Hi [[ session.user.profile.firstName ]]

IT Security

  • RANSOMWARE SURVIVAL GUIDE RANSOMWARE SURVIVAL GUIDE Jennifer Cheng Director, Product Marketing, Proofpoint Live 60 mins
    What every organization needs to know before, during, and after a ransomware attack.

    Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

    Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

    Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

    •Why ransomware is surging.
    •Where it comes from.
    •What to do before, during, and after an attack.
    •Should you pay or not? What to consider.

    Exploit kits don’t stop. Neither should your business.
  • CSA Research: Mitigating Top Cloud Threats CSA Research: Mitigating Top Cloud Threats Salim Hafid and Rich Campagna of Bitglass, and John Yeoh of CSA Recorded: Aug 30 2016 57 mins
    With cloud adoption on the rise, IT leaders are looking to peer organizations to understand security best practices in the cloud. Bitglass and CSA surveyed infosec professionals to uncover the top threats to cloud security and the tools most often used to secure cloud apps.

    In this webinar, John Yeoh, Senior Research Analyst at CSA, joins Bitglass to discuss the results of the "Mitigating Risk for Cloud Applications" report and to explore the major issues facing organizations in their move to the cloud, from Shadow IT and inadequate visibility to concerns around government access.
  • Managing Cyber Risk From Third Party Contractors Managing Cyber Risk From Third Party Contractors Jake Olcott Recorded: Aug 30 2016 46 mins
    Many recent data breaches have exploited security weaknesses in the networks of third parties to attack businesses. With supply chains growing and business functions increasingly outsourced, the number of third party organizations with access to your company’s most sensitive data has increased dramatically. How should organizations assess and manage the cyber risk by their vendors and suppliers? What kinds of policies and controls should organizations put in place in order to mitigate third party cyber risk? How can organizations continuously monitor the cybersecurity performance of their critical vendors in real time?

    Getting familiar with third party cyber risk management best practices and industry standards is a good start towards mitigating cyber risk for your organization. Join Jake Olcott, VP of Business Development as he discusses these topics and more.
  • Social Engineering - Are you the weakest link? Social Engineering - Are you the weakest link? Greg Iddon, Technologist, Sophos Recorded: Aug 30 2016 57 mins
    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
  • Is 'Automation Anxiety' something to be concerned about? Is 'Automation Anxiety' something to be concerned about? Daniel Horton, Technical Manager at Parker Software Recorded: Aug 30 2016 5 mins
    Is automation anxiety a 'thing'? Or is it just a buzzword?
    EM360° talks to Parker Software's Technical Manager, Daniel Horton to find out what this term is all about and whether there really is anything to panic about.
  • Grid Cyber Lockdown: Ransomware in Critical Infrastructure Grid Cyber Lockdown: Ransomware in Critical Infrastructure Panel of experts as originally presented with EnergySec Recorded: Aug 29 2016 59 mins
    Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:

    •A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
    •A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
    •Best practices and technologies for protecting your organization against ransomware.

    Panelists:
    Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
    Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
    Christopher Ellefsen, BKK Group, Senior Network Engineer
    Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
    Jack Whitsitt, EnergySec, Senior Security Strategist
    Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security
  • DDoS LIVE: Watch as a Security Expert Performs a Live DDoS Attack DDoS LIVE: Watch as a Security Expert Performs a Live DDoS Attack Andy Shoemaker Founder and DDoS Expert, NimbusDDoS and Nabeel Hasan Saeed Product Marketing Manager, Imperva Incapsula Recorded: Aug 26 2016 56 mins
    In this webinar Andrew Shoemaker, a DDoS simulation expert from NimbusDDOS, gives you a rare glimpse into how hackers find the weak points in your defenses and exploit them to level devastating DDoS attacks. You'll see real world examples of the tactics and methods used to create tailored DDoS attacks that can bring down a targeted network or application, and learn how best to defend against them.
  • Cradlepoint Whiteboard Series -- Secure Connectivity for Mobile Health Professio Cradlepoint Whiteboard Series -- Secure Connectivity for Mobile Health Professio Roger Billings, Cradlepoint Recorded: Aug 26 2016 2 mins
    Learn more about secure LTE solutions for mobile healthcare applications: https://cradlepoint.com/products-and-services/solutions/healthcare

