The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.
If you’re focused on addressing user threats, User Behavior Analytics (UBA) can be a powerful tool in your kit. In this webcast David Gorton and Mark Settle from LogRhythm, discuss the elements of an effective user threat detection program. You’ll learn:
- Why detecting user threats is so important—and so difficult
- Different approaches to UBA
- The value of data from across your enterprise
- How to maximize the efficiency of your security analysts
Watch the webcast to learn how UBA can help you discover hidden user threats, reduce false-positives, and properly prioritize the most concerning threats.
Let our experienced Avaleris consultants paint a picture of the Microsoft Security solutions from end to end. See the mosaic of Microsoft security tools in this webinar, and we will help you wrap your head around the many solutions available to you and your organization.
There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/compliance issues. Join us for the insightful webcast where we will show how many organizations are tackling these concerns faster and easier than they thought possible. Come away from the webcast with your action plan on how you can start or continue your journey to the cloud without the challenges that may have been holding you back.
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
Bitcoin has been making remarkable breakthroughs in the currency world. Its ability to allow users to be fully in control of their transactions along with its no-borders transfer policy have made it attractive to both investors and consumers alike.
However, recent reports have revealed a darker side to Bitcoin. The cryptocurrency is being hoarded by financial institutions as ransom money to pay off potential cyber attackers. Has Bitcoin officially crossed the line and now become a black market currency? Has its untraceable nature inspired the new generation of cyber criminals to initiate unprecedented levels of targeted Ransomware attacks?
Join this panel of industry-leading speakers, who'll be discussing the following:
-Why has Bitcoin-related ransomware become more popular in recent years?
-How can you prevent a Ransomware outbreak in your organisation?
-Is it possible to catch and subsequently prosecute blockchain criminals?
-How can authorities and financial institutions adopt and adapt in the face of rising levels of Ransomware threats?
This webcast will look at health care security from the top down, focusing on what the survey tells management in terms of priorities, breach management, controls and budgets. Attendees will learn about:
- Supporting operational priorities and business drivers (including mobile and cloud computing priorities)
- Reducing risk while supporting new business drivers
- Educating leadership and getting them on your team
- Efficacy of controls, desired improvements and wish lists
- Budgets and best practices
Intrusion investigations are a response to the detection of a threat in the environment. Organizations are investing heavily in technology, training, and personnel who can quickly detect and respond to threats after they’ve gained some amount of access to their environments. It’s this process that leads to containment and gives businesses back control.
Companies are getting better at detecting threats as a result, but actors may still have been in the environment for several months before that critical moment when tools and personnel finally detect the bump in the night and the investigative process can begin.
During this conversation, we’ll look at the security ecosystem and some of the reasons why technologies that react to threat activity may not be adequate in this golden age of cyber threats. We’ll also discuss a few of the most important skillsets necessary to cultivate and why personnel and expertise are your secret weapons. Lastly, we’ll suggest some of the most effective sources of evidence to examine as well as some of the analysis techniques you should be using to filter through the noise.
Most people know that a board portal is an intuitive, efficient and, above all, secure way of distributing and viewing confidential board and committee meeting materials. But did you know that board portals can help you with more than just document distribution? A sophisticated tool should enhance your board member's experience and improve overall collaboration- leading to better business decisions.
Join our free 30 minute webinar “More than Digital Board Papers” to learn how features such as archiving, note-sharing, electronic voting and questionnaires can help your board take the next step towards secure digital collaboration.
Join us for this informative webinar to learn how to upgrade your Tera1 PCoIP zero clients to new LG devices, receive 5 free zero clients with money back and feel good about recycling not only your zero clients but laptops, desktops, printers and hard drives.
• Earlier this year, LG Electronics USA, was recognized by the EPA on their dedication to increasing consumer awareness about the importance of third-party certified recycling through nationwide education and outreach efforts.
• According to the EPA, the positive environmental impact of LG’s responsible recycling is equal to taking 12,300 passenger cars off the road for a year or saving enough energy to power more than 8,000 U.S. homes for a year.
Guest speaker David Bernstein with Anything IT will explain the process to receive rebates on Tera1 zero clients and dispose of them in accordance with industry’s highest e-waste standards
Anything IT and LG will explain a simple, fast and easy approach to upgrade:
• Assess the value of your current obsolete devices (any brand and any quantity)
• Claim your rebate
• Get 5 free zero clients
• Logistics and Process to upgrade and replace
Security professionals realize that analytics are becoming an increasingly important part of the IT Security technology arsenal. However, most security analytics solutions are complex, requiring the movement of data to the analytics platform, custom use case development involving professional services, and sometimes weeks of personnel and model training before useful results can be obtained. In this webinar, see how security use cases can be quickly and effectively deployed using analytics recipes pulled from Prelert’s “Hot Sheet” security use case library. This webinar will highlight examples of the use cases being deployed in an Elasticsearch environment.
The business benefits of cloud applications are undeniable, however security concerns can still slow their adoption. While many mainstream cloud applications offer secure platforms and excellent security capabilities, much of the security burden is still on you. You still need a strategy and the technology tools to ensure your organization can safely and efficiently utilize these cloud apps.
Join IBM Security as we discuss five essential requirements for ensuring safe and efficient adoption of cloud applications.
The constant barrage of application connectivity and security policy change requests, not to mention the relentless battle against cyber-attacks have made the traditional approach to managing security untenable. In order keep your business both agile and secure – across today’s highly complex and diverse enterprise networks – you must focus your security management efforts on what matters most – the applications that power your business.
Join Joe DiPietro, SE Director at AlgoSec on Tuesday, July 26 at 11am EDT for a technical webinar, where he will discuss an application-centric, lifecycle approach to security policy management – from automatically discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning – that will help you improve your security maturity and business agility. During the webinar, Joe will explain how to:
• Understand the security policy management lifecycle and its impact on application availability, security and compliance
• Auto-discover and map business applications and their connectivity flows – and why it’s important
• Securely migrate business application connectivity and security devices to a new data center
•Get a single pane of glass that aligns application connectivity with your security device estate
• Identify risk and vulnerabilities and prioritize them based on business criticality
The FBI just issued a warning about a “dramatic” increase in CEO Email Scams. The Bureau estimates these scams have cost businesses more than $2.3 Billion in losses over the past three years. No matter how extensive your Security Awareness Training Program is, your company is vulnerable to these attacks. Employees are quick to act when a financial request comes from the CEO. What protocols do you have in place to make sure your team knows when an email is really coming from the C-Level? Join our panel to learn how to avoid falling victim to these phishing scams.
Public cloud computing resources such as Amazon Web Services (AWS) are helping organizations like yours develop and deploy new applications rapidly; expand into geographic regions seamlessly and extend competitive advantages.
Cyber criminals are well aware of the rapid expansion into the public cloud and are looking for weaknesses in your security posture. Don’t let them find one. The VM-Series for AWS, allows you to securely extend your corporate datacenter into AWS, using our next-generation firewall and advanced features to protect your data while native management features ensures policies keep pace with the changing to your applications.
In this webinar, attendees will learn:
- Common customer use cases for AWS
- Key security challenges and considerations
- How the VM-Series can protect your AWS environments
Trend Micro Akdeniz Ülkeleri Kanal Müdürü Mehmet Dağdevirentürk, kendinizi ve firmanızı fidye yazılımlara karşı nasıl koruyacağınızı ve fidye yazılımlarla ilgili son gelişmelerin neler olduğunu sizlerle paylaşıyor. Fidye yazılıma karşı savunmanın sihirli bir formulü yok, ancak en yaygın saldırı yöntemlerini bilmeniz, en iyi korumayı sağlamak için atacağınız öncelikli adımları bilmenizi sağlar. Bu webinarda Trend Micro olarak sizlerle tecrübelerimizi paylaşarak karşılaşabileceğiniz olası risklere karşı planınızı şimdiden oluşturmanız için bir yol haritası sunuyoruz.
Cyberattacks against Banking and Financial Institutions have evolved from annoying pop-ups and machine crashes to denial-of-business events. CxO resignations and losses/damages running into crores of Rupees have heightened the awareness around cyber security, and shifted it from an IT problem to a business priority risk.
Recently, Asia has been a hotspot for such cyberattacks, with many high-profile attacks being the subject of headlines across the region, including the most recent Bangladesh Bank breach.
