Hi [[ session.user.profile.firstName ]]

IT Security

  • What is the biggest risk of poor API performance?
    What is the biggest risk of poor API performance?
    Shahnawaz Backer, Solution Architect, F5 Networks Recorded: Dec 12 2019 43 mins
    It’s a fact: APIs are central to digital transformation. They’re the connective tissue that powers modern web architectures and mobile apps and enables enterprises to deliver a digital marketplace. APIs have become ubiquitous—when we order food online, hail a cab using an app on our phone, or book airline tickets, APIs are behind it.

    As you modernize applications, you’re going to need a modern API management solution. Learn how F5 and NGINX can help you achieve full API lifecycle management across multi-cloud environments for both traditional and modern apps.

    In the webinar and demo, we will explore:
    - What is API Management
    - How to secure your API gateway
    - API Gateway Deployment patterns
    - Visibility and Analytics to mature API program
  • APAC: 2020 Cybersecurity Predictions
    APAC: 2020 Cybersecurity Predictions
    Raffael Marty, Head of Forcepoint X-Labs & Carl Leonard, Principal Security Analyst, Forcepoint Recorded: Dec 12 2019 50 mins
    Join Forcepoint’s Head of X-Labs, Raffael Marty, and Principal Security Analyst, Carl Leonard, as they discuss our top 5 Cybersecurity Predictions for 2020. In this webinar they will discuss:

    - The evolution of Deepfake media applied to cybersecurity
    - Data theft at the speed of 5G
    - What it means to be “Cloud Smart” but remain “Cloud Dumb”
    - Making data protection and privacy legislation work for you
    - Moving ‘left of breach’: from indicators of compromise to indicators of behaviour

    Watch this webinar and gain valuable insights for the year ahead.
  • Symantec Integrated Cyber Defense
    Symantec Integrated Cyber Defense
    Paul Agbabian, Global Chief Technology Officer and Chief Architect, Broadcom Recorded: Dec 12 2019 59 mins
    Join Paul Agbabian, Global CTO and Chief Architect, as he details the power of our combined enterprise security solutions and discusses how Symantec is delivering integrated cyber defense to solve critical cyber security problems for your entire organization.
  • How to Improve your Disaster Recovery in Leaps and Bounds
    How to Improve your Disaster Recovery in Leaps and Bounds
    Manjul Sahay, Director of Product Management Nutanix Recorded: Dec 12 2019 37 mins
    In this webinar, you will learn about deploying a successful solution for Disaster Recovery (DR) with Nutanix. You will gain insights into key trends and gather data points to help you prepare a business case for DR within their organizations: ESG Senior Analyst Christophe Bertrand will outline the market landscape and explore organizations’ challenges and needs for a business continuity / disaster recovery planning. The key with DR is to get it done right. That’s why you will also hear from Manjul Sahay from Nutanix who will share how Xi Leap cloud DR service from Nutanix can help organizations deliver on their data protection and DR SLAs.
  • Why It's Crucial to Back Up Office 365 - and How To Do It
    Why It's Crucial to Back Up Office 365 - and How To Do It
    Karl Thomson, Senior Sales Engineer, StorageCraft Asia Pacific Recorded: Dec 12 2019 39 mins
    Microsoft Office 365 and Google G-Suite bring many benefits to organizations of all size. However that doesn't mean that your data is completely safe.

    Actually Microsoft themselves recommend "that you regularly backup your content and data that you store on the services or store using Third-Party Apps and Services."

    Join our webcast and learn how StorageCraft Cloud Backup for Office 365 and G-Suite, provides effective protection for these two SaaS based vendors.
  • How To: Technical Guide to Meraki APIs
    How To: Technical Guide to Meraki APIs
    Cisco Meraki API team Recorded: Dec 12 2019 52 mins
    Over the last 2 years Meraki has been investing in our own API capability and allowing our customers to consume it with the unique Meraki simplicity they are accustomed to.

    In this technical webinar, you will learn how to build Meraki APIs step-by-step. RSVP for a guide to start your API journey with Meraki.
  • Best Practices for Creating Order from Phish Reporting Chaos
    Best Practices for Creating Order from Phish Reporting Chaos
    Greg Kras, Perry Carpenter Recorded: Dec 11 2019 41 mins
    When Greg Kras, KnowBe4’s Chief Product Officer, first rolled out our Phish Alert Button (your users can use it to report suspicious emails), he thought it would be a great way for you to stay up-to-date on actual phishing emails occurring in the wild. Well, he was right but there was also an “interesting side effect”.

    Phish reports grew from a couple hundred emails in the beginning to 10,000+ messages per day! Like you, KnowBe4’s team had to adapt our processes to deal with the influx of reports and create mechanisms to facilitate prioritization, enabling the team to take action.

    Join Greg and Perry Carpenter, KnowBe4 Chief Strategy Officer, as they explore the challenges and opportunities for creating order from your organization’s phish reporting chaos. Learn useful tips and best practices from in the trenches lessons learned to turning today’s “see something, say something” world into an asset rather than a liability.