    Learn about Enterprise Cloud Manager: https://cradlepoint.com/ecm
  • Thunderstorm in the Cloud Thunderstorm in the Cloud Mathias Fuchs, Senior Incident Response Consultant, Mandiant Recorded: Aug 26 2016 37 mins
    Immer größer wird die Anzahl der Unternehmen die ihre IT-Services teilweise oder ganz an Clouddienstleister abgeben. Dies führt zu einem erhöhten Aufwand und einigen Komplikationen wenn es zu Sicherheitsvorfällen kommt.
    In diesem Webinar präsentiert Mathias Fuchs Strategien wie Unternehmen trotzdem effizient Sicherheitsvorfälle untersuchen und eindämmen können. Anhand einer Fallstudie wir gezeigt wie sich cloudbasierte Untersuchungen von herkömmlichen unterscheiden.
  • How to (effectively) prevent ransomware infections How to (effectively) prevent ransomware infections Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Recorded: Aug 26 2016 51 mins
    Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.

    In this webinar you learn how Palo Alto Networks addresses today’s issues of network complexity, overwhelming data flows, and convoluted security rules with the Panorama network security management solution.
  • How to (effectively) prevent ransomware infections How to (effectively) prevent ransomware infections Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Recorded: Aug 26 2016 50 mins
    Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.

    In this webinar you learn how Palo Alto Networks addresses today’s issues of network complexity, overwhelming data flows, and convoluted security rules with the Panorama network security management solution.
  • Breach Detection Systems The final protection? Breach Detection Systems The final protection? Thomas Skybakmoen Recorded: Aug 25 2016 40 mins
    Find out how a breach detection system, which is designed to detect the activity of malware inside your network after a breach has occurred, can strengthen your defense.
  • Secure Storage: Keys to Successful State and Local Data Strategy Secure Storage: Keys to Successful State and Local Data Strategy Presented by: Veritas Recorded: Aug 25 2016 53 mins
    As citizens increasingly demand faster and more responsive government platforms, harnessing the enormous amounts of data state, county and municipal governments generate is essential to optimizing operations and delivering these services. Left siloed and unattended, big data proves a costly headache; however, when properly managed, this data is a treasure trove that can fundamentally change the way services are delivered.

    In this viewcast, we'll take a look at the results of a recent Government Business Council research survey on how state and local officials are dealing with unstructured data and their strategies for organizing, protecting and leveraging it. Data experts will explore case studies and best practices on managing and processing big data at the state, county and municipal level.

    Join us to hear about the following:
    - Storing data with effective and cost-efficient methods
    - Securing data through the cloud
    - Using data to deliver more services faster and at a higher quality
  • The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software Recorded: Aug 25 2016 62 mins
    Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

    Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.

    Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
  • Ransomware: How to Battle the Most Evolved Ransomware: How to Battle the Most Evolved Ben Brobak and Marc Laliberte Recorded: Aug 25 2016 60 mins
    Large corporations are no longer the primary target for hackers, making network security for small and mid-sized businesses more important than ever before. Ransomware has evolved dramatically over the last few years, but one thing remains the same: it can wreak havoc the likes of which many businesses will never recover from.

    Join Ben Brobak, Technical Product Manager, and Marc Laliberte, Information Security Analyst, as they take a look at the evolution of Ransomware – and the best ways for businesses to protect themselves.
  • Grid Cyber Lockdown: Ransomware in Critical Infrastructure Grid Cyber Lockdown: Ransomware in Critical Infrastructure - Recorded: Aug 25 2016 60 mins
    Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:
    - A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
    - A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
    - Best practices and technologies for protecting your organization against ransomware.

    Panelists
    Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
    Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
    Christopher Ellefsen, BKK Group, Senior Network Engineer
    Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
    Jack Whitsitt, EnergySec, Senior Security Strategist
    Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security
  • Video - Cyber Resiliency: Bouncing Back from a Security Breach Video - Cyber Resiliency: Bouncing Back from a Security Breach Misha Govshteyn, Founder & Chief Security Officer, Alert Logic Recorded: Aug 25 2016 31 mins
    Cyber resilience encompasses cyber security and business resilience, and aims not only to defend against potential attacks but also to ensure an organisation's survival following a successful attack. Companies cannot avoid cyber attacks 100-percent of the time, breaches will eventually occur but in order to bounce back quickly from attacks, companies must become cyber resilient.

