Hi [[ session.user.profile.firstName ]]

IT Security

  • Upgrade to new supported LG PCoIP zero clients, get 5 free and trade-in value Upgrade to new supported LG PCoIP zero clients, get 5 free and trade-in value David Bernstein - Anything IT, Phillip Johnson - LGE Solutions & Pat Greig - Teradici Recorded: Jul 26 2016 60 mins
    Join us for this informative webinar to learn how to upgrade your Tera1 PCoIP zero clients to new LG devices, receive 5 free zero clients with money back and feel good about recycling not only your zero clients but laptops, desktops, printers and hard drives.
    • Earlier this year, LG Electronics USA, was recognized by the EPA on their dedication to increasing consumer awareness about the importance of third-party certified recycling through nationwide education and outreach efforts.
    • According to the EPA, the positive environmental impact of LG’s responsible recycling is equal to taking 12,300 passenger cars off the road for a year or saving enough energy to power more than 8,000 U.S. homes for a year.
    Guest speaker David Bernstein with Anything IT will explain the process to receive rebates on Tera1 zero clients and dispose of them in accordance with industry’s highest e-waste standards
    Anything IT and LG will explain a simple, fast and easy approach to upgrade:
    • Assess the value of your current obsolete devices (any brand and any quantity)
    • Claim your rebate
    • Get 5 free zero clients
    • Logistics and Process to upgrade and replace

    Q&A will follow at the end of the session.
  • Fast and Effective IT Security Analytics Use Cases Fast and Effective IT Security Analytics Use Cases Mike Paquette, VP Products Prelert Recorded: Jul 26 2016 60 mins
    Security professiona​​ls realize that analytics are becoming an increasingly important part of the IT Security technology arsenal. However, most security analytics solutions are complex, requiring the movement of data to the analytics platform, custom use case development involving professional services, and sometimes weeks of personnel and model training before useful results can be obtained. In this webinar, see how security use cases can be quickly and effectively deployed using analytics recipes pulled from Prelert’s “Hot Sheet” security use case library. This webinar will highlight examples of the use cases being deployed in an Elasticsearch environment.
  • Five Requirements for Securely Adopting Cloud Applications Five Requirements for Securely Adopting Cloud Applications Mark D. Campbell and Brandon Whichard of IBM Security Recorded: Jul 26 2016 62 mins
    The business benefits of cloud applications are undeniable, however security concerns can still slow their adoption. While many mainstream cloud applications offer secure platforms and excellent security capabilities, much of the security burden is still on you. You still need a strategy and the technology tools to ensure your organization can safely and efficiently utilize these cloud apps.

    Join IBM Security as we discuss five essential requirements for ensuring safe and efficient adoption of cloud applications.
  • Learn how an app-centric approach will improve security & operational efficiency Learn how an app-centric approach will improve security & operational efficiency Joe DiPietro, SE Director at AlgoSec Recorded: Jul 26 2016 51 mins
    The constant barrage of application connectivity and security policy change requests, not to mention the relentless battle against cyber-attacks have made the traditional approach to managing security untenable. In order keep your business both agile and secure – across today’s highly complex and diverse enterprise networks – you must focus your security management efforts on what matters most – the applications that power your business.

    Join Joe DiPietro, SE Director at AlgoSec on Tuesday, July 26 at 11am EDT for a technical webinar, where he will discuss an application-centric, lifecycle approach to security policy management – from automatically discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning – that will help you improve your security maturity and business agility. During the webinar, Joe will explain how to:
    • Understand the security policy management lifecycle and its impact on application availability, security and compliance
    • Auto-discover and map business applications and their connectivity flows – and why it’s important
    • Securely migrate business application connectivity and security devices to a new data center
    •Get a single pane of glass that aligns application connectivity with your security device estate
    • Identify risk and vulnerabilities and prioritize them based on business criticality
  • CEO Fraud and the $2.3 Billion Mistake You Can’t Afford to Make CEO Fraud and the $2.3 Billion Mistake You Can’t Afford to Make Randy Luskey, Stu Sjouwerman, Dr. Christopher Pierson, Sam Masiello Recorded: Jul 26 2016 109 mins
    The FBI just issued a warning about a “dramatic” increase in CEO Email Scams. The Bureau estimates these scams have cost businesses more than $2.3 Billion in losses over the past three years. No matter how extensive your Security Awareness Training Program is, your company is vulnerable to these attacks. Employees are quick to act when a financial request comes from the CEO. What protocols do you have in place to make sure your team knows when an email is really coming from the C-Level? Join our panel to learn how to avoid falling victim to these phishing scams.
  • Next-Generation Security for Amazon Web Services Next-Generation Security for Amazon Web Services Dharminder Debisarun Recorded: Jul 26 2016 29 mins
    Public cloud computing resources such as Amazon Web Services (AWS) are helping organizations like yours develop and deploy new applications rapidly; expand into geographic regions seamlessly and extend competitive advantages.