    Listen to hear about:

    - How to maintain business continuity by returning “clean” messages as fast as possible
    Enriching email data and clustering into groups to expedite prioritization and follow up
    - How Artificial Intelligence and Machine Learning can help you spot real malicious emails even faster
    - How automating your email disposition process can save you so much time
  • SASE: Security for the Cloud & from the Cloud
    SASE: Security for the Cloud & from the Cloud
    Mike Schuricht, VP of Product at Bitglass Recorded: Dec 11 2019 50 mins
    What’s all the buzz in the cybersecurity industry around SASE, and how does it relate to CASB and SWG? How do organizations secure their data in our cloud-first world? Join our webinar to learn about:

    What exactly is a SASE?
    How are CASB and SWG evolving?
    Real-world use cases for organizations securing SASE
  • Instart Web Skimming Protection for Salesforce Commerce Cloud
    Instart Web Skimming Protection for Salesforce Commerce Cloud
    Andy Wyatt, Sr. Technologist at Instart Recorded: Dec 11 2019 17 mins
    Magecart attacks, named after common vulnerabilities in the Magento platform, continue to be a thorn in the side of retailers all over the world. These attacks rely on secretly loading a small blurb of JavaScript that skims customer information when they checkout. Recently, attackers have found new ways to add this JS blurb not only on Magento sites but also on larger platforms like Salesforce Commerce Cloud.

    As web skimming attacks like Magecart continue to grow in popularity for hackers, businesses need to take responsibility for customer information they obtain in their web apps and take the appropriate steps to ensure their customers' data is safe. Today Instart is happy to announce our Web Skimming Protection for Salesforce Commerce Cloud to help prevent these types of attacks from impacting Salesforce Commerce Cloud clients.

    In this webinar, you will learn about:
    -Magecart attacks and how they infect your site
    -Why Instart can make a difference in helping you prevent a breach like this
    -How to get started with Instart Web Skimming Protection for Salesforce Commerce Cloud
  • Leverage Hybrid Cloud with CloudShell Pro
    Leverage Hybrid Cloud with CloudShell Pro
    Quali Recorded: Dec 11 2019 3 mins
    Accelerate and simplify your environment provisioning with self-service, on-demand replicas of full-stack infrastructure environments for hybrid cloud configuration in just one click.
  • Gearing up for 2020: Best Practices to Secure Your Remote Workers
    Gearing up for 2020: Best Practices to Secure Your Remote Workers
    Negisa Taymourian, Senior Product Marketing Manager at Cisco Umbrella Recorded: Dec 11 2019 42 mins
    Security needs to evolve to secure DIA and mobile users, remote workers, and SaaS apps. With 2020 on the horizon, organizations need a better way to see and control all internet traffic.

    Workplaces are changing; more organizations are switching to direct internet access (DIA) at satellite offices. Users are embracing cloud apps, skipping the VPN, and enjoying the freedom to work from anywhere. But the draw of DIA creates even more gaps in security for IT

    Join us for this webcast to learn how you can improve security, simplify your security environment, and reduce the number of security tools to reduce strain on your limited resources.
  • Reducing the risk of workload data loss during OpenStack upgrades
    Reducing the risk of workload data loss during OpenStack upgrades
    Jon Tobin Solutions Architect, Trilio, Kevin Jones Cloud Domain Architect, Red Hat Recorded: Dec 11 2019 49 mins
    Cloud upgrades can be painful. It’s tempting to delay these system changes and bypass updates in order to avoid interruptions in day-to-day operations. But as your software ages and become more susceptible to security risks over time, the need for a simple, reliable upgrade path grows more urgent.

    This webinar will walk through the Red HatⓇ fast forward upgrade process and introduce TrilioVault, which provides data protection for complete OpenStackⓇ workloads.

    Join us to learn:

    - How Red Hat and Trilio offer a safer, more secure, and more efficient path for customers to upgrade to the latest OpenStack version.
    - About the value of data protection during upgrades and how TrilioVault captures and protects tenant workloads throughout the procedure.
    - How administrators can rapidly and efficiently restore an entire overcloud in an automated fashion, while minimizing user input to the bare minimum.
    - How you can reduce downtime by streamlining restoration activities with point-in-time backups from Trilio.
  • A 2020 Market Guide to Selecting SD-WAN
    A 2020 Market Guide to Selecting SD-WAN
    Andrew Leong, Director Product Marketing, R. Scott Raynovich, Founder and Principal Analyst Recorded: Dec 11 2019 54 mins
    SD-WAN has become top of mind for many enterprise network operations teams as they look to align better to their organizational priorities of building more agility and efficiency. In pondering which technology projects to prioritize for the year ahead, you might be wondering how to justify a transition to SD-WAN. While benefits such as security, support for cloud migration, and improved user experience may be important, not surprisingly the business case is also about dollars and cents.