    Misha Govshteyn, Founder & Chief Security Officer at Alert Logic delivered a talk at our London Cloud Security Summit - "Cyber Resiliency: Bouncing back from a security breach". In this session he examines cyber risk and the keys steps in building a cyber resilience strategy.
  • Ask the Experts: Realizing the Value of Microsoft Azure  Ask the Experts: Realizing the Value of Microsoft Azure  Evelyn Padrino, Group Product Marketing Manager, Microsoft Aug 30 2016 6:00 pm UTC 60 mins
    Tune in for the latest in our Ask the Experts Series! This session is all-about-Azure: cloud computing and PaaS for the enterprise. During this session we will show you how and why to use the benefit/credit that comes with your Visual Studio Subscription.

    In this webcast, you will learn:

    - About other available Azure programs
    - Application development tests on Azure
    - What other customers are doing on Azure and how it is paying large dividends
  • Breach Detection Systems – Product Selection Guide Breach Detection Systems – Product Selection Guide Jason Pappalexis Aug 30 2016 6:00 pm UTC 45 mins
    Understand Breach Detection System selection criteria and what enterprises should consider prior to purchase.
  • RegTech Webinar Series RegTech Webinar Series Shane Brett Aug 31 2016 1:00 pm UTC 45 mins
    Regulatory compliance is one of the biggest immediate challenges affecting the financial services industry today. Many market participants are unsure how to meet constantly evolving reporting requirements or how to move to an open API framework in a secure and compliant way.
  • Ransomware is Here: Fundamentals Everyone Needs to Know Ransomware is Here: Fundamentals Everyone Needs to Know Jeremiah Grossman, Chief of Security Strategy Aug 31 2016 3:00 pm UTC 45 mins
    If you’re an IT professional, you probably know at least the basics of ransomware. Instead of using malware or an exploit to exfiltrate PII from an enterprise, bad actors instead find valuable data and encrypt it. Unless you happen to have an NSA-caliber data center at your disposal to break the encryption, you must pay your attacker in cold, hard bitcoins—or else wave goodbye to your PII.


    Those assumptions aren’t wrong, but they also don’t tell the whole picture. Hear from Jeremiah Grossman, SentinelOne’s Chief of Security Strategy and a 20-year cybersecurity veteran, in this on-demand webinar that will explore the foundations of ransomware, and why you truly need to worry.
  • Office 365 Security: How to safeguard your data Office 365 Security: How to safeguard your data Greg Schaffer, CISO for FirstBank & Rich Campagna, VP of Products for Bitglass Aug 31 2016 5:00 pm UTC 60 mins
    Public cloud apps like Office 365 are being widely adopted in every major industry, with security & compliance at the top of the list of concerns. In this webinar, Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, will provide practical cloud security advice that you can apply immediately in your organization. Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and will give examples of how your peers have responded to the cloud security challenge.
  • Security by Design: The Alignment of Security and Agility Security by Design: The Alignment of Security and Agility Uri Sarid, CTO, MuleSoft; Kevin Paige, Head of Security, MuleSoft Aug 31 2016 5:00 pm UTC 60 mins
    By 2020, Gartner predicts 60% of digital businesses will suffer major service failures due to the inability of the IT security team to manage digital risk in new technology and use cases. With Target, Apple, Nissan, and Twitter all making the news recently for their security failures, CIOs and CISOs are under tremendous pressure to keep the business secure -- without slowing the business down.

    In this session, Uri Sarid, MuleSoft CTO and Kevin Paige, MuleSoft Head of Security, discuss the application networks and an emerging approach that CIOs and CISOs are driving together to deliver both security and business agility.

    Attendees will learn:

    – How to deal with security no longer resting in the hands of the security team due to shadow IT and other factors
    – How a well-defined API strategy can reduce risk
    – How application networks have emerged as an approach to deliver security and agility
    – How CISOs can drive agility and promote security by shifting mindsets
  • An Asset-Centric Approach to Manage Cyber Risk An Asset-Centric Approach to Manage Cyber Risk Humphrey Christian, Vice President, Product Management, Bay Dynamics Aug 31 2016 5:00 pm UTC 60 mins
    Enterprises, both large and small, all have vulnerability management solutions. However, security teams are overwhelmed by the mountain of vulnerabilities uncovered by these solutions. Once they determine which endpoints, systems and applications are vulnerable to an attack, they do not know which steps to take next and in what order. As a result, they spend countless hours manually determining who owns the vulnerable asset, the value of that asset, if it was compromised and if there is an active threat to that asset.