    Cyber criminals are well aware of the rapid expansion into the public cloud and are looking for weaknesses in your security posture. Don’t let them find one. The VM-Series for AWS, allows you to securely extend your corporate datacenter into AWS, using our next-generation firewall and advanced features to protect your data while native management features ensures policies keep pace with the changing to your applications.

    In this webinar, attendees will learn:
    - Common customer use cases for AWS
    - Key security challenges and considerations
    - How the VM-Series can protect your AWS environments
  • Fidye Yazılıma HAYIR! Fidye Yazılıma HAYIR! Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü Recorded: Jul 26 2016 63 mins
    Trend Micro Akdeniz Ülkeleri Kanal Müdürü Mehmet Dağdevirentürk, kendinizi ve firmanızı fidye yazılımlara karşı nasıl koruyacağınızı ve fidye yazılımlarla ilgili son gelişmelerin neler olduğunu sizlerle paylaşıyor. Fidye yazılıma karşı savunmanın sihirli bir formulü yok, ancak en yaygın saldırı yöntemlerini bilmeniz, en iyi korumayı sağlamak için atacağınız öncelikli adımları bilmenizi sağlar. Bu webinarda Trend Micro olarak sizlerle tecrübelerimizi paylaşarak karşılaşabileceğiniz olası risklere karşı planınızı şimdiden oluşturmanız için bir yol haritası sunuyoruz.
  • Recognise your Threats, Regulate your Risks Recognise your Threats, Regulate your Risks Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India Recorded: Jul 26 2016 53 mins
    Cyberattacks against Banking and Financial Institutions have evolved from annoying pop-ups and machine crashes to denial-of-business events. CxO resignations and losses/damages running into crores of Rupees have heightened the awareness around cyber security, and shifted it from an IT problem to a business priority risk.
    Recently, Asia has been a hotspot for such cyberattacks, with many high-profile attacks being the subject of headlines across the region, including the most recent Bangladesh Bank breach.
    In its latest annexure to banks titled “Cyber Security Framework in Banks”, RBI has outlined a number of proactive measures that Banks in India need to take to ensure a robust cyber security/resilience framework, and to ensure adequate cyber security preparedness on a continuous basis.

    Here are just a few requirements:
    -Board approved cyber security policy
    -Continuous surveillance
    -Cyber crisis management plan
    -Cyber resilience framework
    -Cyber security awareness among stakeholders / top management / board
    FireEye invites all banks and financial institutions to join this exclusive webinar where the speakers will review the RBI guidelines and suggest ideas to bolster your response strategy and limit the consequences of a breach.

    Date: 26th July, Tuesday
    Time: 11:00 am
    Duration: 40 mins. With Q&A
    Vipul Kumra, Consulting Engineer, FireEye India
    Shantanu Mahajan, Consulting Engineer, FireEye India
  • Cyber Risk Conversation: Security Trends & Best Practices Cyber Risk Conversation: Security Trends & Best Practices Ron Bushar, Managing Director, Mandiant (a FireEye company) Recorded: Jul 26 2016 54 mins
    Over the last decade, cyber security has evolved from a niche concern confined to IT professionals to a major priority for CEOs and boards of directors. Company leaders are now charged with managing cyber risk with the same urgency that they have managed traditional business risk.
    The emergence of cyber risk as a centerpiece of risk management is being fueled by new and increasingly complex threats. Organizations must deal with a quickly evolving set of threats to their information systems and data. Many of these threats were unimaginable just a few years ago.