    Join Citrix and R. Scott Raynovich, Founder and Principal Analyst from Futuriom as we take a real-world look into the drivers, technology considerations, and deployment options that will help in the assessment of SD-WAN in your organization. We’ll be examining the benefits of:

    · Converging networking and security functions at the WAN edge
    · Augmenting or replacing existing connections with lower cost internet and higher reliability
    · Building a platform for application performance, strong security, and easy extension to the cloud
    · Leveraging a service provider to help with design, deployment, and management Additionally, we’ll get some perspective on how several Citrix customers went through their journey to SD-WAN and what benefits their organizations realized.
  • Top 5 Predictions 2020: Defending Enterprises in the Cloud Transformation Era
    Top 5 Predictions 2020: Defending Enterprises in the Cloud Transformation Era
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc. & Steve Piper, Founder & CEO - CyberEdge Group Recorded: Dec 11 2019 49 mins
    According to research from CyberEdge Group, nearly four in five organizations were affected by successful cyberattacks last year. With enterprises increasingly turning to the cloud, and with the cyberthreat landscape growing in sophistication, the stakes are getting even higher.

    How will cloud transformation impact your organization? And what’s in store for enterprise IT security teams next year?

    In this webinar, hear from industry experts as we walk through the top 5 security predictions for 2020 in the era of cloud transformation. Topics for discussion include:

    • Understanding cybersecurity’s “weakest links”
    • Addressing critical gaps in IT security personnel
    • Leveraging the cloud for protecting the cloud
    • And much more!

    Register now!
  • How to Leverage Ansible Security Automation as a Dev or a SecOps Practitioner
    How to Leverage Ansible Security Automation as a Dev or a SecOps Practitioner
    Colin McCarthy, Senior Solutions Architect, Red Hat Recorded: Dec 11 2019 21 mins
    Introducing automation into your security practices is easy, but planning is required to ensure to implement it in production and at scale. Learn how to architect your Security Automation practice with Ansible, future-proofing its usage to speed up threat analysis and perform remediations.
  • Policy-Based Security For Harbor Operators with Anchore
    Policy-Based Security For Harbor Operators with Anchore
    Zach Hill, Anchore Chief Architect and Michael Michael, Harbor Core Maintainer Recorded: Dec 11 2019 28 mins
    Zach Hill, Anchore Chief Architect, is joined by Michael Michael, Harbor Core Maintainer, for this short discussion about Anchore deep image scanning for the Harbor registry. Using Anchore, registry operators can define policies that validate or reject containers, enforcing security best practices.
  • Teradici PCoIP Management Console 2019.11
    Teradici PCoIP Management Console 2019.11
    Edna Menon, Sr Product Manager & Paul Barrett Systems Specialist Recorded: Dec 11 2019 45 mins
    Teradici PCoIP Management Console 2019.11 offers significant upgradeability, usability, and security enhancements!
    In this webinar, we’ll be showing you a demo covering some of the new features, including:
    •General availability of Redhat Package Manager (RPM) for blazing fast upgrades
    •Account lockout enhancements for improved security
    •Support for User Principal Name (UPN) for simplified login with Active Directory
    •Ability to enable OPUS audio codec and dual audio output in Zero Clients from Management Console

    Register Today!
  • Packet Brokers for Cost-effective Unified Visibility Across NetOps and SecOps
    Packet Brokers for Cost-effective Unified Visibility Across NetOps and SecOps
    Ray Jones, Senior Director, NETSCOUT Recorded: Dec 11 2019 51 mins
    In today’s threat landscape, more tools means more security, right? Not necessarily. The resulting tool sprawl places new and stressful demands on security and network operations. The challenges are especially acute when it comes to active (inline) security systems that are designed to act on live network traffic. Every change or upgrade means a potential network disruption. Trying to deal with this sprawl can be a true IT nightmare.

    Please join Ray Jones, Senior Director at NETSCOUT as we discuss how full packet visibility empowers your security systems to perform at their utmost efficiency – by processing the traffic they are designed to see. In the webinar you will learn:

    How to get unified visibility that allows multiple IT groups to access packet flows without creating disruptions

    Real world examples of how to optimize the flow of traffic from the network to your security systems and monitoring tools

    Ways you can leverage NETSCOUT’s cost-effective and flexible software-driven network packet brokers- at scale
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Brandon Cooper, Sales Support Engineer Recorded: Dec 11 2019 31 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!

    Brandon Cooper, Sales Support Engineer

    Keywords: cyber defense, cyber security, application security, training security, vulnerability
  • Lockdown Lessons: Close Your Business Security Gaps
    Lockdown Lessons: Close Your Business Security Gaps
    Shane Cooper | Sales Engineer Recorded: Dec 11 2019 40 mins
    We can all agree: it’s the nature of technology to advance. Cybercrime is no exception to this rule, and neither are the tools we use to stop attacks. However, you’d be surprised how much a business can accomplish in terms of their own security simply by keeping existing systems up to date and using technology to their best advantage.

