Hi [[ session.user.profile.firstName ]]

IT Security

  • Enhanced Enterprise Readiness for Automation and Reporting
    Enhanced Enterprise Readiness for Automation and Reporting
    Roi Alon, Product Manager, Tufin & Dan Rheault Sr. Product Marketing Manager, Tufin Live 60 mins
    Ready for full automation for next generation firewalls (NGFWs)? Eager to achieve a greater understanding of your risk?

    Join the Tufin product team on January 16 to learn how customers using Tufin Orchestration Suite R18-3 GA will master their Network Security Policy Management through increased automation and additional risk reporting.

    Tufin Orchestration Suite R18-3 GA delivers:

    - New workflow support for Cisco and Palo Alto Networks NGFWs
    - Policy-based routing automation for Cisco network devices
    - New reporting options
    - Methods to identify risk for non-zone included IPs for risk flows

    Register now to learn how automation increases your organization’s efficiency and improves risk management processes.
  • Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Why Security Matters: Global Insights to the 2018 Unisys Security Index Survey
    Tom Patterson, Chief Trust Officer, Unisys Live 75 mins
    Despite spending billions of dollars every year on security, companies and governments – as well as the products and services they use – often lose sight of their ultimate goal: protecting the user. Please join this webinar to hear Tom Patterson, the Chief Trust Officer for Unisys, share results and realities from the only recurring snapshot of consumer security concerns conducted globally. This year’s global Unisys Security Index survey brings to light key areas of consumer concern that are vital to understand, if society and the security sector are to be successful in achieving their goals.

    Major findings affecting government services, entire business sectors and fast evolving technologies are all illuminated through the lens of the user, as opposed to the more typical providers. Learn what’s most important to the consumer in each region of the world, and across key demographic categories. This clarity of vision, brought by thousands of statistically significant consumers from around the world, is a voice that needs to be heard.

    Tom will use this year’s results, juxtaposed with over a decade of survey history and informed by global events and leaders from both government and industry, to provide a cogent report on the state of global security from the perspective that matters most—the user.
  • Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Why Lead with Risk? Defining a Risk-Based Cybersecurity Strategy
    Doug Landoll, CEO, Lantego Live 35 mins
    Some approaches to information security simply won’t deliver the results required for effective governance. Addressing head-on the primary issue—risk—is the key to a successful strategy.

    In this session, Doug Landoll, CEO of information security compliance consulting firm Lantego, will discuss how to take a risk-first approach to addressing information security. Specific topics include:

    - How to define cybersecurity success
    - Common approaches that fall short
    - Risk-based cybersecurity strategy planning

    Find out how a proactive approach to information security now can help your organization avoid compliance issues later.
  • An introduction to Symantec Email Fraud Protection
    An introduction to Symantec Email Fraud Protection
    Anant Krishna Vadlamani, Brian Westnedge, Steve Whittle Live 60 mins
    In this webinar, we’ll go in depth on Symantec Email Fraud Protection, a new automated DMARC enforcement solution that provides another layer of defence to eliminate the single biggest phishing attack vector: exact-domain impersonation.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Live 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • CISO Panel - Cybersecurity and the New CISO
    CISO Panel - Cybersecurity and the New CISO
    Gary Hayslip (Webroot) | Dan Lohrmann (Security Mentor) | Mark Weatherford (vArmour) | Amos Stern (Siemplify) Recorded: Jan 16 2019 59 mins
    Learn how the role of Chief Information Security Officer (CISO) has changed in the age of data breaches and high-profile cyber attacks.

    Join well-known CISOs at the top of their game for an interactive discussion on:
    - How the role of CISO has changed in the last few years
    - Hiring and retaining a CISO
    - Top challenges for CISOs
    - Dealing with stress & pressure associated with the role
    - How to keep your security team happy
    - Tools, technology and policies CISOs swear by
    - What keeps CISOs up at night
    - Why leadership buy-in is essential to boost cybersecurity
    - Future trends and predictions

    Speakers:
    - Gary Hayslip, CISO, Webroot
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Dan Lohrmann, Chief Strategist & CSO, Security Mentor
    - Amos Stern, CEO, Siemplify

    This exclusive CISO webinar originally aired during National Cyber Security Awareness Month (NCSAM).
  • Top 5 Ways Your Network Can Give Your Business a Competitive Edge
    Top 5 Ways Your Network Can Give Your Business a Competitive Edge
    Guido Kragten, Sales Enablement Cloud Platforms, EMEA Recorded: Jan 16 2019 52 mins
    Seventy percent of today's Midsize businesses are investing in technology to customize the user experience, improve customer satisfaction, build loyalty, and gain a competitive advantage. But the ability to deliver amazing user experiences is dependent on high-performance, reliable connectivity. It requires a business-class network.