    Join us for a live webinar on Wednesday, August 31, 2016 at 10am PT as Humphrey Christian, Vice President, Product Management, Bay Dynamics, discusses why organizations and business stakeholders, need an asset-centric approach to provide a fully integrated view of threats, vulnerabilities, asset value and business context. He will also give a live demonstration of the Bay Dynamics Risk Fabric cyber risk platform and provide examples of how our customers have used it to build asset-centric risk management programs that allow security teams, line-of-business leaders, C-level executives and boards of directors to determine which threats and associated vulnerabilities could lead to a compromise of their most valued assets and what steps need to be taken in order to reduce that risk.

    Register for the live webinar to learn more about:
    • Understanding your Assets at Risk by protecting your high value assets that can be exploited by threats and vulnerabilities
    • Why it is important to take an asset-centric approach to effectively manage cyber risk
    • How Risk Fabric cyber risk analytics platform servers as a centerpiece for this asset-centric approach through a live demonstration
  • Webcast: Do More with ESET Remote Administrator Webcast: Do More with ESET Remote Administrator Ben Reed, Sr. Technical Content Strategist and Sales Engineer Aug 31 2016 5:00 pm UTC 60 mins
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • How to improve network visibility and ease IT frustration How to improve network visibility and ease IT frustration Neela Sambandam Aug 31 2016 6:00 pm UTC 60 mins
    Today’s new generation of mobile-centric users and the sheer number of authentications due to mobility is driving the need for better visibility into who and what is on the network.

    Join Neela Sambandam, ClearPass Product Manager, to learn how the Insight reporting package within the ClearPass solution gives you:
    •Unsurpassed views into the users, devices and connections on your network
    •An easy-to-use dashboard and analytics engine
    •Triggered alerts based on pre-defined metrics
    •Improved reporting with pre-configured templates

    Learn how ClearPass Insights can improve network performance and user experience, as well as about future enhancements.
  • Roundtable:Threats, Vulnerabilities & Actors: (ISC)² Security Congress EMEA 2016 Roundtable:Threats, Vulnerabilities & Actors: (ISC)² Security Congress EMEA 2016 Aviram Zrahia, Juniper Networks, Dominique Brack, Swisscom, Alexander Haynes, CDL, Adrian Davis, (ISC)2 EMEA Sep 1 2016 11:00 am UTC 60 mins
    Offering a preview of what to expect from Track 2 of Security Congress EMEA, this session brings together speakers that examine varied developments in the threat landscape. Tackling trends from the role of social engineering in Industry 4.0 to the latest Tactics and Drivers behind DDoS Attacks and the Casino-style tactics deployed by hackers, delegates will gain both an overarching view of current concerns from the front- lines of defence, and an opportunity to examine a few questions that are rattling the security industry today:
    Is it time to accept breach as inevitable?
    Are we prepared for the aftermath?
    Should we welcome vulnerability disclosure?
    Can we do a good job of sharing and warning each other?
  • Briefings Part 1: The Digital Marketplace & Cybersecurity Briefings Part 1: The Digital Marketplace & Cybersecurity Michelle Waugh, Security Business, CA Technologies; Brandon Dunlap Sep 1 2016 5:00 pm UTC 75 mins
    Your business is part of a new digital reality and the digital relationships you have with individuals are your greatest assets. They are also the new perimeter, where identities are the unifying control point across apps & data and users demand access and insight with an exceptional user experience. While all this drives your business, it also opens you up to attacks and breaches. Join CA Technologies and (ISC)2 on September 1, 2016 at 1:00PM Eastern for this first event of a six-part webcast series where you will learn how leaders can adapt to the new digital reality -- embrace new identity and access management strategies that allow you to innovate in ways you never imagined.
  • How Software Eats Hardware in the Datacenter: Reducing Cost and Complexity How Software Eats Hardware in the Datacenter: Reducing Cost and Complexity Andy Ryan, Cloud Solutions Architect at vArmour Sep 1 2016 5:00 pm UTC 45 mins
    INTRO:

    As organizations move to virtual data centers and multi-cloud environments in a dangerous threat climate, they are faced with new security challenges they must overcome. But, they must do this without exponentially increasing the manpower, products, or resources they need, so they still get the most of their valuable security budgets. These challenges include:

    -Improving visibility inside data centers and cloud
    -Reducing the attack surface
    -Maintaining regulatory compliance standards.