    Join this webinar to learn some basic ways that you can future-proof your very own IT environment against sophisticated, modern malware.
  • Taking Cybersecurity to the Next Level: Bellwether Technologies
    Taking Cybersecurity to the Next Level: Bellwether Technologies
    Johna Till Johnson, CEO and Founder, Nemertes Research Recorded: Dec 11 2019 47 mins
    There are hundreds of cybersecurity tools on the market. But which ones genuinely improve operational security? There's only one way to be certain. Find out from this webinar which technologies (and vendors) correlate with improved Mean Total Time to Contain (MTTC) threats--and which don't. From advanced analytics, AI, and machine learning to automation, you'll learn which technologies really deliver.
  • Software-Defined Segmentation -Challenges of Accelerated Enterprise
    Software-Defined Segmentation -Challenges of Accelerated Enterprise
    ISSA International Recorded: Dec 11 2019 60 mins
    Businesses have turned to IT for competitive differentiation. They demanded IT bring accelerated delivery, resource conservation and cost savings. IT has responded with DevOps/cloud-based models and practices that utilize automation, autoscaling and playbooks. With this speed comes increased risk, compliance concerns and has left IT staff wondering how they can gain visibility and segmentation across their entire heterogeneous environments easily, effectively and at this new speed of innovation. With the realization that traditional methods of segmentation like VLANs, cloud security groups and firewalls are not suitable for today’s rapidly changing enterprise environments enterprises have turned to software-defined segmentation.

    In this webinar come learn about how modern software-defined segmentation solutions:

    Start with visibility.
    Provide enterprises with easy ways to identify and label workloads.
    Provide easy to implement, granular enforcement that goes way beyond IP address and port but is able to lock down by process, user and domain.
    Enables DevOp automation, provisioning and management.
    Is decoupled from and works in an agnostic fashion across every enterprise platform.
    Provides unparalleled security while enabling compliance and ongoing compliance validation.

    Moderator:

    Robert Martin, Sr. Security Engineer, Cisco Systems, Inc.

    Speakers:

    Dave Klein, Senior Director, Engineering & Architecture, Guardicore
    Jonathan Fowler, CISO, Consilio
  • 2020 Trends in Cybersecurity
    2020 Trends in Cybersecurity
    Kunal Anand, CTO, Imperva & David Gee, CMO, Imperva Recorded: Dec 11 2019 41 mins
    Join us for a fireside chat with Imperva CTO Kunal Anand and CMO David Gee as they share with you the cybersecurity trends and things to watch for in 2020.
  • Data Privacy & Why it Matters
    Data Privacy & Why it Matters
    Eric Hibbard, CISSP-ISSAP, ISSMP, ISSEP, CISA, CCSP; Steven W. Teppler, Esq.; Thomas Rivera, Chair, SNIA DPPC Recorded: Dec 11 2019 62 mins
    Failing to protect sensitive information can put a lot of people at risk of being exploited by cybercriminals, and can make a company face enormous legal penalties.

    The way information is shared and stored can put the information at risk.

    It is risky to store personal information on portable devices, which are easily lost or stolen.

    In addition, the consequences of a data breach can be devastating. Identity theft could lead to financial losses, and a company could face lawsuits and legal penalties.

    This presentation will cover what kinds of personal information must be protected & guidelines for keeping this info safe.

    After viewing this session, attendees should:
    1. Understand how Privacy is defined
    2. Highlight some of the Privacy regulations from around the globe
    3. Understand what information to safeguard
    4. Understand how these privacy regulations affect organizations that handle personal information
  • Cybersecurity in 2020 and Beyond: trends, predictions, and threats landscape
    Cybersecurity in 2020 and Beyond: trends, predictions, and threats landscape
    Ido Safruti, CTO and Co-Founder at PerimeterX and Deepak Patel, VP of Product Marketing at PerimeterX Recorded: Dec 11 2019 36 mins
    As 2019 comes to an end, we walk away armed with even more knowledge about the cyber threats and trends we can expect to continue in 2020 and beyond. This year revealed a range of security developments from evolving bot threats and rising Magecart attacks to newly discovered carding bots. We believe that 2020 will be the wildest security year in a long time.

    Tune in for a live webinar on December 11 at 10 am PT as our security experts - CTO and founder of PerimeterX Ido Safruti and VP of Product Marketing Deepak Patel - share their thoughts and observations about cybersecurity in 2020. You will learn about:

    The predictions that highlight some of the most critically important trends in cybersecurity
    How to protect your customers’ PII data and your brand reputation against ever-evolving ATO and Magecart attacks
    What would be the next targets for digital skimming and Magecart
    GDPR and CCPA - how to be proactive and prepare your online business
  • Der Payment Security Report 2019
    Der Payment Security Report 2019
    Frank Matzkies, Senior Security Consultant PCI QSA, Security Assurance,Verizon Business Group Dec 12 2019 10:00 am UTC 60 mins
    Manche Firmen investieren viel Zeit und Geld in Datenschutz- und Compliance-Programme. Trotz bester Absichten schafft es mehr als die Hälfte der Unternehmen nicht, ein nachhaltiges Datenschutz- und Compliance-Programm aufzusetzen und durchzuführen.