    Join us on 16th January, as we showcase the Top 5 business-class features your network must have for you to automate and optimize the delivery of network services to drive your business success.

    A high-level discussion will be followed by a demo of Aruba Central, network management in the Cloud.
  • Security Platforms
    Security Platforms
    Symantec Recorded: Jan 16 2019 8 mins
    Security Platforms
  • Come rendere il passaggio al cloud più veloce e sicuro
    Come rendere il passaggio al cloud più veloce e sicuro
    Antonio Cancellara & Marco Ottavi Recorded: Jan 16 2019 51 mins
    Stai progettando la migrazione al cloud? Sei sicuro che la tua infrastruttura cloud e le tue applicazioni aziendali siano realmente protette?
    Partecipa a questo webinar esclusivo in cui gli esperti di SonicWall spiegano come proteggere la tua infrastruttura cloud pubblica e privata dalle minacce avanzate.
    Argomenti del webcast:
    •Come applicare la protezione di nuova generazione a infrastrutture cloud pubbliche e private e alle applicazioni aziendali
    •Come ottenere visibilità completa sull'ambiente virtuale per prevenire le minacce
    •Novità di NSv e WAF
  • Cyber Security Framework
    Cyber Security Framework
    Symantec Recorded: Jan 16 2019 6 mins
    Cyber Security Framework
  • Weekly Threat Byte | Happy (Late) Holidays
    Weekly Threat Byte | Happy (Late) Holidays
    Neil Glick, Technical Engineer, Cybersecurity Strategy - Proofpoint Recorded: Jan 15 2019 7 mins
    For this week's Interesting Threat Byte, we bring you Happy Holidays from TA505! TA505 is the designation for Threat Actor 505, one of the most prolific threat actors observed by Proofpoint. TA505 was responsible for the largest Dridex, Locky, Jaff and The Trick campaigns. Due to the variety of malware delivered by this group, demonstrates their deep connections to the underground malware scene.

    Proofpoint has been watching TA505 for quite some time and has data dating back to 2014 when they launched their first Dridex campaign. When TA505 changes their tactics, other threat actors tend to follow. Just in time for the holidays, Proofpoint has noticed that TA505 is sending out fewer ransomware campaigns and instead focusing on smaller more targeted attacks. Why you ask? The value of cryptocurrency has dropped significantly, leading to threat actors looking for new and creative ways to get money from unsuspecting victims.
  • Security Strategy & Influence
    Security Strategy & Influence
    Max Aulakh, CEO, Ignyte Assurance Platform Recorded: Jan 15 2019 38 mins
    Every organization has a strategy – sometimes this is explicitly stated within various organizational documents and other times the strategic objectives are held within the minds of executive leadership. CISOs today are struggling to find the right words and narrative to set the tone from the top. How do you properly extract the right type of information from your organization that will help you build a consensus and influence with your top-level management?

    As a CISOs, you need to acquire a new set of skills while maintaining your technical trench warfare knowledge (Frameworks, SIEMs, DLP, MDR, etc..). In this presentation, Max Aulakh (CEO) will present broad range of skills that are needed for the next CISO. We will also examine behaviors of some of the well known CISOs in our industry and how they interact & build influence to gain consensus.
  • Wrangling Vulnerability
    Wrangling Vulnerability
    Mark Arnold Recorded: Jan 15 2019 33 mins
    Automating Your Vulnerability Risk Management Program
  • Moving to the Cloud without Migration
    Moving to the Cloud without Migration
    Bryan J Smith, Sr. Cloud Architect, ORock & Matt Plummer, Sr. VP of Cloud Architecture, ORock Recorded: Jan 15 2019 36 mins
    Migrating legacy applications and sensitive data (such as personally identifiable information (PII)) to the cloud introduces challenges that many government agencies may be unable to overcome. Challenges include lack of financial resources or internal expertise for application modernization and concerns over data security, network performance, and compliance.As a result, many agencies continue to host and process their most sensitive data and workloads on-premise or in private clouds despite growing pressure to modernize and reduce costs.

    In this webinar, we’ll discuss a Red Hat solution that lets you move and host your legacy government off-the-shelf (GOTS) or commercial-off-the-shelf (COTS) applications in a FedRAMP moderate cloud while keeping your most sensitive data on-premise. This on-premise to cloud solution helps you satisfy compliance requirements while improving performance, security, and total cost of ownership.

    Attend this webinar to hear more about how you can:

    - Process workloads and backups in a Red Hat open source cloud.
    - Keep your most sensitive data on-premise.
    - Move legacy applications to a private Infrastructure-as-a-Service (IaaS) with limited-to-no refactoring.
    - Transport data securely over a public internet connection without a virtual private network (VPN) connection.
    - Satisfy FedRAMP, Health Insurance Portability and Accountability Act (HIPAA), Health - Information Technology for Economic and Clinical Health (HITECH) Act, and other compliance requirements for data protection.
    - Prevent dedicated denial of service (DDoS) and man-in-the-middle (MITM) attacks.
  • State of Cybercrime Report 2018: Key Findings
    State of Cybercrime Report 2018: Key Findings
    Alex Tilley, Secureworks Senior Security Researcher Recorded: Jan 15 2019 57 mins
    From July 2017 through June 2018, Secureworks Counter Threat Unit® (CTU®) researchers analyzed incident response outcomes and conducted original research to gain insight into threat activity and behavior across 4,400 companies. Their findings, which include new data about who is conducting what types of attacks and why, will be shared in person by CTU experts on this webcast.

    We’ll examine a small subset of professional criminal actors responsible for the bulk of cybercrime-related damage worldwide and explain: how they’re leveraging the underground hacker economy, why they can’t be seen by researchers and law enforcement who monitor the dark web, and how we know their tools and techniques are as sophisticated, targeted and insidious as most nation-state actors.

    You’ll also learn how constant “background noise” from low-level criminality is impacting businesses around the world and see latest cost of stolen goods, hacking tools, and hacking services on the underground marketplace.

    Additionally, get insight on these key findings from the report:

    - Ransomware is now more sophisticated than ever. Secureworks’ CTU researchers observed no less than 257 new and distinct ransomware families in 12 months
    - Cryptocurrency mining remains an extremely popular way for criminals to monetize access to infected computers. In 2017, at least one in three organizations experienced cryptocurrency mining activity on their network.
    - Criminal gangs have combined advanced social engineering and network intrusion techniques with POS malware to generate millions of dollars of revenue through stolen payment card data. According to the FBI, business email compromise and business email spoofing alone have now generated $12B in financial losses since October 2013.
  • What Does 2019 Have in Store for Cybersecurity? A CISOs Perspective.
    What Does 2019 Have in Store for Cybersecurity? A CISOs Perspective.
    Scott King, Rapid7; Shawn Valle, Rapid7; Gary Hayslip, Webroot; Vito Sardanopoli, Vantage CyberRisk Partners Recorded: Jan 15 2019 45 mins
    With the ever-changing threat environment and increasing prevalence of data breaches, today’s CISOs face a daunting task of securing their organization from a variety of threats. But, with so many priorities and a finite budget, it can sometimes feel like an impossible task to decide where to focus. So, what does 2019 have in store for cybersecurity and what are CISOs’ top priorities?

    Join Rapid7 and our panel of expert CISOs for our 2019 predictions. Some of the topics our panel will cover include:

    1. What are the top cybersecurity predictions for 2019?
    2. How will CISOs’ priorities change in 2019? What will become new areas of focus and what will decrease in priority?
    3. How will CISO’s investments change in 2019? What areas of cybersecurity do they see receiving more funding?
    4. Actionable insights for how to improve your organization’s cybersecurity strategy in 2019
  • Top 5 Reasons Why SOCaaS is the Right Choice
    Top 5 Reasons Why SOCaaS is the Right Choice
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: Jan 15 2019 46 mins
    As the rapid digitization of business processes continues, the risks from cyberattacks have become increasingly daunting. Data breaches can disrupt business operations and cause significant economic damage, especially to businesses that don't have the resources to build a fully operational Security Operations Center (SOC). Smaller businesses often incorrectly assume that investing in endpoint and perimeter security products is enough to keep them safe. This approach is now outdated and ineffective.

    A recent survey commissioned by Arctic Wolf of over 400 cybersecurity professionals indicates an increasing shift towards outsourced security operations across businesses in a variety of industries. Join this webinar as cybersecurity expert from Arctic Wolf, Louis Evans, explores:

    ● Why investing in antivirus or perimeter security solutions alone is not enough
    ● The top reasons why a SOC-as-a-Service is the right choice for security operations
    ● What you can do to transform your business overnight with outsourced security

    To see why SOCaaS is the Right Choice, save your seat now!
  • Cybersecurity of Tomorrow
    Cybersecurity of Tomorrow
    Alex Holden, CISO, Hold Security Recorded: Jan 15 2019 62 mins
    Learn what kind of challenges the next generations of technology will bring to cybersecurity and what kind of safeguards we are building. From our history of technologies becoming obsolete, to the rise and fall of hacker techniques; we can derive our lessons and not only fantasize about our future but predict it based on a solid track record from the past.
  • Principles, Not Prescriptions: The Coming of Age of ContentOps
    Principles, Not Prescriptions: The Coming of Age of ContentOps
    Rahel Anne Bailie, Chief Knowledge Officer at Scroll Recorded: Jan 15 2019 61 mins
    Content operations, ContentOps for short, has been around for a long time, though the average content professional would be hard-pressed to define it. ContentOps means having a system for content production, day in and day out, that allows us to deliver content at scale. Processes that include copy-and-paste have limited capacity, and it's time for organizations to change their processes that have lots of administrative overhead. It's time to replace outdated production methods with streamlined operational models.

