Hi [[ session.user.profile.firstName ]]

IT Security

  • IIoT Endpoint Security – The Model in Practice IIoT Endpoint Security – The Model in Practice Marcellus Buchheit, Co-founder, Wibu-Systems AG; Terrence Barr. Head of Solutions Engineering, Electric Imp Inc. Feb 22 2017 4:00 pm UTC 60 mins
    What is your first line of defense against cyberattacks? Secure endpoints! Endpoints are everywhere in the IIoT landscape. Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.

    On February 22, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will discuss the endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document and present a real-world customer use case for an approach taken to secure an industrial system.
  • Reducing Open Source Risk and Remediation Costs Early in the SDLC Reducing Open Source Risk and Remediation Costs Early in the SDLC Pat Durante, Senior Director Education Services; John Beaudoin, Senior Instructional Designer Feb 22 2017 4:00 pm UTC 90 mins
    Increasingly, organizations worldwide are implementing open source security and license risk assessment capabilities early in the software development lifecycle when the cost to remediate issues is lowest. This webinar will demonstrate Black Duck Hub’s effectiveness in providing comprehensive risk assessments when used in combination with our Eclipse IDE plugin, Build Tool, and CI Tool integrations. Additionally, we'll review valuable new features in Black Duck Hub 3.5.
    You’ll also learn:
    - How to improve the accuracy of your open source inventory by leverage open source dependency discovery techniques for build tools and package managers
    - Options for incorporating Hub scanning into your Continuous Integration environments
    - How to track remediation tasks using the Hub-Jira integration
    - How to streamline your component review process
    - Use cases for scanning binary repositories such as Artifactory
  • AI & Machine Learning in CyberSecurity. What Is the Difference? AI & Machine Learning in CyberSecurity. What Is the Difference? Sven Krasser, Igor Baikalov, Stephan Jou, Engin Akyol, and Sean Martin Feb 22 2017 4:00 pm UTC 60 mins
    Artificial Intelligence and Machine Learning are becoming more pervasive in the cybersecurity space, but it is not the panacea everyone thinks it is. Lacking real case studies, many vendors must resort to simulated data and made-up scenarios to demonstrate their product capabilities. Moderator Sean Martin, Editor in Chief of ITSP Magazine, will ask the expert panelist to share their insights as to how AI and/or ML can be used to help address a variety of cybersecurity risks.

    Leading into this actionable advice, the panel will provide additional insights, including:
    • The difference is between AI and ML
    • How AI and ML can be used for good … and evil
    • What the future of AI and ML looks like

    Moderator:
    Sean Martin, Editor in Chief of ITSP Magazine

    Panelists:
    • Sven Krasser, Chief Scientist at CrowdStrike
    • Igor Baikalov, Chief Scientist at Securonix
    • Stephan Jou, CTO of Interset
    • Engin Akyol, Co-Founder & CTO of Distil Networks
  • Overcoming Security Threats in an Evolving IT Landscape Overcoming Security Threats in an Evolving IT Landscape Cris Thomas (aka Space Rogue), Strategist at Tenable Network Security Feb 22 2017 5:00 pm UTC 60 mins
    Today’s attack surface is expanding and the network is becoming increasingly complex thanks in large part to the ephemeral nature of assets, including mobile devices, cloud, IoT, web apps, containers and virtual machines.

    ‘Space Rogue’ (aka Cris Thomas), strategist at Tenable Network Security, will look at the findings of the Tenable 2017 Global Cybersecurity Assurance Report Card and discuss strategies for staying ahead of sophisticated cyberattacks in the modern IT landscape.
  • 2017 Predictions on Data Security Trends for the Banking Industry 2017 Predictions on Data Security Trends for the Banking Industry Lynne Courts VP of Global Marketing, Seclore Feb 22 2017 5:00 pm UTC 60 mins
    2016 was a wild ride, with cybersecurity and warfare dominating the headlines. The new EU General Data Protection Act (GDPR) impacts many financial services organizations globally and may be an indication of what’s ahead for North America.

    On top of that, we have the growing use of innovative, and often unsanctioned, collaboration technologies such as Enterprise File Sharing Services, further accelerating the flow of information outside of the organization’s perimeter.

    It is safe to say that ensuring the security of information is an even higher concern than ever before and that the current Information Security infrastructure isn’t making the grade.

    Join us for this webcast in the field of data-centric security will discuss the top seven security trends that will impact banks and financial institutions in 2017.

    Join this presentation to learn the top security trends that will impact banks and financial institutions in 2017, including:

    · Impacts of anticipated cybersecurity legislation and new global regulations on protecting data.

    · What’s missing the Information Security arsenal?

    · How to embrace collaboration and other technology innovations with less risk.

    · Is the shift to data-centric security the answer?
  • The Malware Battleground in 2017 The Malware Battleground in 2017 Shimon Oren, Head of Cyber-Intelligence at Deep Instinct Feb 22 2017 6:00 pm UTC 60 mins
    2016 has been yet another record breaking year in many aspects of the cyber security and malware world. We will look at some of the trends and vectors that have materialized or strengthened in 2016 and will carry into 2017.

    Join Shimon N. Oren, Deep Instinct’s Head of Cyber-Intelligence, to learn about the evolution of malware and cyber threats in the previous year. From ransomware, through cross platform campaigns, to file-less attacks we will review and give examples of the newest concepts and campaigns that will shape this year’s play ground between hackers and the cyber-industry.

    About the Presenter:
    Shimon Noam Oren is the head of Cyber-Intelligence at Deep Instinct. Prior to joining Deep Instinct Shimon served for 14 years as an officer in the Israel Defense Force's elite cyber unit. With a background that includes a wide range of cyber security and intelligence positions, Shimon successfully led multifunctional teams of engineers, analysts, hackers and security professionals in various settings and operations. Some of his other accomplishments during his tenure in the military include developing new methods and tools for researching and analyzing cyber-attacks and leading a product management team in charge of a series of innovative cyber collection products. Shimon has worked extensively with a variety of industry, defense and intelligence partners and agencies in North America and Europe, and was awarded the President of Israel Award for outstanding service.
  • How to Mitigate Cyber Risk with Efficient Vendor Risk Management How to Mitigate Cyber Risk with Efficient Vendor Risk Management Kevin Roden and Julia Grunewald Feb 22 2017 6:00 pm UTC 60 mins
    Over the past few years, outsourcing business functions to vendors has been on the rise. In fact, there are more third-party relationships today than ever before. However, as the number of supplier relationships grows, so grows the amount of risk those suppliers pose. And in today’s hyper-connected landscape, cyber risk has taken center stage when it comes to vendor risk.

    Join former CIO, Kevin Roden, and BitSight’s Senior Customer Success Manager, Julia Grunewald, on Wednesday, February 22nd at 1pm ET, as they discuss traditional and emerging vendor risk management (VRM) tactics.

    In this webinar you’ll learn:
    - How VRM has traditionally been handled
    - Why traditional strategies alone aren’t enough
    - Advice on how to effectively and efficiently mitigate cyber risk
  • Packets Don’t Lie: Do You Know What’s Really Happening on Your Network? Packets Don’t Lie: Do You Know What’s Really Happening on Your Network? Dave Shackleford, senior SANS analyst Feb 22 2017 6:00 pm UTC 75 mins
    When it comes to detection and response, you need full visibility into what’s traversing your network.

    In this webcast, Dave Shackleford, senior SANS analyst, provides a functional review of LogRhythm’s NetMon Freemium. He also speaks to the NetMon Freemium’s network visibility capabilities and ability to recognize contemporary threats such as bots, beaconing, unencrypted sensitive information, and ransomware.

    You’ll learn:

    • Why network monitoring should be an essential component of your security and operations toolkit
    • How to automate threat detection that was previously only possible via manual packet analysis
    • To create analyst workflow that leverages forensic investigation capabilities
    • How to identify potential network threats such as port misuse or beaconing
    • To respond to incidents discovered through deep packet analysis
  • Protect Your Gaming Infrastructure from Hackers and Competitors Protect Your Gaming Infrastructure from Hackers and Competitors Shawn Andrich, Host & Founder, Gamers with Jobs Podcast and Nicole Banks, Sr. Community Manager, Imperva Incapsula Feb 22 2017 6:00 pm UTC 45 mins
    Online gaming is uniquely vulnerable to costly DDoS attacks: how can you protect these platforms from cyber attacks and resulting outages? This webinar will discuss what makes the online gaming industry such a prime target for DDoS and will propose a new solution to address this growing problem.

    Benefits of attending the webinar include:


    - Learning the latest DDoS threats and what it means for your business
    - Why online gaming servers are vulnerable
    - Strategies to combat DDoS attack
  • Why Built-In Data Protection & Network Security are Key to Threat Intelligence Why Built-In Data Protection & Network Security are Key to Threat Intelligence Stephen Jeffries, Technical Architect, Microsoft Feb 22 2017 7:00 pm UTC 60 mins
    With more than 250 million threats online in any given day, security for your business has never been more critical. These threats can cause loss of data and personal information with increased risk of identity theft. Windows 10 includes built-in protection to help keep you more secure with all new features in the Anniversary update.

    Join this webcast to learn more about the two major new security features that launched with the Anniversary update:

    - Windows Defender Advanced Threat Protection (WDATP) detects, investigates, and responds to advanced malicious attacks on networks by providing a more comprehensive threat intelligence and attack detection
    - Windows Information Protection enables businesses to separate personal and organizational data and helps protect corporate data from accidental data leaks.
  • Endpoint Breach: What Attackers Do Next to Penetrate Your Organization Endpoint Breach: What Attackers Do Next to Penetrate Your Organization Roi Abutbul, CEO & Founder, Javelin Networks Feb 22 2017 8:00 pm UTC 45 mins
    Once breached at the endpoint, what does an attacker do? Where is he going? What does he want? The truth of APTs and advanced attacks is that they just don't want one machine - they want access to the heart of the organization. Since 1999, Microsoft has made the Windows Domain the heart of the network. Once accessed, it permits the attacker to control the organization - undetected and indefinitely. This is what the attacker wants. This webinar will discuss all moves an attacker can make to go from a compromised machine to achieve his goal from a statistical point of view; we will present the probability of detection and evidence-gathering for any move made along the way.


    Roi is CEO and Founder of Javelin Networks, a post breach containment technology that focuses on stopping attackers from credential misuse and lateral movement after compromising a machine. Roi served in the Israeli Air Force at the OFEK unit where he worked on the security of the Israeli satellite launch, Arrow missiles and the Air Force drones. As a network and security engineer, he was influential in designing, developing, analyzing, implementing large enterprise communication networks, both nationally and around the world. Worked for four years as a Security consultant, leading ongoing projects at the Vatican and other military organizations.
  • How far can you trust AI How far can you trust AI Greg Pollock, VP of Product at UpGuard Feb 22 2017 9:00 pm UTC 60 mins
    Machine learning is both cool and valuable, but to apply it effectively requires that we disregard the former in order to be rigorous about the latter. In this session we take a hard look at the qualities that make machine learning fit for purpose for problems in cyber security in order to lay out a global roadmap for how machine learning can solve security problems today. Even more importantly, our bottom-up analysis of machine learning will chart the areas where an excessive faith in automation can become harmful to a business' security posture.

    About the presenter:

    Greg has previously managed products and product teams for gaming and education startups with a focus on meaningful, measurable engagement loops. His games have been ranked in the top ten by traffic on Facebook, the top ten by revenue on the App Store, and as the Editor's Choice in the App Stores of over 70 countries.
  • Real-Time Contextual Learning and Adaptation in an Era of Targeted Attacks Real-Time Contextual Learning and Adaptation in an Era of Targeted Attacks Simon Crosby, Co-Founder & CTO of Bromium Feb 22 2017 10:00 pm UTC 60 mins
    You’ve heard a lot about using artificial intelligence and machine learning to change the odds in your favor in cyber-attacks. Unfortunately it turns out that the bad-guys have great AI too, and with each click they can stealthily adapt, morphing into a new hard-to-detect form. But what if we apply learning in real time, on every endpoint, and allow the endpoints to collaborate to identify the threat?

    In this talk Simon Crosby, co-founder and CTO of Bromium, will explore how this new approach can give defenders the edge in an era of targeted attacks.

    About the Presenter:
    Simon Crosby is a co-founder and CTO of Bromium Inc. – the pioneer of micro-virtualization, which enables PCs to defend themselves by design from all malware. Previously Simon was CTO, Data Center & Cloud at Citrix Systems, which acquired XenSource, where he was co-founder and CTO. He was formerly a Principal Engineer at Intel where he led strategic research on platform security and trust, and founder & CTO of CPlane Inc., a pioneer in Software Defined Networking. He was a faculty member in the Computer Laboratory at the University of Cambridge, UK from 1994-2000. He holds a PhD in Computer Science from the University of Cambridge, UK, and is author of more than 50 peer reviewed papers and patents.
  • Incident Response and GDPR. What You Need To Know. Incident Response and GDPR. What You Need To Know. Amar Singh Feb 23 2017 9:00 am UTC 60 mins
    Warning - this is not just another GDPR webinar. Join Amar Singh in his popular and interactive webinars and deep-dive into this special Cyber Incident Planning & Response webinar where we share and discuss the following:

    * - What are the key components to automate in incident management to enable GDPR compliance.

    * - Four important questions a CISO or Manager must ask to manage an incident successfully.

    * - Understand Process Automation for Incident Orchestration.

    * - How you can, using the technology and processes, build a lean, effective and knowledge Security team with or without a Security Operations Centre.

    * - Data Protection and Incident Response for the non-technical manager.

    * - How and why it's critical that middle and senior management, working with technical teams, get involved in delivering effective cyber incident planning & response.
  • Packets Don’t Lie: Do You Know What’s Really Happening on Your Network? Packets Don’t Lie: Do You Know What’s Really Happening on Your Network? Dave Shackleford, senior SANS analyst Feb 23 2017 10:00 am UTC 60 mins
    When it comes to detection and response, you need full visibility into what’s traversing your network.

    In this webcast, Dave Shackleford, senior SANS analyst, provides a functional review of LogRhythm’s NetMon Freemium. He also speaks to the NetMon Freemium’s network visibility capabilities and ability to recognise contemporary threats such as bots, beaconing, unencrypted sensitive information, and ransomware.

    You’ll learn:

    • Why network monitoring should be an essential component of your security and operations toolkit
    • How to automate threat detection that was previously only possible via manual packet analysis
    • To create analyst workflow that leverages forensic investigation capabilities
    • How to identify potential network threats such as port misuse or beaconing
    • To respond to incidents discovered through deep packet analysis
  • How to Gate, Watch and Guard your Sensitive Data Everywhere How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Feb 23 2017 11:00 am UTC 60 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.