    Im Payment Security Report, den Verizon 2019 wieder herausgegeben hat, wird gezeigt, wie diese Aufgaben erfüllt werden können und welche Möglichkeiten und Hilfsmittel es gibt, Ihr Compliance Management auf eine neue Ebene zu heben.

    Zum ersten Mal enthält der Report Bewertungsdaten auch von anderen qualifizierten Bewertungsfirmen der Zahlungssicherheit. Dadurch erweitert sich die Datenbasis und das Blickfeld im Vergleich zu vergangenen Reports.
  • Live Demo - Enterprise Information Archiving
    Live Demo - Enterprise Information Archiving
    Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist Dec 12 2019 10:00 am UTC 48 mins
    GDPR, Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    So what is best practice with respect to developing and implementing a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • A Cloud Native Approach Demands Cloud Native Security
    A Cloud Native Approach Demands Cloud Native Security
    Ashley Ward Dec 12 2019 10:00 am UTC 60 mins
    The Cloud Native Computing Foundation's charter describes how cloud native technologies empower organisations for modern and dynamic environments. Cloud Native security has to operate in the same way.

    In this talk we'll go through what this means, what you need to look out for, and how to achieve democratised cloud native security.
  • Why backing up Microsoft Office 365 & Google G-Suite
    Why backing up Microsoft Office 365 & Google G-Suite
    Florian Malecki Dec 12 2019 10:00 am UTC 45 mins
    Microsoft Office 365 and Google G-Suite bring many benefits to organizations of all size. However that doesn’t mean that your data is completely safe.

    Actually Microsoft themselves recommend “that you regularly backup your content and data that you store on the services or store using Third-Party Apps and Services.”

    Join our webcast and learn how StorageCraft Cloud Backup for Office 365 and G-Suite provides effective protection for these two SaaS based vendors.
  • AppSec: Beyond Scanning
    AppSec: Beyond Scanning
    Chris Eng, Chief Research Officer, Veracode Dec 12 2019 11:00 am UTC 37 mins
    We consistently come across organizations that think they can check the AppSec box if they’re scanning their code, or who are quantifying success by how many scans they can run a day, rather than by how many flaws they were able to fix. Unfortunately, you can’t scan your way to secure code.

    At this session will walk you through three critical steps an organization must take beyond scanning to develop more secure code: educating your developers so they learn secure coding skills, fixing the vulnerable code that’s found, and scaling the AppSec program to cover your entire application landscape.

    Key takeaways:
    - Learn how to move your AppSec program from a find focus to a fix focus
    - Find out why training plays a critical role in AppSec
    - Understand what it takes to scale your AppSec program
  • Breach Detection and Response - The whole business challenge
    Breach Detection and Response - The whole business challenge
    Ade Taylor, CTO, ITC Secure Dec 12 2019 11:00 am UTC 29 mins
    Technical detection is now just the starting point for a series of exercises which will see the entire business work together to identify what happened and to mitigate the results.

    In this session, you will learn:

    - How EDR and MDR are morphing into BDR
    - Why BDR is a challenge for the whole business
    - How technology can help, and how it doesn’t

    In this 30 minute webinar Ade will discuss how the world of cyber-security detection and response is changing, fast. From IT and technical analysts to the CEO via HR, this is a problem for the whole business to solve together.
  • Securing Container-Based Applications at the Speed of DevOps
    Securing Container-Based Applications at the Speed of DevOps
    Carmen Puccio (Solutions Architect, AWS) & Shiri Ivtsan (Product Manager, WhiteSource) Dec 12 2019 12:00 pm UTC 59 mins
    Thanks to containerization and automation, applications are being developed and delivered faster than ever. With tools such as AWS ECR, developers are able to store, manage and deploy Docker container images without having to worry about operating their own container repositories or scaling the underlying infrastructure. With this, however, arise challenges around managing the security and compliance aspect of your container images. With tools such as WhiteSource, developers are able to manage the security of their containers and container images with no impact on agility and speed.

    Join Shiri Ivtsan, Product Manager at WhiteSource and Carmen Puccio, Solutions Architect at AWS, as they discuss the following:

    - Effectively managing and deploying your container images
    - Gaining full visibility into your container images
    - Building and automating security into each layer of the container environment to ensure a continuous process throughout the SDLC
    - Demonstrating a live example using a vulnerable container image
  • Practical data privacy lessons for Financial Services Leaders
    Practical data privacy lessons for Financial Services Leaders
    Jason McFall, CTO, Privitar; Bob Canaway, CMO, Privitar & Matt Pitchford, Principal Solutions Architect, AWS Dec 12 2019 12:00 pm UTC 53 mins
    Finance leaders are fast realizing that their current approach to protecting their data isn’t working – for them or for their customers.

    As well as the obvious financial and legal penalties, financial institutions are facing a trust crisis. Every new data breach erodes consumer confidence in the industry itself. It’s time for data leaders in financial services to take back control; to build a new narrative around their respect for customer data.