    Join Scott Abel, The Content Wrangler, and his special guest, Rahel Anne Bailie, Chief Knowledge Officer at Scroll UK for this free, one-hour webinar. Come learn why ContentOps works nicely with DevOps, which helps software developers uses established processes to create and manage code efficiently, and DesignOps, which helps designers use established processes to create and manage aspects of design more efficiently. We'll talk about why organizations have been slow to adopt ContentOps, and how to move toward using content processes to be able to develop and manage great content efficiently and effectively.

    ABOUT RAHEL ANNE BAILIE

    Rahel Anne Bailie is Chief Knowledge Officer at Scroll, an STC Fellow, an industry author, and a results-driven content strategist. She has a strong track record of developing successful digital content projects, tackling the complexities of managing content for clients globally. Her strength is diagnostics: calculating how to use content to deliver compelling experiences.
  • Security Considerations for CF Container Runtime vs. CF Application Runtime
    Security Considerations for CF Container Runtime vs. CF Application Runtime
    Rani Osnat, VP of Product Marketing, Aqua Security Recorded: Jan 15 2019 34 mins
    The growing adoption of containers and the availability of scalable orchestration tools (e.g. Kubernetes) are creating opportunities to develop more agile, easy-to-update applications that combine stateful and stateless modes. The emerging architecture combines both modalities, that have very different security considerations and risk profiles.

    While Cloud Foundry Application Runtime is well-suited to 12-factor application development, Cloud Foundry Container Runtime is better for flexible, rapidly-updated apps that can scale-out specific parts of the application in a very elastic way. However, from a security standpoint, CFCR presents challenges in the form of 3rd party open-source inflow, developer-driven code changes, and frequent updates. It also presents benefits in the form of immutability, better network segmentation, and lack of persistence on the host (the notion we sometimes refer to as “reverse uptime”).

    This webinar describes how to approach these divergent needs and demonstrates some of the methods and tools that can be used to mitigate risk without slowing down development.
  • Three Best Practices for Monitoring Your PCI Preparedness
    Three Best Practices for Monitoring Your PCI Preparedness
    Tony Bradley, Senior Manager of Content Marketing, Alert Logic and Lee Ramsey, Co-Founder of Pre-Fi Recorded: Jan 15 2019 33 mins
    Maintaining and proving PCI DSS compliance can be a constant headache.

    Without the right tools and resources, monitoring your PCI compliance can be complex and involve lots of time and costs.

    Join us as we share the three best practices for monitoring PCI compliance .. Alert Logic’s automated security controls streamline assessment and detection of vulnerabilities and suspicious behavior that could jeopardize your compliance status.

    We’ll discuss product features and show you:

    -What data to monitor for PCI compliance
    -How to look for issues related to PCI compliance
    -What logs to review and make available for auditors

    Hear from our experts about these capabilities and more in this ’staying ahead of PCI compliance webinar.

    Additionally, this webinar will feature a Q&A session with Alert Logic customer Lee Ramsey, Co-founder of Pre-Fi, a provider of pre-qualification tools for consumer loan approvals. Lee will share how Alert Logic solutions help with PCI compliance preparedness.
  • Survival Skills for Cybersecurity Leaders
    Survival Skills for Cybersecurity Leaders
    Glenn Richardson, Executive Coach, LeaderSages Recorded: Jan 15 2019 60 mins
    Start the new year on the right foot by investing in yourself and improving your leadership skills. Join Glenn Richardson, coach and executive consultant, in this webinar that will explore the principles of leadership. We will review practical tips, supported by real-world examples, from an experienced, successful leader who specializes in coaching and developing new and emerging leaders. Gain confidence in your ability to learn and lead, and, if you’re already in a leadership role or approaching a new position with leadership expectations - congratulations! Join us on this webinar to develop a plan for continue learning, improvement and career advancement.
  • Symantec Endpoint Protection Mobile: Product Updates - January 2019
    Symantec Endpoint Protection Mobile: Product Updates - January 2019
    Maya Mandel, Sr Dir, Product Management Recorded: Jan 15 2019 52 mins
    Join us for a periodical customer dialog to learn about the latest Symantec Endpoint Protection (SEP) Mobile features and ask any product-related questions.

    You will learn about:

    SEP Mobile EU datacenter
    Unwanted Network Content policies
    Appthority integration and access
    WSS integration for iOS
    Custom security alerts
    Simple Android Enterprise & AirWatch 'Personal' profile enrollment
    Emulated devices visibility and enforcement policies
    And more...
  • How Cloud Applications Affect Branch Architectures
    How Cloud Applications Affect Branch Architectures
    Donna Johnson, Cradlepoint, and Lee Doyle, principal analyst at Doyle Research Jan 16 2019 5:00 pm UTC 60 mins
    Today’s branch networking landscape has been changed by the rise of cloud-based applications, cloud-delivered traffic, and IoT devices. These trends significantly affect how network administrators and IT teams address network uptime and security, deploy IoT devices, and manage their widely distributed endpoints. New needs often require innovative network architectures and solutions.