    In this discussion, we explain the different forms of cyber risk and show how the threat level has risen in recent years. We also provide a basic framework for managing cyber risk, and finally, we pose five key questions business leaders should ask themselves to ensure their security posture is sufficiently robust and resilient to meet evolving threats.

    Register for this webinar today. As usual, we’ll leave time for Q&A.
  • The Foundation of Data Quality The Foundation of Data Quality Charlie Piper - CEO and Dan Ortega - VP of Marketing Recorded: Jul 22 2016 5 mins
    Blazent's CEO, Charlie Piper and Dan Ortega introduce the company strategy, vision and it's value to customer's and MSP partners. Together, Charlie and Dan describe how Blazent's platform finds the the most accurate data to improve decision manking in IT and beyond.
  • Ransomware - an Educated Response Ransomware - an Educated Response Stu Sjouwerman, Founder and CEO of KnowBe4 Recorded: Jul 21 2016 12 mins
    Stu Sjouwerman, CEO of KnowBe4, has seen first-hand the devastating impact of ransomware on healthcare entities. And he knows traditional defenses aren't enough to ward off attackers. What's needed is a whole new approach to user education.
  • CA Live API Creator: una manera increíblemente rápida de crear API's CA Live API Creator: una manera increíblemente rápida de crear API's Cesar Triana Recorded: Jul 21 2016 45 mins
    La empresa de la actualidad, a medida que adopta la transformación digital, necesita abordar una série de retos para avanzar.
    En esto webinar los especialistas de CA muestran como el CA Live API Creator es una manera increíblemente rápida de crear API's.
  • Security in the Boardroom Series: Earning and Using Your Seat at the Table Security in the Boardroom Series: Earning and Using Your Seat at the Table Ashley Ferguson, Director, SecureWorks Governance, Risk & Compliance Recorded: Jul 21 2016 60 mins
    This webinar will provide tips for successfully navigating the expanding role of the Chief Information Security Officer as an essential business leader. Explore leading practices for managing cybersecurity risk as a people, process and IT leader. Get tips for building a working relationship with other executive stakeholders in audit, compliance and enterprise risk. And hear how other CISOs are establishing more productive reporting relationships with the board of directors. Whether you’d like to expand your role as a risk and security professional, gain more executive support for key initiatives, or improve your relationship with the board, you’ll take away actionable insights to apply to your own journey as an essential business leader.
  • A Comprehensive Approach to Next-Generation Endpoint Security A Comprehensive Approach to Next-Generation Endpoint Security Jon Oltsik, ESG; Grant McDonald, Intel Security; and Eyal Dotan, Bufferzone Recorded: Jul 21 2016 59 mins
    Many enterprise organizations are moving beyond antivirus software, adding new types of controls and monitoring tools to improve incident prevention, detection, and response on their endpoints. Unfortunately, some of these firms are doing so by adding tactical technologies that offering incremental benefits only.
    So what’s needed?
    A strategic approach that covers the entire ESG endpoint security continuum from threat prevention to incident response. A truly comprehensive solution will also include advanced endpoint security controls that reduce the attack surface and tight integration with network security, SIEM, and threat intelligence to improve threat detection and response processes.
    Join ESG senior principal analyst Jon Oltsik, Intel Security, and Bufferzone on a webinar on July 21 at 10am PT/1pm ET to learn more about next-generation endpoint security requirements and strategies.
  • The Agile Supply Chain: API-led Connectivity and B2B/EDI The Agile Supply Chain: API-led Connectivity and B2B/EDI Kent Brown, CTO, ModusBox David Chao, Industry Marketing, MuleSoft Recorded: Jul 21 2016 46 mins
    Today's supply chains are faced with an increasing number of distribution channels, a broader set of suppliers and ever decreasing product cycles. A new approach is required that delivers a step change in agility. MuleSoft's API-led approach delivers up to 200% faster development cycles through leveraging re-usable assets. Join us for a walkthrough of this approach, including a demo of Anypoint Platform and Anypoint B2B.
  • Briefings Part 1: Anatomy of a Ransomware Attack Briefings Part 1: Anatomy of a Ransomware Attack Barry Shteiman, Director, Threat Research, Exabeam; Brandon Dunlap, Brightfly Recorded: Jul 21 2016 60 mins
    Ransomware is currently one of the most disruptive security challenges for enterprises. As it moves from an individual employee's PC to the corporate network, the impact can be significant. Despite research and analysis by security firms and analysts, most don't have a good idea of how a piece of ransomware actually operates, i.e. what is affected and when, what signals to look for, etc. Exabeam researchers have detonated nearly 100 strains of ransomware in the labs and produced a detailed analysis of how a ransomware attack actually unfolds, and how an organization might respond to shut it down. Join Exabeam and (ISC)2 on July 21, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms of ransomware, how to detect it and shut down an attack.
  • Prevention Week Part 4: Prevent Ransomware with the Right Architecture Prevention Week Part 4: Prevent Ransomware with the Right Architecture Scott Simkin, Palo Alto Networks Cybersecurity Team Recorded: Jul 21 2016 61 mins
    Thanks to advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data, ransomware is on a tear. To protect your organization from having to pay attackers to free your data, you need to evolve beyond a layered security approach to a prevention-oriented architecture – or face threats of Jurassic proportions.
    Learn more about the right architectural approach for effectively preventing ransomware infections and other sophisticated threats, even across distributed IT environments.
  • Effective Monitoring and Defense in Financial Services Effective Monitoring and Defense in Financial Services Dave Hoelzer (SANS) and Lawrence Chin (Palo Alto Networks) Recorded: Jul 21 2016 47 mins
    Cybersecurity Webcast co-hosted by SANS and Palo Alto Networks