In its latest annexure to banks titled “Cyber Security Framework in Banks”, RBI has outlined a number of proactive measures that Banks in India need to take to ensure a robust cyber security/resilience framework, and to ensure adequate cyber security preparedness on a continuous basis.
Here are just a few requirements:
-Board approved cyber security policy
-Cyber crisis management plan
-Cyber resilience framework
-Cyber security awareness among stakeholders / top management / board
FireEye invites all banks and financial institutions to join this exclusive webinar where the speakers will review the RBI guidelines and suggest ideas to bolster your response strategy and limit the consequences of a breach.
Date: 26th July, Tuesday
Time: 11:00 am
Duration: 40 mins. With Q&A
Vipul Kumra, Consulting Engineer, FireEye India
Shantanu Mahajan, Consulting Engineer, FireEye India
Over the last decade, cyber security has evolved from a niche concern confined to IT professionals to a major priority for CEOs and boards of directors. Company leaders are now charged with managing cyber risk with the same urgency that they have managed traditional business risk.
The emergence of cyber risk as a centerpiece of risk management is being fueled by new and increasingly complex threats. Organizations must deal with a quickly evolving set of threats to their information systems and data. Many of these threats were unimaginable just a few years ago.
In this discussion, we explain the different forms of cyber risk and show how the threat level has risen in recent years. We also provide a basic framework for managing cyber risk, and finally, we pose five key questions business leaders should ask themselves to ensure their security posture is sufficiently robust and resilient to meet evolving threats.
Register for this webinar today. As usual, we’ll leave time for Q&A.
Blazent's CEO, Charlie Piper and Dan Ortega introduce the company strategy, vision and it's value to customer's and MSP partners. Together, Charlie and Dan describe how Blazent's platform finds the the most accurate data to improve decision manking in IT and beyond.
Stu Sjouwerman, CEO of KnowBe4, has seen first-hand the devastating impact of ransomware on healthcare entities. And he knows traditional defenses aren't enough to ward off attackers. What's needed is a whole new approach to user education.
When it comes to analysing and managing insurance claims, the market still runs in a very old school manner — human intervention, lots of paperwork and phone calls. This unfortunately also poses a real threat when it comes to fraudulent claims and applications. With digital advances and the rise of InsurTech, these risks can be minimised and fraudulent applications detected way before they can do any harm.
Join this panel where we’ll discuss:
-How predictive analytics can help spot fraudulent applications before they can do proper damage
-How new technologies can help investigate and monitor specific claims
-The need for more transparency throughout the claiming process and the importance of identity validation
-Improving the customer journey by empowering the individual to report and settle claims online or through mobile devices
Data centers are under unprecedented threat from hackers, malware, and insider threats. Yet modern data centers require security that doesn't compromise speed, performance or functionality.
Join the data center security webinar "Five Steps to Protect Your Data Center Against Cyber Threats" and learn how to secure your data center and achieve consistent security across physical, virtual, and cloud environments.
In this webinar, data center security expert Christina Hausman (Product Marketing Manager, Cisco Data Center Security) will share with you how to:
- Identify gaps in your data center security posture
- Gain visibility and control over custom data center applications
- Address the full attack continuum before, during, and after an attack
- Manage traffic flows securely between devices and data centers
- Adapt fluidly as data centers and threat landscapes evolve
- Reduce risk and accelerate business outcomes
Lightning-fast and impeccable application delivery performance has nowadays became a modern standard in digitalized world, therefore a daily struggle to deal with increasing network loads has been undertaken into a large amount of attention and work to enable consistent flow in the delivery chain. Applications have become the new gold and protecting application delivery is the most important task for your business.
Application performance and availability is impacted by a wide variety of factors, therefore Comtrade’s SCOM Management Pack for F5 BIG-IP identifies specific nodes affecting applications and enables complete approach for resolving and maintaining operational functionality.
In this webinar, you will:
- Learn how to identify application servers which are unavailable or under heavy load
- See how to track selected load balancing algorithm performance for the specific application delivery
- See how repetitive issues can impact overall application delivery
How can companies effectively measure their company’s risk of a data breach? Which security metrics are most important when it comes to determining cyber risk? How do different types of security compromises, whether botnet infections or brand name SSL vulnerabilities, contribute to an organization’s risk profile?