    WHAT'S IN THIS WEBINAR:

    vArmour will explore trends in data center security that include the rise of software to replace firewalls inside the data center, segmentation and micro-segmentation as security techniques, and shifting ideas about software defined networking that:

    -Eliminate under-utilized zones and choke points
    -Avoid costly hardware refresh cycles and on-going maintenance
    -Lower the time it takes to see and stop threats
    -Reduce the time and complexity to process security changes
    -Increase speed of secure application delivery

    ABOUT THE SPEAKERS:

    Andy Ryan, Cloud Solutions Architect at vArmour
    https://www.linkedin.com/in/andyr
  • The Digital Strategy that will Shape Your Future The Digital Strategy that will Shape Your Future Jonathan Murray, EVP and CTO at Digital Prism Advisors; Ross Mason, Founder and VP of Product Strategy, MuleSoft Sep 1 2016 5:00 pm UTC 90 mins
    According to Gartner, half of CEOs believe that their industries will be unrecognizable in five years. Their top priority is transforming their organizations to ensure their organizations stay competitive in the midst of digital disruption.

    What is your organization’s strategy for digital transformation? Join Jonathan Murray, EVP and CTO at Digital Prism Advisors and formerly with Warner Music Group and the NY Times and MuleSoft founder and VP of Product Strategy Ross Mason as they explore the digital strategy that can help your company compete and win.

    Attendees will learn:

    – The definition of a composable enterprise, and how you can adopt that model for your own business
    – Case studies of global businesses achieving digital transformation with a composable enterprise
    – Best practices for business agility leveraging Anypoint Platform
  • Enterprise Knowledge & Unified Communications Drives Impact Enterprise Knowledge & Unified Communications Drives Impact Microsoft Sep 1 2016 6:00 pm UTC 60 mins
    Get your employees in the loop with easily accessible knowledge!

    Some of the biggest drains on employee productivity and engagement come from one thing: a lack of available knowledge. Whether its an IT, HR, or customer service question, having to search multiple places for the answer, or contact another employee for it, wastes valuable time and effort. Having the right knowledge in the right place at the right time empowers people to work better, and the latest advancements in cloud applications and collaboration tools can help.

    In this webcast, you will learn how to:

    - Increase employee engagement, productivity, and satisfaction by providing easy access to a consistent, authoritative, and searchable knowledge base.

    - Reduce service cost and effort by deflecting questions from high cost channels (assisted-service) to more cost effective channels (self-service) for “help desk” functions enterprise–wide, including HR, IT, Compliance, Finance, Customer Service, and more.

    - Reinforce adherence to policies and procedures by making corporate compliance guidelines easily available to all employees.
  • S'entraîner, se préparer, se juger, réagir face aux attaques ciblées S'entraîner, se préparer, se juger, réagir face aux attaques ciblées David Grout, Technical Director, Southern Europe, FireEye Sep 2 2016 9:00 am UTC 45 mins
    Aujourd’hui la question n’est plus “vais-je être victime d’une attaque ou d’une tentative d’attaque ? » mais plutôt « quand vais-je l’être ? ». Comme pour le sport de haut niveau, la gestion de la sécurité d’une infrastructure nécessite de la préparation, de l’entrainement et de la compétition. Fort de notre expérience en victimologie avec nos équipes Mandiant et de notre vision des groupes d’attaquants à travers Isight Partners, nous avons mis en place différents programmes qui vous permettent d’être prêt le jour J et de régir le cas échéant. Venez découvrir comment nous pouvons vous accompagner dans toutes les phases amont et aval à travers nos prestations de consulting.
  • Endpoint Protection Beyond Antivirus Endpoint Protection Beyond Antivirus Steve Gerrard and Usman Durrani, Cyber Security Solutions, Palo Alto Networks Sep 6 2016 9:00 am UTC 60 mins
    It’s time to protect your users from threats that easily bypass antivirus.