    Join Lee Doyle, principal analyst at Doyle Research, and Donna Johnson, vice president of product and solution marketing at Cradlepoint, for a live webinar to explore the ramifications of cloud applications and IoT on branch architectures, as well as the role of flexible, cloud-managed edge solutions in meeting the diverse and ever-changing network requirements of today’s enterprises.
  • Network Upgrades Giving You Security Headaches?
    Network Upgrades Giving You Security Headaches?
    Mike Rothman, President, Securosis and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Jan 16 2019 6:00 pm UTC 58 mins
    Despite the insatiable demand for bandwidth, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB.

    Join Mike Rothman, President of Securosis, and Sam Kumarsamy, Senior Product Marketing Manager at Gigamon, as they discuss how to solve the security headaches that go with these network upgrades and architectures that strengthen your security posture, simplify IT and reduce costs. You’ll learn how to:

    - Increase Your Security ROI: Filter and deliver just the right data to the right tools from network traffic anywhere in the physical, virtual and cloud infrastructure
    - Reduce Your Security Risk: Rethink your network security architecture by decrypting once and enabling inspection by multiple security tools
    - Improve Threat Response: Separate signal from noise to identify patterns and threat vectors more quickly across heterogeneous networks

    Find out how both network and security teams can collaborate faster and safer during network upgrades to solve security headaches – register today!
  • Secrets of Mature DLP Programs
    Secrets of Mature DLP Programs
    Salah Nasser, Director Product & GTM Strategy, Symantec and Kyle Black, Director Systems Engineering, Bay Dynamics Jan 16 2019 7:00 pm UTC 56 mins
    Incident triage dominates daily efforts by Data Loss Prevention (DLP) teams. What’s more pressing is the need to expand DLP policies and channels, i.e. cloud apps and email, are creating more incidents. But more incidents arrive than can be closed - so high risk actions sometimes get missed.

    New user and entity behavior analytics platforms like Symantec Information Centric Analytics (ICA) dramatically reduce false positives, so there’s time to refine processes and educate other organizations.

    Key questions answered include:

    -How to expand existing Data Protection to cover more channels while reducing incident management?

    -What’s abnormal but dangerous activity? and how dangerous is it?

    -How to address more incidents and risky users without changing policies?
  • Crouching Miner, Hidden Exfil: The Saga Continues
    Crouching Miner, Hidden Exfil: The Saga Continues
    Troy Kent, Threat Researcher, Awake Security Jan 16 2019 7:00 pm UTC 60 mins
    Everyone talks about alert fatigue and the unfortunate reality of overworked and undertrained analysts. What happens though when attackers start to focus on that reality as a point of failure? In this webinar, we will discuss how trivial this can be for an attacker. Using minimal time and open source tools, we will fly under the radar by taking advantage of analyst biases and assumptions. We'll specifically explore how we can edit an open source miner to make it fileless, and then use it for command and control and to exfiltrate data. We will then show how artificial intelligence and advanced network traffic analysis tools detect threats such as these and enable you to respond decisively.

    Key Learning Objectives include:

    - Discuss the not-so-obvious challenges alert fatigue poses

    - Illustrate with an example how attackers hide in plain sight

    - See how AI can help the analyst find and then respond to these attackers
  • Cómo hacer que su traslado a la nube sea más rápido y más seguro
    Cómo hacer que su traslado a la nube sea más rápido y más seguro
    Alex Vazquez Jan 17 2019 10:00 am UTC 60 mins
    ¿Quiere migrar a la nube? ¿En qué medida confía en la seguridad de su infraestructura de nube y de sus aplicaciones de negocio?
    Participe en este seminario virtual exclusivo, en el que los expertos de SonicWall hablarán sobre cómo proteger su infraestructura de nube pública y privada contra las amenazas avanzadas.
    Obtenga información sobre:
    •Cómo utilizar seguridad de próxima generación para su infraestructura de nube pública y privada y para sus aplicaciones de negocio
    •Cómo obtener visibilidad completa sobre su entorno virtual para disfrutar de prevención de amenazas
    •Las novedades de NSv y WAF
  • SD-What Now? What SD-WAN really is and the easiest way to deploy it
    SD-What Now? What SD-WAN really is and the easiest way to deploy it
    Imran Idrees, Global Portfolio Marketing Manager Jan 17 2019 10:00 am UTC 45 mins
    Watch this webinar for a straightforward explanation of what’s driving the adoption of SD-WAN, what it is, and why Meraki offers the simplest SD-WAN solution on the market.
  • Tackling Your Biggest Threat for Free: One Active Directory Policy
    Tackling Your Biggest Threat for Free: One Active Directory Policy
    Helen Oswell, Cyber Security Engineer Jan 17 2019 11:00 am UTC 45 mins
    The biggest threat to any organization is it’s own people, particularly when they have access to its most sensitive data. This talk is about limiting the internal threat through RBAC and segregation of duties, and how to implement these using Active Directory.