    In financial institutions, investments in cybersecurity may occur in fits and starts due to actual incidents, media coverage, or perceived risk. This presents challenges in maintaining a consistent security posture, especially as the threats and the attack surfaces evolve continuously.

    In this webcast you will learn about the value of constant monitoring and awareness of your network traffic, the role and relevance of anomalies, and the benefits of an overall security architecture for financial institutions.
  • Protecting Application Delivery without Network Security Blind Spots Protecting Application Delivery without Network Security Blind Spots Don Laursen, Sr. Product Manager, F5 & Juan Asenjo, Sr. Partner Manager, Thales e-Security Recorded: Jul 21 2016 55 mins
    SSL/TLS is extensively used to protect web traffic, but the technology can also be exploited to create security blind spots. SSL/TLS encrypted tunnels can be used to hide malicious codes and other threats from network security and performance monitoring tools. To prevent possible malware propagation across networks requires decrypt/encrypt capabilities that enable careful traffic monitoring and inspection.
    Join Don Laursen, Sr. Product Manager from F5 and Juan Asenjo, Sr. Partner Manager at Thales e-Security, to learn how a security architecture using application delivery controllers (ADCs) and hardware security modules (HSMs) can ensure you can optimizes web services with traffic inspection, while safeguarding and managing the critical cryptographic keys that underpin security.
  • Cybersecurity Challenges, Risks, Trends and Impacts:  Key Survey Insights Cybersecurity Challenges, Risks, Trends and Impacts: Key Survey Insights Julian Dana (Director, Latin America, Mandiant), Chris Leach (Chief Technologist, HPE) Recorded: Jul 21 2016 59 mins
    No question about it: Information security—or, more precisely, the lack of it—is firmly on the radar for business and information-technology leaders in organizations of all sizes and in every sector. Many executives and managers fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyber attacks, and a shortage of in-house security expertise remains of widespread concern.

    Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review Custom in February 2016. Commissioned by Hewlett Packard Enterprises Security Services and FireEye, join our experts as they discuss this industry survey to uncover:

    •Implications of breach impacts for organizations
    •Benefits of a risk management strategies
    •Current trends in information-security threats

    Register for this webinar today!
  • Up and Running in AWS, Now What About Security? Up and Running in AWS, Now What About Security? Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Jul 21 2016 54 mins
    For many businesses, security, compliance and data protection in the cloud have been a major challenge due to the shared responsibility model and automation of public cloud infrastructure. Trying to force fit traditional security tools into an agile infrastructure like AWS can be time consuming and clumsy, and ensuring consistent security controls requires new practices for security and auditing teams.

    Register for this impactful webinar presented by Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic, as he walks through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Tradition is out: where traditional security does and doesn’t fit
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices