Hi [[ session.user.profile.firstName ]]

IT Security

  • How to improve network visibility and ease IT frustration How to improve network visibility and ease IT frustration Neela Sambandam Recorded: Aug 31 2016 43 mins
    Today’s new generation of mobile-centric users and the sheer number of authentications due to mobility is driving the need for better visibility into who and what is on the network.

    Join Neela Sambandam, ClearPass Product Manager, to learn how the Insight reporting package within the ClearPass solution gives you:
    •Unsurpassed views into the users, devices and connections on your network
    •An easy-to-use dashboard and analytics engine
    •Triggered alerts based on pre-defined metrics
    •Improved reporting with pre-configured templates

    Learn how ClearPass Insights can improve network performance and user experience, as well as about future enhancements.
  • Office 365 Security: How to safeguard your data Office 365 Security: How to safeguard your data Greg Schaffer, CISO for FirstBank & Rich Campagna, VP of Products for Bitglass Recorded: Aug 31 2016 54 mins
    Public cloud apps like Office 365 are being widely adopted in every major industry, with security & compliance at the top of the list of concerns. In this webinar, Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, will provide practical cloud security advice that you can apply immediately in your organization. Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and will give examples of how your peers have responded to the cloud security challenge.
  • An Asset-Centric Approach to Manage Cyber Risk An Asset-Centric Approach to Manage Cyber Risk Humphrey Christian, Vice President, Product Management, Bay Dynamics Recorded: Aug 31 2016 56 mins
    Enterprises, both large and small, all have vulnerability management solutions. However, security teams are overwhelmed by the mountain of vulnerabilities uncovered by these solutions. Once they determine which endpoints, systems and applications are vulnerable to an attack, they do not know which steps to take next and in what order. As a result, they spend countless hours manually determining who owns the vulnerable asset, the value of that asset, if it was compromised and if there is an active threat to that asset.

    Join us for a live webinar on Wednesday, August 31, 2016 at 10am PT as Humphrey Christian, Vice President, Product Management, Bay Dynamics, discusses why organizations and business stakeholders, need an asset-centric approach to provide a fully integrated view of threats, vulnerabilities, asset value and business context. He will also give a live demonstration of the Bay Dynamics Risk Fabric cyber risk platform and provide examples of how our customers have used it to build asset-centric risk management programs that allow security teams, line-of-business leaders, C-level executives and boards of directors to determine which threats and associated vulnerabilities could lead to a compromise of their most valued assets and what steps need to be taken in order to reduce that risk.

    Register for the live webinar to learn more about:
    • Understanding your Assets at Risk by protecting your high value assets that can be exploited by threats and vulnerabilities
    • Why it is important to take an asset-centric approach to effectively manage cyber risk
    • How Risk Fabric cyber risk analytics platform servers as a centerpiece for this asset-centric approach through a live demonstration
  • Webcast: Do More with ESET Remote Administrator Webcast: Do More with ESET Remote Administrator Ben Reed, Sr. Technical Content Strategist and Sales Engineer Recorded: Aug 31 2016 61 mins
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • Security by Design: The Alignment of Security and Agility Security by Design: The Alignment of Security and Agility Uri Sarid, CTO, MuleSoft; Kevin Paige, Head of Security, MuleSoft Recorded: Aug 31 2016 40 mins
    By 2020, Gartner predicts 60% of digital businesses will suffer major service failures due to the inability of the IT security team to manage digital risk in new technology and use cases. With Target, Apple, Nissan, and Twitter all making the news recently for their security failures, CIOs and CISOs are under tremendous pressure to keep the business secure -- without slowing the business down.

    In this session, Uri Sarid, MuleSoft CTO and Kevin Paige, MuleSoft Head of Security, discuss the application networks and an emerging approach that CIOs and CISOs are driving together to deliver both security and business agility.