    Register for our webinar to get a deeper understanding of how leading financial services organizations go about protecting their customers’ data – while encouraging innovation with data

    - Learn how to overcome barriers to the full use of data in the age of data privacy

    - Understand how to transform data use in your own organization

    - Discover how to build a best in class business case for safer, better data use
  • Reliable, high performance workspace delivery over imperfect network connections
    Reliable, high performance workspace delivery over imperfect network connections
    Derek Thorslund & Wesley Shepherd Dec 12 2019 1:00 pm UTC 36 mins
    Today's digital workspace includes a myriad of applications: SaaS, Citrix Virtual Apps and Desktops, VoIP, unified communications, and much more. Delivering a high-quality workspace experience to workers in any location may not be as easy as it seems since these apps can run in various clouds and datacenters. Come learn how customer Fast Pace Urgent Care uses Citrix SD-WAN to deliver a consistent experience for Citrix apps, even over imperfect network conditions.
  • Best Practices for Securing Access to Office 365
    Best Practices for Securing Access to Office 365
    Danna Bethlehem, Access Management Product Evangelist Dec 12 2019 2:30 pm UTC 30 mins
    As organizations migrate to Office 365 and move their core IT applications and infrastructure needs to the cloud, they face new and varied security challenges. These challenges include increased exposure to phishing attacks, the need to successfully bridge existing security frameworks to Office 365, and the question of having to secure non-Microsoft applications. Join Danna Bethlehem, for the first of a new series of “Coffee Break” conversations focusing on Trusted Access. This first session will discuss how organizations are addressing security concerns by utilizing different access management approaches they can take to protect their Office 365 and their Microsoft environments without having to rip and replace their existing security frameworks. Specifically, attendees to this webinar will learn:
    • What are the security implications of Office 365
    • What are the weaknesses of Office 365 security
    • How do you manage secure access to both cloud apps like Office 365 and on-premise corporate apps
  • Securing and optimising customer experience in a digital world
    Securing and optimising customer experience in a digital world
    Moderator: Caroline Baldwin - Speakers: William Long, Richard Meeus, Bhavesh Unadkat Dec 12 2019 3:00 pm UTC 75 mins
    This webinar will address the clash between creating an excellent digitally-inspired customer experience while also being mindful of security in today’s digital world.
  • Cyber Confidence: Building a Trustworthy Security Posture
    Cyber Confidence: Building a Trustworthy Security Posture
    Stuart Reed - VP Products, Nominet Dec 12 2019 3:00 pm UTC 28 mins
    Nominet recently surveyed around 300 security professionals from across the UK and US about their organization’s security position, the barriers to confidence and what they believe will aid cyber confidence.

    In this webinar, we outline our key findings, including:

    - The state of cyber confidence for modern security professionals

    - The risks facing organizations’ cyber confidence and the ways in which they can be mitigated

    - Future priorities and investment within these companies
  • CISSP Exam Prep Clinic #4: Pass the CISSP the 1st Time - Best Answer Selection
    CISSP Exam Prep Clinic #4: Pass the CISSP the 1st Time - Best Answer Selection
    Mission Critical Institute Dec 12 2019 5:00 pm UTC 41 mins
    Learn how to analyze exam answer choices so you can select the best answers.

    In Clinic #4, you will learn tactics for analyzing the answer choices and then selecting the “best answer”. Often there is no “right” answer and you need to eliminate the less likely answers.

    If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    These five Clinics include tips for all 8 CISSP domains covered in the exam.

    Register today and move closer to your goal!

    SPONSORED BY: Mission Critical Institute
  • The State of Open Source in M&A Transactions
    The State of Open Source in M&A Transactions
    Chris Stafford, Senior Manager, M&A Advisory West Monroe Partners, Paul Cotter, Senior Architect West Monroe Partners Dec 12 2019 5:00 pm UTC 60 mins
    With extensive experience in M&A, West Monroe Partners is on the front line of tech due diligence, and they’ve seen a few trends emerge when it comes to open source and M&A deals. Buyers and sellers alike need to understand these trends to get the most value out of any transaction.

    Join us for this live webinar to learn what buyers and sellers need to know and how they operate during a transaction. We’ll cover:

    •Why OSS management should fit into a broader security program
    •How (and when) sellers need to prepare for a transaction
    •How buyers are becoming more sophisticated in transactions

    Don’t miss this informative webinar. Register today.
  • The Art of Cyber Threat Hunting
    The Art of Cyber Threat Hunting
    24by7Security, Inc Dec 12 2019 5:00 pm UTC 60 mins
    One of the best ways to get out ahead of malicious actors is with cyberthreat hunting, the act of proactively and aggressively eliminating adversaries as early as possible. The quicker you can locate and track your adversaries’ tactics, techniques and procedures, the less impact attackers will have on your business. Hear from Michael Sci, Senior Solutions Engineer from eSentire talk in-depth about Managed detection and response (MDR) and how it provides organizations with threat hunting services and responds to threats once they are discovered.
  • Go Passwordless with Yubico and Microsoft: WebAuthn, FIDO2 and Azure AD
    Go Passwordless with Yubico and Microsoft: WebAuthn, FIDO2 and Azure AD
    Hormazd Romer, VP Product Marketing, Yubico and Jon Wojan,Partner Technical Architect, Microsoft Dec 12 2019 5:00 pm UTC 52 mins
    Secure passwordless authentication is coming to a computer near you! WebAuthn, a new standard published by the W3C, along with the FIDO2 spec now make this promise a reality. Microsoft’s upcoming support for Windows 10 passwordless login via Azure Active Directory means soon hundreds of millions of users will be able to experience the convenience of passwordless login at a higher level of security than the traditional combination of password and multi-factor authentication (MFA).

    Experts from Yubico and Microsoft will provide an overview of the journey to passwordless, its key benefits, and why it is more secure than typical MFA.

    Attend this webinar to learn:

    * The roadmap to passwordless
    * Use cases and advantages of the WebAuthn and FIDO2 standards
    * How passwordless will work with Windows 10 and Azure AD
    * How to get started with passwordless authentication
  • Automating Firewall Change Requests
    Automating Firewall Change Requests
    Ben Chinoy, Security Researcher, Adobe & Jason Joy, Sr. Enterprise Security Engineer, Adobe Dec 12 2019 5:00 pm UTC 60 mins
    As many companies transform to multi-cloud environments, managing firewall changes at the speed of development teams can be challenging. Teams across Adobe are constantly evolving cloud services to continue to delight our customers. But one of the major challenges is in helping to ensure that the firewall change requests to support their work happen efficiently and securely. They receive hundreds of access requests each month for access to services. However, manually reviewing each one can be a time-consuming process that comes with the risk of human error. Adobe set out to try and mitigate this potential risk by automating as much of the process as possible.

    This webcast Ben Chinoy, Security Researcher at Adobe and Jason Joy, Senior Enterprise Security Engineer at Adobe, will discuss the issues they faced in automating this common process in cloud app development securely and introduce the tooling they developed to assist.
  • App and Network Attacks
    App and Network Attacks
    Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat Citrix Dec 12 2019 5:00 pm UTC 46 mins
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This on-demand webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
  • Threat Intelligence Report: Assessing Pen Testing Practices
    Threat Intelligence Report: Assessing Pen Testing Practices
    Kevin Livelli, Director of Threat Intelligence and Matthew Maley, Practice Director for Red Team Services Dec 12 2019 5:00 pm UTC 54 mins
    The red line distinguishing legitimate pentesting services from threat actor behavior has thinned and, in some cases, blurred out entirely in recent years due to the lack of universally accepted industry standards for practicing pentesting tradecraft. Join us and take a closer look at the current state of pentesting tradecraft and key findings from a provocative new Threat Intelligence report, Thin Red Line, Penetration Practices Examined.

    Additional Resources:
    • Latest Report from the BlackBerry Cylance Threat Intelligence Team, Thin Red Line: Penetration Testing Practices Examined
    https://stg.cylance.com/en-us/lp/threat-research-and-intelligence/penetration-testing-practices-examined.html
    • Insecurity Podcast: The Thin Red Line – Lifting the Veil on Penetration Testing
    https://threatvector.cylance.com/en_us/home/insecurity-podcast-the-thin-red-line-lifting-the-veil-on-penetration-testing.html
  • Multi-Cloud Security: The Power of Relationships in Complex Environments
    Multi-Cloud Security: The Power of Relationships in Complex Environments
    Fernando Montenegro, Principal Analyst, 451 Research / Rich Noguera, VP of Security Services, vArmour Dec 12 2019 6:00 pm UTC 30 mins
    Enterprises today are leveraging multiple clouds for the cost and scale benefits that cloud brings, but rapid adoption is creating new challenges for CISOs and their teams. As complexity increases across environments and applications, security teams struggle to maintain visibility of critical workloads and their dependencies. Without a way to understand application relationships across the environment, vulnerabilities become hard to manage and addressing risk becomes risky itself.

    In this 30-minute webinar for CISOs, Security Engineers, Architects, and SOC Teams, learn how to gain the visibility and context necessary to properly secure multi-cloud applications. You'll learn:

    -The complexities of application security in multi-cloud environments
    -How limited visibility increases cloud risk and exposure
    -How understanding application relationships provides critical context for security
    -How to turbocharge multi-cloud security with existing data sources

    Presenters:
    Fernando Montenegro, Principal Analyst at 451 Research & 20-year security industry veteran
    Rich Noguera, VP of Security Services at vArmour & former CISO of Gap and Yapstone
  • Live Demo: Security Training for Healthcare
    Live Demo: Security Training for Healthcare
    Ryan Witt, Healthcare Industry Practice Leader & Matt Nesser, Account Executive of Proofpoint Dec 12 2019 6:00 pm UTC 45 mins
    The 2019 HIMSS Cybersecurity indicated that email is the initial point of compromises for healthcare cyber-attacks – phishing, hacking, BEC – or negligent activity from hospital staff…someone inadvertently clicking on a link or downloading a file. Clearly people are under attack, yet they are also a health system’s first line of defense. So how do you best protect your people and prepare for them for continuous stream of cyber-attacks?

    Join this live demo to see Proofpoint Security Awareness Training in action, and how it safeguards against advance threats and compliance risks.

    You’ll learn:

    - The most common attacks in today's healthcare threat landscape
    - Best practices to improve your security posture
    - A people-centric approach to helping you protect patient data
  • End user computing trends, predictions, and best practices for 2020
    End user computing trends, predictions, and best practices for 2020
    Ruben Spruijt, Senior Technologist at Nutanix and former CTO at Frame Dec 12 2019 6:00 pm UTC 60 mins
    Nowadays business consumers expect a modern workspace to get work done, recruiting and retaining new talent has become a bigger challenge, and keeping employees engaged and productive has become more difficult than ever. IT departments are faced with an increasingly mobile workforce with devices that need to be updated, optimized, and secured no matter where they are in the world.

    That's why Desktop-as-a-Service (DaaS) is disrupting end user computing and virtual desktop infrastructure, and companies like Google and Microsoft are getting into the mix. They're partnering with end user computing firms to create solutions that can run remote applications and desktops on any device, vastly improving the user experience and making the lives of your business consumers and IT department so much easier.

    Data is centralized and infinitely more secure, the IT department can manage thousands of workspaces anywhere in the world from one console, and the end user's device, whether it's their own or corporate-owned is optimized, making the experience faster and easier to use than ever.

    For a look at the latest developments in End User Computing (EUC), virtual desktop infrastructure (VDI), and DaaS, the pros and cons of VDI versus DaaS, unique use cases and more, don't miss this VB Live event!

    Registration is free here!

    Key takeaways:

    + Tips and advice for VDI and DaaS success in 2020
    + How DaaS and VDI is evolving, and how to prepare your IT department
    + Pros and cons for Desktop-as-a-Service vs. VDI
    + Best practice for DaaS in public clouds and on-premises
  • How to integrate DevOps and ITIL
    How to integrate DevOps and ITIL
    Troy DuMoulin, VP of R&D at Pink Elephant and Gerald Beaulieu, Director of Product Marketing at ServiceNow Dec 12 2019 6:00 pm UTC 60 mins
    Both DevOps and ITIL 4 have a lot to say about deploying and releasing effectively and efficiently into production without impacting availability. However, for many these two disciplines seem to be at odds or at least very complicated and challenging to describe how they work together. 

    In this practical webinar, Troy DuMoulin, VP R&D at Pink Elephant and Gerald Beaulieu, Director of Product Marketing at ServiceNow will provide a clear picture of how these two set of practices are integrated and co-dependent.

    We’ll cover:

    - ITIL Release and Deployment integrated with Agile Project Planning
    - How to scale change authorization without risk
    - The role of Service Validation & Testing and Automated Testing
    - The CMDB, Asset Management and DevOps environment Configuration
  • Inclining SIEM for 2020
    Inclining SIEM for 2020
    Geethanjali Natarajan and Saumya Saxena, Sennovate Inc Dec 12 2019 6:00 pm UTC 60 mins
    In today's world of IT, a robust safeguard service is required for identifying and managing applications from a single point to spot trends and see patterns that are out of the ordinary. SIEM (System Information and Event Management) is a managed security service used to gather information from end-user and even specialized security equipment like firewalls and antivirus systems. Security information and event management (SIEM) software gives security professionals both insight into and a track record of the activities within their IT environment.

    While SIEM technology has been around for more than a decade, it’s become a critical component of a comprehensive security strategy in today’s threat environment.

    Topics for discussion include:
    - Evolution of SIEM.
    - Best practices from expertise.
    - Next generation SIEM – UEBA and SOAR
    - SIEM solutions for some common SOC pains.
    - Integrating AI and ML.

    Speakers:
    Geethanjali Natarajan, Security Solutions Lead at Sennovate Inc
    Saumya Saxena, Software Engineer at Sennovate Inc
  • Infoblox #3: Stop Attacks Faster - Using the MITRE ATT&CK Framework
    Infoblox #3: Stop Attacks Faster - Using the MITRE ATT&CK Framework
    Mike Zuckerman, Consulting Product Maketing Manager, Infoblox; Brandon Dunlap, Moderator Dec 12 2019 6:00 pm UTC 60 mins
    The MITRE ATT&CK Framework is a comprehensive, up-to-date knowledge base of cyberattacker tactics and techniques gathered from actual observation of attacker behavior. The framework can help anticipate what an attacker will do and how to respond. Join Infoblox and (ISC)2 on December 12, 2019 at 1:00PM Eastern for an examination of how the MITRE ATT&CK can help you make better, faster decisions about assessing risks, deploying new security controls and stopping attacks faster and more efficiently.