    Helen has a masters in electronic engineering, specializing in machine learning. She moved into Cyber Security at 10x Future Technologies, a fintech start up founded by the ex-CEO of Barclays Anthony Jenkins. She is now working with 6point6 to provide SME services to HM Government, designing and building a number of Cyber Security tools.
  • The Threats of 2019
    The Threats of 2019
    Bogdan Botezatu, Director of Threat Research and Reporting, Bitdefender Jan 17 2019 1:00 pm UTC 45 mins
    What threats can we expect to see in 2019, and how do we make sure we're prepared?

    Join Bitdefender Director of Threat Research and Reporting, Bogdan Botezatu to discuss research-based predictions on the biggest threats of 2019. He'll walk through the future of cryptojacking, advanced persistent threats (APTs), network-level exploits, IoT attacks, and others and provide recommendations on the industry's best defenses against these threats.
  • Securing Digital Transformation: How to Close Major Loopholes
    Securing Digital Transformation: How to Close Major Loopholes
    Corie Chung - Chief Strategy Officer; Shlomi Levin - Co-founder and CTO; Michael Aminov Co-founder & Chief Architect Jan 17 2019 4:00 pm UTC 45 mins
    Nearly 90% of businesses are pursuing a digital-first strategy as their processes become digitized as data-driven.

    However, with the promise of great leaps in growth and productivity, also come major security loopholes. From new communication channels to problematic security policies to legacy systems, there are many ways in which the digital-first business may be exposed - a risk brands simply can't afford to take.

    Join our founders to learn more about the digital transformation phenomena, its IT enablers, and how to close some of the major loopholes leaving organizations exposed.
  • Staying a Step Ahead: Security Predictions and Preparations for 2019
    Staying a Step Ahead: Security Predictions and Preparations for 2019
    Alert Logic Jan 17 2019 4:00 pm UTC 50 mins
    Hear predictions from our security experts about the evolving threat landscape so you can get prepared with actionable recommendations to improve your cybersecurity posture for 2019.

    The attack landscape is shifting with increased automation and cunning new distribution methods. There’s no discrimination when it comes to a security breach any more: everyone is at risk. How are you preparing to stay ahead of attackers, and not just for their existing attack methods but new and emerging ones as well?

    Alert Logic security experts have a front row seat on current and emerging attacks across more than 4,000 clients. Join this webinar to hear their predictions for 2019 along with practical guidance on how you can stay a step ahead and better protect your business.
  • Breaking Down the PCI SSC’s New Guidance for Protecting Telephone-Based Payments
    Breaking Down the PCI SSC’s New Guidance for Protecting Telephone-Based Payments
    Wayne Murphy, Sec-1 Ltd.; Ben Rafferty, Semafone Jan 17 2019 4:00 pm UTC 60 mins
    Over the last seven years, the technologies used by call and contact centers to communicate with customers and complete card transactions have changed drastically. Networking methodologies like VoIP have since become widely adopted, while the number of applications organizations employ to process customer information has risen dramatically. For this reason, the PCI SSC recently released their highly anticipated updated “Guidance for Protecting Telephone-Based Card Payments” for the first time since 2011, offering several much-needed clarifications for organizations looking to achieve PCI DSS compliance inside their contact centers.

    Join Semafone and Sec-1 Ltd. for this insightful webinar into the most pertinent changes, featuring two of the members of the PCI SSC’s Special Interest Group – Ben Rafferty, Chief Innovation Officer at Semafone, and Wayne Murphy, Senior Security Consultant at Sec-1 Ltd. We’ll cover the following:

    • How to avoid scope-creep inside the contact center during PCI DSS compliance
    • How Pause and Resume call recording solutions create more problems than they solve
    • How most 3rd party services are now in scope for PCI DSS compliance
    • How devices that control SIP Redirection are now also in scope
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security
    Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVault Jan 17 2019 5:00 pm UTC 60 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.

    In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.