    Attendees will learn:

    – How to deal with security no longer resting in the hands of the security team due to shadow IT and other factors
    – How a well-defined API strategy can reduce risk
    – How application networks have emerged as an approach to deliver security and agility
    – How CISOs can drive agility and promote security by shifting mindsets
  • Ransomware is Here: Fundamentals Everyone Needs to Know Ransomware is Here: Fundamentals Everyone Needs to Know Jeremiah Grossman, Chief of Security Strategy Recorded: Aug 31 2016 34 mins
    If you’re an IT professional, you probably know at least the basics of ransomware. Instead of using malware or an exploit to exfiltrate PII from an enterprise, bad actors instead find valuable data and encrypt it. Unless you happen to have an NSA-caliber data center at your disposal to break the encryption, you must pay your attacker in cold, hard bitcoins—or else wave goodbye to your PII.


    Those assumptions aren’t wrong, but they also don’t tell the whole picture. Hear from Jeremiah Grossman, SentinelOne’s Chief of Security Strategy and a 20-year cybersecurity veteran, in this on-demand webinar that will explore the foundations of ransomware, and why you truly need to worry.
  • RegTech Webinar Series RegTech Webinar Series Shane Brett Recorded: Aug 31 2016 17 mins
    Regulatory compliance is one of the biggest immediate challenges affecting the financial services industry today. Many market participants are unsure how to meet constantly evolving reporting requirements or how to move to an open API framework in a secure and compliant way.
  • Monthly Threat Webinar Series: August 2016 - 1H'16 Security Roundup Monthly Threat Webinar Series: August 2016 - 1H'16 Security Roundup Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro Recorded: Aug 30 2016 42 mins
    This month’s webinar will feature information from our 2016 mid-year security roundup report where we detail out the latest trends within the threat landscape affecting the world. From Ransomware and Business Email Compromise to Data Breaches we’ll cover the most important threats that are targeting our customers and businesses. We will also cover the threat statistics we gather from our Trend Micro™ Smart Protection Network™ and the top threats observed.
  • Breach Detection Systems – Product Selection Guide Breach Detection Systems – Product Selection Guide Jason Pappalexis Recorded: Aug 30 2016 34 mins
    Understand Breach Detection System selection criteria and what enterprises should consider prior to purchase.
  • Ask the Experts: Realizing the Value of Microsoft Azure  Ask the Experts: Realizing the Value of Microsoft Azure  Evelyn Padrino, Group Product Marketing Manager, Microsoft Recorded: Aug 30 2016 31 mins
    Tune in for the latest in our Ask the Experts Series! This session is all-about-Azure: cloud computing and PaaS for the enterprise. During this session we will show you how and why to use the benefit/credit that comes with your Visual Studio Subscription.

    In this webcast, you will learn:

    - About other available Azure programs
    - Application development tests on Azure
    - What other customers are doing on Azure and how it is paying large dividends
  • RANSOMWARE SURVIVAL GUIDE RANSOMWARE SURVIVAL GUIDE Jennifer Cheng Director, Product Marketing, Proofpoint Recorded: Aug 30 2016 61 mins
    What every organization needs to know before, during, and after a ransomware attack.

    Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

    Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

    Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

    •Why ransomware is surging.
    •Where it comes from.
    •What to do before, during, and after an attack.
    •Should you pay or not? What to consider.

    Exploit kits don’t stop. Neither should your business.
  • CSA Research: Mitigating Top Cloud Threats CSA Research: Mitigating Top Cloud Threats Salim Hafid and Rich Campagna of Bitglass, and John Yeoh of CSA Recorded: Aug 30 2016 57 mins
    With cloud adoption on the rise, IT leaders are looking to peer organizations to understand security best practices in the cloud. Bitglass and CSA surveyed infosec professionals to uncover the top threats to cloud security and the tools most often used to secure cloud apps.

