IT Security

Community information
The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
  • In this webinar, Chris Inglis, former Deputy Director of the NSA will share research and actionable insights on:

    -What it takes to build a winning cyber security strategy

    -Why cyber campaigns are much more effective than reactive cyber tactics

    -How to enhance your organization's cyber security profile and maintain a sustainable security posture

    About Chris Inglis:

    Mr. Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. Mr. Inglis began his career at NSA as a computer scientist within the National Computer Security Center followed by tours in information assurance, policy, time-sensitive operations, and signals intelligence organizations. Promoted to NSA's Senior Executive Service in 1997, he held a variety of senior leadership assignments and twice served away from NSA Headquarters, first as a visiting professor of computer science at the U.S. Military Academy (1991-1992) and later as the U.S. Special Liaison to the United Kingdom (2003-2006).
  • This webinar is for business leaders who wish to understand vulnerabilities in commercial software and how they can impact organizations:
    Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or as the enabler of privileges escalation inside networks.
    This webinar demystifies software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.
    Key takeaways:
    -What is a software vulnerability
    -How a software vulnerability becomes a threat
    -A glimpse of how threats multiply
    -How closing vulnerabilities impacts risk reduction
  • In today’s global market place your organization needs network connectivity with external entities – suppliers, credit card processing companies, business partners, data feeds etc. But are you really sure these connections are secure and compliant? Are you really sure they are not inadvertently creating holes in your network and exposing your organization to cyber criminals? The Target breach – and many others like it – should at least make you double check your practices.

    Presented by the renowned industry expert Professor Avishai Wool, this technical webinar will cover best practices for managing external connectivity lifecycle to and from your network, including:

    • Defining the right infrastructure, network segmentation, security controls and additional security protections
    • Managing changes to connectivity for third party applications or data feeds
    • Routing partner traffic through your network
    • Auditing and compliance challenges for both you and your partner
    • Technical considerations for managing the business and ownership aspects of third party connectivity
  • Web application security is threatened not just by hackers but also by the complexity (and related cost) of keeping up with security challenges. Due to the ever-increasing strategic and financial importance of e-commerce and other web services, web application security is of paramount importance for nearly every organization. The difficulties of web application security are compounded by the growing complexity of web applications, the nearly constant changes in site content and the increasing sophistication of web application attacks. Add in migration to cloud-based and hosted environments and the cost of application security can start to become unmanageable.

    Join this webinar as Trustwave discusses 4 approaches to reduce cost and complexity. Trustwave has helped hundreds of organizations adopt these approaches and secure their web applications with a solution offering advanced capabilities (continuous learning mode, bi-directional analysis, etc.), flexible architecture, and multiple delivery options to simplify your operations.
  • Cybercrime impacts millions of people around the world. David Finn, Executive Director of the Microsoft Digital Crimes Unit, gives you a behind the scenes look at how Microsoft is going on the offensive to stop criminals, refer perpetrators to law enforcement, and create a safe digital world.
  • 3 Steps to Better Your Help Desk and Employee Access Management Practices

    In this era of SaaS, moving your IT Service Desk and Identity Management to the cloud reduces operational friction and moves your business faster. Managing service requests and quickly closing tickets directly impact productivity and employee satisfaction. By bringing ITSM and IAM together in the cloud, IT can reduce time consuming manual tasks and streamline access controls.

    Join Ryan van Biljon from Samanage and Chip Epps from OneLogin for an overview of contemporary service request management practices, including:

    ●Unifying User Stores and Directories
    ●Automating Employee Onboarding and Offboarding
    ●Facilitating Single Sign-On and Strong Authentication
    ●Enabling Self-Service Password Management
  • Joel Daly, Founder and EVP of Sales of HOSTING will discuss ways healthcare CIOs can leverage new business models to realize increased technology efficiencies, enable information-driven decisions and improve patient service. This session will draw upon real world case studies from Uber and the nation’s leading behavioral health organization to illustrate how healthcare CIOs can learn from other industry players to successfully meet today’s challenges including: management of data convergence, HIPAA compliance, mobile (BYOD) integration and securing protected health information (PHI) from sophisticated cyberattacks and breaches – all while meeting high patient expectations and adhering to best practices prescribed by the IHI Triple Aim.
  • Palo Alto Networks는 6월 9일 PAN-OS® 7.0을 발표했습니다.
    이번 개정판에는 고객의 주요 운영 문제를 해결하고 3가지 중요 영 역(대응 시간 단축, 알려지지 않은 사실 알아내기, 관리 간소화)에서 운영 간격을 메울 수 있도록 지원하는 여러 가지 향상된 기능이포함되어 있습니다.
    이 짧은 동영상을 보고 핵심 기능을 알아보거나 아래 링크를 클릭 하여 자세한 내용을 살펴보십시오.
  • This webinar is a webinar focused on a strategic view of risk mitigation:
    Vulnerabilities in commercial software remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or the enabler of privileges escalation inside networks.
    Despite awareness of the risk, and the fact that most software vulnerabilities have a fix the day they are made public, organizations continue to fail to execute mitigation actions. The consequence is that we continue to see costly breaches affecting businesses around the globe.
    In this webinar, Marcelo will talk about how the use of vulnerability intelligence can be a game changer to help organizations become better at mitigating the risk of software vulnerabilities.
    Key takeaways:
    -Fresh data related to software vulnerabilities
    -The challenge of prioritizing mitigation
    -How the use of vulnerability intelligence can help support consistent risk reduction
  • Due to the widespread adoption and use of cloud applications, a burgeoning mobile workforce and the rise in APTs, endpoint risks have become more prevalent and a challenge to manage. Indeed, endpoint penetrations and breaches take only minutes to occur. An effective endpoint detection & response solution is critical to a timely response, as is properly trained incident response team. Join Guidance Software and (ISC)2 on August 6, 2015 at 1:00PM Eastern for a discussion on EDR and the need for effective Incident Response and automation to hasten mitigation.
  • The era of digital business is bringing a lot of opportunities for organizations. At the same time, it is bringing new challenges for those in charge of securing companies’ assets: customer data, intellectual property, and infrastructure.

    The digital business environment requires a new approach to security. An approach that focuses on supporting the business to achieve its desired outcomes while ensuring that what really matters is protected from the reach of hackers and criminals.

    In this webinar we will look into two distinct areas of IT: Enterprise Application and Mobility and the vulnerability landscape around those to discuss some of the challenges security professionals are facing today.
  • Today's problem is that all MOBILE DEVICES use Pseudo Random Number Generators, which is true of any brand or type. This exposes devices to potential mobile attacks. However, tomorrow's problems are that societal shifts will manage more of our personal data on mobile devices and this will become acute with the Internet of Things set to increase the number of devices that are connected.