    Join us for this webcast to learn:

    - The most common challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - The core security capabilities you need to demonstrate compliance
    - How AlienVault Unified Security Management can simplify the compliance process

    Hosted By
    Sanjay Ramnath
    VP of Product Marketing at AlienVault
    Jacques Lucas
    Qualified Security Assessor (QSA) with Terra Verde
    Zuri Cortez
    Sales Engineer at AlienVault
  • Measuring Cybersecurity through Behavioral Analytics - an Outside-In Approach
    Measuring Cybersecurity through Behavioral Analytics - an Outside-In Approach
    Jasson Casey - CTO at SecurityScorecard Jan 17 2019 5:00 pm UTC 60 mins
    Please join us on the 17th of January as Jasson Casey, CTO at SecurityScorecard, describes the state of cybersecurity in the modern world, and what best practices are for measuring it - differently. He will discuss the importance of behavioral analytics, and how to make use of an “outside-in approach” when measuring cybersecurity.

    He will relate how to apply security analytics to different facets of our business, including devops. With 20 years in the industry, Jasson will discuss his perspective on what tactics work, and which do not. Please join us to learn more.
  • Fix your Leaky Onboarding Funnel with Online Identity Verification
    Fix your Leaky Onboarding Funnel with Online Identity Verification
    Dean Nicolls, VP of Marketing, Jumio Corp. Jan 17 2019 5:00 pm UTC 27 mins
    Customer acquisition is top of mind for most financial service organizations and their boards. Normally, when banks and other financial service institutions think customer acquisition, they think about launching a new advertising campaign with the hope of driving more online or in-branch traffic -- but these campaigns are iffy at best.

    Instead, why not rethink your online account opening process where FSIs lose about 20% of their prospects through abandonment. If you can plug that leaky funnel, you will see an immediate improvement in customer acquisition.

    Join us for this informative “how-to” webinar and discover how to…

    - Dissect the abandonment problem
    - Reduce the number of identity verification screens & clicks
    - Cast a wider net with omni-channel verification
    - To say “no” to verification “maybes”
  • Get Recruited for a $100K+ Cybersecurity Job in 2019!
    Get Recruited for a $100K+ Cybersecurity Job in 2019!
    Dr. V.N. Berlin, CEO, Mission Critical Institute Jan 17 2019 5:00 pm UTC 30 mins
    Looking to break into or advance your career in the lucrative field of cybersecurity? Want to know how to get recruited by employers for $100K+ cybersecurity jobs? Join our webinar to find out!

    Mission Critical Institute is an industry leader in producing job-ready, cybersecurity experts through our academic and training partners. Our innovative programs are custom-built to meet industry standards and advance your cybersecurity career.

    There is a growing shortage of trained cybersecurity professionals, with over 3.5 million unfilled jobs projected by 2021, and employers need candidates now. Join us and learn how to start your cybersecurity today!

    Sign up for this webinar to learn:

    • How do you get recruited for a $100K+ cybersecurity job?
    • What are employers looking for in cybersecurity professionals?
    • What certifications do you need to get recruited?
    • What experience do you need to become a cybersecurity professional?
    • Why are companies willing to pay $100K+ for trained cybersecurity professionals?

    Join our webinar today and learn how you can be the next $100K+ cybersecurity professional!
  • XG Firewall: See It. Stop It. Secure It.
    XG Firewall: See It. Stop It. Secure It.
    Chris McCormack, Firewall Product Specialist, Sophos Jan 17 2019 6:00 pm UTC 60 mins
    Sophos XG Firewall gives you everything you need to secure your network against advanced threats like ransomware, bots, worms, hacks, breaches and APTs. In addition, you get unparalleled network visibility that no other firewall on the market can deliver.

    Join this webcast to see how XG Firewall can transform your network security and performance. You’ll see:

    - How the threat landscape is evolving
    - How ransomware gets onto your network and spreads – fast
    - Essential protection you need in your firewall to secure your network
    - Best practices for deploying your firewall to provide a solid defense
  • Sunset of Windows Server 2008: Migrate with Docker Enterprise
    Sunset of Windows Server 2008: Migrate with Docker Enterprise
    David Hamdani, Docker Jan 17 2019 6:00 pm UTC 33 mins
    The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.

    Attend this webinar to learn how Docker can help you meet migration deadlines by providing a validated methodology for containerizing legacy Windows applications, quickly. The combination of the Docker Enterprise container platform and purpose-built tools, allow you to upgrade and improve application security and reliability; all while cutting costs by up to 50%.
  • AWS Security: Visualizing Security Data in 2019
    AWS Security: Visualizing Security Data in 2019
    Chris Murdock, Senior Security Engineer at Conga Jan 17 2019 6:00 pm UTC 60 mins
    In a world of evolving, complex cloud infrastructure – there is no shortage of advanced security technologies that monitor for potential threats. People look for better ways to gain security insights from large datasets and are tasked with the responsibility of communicating associated business risk throughout the entire organization.