    In this webinar, John Yeoh, Senior Research Analyst at CSA, joins Bitglass to discuss the results of the "Mitigating Risk for Cloud Applications" report and to explore the major issues facing organizations in their move to the cloud, from Shadow IT and inadequate visibility to concerns around government access.
  • Managing Cyber Risk From Third Party Contractors Managing Cyber Risk From Third Party Contractors Jake Olcott Recorded: Aug 30 2016 46 mins
    Many recent data breaches have exploited security weaknesses in the networks of third parties to attack businesses. With supply chains growing and business functions increasingly outsourced, the number of third party organizations with access to your company’s most sensitive data has increased dramatically. How should organizations assess and manage the cyber risk by their vendors and suppliers? What kinds of policies and controls should organizations put in place in order to mitigate third party cyber risk? How can organizations continuously monitor the cybersecurity performance of their critical vendors in real time?

    Getting familiar with third party cyber risk management best practices and industry standards is a good start towards mitigating cyber risk for your organization. Join Jake Olcott, VP of Business Development as he discusses these topics and more.
  • Social Engineering - Are you the weakest link? Social Engineering - Are you the weakest link? Greg Iddon, Technologist, Sophos Recorded: Aug 30 2016 57 mins
    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
  • Is 'Automation Anxiety' something to be concerned about? Is 'Automation Anxiety' something to be concerned about? Daniel Horton, Technical Manager at Parker Software Recorded: Aug 30 2016 5 mins
    Is automation anxiety a 'thing'? Or is it just a buzzword?
    EM360° talks to Parker Software's Technical Manager, Daniel Horton to find out what this term is all about and whether there really is anything to panic about.
  • Grid Cyber Lockdown: Ransomware in Critical Infrastructure Grid Cyber Lockdown: Ransomware in Critical Infrastructure Panel of experts as originally presented with EnergySec Recorded: Aug 29 2016 59 mins
    Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:

    •A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
    •A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
    •Best practices and technologies for protecting your organization against ransomware.

    Panelists:
    Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
    Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
    Christopher Ellefsen, BKK Group, Senior Network Engineer
    Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
    Jack Whitsitt, EnergySec, Senior Security Strategist
    Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security
  • DDoS LIVE: Watch as a Security Expert Performs a Live DDoS Attack DDoS LIVE: Watch as a Security Expert Performs a Live DDoS Attack Andy Shoemaker Founder and DDoS Expert, NimbusDDoS and Nabeel Hasan Saeed Product Marketing Manager, Imperva Incapsula Recorded: Aug 26 2016 56 mins
    In this webinar Andrew Shoemaker, a DDoS simulation expert from NimbusDDOS, gives you a rare glimpse into how hackers find the weak points in your defenses and exploit them to level devastating DDoS attacks. You'll see real world examples of the tactics and methods used to create tailored DDoS attacks that can bring down a targeted network or application, and learn how best to defend against them.
  • Cradlepoint Whiteboard Series -- Secure Connectivity for Mobile Health Professio Cradlepoint Whiteboard Series -- Secure Connectivity for Mobile Health Professio Roger Billings, Cradlepoint Recorded: Aug 26 2016 2 mins
    Learn more about secure LTE solutions for mobile healthcare applications: https://cradlepoint.com/products-and-services/solutions/healthcare

    Learn about Enterprise Cloud Manager: https://cradlepoint.com/ecm
  • Thunderstorm in the Cloud Thunderstorm in the Cloud Mathias Fuchs, Senior Incident Response Consultant, Mandiant Recorded: Aug 26 2016 37 mins
    Immer größer wird die Anzahl der Unternehmen die ihre IT-Services teilweise oder ganz an Clouddienstleister abgeben. Dies führt zu einem erhöhten Aufwand und einigen Komplikationen wenn es zu Sicherheitsvorfällen kommt.
    In diesem Webinar präsentiert Mathias Fuchs Strategien wie Unternehmen trotzdem effizient Sicherheitsvorfälle untersuchen und eindämmen können. Anhand einer Fallstudie wir gezeigt wie sich cloudbasierte Untersuchungen von herkömmlichen unterscheiden.