as we discuss the common trends highlighted in the report including:
    - Time criticality and deadline sensitivity
    - Consequences for not paying or missing the demand
    - The Customer Service Approach on how to pay the ransom
    - The use of a variety of imagery
    - Preferred mechanism for payment

    About the presenter:
    Jeremiah’s InfoSec career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry’s biggest names. At SentinelOne, Jeremiah is responsible for designing effective defense strategies against ever-evolving attacks including ransomware. Prior to joining, Jeremiah was the Founder & CEO of WhiteHat Security, specializing in website risk management.
  • The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products
    The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products Jim Waggoner, Sr. Director, Product Management Sep 26 2017 3:00 pm UTC 60 mins
    Antivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses.

    On September 26, Jim Waggoner, Sr. Director, Product Management for FireEye will detail:
    •Why endpoint security products have not provided complete protection
    •Capabilities required for a comprehensive endpoint protection solution
    oAV with threat intelligence
    oDetection and response
    oBehavior and exploit analysis
    oVisibility and automation
    •How the latest FireEye Endpoint Security solution enables you to go from detection to investigation and remediation quickly, all with a single agent

    Attend this webinar as the first step toward a smarter, more adaptive approach to endpoint security.
  • How to Design Safe, Secure, and Reliable IoT Critical Infrastructure Systems
    How to Design Safe, Secure, and Reliable IoT Critical Infrastructure Systems Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Sep 26 2017 3:00 pm UTC 60 mins
    There’s no way around it; as a software developer, system engineer, or system architect, you’re going to encounter design complexity when developing safe, secure and reliable IoT systems for today’s critical infrastructure. But in this new software-defined world and with the IoT exploding around us, companies like yours must adapt to stay relevant. While legacy critical infrastructure is too expensive to just replace completely, there are ways to implement new features that will define premium products for your market and meet the safety and security requirements necessary for connecting to the IoT. In Day 1 of this three-day class, we’ll look at how you can transform digitally and ensure that your applications remain safe and secure. Sponsored by Wind River.
  • Evaluating CASB - Five Use Cases to Consider
    Evaluating CASB - Five Use Cases to Consider Aaron Smith, Sr. Product Marketing Manager, Cloud Security, Forcepoint Sep 26 2017 3:00 pm UTC 45 mins
    Your organization has a cloud-first imperative. You know that traditional, perimeter defenses will not protect employees using cloud applications. This webcast discusses five emerging use cases and how to address them while keeping employees, partners, and clients productive.

    - Discovery of Shadow IT
    - Managing any vs. all cloud applications
    - Securing users anywhere
    - Protecting the data, wherever it flows
    - UEBA in the cloud - it's more important than you think
  • Risk in the Cloud: Measuring and Mitigating with an Expert
    Risk in the Cloud: Measuring and Mitigating with an Expert Maurice Stebila, CISO, Harmon International, Dan Rheault, Sr. Product Marketing Manager, Tufin Sep 26 2017 3:00 pm UTC 45 mins
    The public cloud is a critical asset for enabling business agility, but the new rapid pace of cloud deployments cannot come at the expense of security. In a time when risks are regularly introduced through the diffusion of ownership of the cloud, security teams need to develop ways to identify the risks introduced to their network, understand how to measure those risks, and devise and employ risk mitigation strategies.

    This Tufin-hosted webinar will feature Maurice Stabila, CISO of Harmon International, a Fortune 500 company. Maurice is an award-winning, published, and internationally renowned leader in IT security. Attendees of this webinar will gain a better understanding of what risks are persistent in the public cloud, how your organization can measure cloud-specific risk, and gain exposure to some techniques for successfully managing cloud risk.

    Join us to hear an industry expert’s approach to solving these new security problems.
  • WannaCry & Petya - Where do we go from here?
    WannaCry & Petya - Where do we go from here? Carl Leonard, Principal Security Analyst, Forcepoint Security Labs & Neil Addleton, Security Advisor, South Australia Health Sep 26 2017 4:00 pm UTC 45 mins
    One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, financial, government and commercial enterprise networks can now be listed among its victims. Our security experts examine the technical and business threats that ransomware continues to pose to organizations for which IT security teams must be prepared to address and overcome.

    During the session, Carl Leonard and Neil Addleton will discuss the latest on WannaCry, Petya, Jaff and Cradlecore as well as examining the concept of “have-a-go” cybercrime. Highlights include:

    - Which ransomware should you defend against?
    - Should you pay the ransom?
    - What can you do to protect your data and network? (research-based)
    - How is your organization using the Cloud in a risky way, putting your data more at risk?
  • Surviving a CISO Transition
    Surviving a CISO Transition Shahar Ben-Hador - CISO; Bo Kim - Sr. Dir. Information Security; Paul Steen - Vice President, Global Product Strategy Sep 26 2017 5:00 pm UTC 60 mins
    How to make sure a CISO's work isn't dumped when they leave.

    A CISO's departure can leave a company vulnerable and its security posture at risk. Having a plan to manage a CISO succession is critical to business continuity. In this webinar, outgoing Imperva CISO Shahar Ben-Hador and his successor Bo Kim provide key steps to successful succession planning, including:

    * Building a transition timeline
    * Evaluating which projects should be completed and which handed off
    * Determining where to draw the line on investments

    About the Speakers:

    Shahar Ben-Hador, CISO, Imperva

    As the CISO of Imperva (NASDAQ: IMPV) Shahar's team was responsible for Cyber Security and Compliance of the enterprise footprint and Cloud Operations activities for Imperva and Incapsula SaaS product lines.

    Bo Kim, Sr. Dir. Information Security, Imperva

    Bo’s team is responsible for developing and maintaining Imperva’s security posture. He is assuming responsibility from Shahar for cybersecurity and compliance.
  • A Predictive "PreCrime" Approach Requires a Human Focus
    A Predictive "PreCrime" Approach Requires a Human Focus Dr. Richard Ford, Chief Scientist, Forcepoint Sep 26 2017 5:00 pm UTC 45 mins
    In Philip K. Dick's 1956 "The Minority Report," murder ceased to occur due to the work of the "Precrime Division," that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Precrime Division, empowered to intervene before a violation is ever committed.

    In this webcast, we will examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
  • Defending Against Ransomware in 2017
    Defending Against Ransomware in 2017 John Bambenek (Fidelis Cybersecurity), Masha Sedova (Elevate Security), Jay Beale (InGuardians) Sep 26 2017 5:00 pm UTC 60 mins
    Hacking and malware attacks, including ransomware attacks, are a major cause of breaches in 2017. With high-profile ransomware attacks on the rise, enterprises and small businesses worldwide are looking to better secure their data from cyber criminals and more nefarious attackers.

    Join this interactive Q&A session with security experts across industries to learn more about:
    - What can we learn from Wannacry, NotPetya and other ransomware attacks seen in 2017
    - Financial motivation or disruption
    - Who is at risk of a ransomware attack
    - What to do before, during, and after a ransomware attack
    - How can we better protect our businesses, organizations, governments and infrastructure from cyber attacks
    - Urgent steps to take today

    Moderator:
    - Jay Beale, CTO & COO of InGuardians

    Speakers:
    - John Bambenek, Threat Systems Manager, Fidelis Cybersecurity
    - Masha Sedova, Co-founder of Elevate Security
  • Next-Generation (SOC) Security Operation Center
    Next-Generation (SOC) Security Operation Center Rinki Sethi, Sr. Director, Information Security and Matt Mellen, Security Architect, Palo Alto Networks Sep 26 2017 5:00 pm UTC 60 mins
    Security Operations Centers, or SOCs, were invented to enable ease of collaboration among security personnel across different technologies and location, providing a full view of an attack. Most traditional SOC practices and tools, where established in a time when cyberattacks were primarily manual in nature. Nowadays, machine-based automated cyberattacks, with multi-steps approach leveraging variety of entry points are the norm and are challenging enterprises to ‘re-think’ their SOC and InfoSec team’s strategy.

    Join Matt Mellen from our PMM team, and Rinki Sethi, who leads our InfoSec team, for an educational webinar on defining and building your Next-Generation SOC, sharing insights and providing best practice from our own experiences.

    Join this information session to understand:

    •Why traditional SOCs fail.
    •What defines a Next-Gen SOC.
    •How to shift in focus from detection to prevention
    •The business value of building a Next-Gen SOC in your organization.
  • Why and How to Secure Cloud Apps While Keeping Employees Productive
    Why and How to Secure Cloud Apps While Keeping Employees Productive Shan Zhou, Sr. Director, CASB Engineering, Forcepoint Sep 26 2017 6:00 pm UTC 45 mins
    Cloud apps such as Dropbox, Box, Salesforce, Office 365 and Google Apps enhance productivity and collaboration between teams, but IT professionals have difficulty taking away access to these apps once users start relying on them. Taking them away is not the solution; instead, you should understand how to leverage the cloud’s operational benefits and cost advantages while simultaneously providing your IT team with visibility into cloud app usage.

    Using CASB (Cloud Access Security Broker) technology, organizations gain visibility into cloud app usage, identify high-risk activities and enforce policy and controls for cloud apps to prevent account-centric threats, meet compliance requirements and protect data.

    Join Shan Zhou, Sr. Director of CASB Engineering at Forcepoint, for an overview on CASB and as he addresses:

    • What are the gaps in cloud app security and how does CASB address them?
    • How do you identify the risky applications your employees are using?
    • What are the key CASB features to consider when implementing it into your environment?
  • Meeting Compliance Regulations in Cloud Environments
    Meeting Compliance Regulations in Cloud Environments Fernando Montenegro - Sr Analyst, Information Security at 451 Research & Jack Marsal - Dir Product Marketing at CloudPassage Sep 26 2017 6:00 pm UTC 60 mins
    IT environments have gotten markedly faster, helped by technologies such as public and private clouds, and automation tools. As a result, maintaining compliance with regulations such as PCI, HIPAA, SOC2, etc has become much more difficult if you continue to use old-style compliance thinking and tools. In this webinar, you’ll learn the friction points caused by old tools and the new best practices that will allow you to maintain compliance in any environment, no matter how fast-paced.
  • Optimize Incident Response in the Age of Ransomware
    Optimize Incident Response in the Age of Ransomware Tom Clavel, Senior Manager, Security Product at Gigamon Sep 26 2017 6:00 pm UTC 60 mins
    Organizations face increasing volumes of network data across their expanding physical, virtual and cloud networks. At the same time, dangerous malware, data breaches and ransomware continue to successfully penetrate their networks. Yet, network security, monitoring and analysis tools are overloaded, Security Operations teams are understaffed and overwhelmed and incident response is becoming more cumbersome and time-consuming.

    Learn how Gigamon, the industry leader in network visibility solutions, can help you optimize incident response and effectively secure your organization’s network using your existing security and monitoring tools.
  • 4 Reasons Next-Generation Antivirus Should Be Your Next Managed Service
    4 Reasons Next-Generation Antivirus Should Be Your Next Managed Service John Collins, SecureWorks Counter Threat Unit Principal Architect | Mike Viscuso, Carbon Black CTO Sep 26 2017 6:00 pm UTC 60 mins
    There seems to be no shortage of threats these days with attackers constantly innovating and combining different techniques with classic malware. New ransomware variants, targeted espionage campaigns, and attacks that don’t use malware at all are just a few threats that put your organization at risk. As each new attack generates global headlines, it can feel a bit overwhelming.

    It’s increasingly clear that the signature-based approach of traditional antivirus (AV) can no longer provide the protection needed to keep attackers off your endpoints. Join John Collins, SecureWorks Counter Threat Unit Principal Architect and Mike Viscuso, Carbon Black CTO, as they discuss how managed Next-Generation Antivirus (NGAV) goes beyond malware prevention to ensure that organizations of all sizes stay out of the security headlines and one step ahead of emerging cyber threats.

    You will learn:
    • What are the indicators that I need NGAV?
    • How do I know when it is time to make the move from traditional AV to NGAV?
    • Why is managed NGAV better able to address Ransomware, PowerShell and WMI threats?
    • What managed NGAV can do for you