    In this webinar, Senior Security Engineer Chris Murdock from Conga will explore how to democratize the security of your next-gen infrastructure by building measurement directly into systems, factoring in security-related KPIs and OKRs. Tune in to learn how to securely scale your infrastructure while continuing to enable innovation at the speed of business.
  • [Earn 1 CPE]  Critical Actions to Survive a Data Breach in 2019 and Beyond
    [Earn 1 CPE] Critical Actions to Survive a Data Breach in 2019 and Beyond
    Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace. Jan 17 2019 6:00 pm UTC 75 mins
    With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.

    Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:

    - Implement security analytics for incident detection and response.
    - Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
    - Leverage AI to autonomously respond to emerging threats before they can do serious damage.
    - Understand key information that needs to be communicated to various stakeholders in the event of a breach.
    - Apply a “standard of due care” in order to prove compliance to regulatory agencies.
  • Employing Users as Your Quality Control
    Employing Users as Your Quality Control
    Josh Bartolomie, Dir, Res & Dev, Cofense; Sharon Smith, Fndr, C-Suite Results; Theresa Frommel, Act Dep CISO, State of MO Jan 17 2019 6:00 pm UTC 60 mins
    Process automation delivers a lot of promises. A car can be assembled in less than a day and vegetables can go from vine to can in hours. Sensors look for obvious flaws, but at points in the production process there is human oversight in the form of quality control. The same holds true for protecting against phishing threats. Automation can help weed out some of the bad stuff, but bad actors and new threats constantly outsmart the latest sensors. Join Cofense and (ISC)2 on January 17, 2019 at 1:00PM Eastern for a panel discussion examining strategies on how to enable your workforce to be quality control when it comes to malicious emails to know when something isn’t right and what to do when they see something.
  • How to Build a Zero Trust Network
    How to Build a Zero Trust Network
    John Kindervag, Field CTO, Palo Alto Networks Jan 17 2019 6:00 pm UTC 60 mins
    “Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks

    Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?

    High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.

    Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.

    Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:

    • Learn specific outcomes of implementing a Zero Trust architecture
    • Hear recommendations on where to start when planning and implementing a Zero Trust framework
    • See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
    • Get your questions answered in our Live Q&A
  • 10 Resolutions to Strengthen Your Phishing Defense Program in 2019
    10 Resolutions to Strengthen Your Phishing Defense Program in 2019
    Tonia Dudley, Security Solutions Advisor, Jeffrey Rogers, VP Customer Success, at Cofense Jan 17 2019 7:00 pm UTC 45 mins
    New year. New resolutions. Every year we make the pledge to eat healthier and get more exercise. What is good for the waistline is also good for your phishing defense posture. With more than 90% of breaches attributed to successful phishing campaigns – now is the time to think about how to prepare and prevent attacks. In this session, you’ll hear about 10 resolutions for your phishing defense programs that will make your organization more secure.

    Some of the topics covered include:

    - How to empower humans to be part of the solution
    - Best practices to balance automation with human intuition
    - How the latest features and technologies can make your life easier
  • Comment rendre votre passage au cloud plus rapide et plus sûr
    Comment rendre votre passage au cloud plus rapide et plus sûr
    Stephane Juhles Jan 18 2019 10:00 am UTC 60 mins
    Vous envisagez de migrer vers le cloud ? Avez-vous la certitude que votre infrastructure cloud et vos applications métier sont sécurisées ?
    Participez à un webinaire exclusif où des experts SonicWall vous diront comment protéger votre infrastructure cloud public et privé contre les menaces évoluées modernes.
    Découvrez :
    •Comment faire bénéficier votre infrastructure cloud public et privé et vos applications métier d’une sécurité de nouvelle génération
    •Comment obtenir une visibilité totale sur votre environnement virtuel pour la prévention des menaces
    •Quelles nouveautés apportent les produits NSv et WAF
  • Moving the Needle - Women in CyberSecurity
    Moving the Needle - Women in CyberSecurity
    Taly Walsh, Executive Director, WiCyS Jan 18 2019 6:00 pm UTC 60 mins
    A new study has updated the ratio of women to men in the cybersecurity workforce – from 11% to 20%. Yet more than 300,000 cybersecurity jobs are unfilled today, a number that is exponentially growing into the millions. Let's do something to move the needle to 50% women in cybersecurity!

    Women in CyberSecurity (WiCyS), a non-profit organization with deep roots in academia, government and industry, is driving to increase recruitment, retention and advancement of women in cybersecurity.

    During this engaging webinar for diversity recruiters and women in various stages of cybersecurity careers, we will interview two WiCyS Board Members who offer stats and important guidelines for recruitment and retention of women in cybersecurity.

    Featuring:
    Dr. Janell Straach, Chairman of the Board, WiCyS - Director, Center for Engaging Women in Cybersecurity, University of Texas Dallas

    Dr. Costis Toregas, Treasurer, WiCyS - Director, Cyber Security and Privacy Research Institute, George Washington University

    Interviewer: Taly Walsh, Executive Director, WiCyS