    Join us for a live webinar on endpoint security

    •What hidden costs traditional AV imposes on your organization
    •How to determine the true value of any endpoint security solution
    •Which five capabilities are critical to protect your users, systems and endpoints
    •How Traps v3.4 prevents security breaches in your organization – without traditional AV.

    Protect yourself against antivirus.
  • Why is All-flash Infrastructure Becoming the Storage of Choice? Why is All-flash Infrastructure Becoming the Storage of Choice? Benoy CS, Head of the Digital Transformation, Syed Masroor, Country Manager, Flash Solutions, EMC India & SAARC Sep 6 2016 9:30 am UTC 60 mins
    Why You Must Attend:
    • India is on the cusp of a digital revolution. Discover the opportunities and trends in digital transformation.
    • Learn about the benefits of flash storage for new-age enterprise needs, such as business intelligence, analytics, and virtual desktop infrastructure.
    • Nearly 75% of CIOs in India are using flash storage to support their mission-critical databases, such as SAP, Oracle, Microsoft, etc. Find out why.
    • Discover how flash storage has helped CIOs achieve their business goals.
  • Manage any device, anywhere from a single console with HEAT LANrev Manage any device, anywhere from a single console with HEAT LANrev Margreet Fortune Sep 6 2016 9:45 am UTC 60 mins
    HEAT LANrev was Highly Commended in the recent Computing Vendor Excellence Awards in London - Mobile Management category.
    With the fragmentation of technology platforms and proliferation of mobile devices organisations today need a unified management approach for smart connected devices. Join this session to learn how HEAT LANrev can provide end to end multi-platform support for Windows, Mac, Linux, iOS and Android.
  • La protection des terminaux au-delà des antivirus La protection des terminaux au-delà des antivirus Bertrand Le Bail and Cyril Cimonnet, Cyber Security Solutions, Palo Alto Networks Sep 6 2016 1:00 pm UTC 60 mins
    Il est temps de protéger vos utilisateurs contre les menaces qui contournent facilement les antivirus.

    Assistez à notre webinar en direct sur la sécurité des terminaux

    •Les coûts cachés d'un antivirus classique pour votre entreprise
    •Comment déterminer la véritable valeur d'une solution de sécurité des terminaux
    •Les cinq fonctions indispensables à la protection de vos utilisateurs, systèmes et terminaux
    •Comment Traps v3.4 prévient les failles de sécurité dans votre entreprise sans antivirus classique

    Protégez-vous contre les antivirus.
  • 2016 Threat Analysis: Learning from Real-World Attacks 2016 Threat Analysis: Learning from Real-World Attacks Matt Webster, CTU Security Researcher, SecureWorks Sep 6 2016 1:00 pm UTC 45 mins
    SecureWorks® incident responders assist hundreds of organisations annually with the containment and remediation of threats during suspected security incidents.

    Visibility of these incidents provides the SecureWorks Counter Threat Unit™ (CTU) research team with a unique view of emerging threats and developing trends. This Threat Intelligence is then continuously provided to clients, arming them with the information they need to stay one step ahead of adversaries trying to compromise their networks.

    In this webcast Matt Webster, CTU Security Researcher, will discuss developments in the threat landscape observed through SecureWorks’ Incident Response engagements from April to June of 2016, including;

    - Key developments of the APT threat
    - Criminal cyber threat trends
    - Developments in Ransomware

    Matt will also discuss observations of how the affected organisations could have better prepared for the threats they encountered.
  • The FCA Says the Cloud is OK The FCA Says the Cloud is OK Greg Hanson, CTO & VP Cloud EMEA, Informatica & Andrew Joss, Head of Industry consulting – Financial Services, Informatica Sep 6 2016 1:00 pm UTC 60 mins
    The Financial Conduct Authority (FCA) has released guidance for all Financial Services Institutions considering outsourcing to the Cloud, advising a Hybrid or Cloud deployment fosters innovation which can be a driver for effective competition.

    Using a third party provider to integrate with cloud software can open a new world of opportunities including cost efficiencies, increased security and a more flexible infrastructure capacity. These benefits support effective competition.

    Join this webinar and learn:

    1.Trends and drivers of change in Financial Services
    2.The latest guidance, from the FCA, for firms outsourcing to the ‘cloud’ and what it means
    3.Cloud, Hybrid and on-Premise – why no one size fits all and why that’s ok
    4.The benefits and the opportunity available to Financial Services Organisations