In this presentation, BitSight’s Chief Technology Officer Stephen Boyer and Senior Data Scientist Jay Jacobs answer these questions and more. This data-driven webinar will highlight the extensive analysis that the BitSight Data Science team undertakes to make security signals into concrete risk mitigation actions. Perhaps most importantly, the speakers will give guidance on how security and risk professionals at every level - from the board room to the server room - can drive positive change throughout their organizations.
The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.
CISOs are often asked to justify a growing budget by showing ROI. But at the end of the day the security organization spends a lot of money and the answer to what is the ROI is that nothing happened. Because when the security leader is doing their job they are invisible. That is a very difficult conversation to have when you are trying to justify growing budget. The challenge is to change the perception as a cost center and become visible. This webinar will explore how to overcome these challenges by influencing the larger company’s budget to eliminate security concerns.
•Thinking Differently about ROI as companies build IoT businesses and move into cloud-based environments where there are no walls
•Mind Mapping the Business: The ROI Mind-Set of Security
•How Threat Detection and Incident Management Becomes a Competitive Advantage
•The Vision for Next Gen Automated Cybersecurity
Speaker: Michael Schiebel
45 Minutes Presentation/15 Minutes for Q & A/Crowdchat
Medical devices (biomed) introduce many cybersecurity challenges into healthcare delivery organizations, but what can you do? Connecting medical devices to your network and in turn to your physicians and EMR system increases clinical workflow while opening security holes. Much is out of your control. Device manufacturers control patch cycles and vulnerabilities persist so you segment your network which introduces administration overhead and increases the possibility of breaches due to misconfigurations. As you try harder to improve efficiency, is your environment becoming less secure due to improved connectivity? And what about patient safety when medical devices are connected directly to patients?
Join Dan McWhorter, Chief Intelligence Strategist at FireEye, and John Klassen, Sr Director Solutions Marketing, on this webinar to learn:
•The impact on Healthcare cybersecurity from complex medical device ecosystems
•What kind of attacks connected medical devices are vulnerable to
•Strategies and tools to lower your risk from compromised devices
Register today to understand this emerging threat landscape.
With Datadog’s cloud-scale performance monitoring capabilities, users obtain invaluable operational data about their cloud environment and applications. IMMUNIO is the latest addition to the list of more than 100 turnkey Datadog integrations (a group that also includes Amazon Web Services, Docker, and Slack). The IMMUNIO integration makes your existing Datadog monitoring even more powerful. By using IMMUNIO with Datadog, you gain critical insights into how attacks are affecting your system -- and you get the tools you need to stop the attacks immediately.
The data provided by your IMMUNIO integration with Datadog helps you determine what’s normal for your system and your apps -- so you can quickly zero in on abnormal activity, determine whether it’s malicious, and immediately safeguard your apps.
Join IMMUNIO and Datadog for this informative webinar and get the scoop on all the benefits of the IMMUNIO integration, including the ability to:
- Correlate CPU usage spikes with a brute force login attack
- Diagnose database query latency by matching to a blind SQL Injection attack
- Use IMMUNIO to stop bots by automatically serving CAPTCHAs, and set a Datadog alert based on number of CAPTCHAs served.
- Harden your application against Cross-Site Scripting, SQL Injection, Remote Command Execution, and other vulnerabilities -- even many zero-day attacks
Attend this session to discover Microsoft's Cloud App Security (CAS) as we take you through an in depth demo of this cloud technology . We will explore how Microsoft's CAS allows you to benefit from using cloud applications within your organization, without compromising the security of your organization's data.
Companies used to know where their data was at all times: It was in the data center, surrounded by physical walls. But today, your data is everywhere your employees and customers are — on phones, on tablets, on laptops, in the cloud. Anywhere, anytime access provides more work-life balance and helps employees stay productive, but it also puts data security at considerable risk. The challenge companies consequently face is how to provide fast, simple access to enterprise applications, data and resources without compromising security.
Join Mark Hewett, senior product manager for Dell SonicWALL Secure Mobile Access, and Steven Sanderson, senior product marketing manager for Dell SonicWALL Secure Mobile Access, for a webcast on how to manage and provision mobile devices to protect company data and networks from cyber attacks, viruses, malware and other threats.
•Ensure that only authorized users have access to appropriate data and through approved devices
•Quickly and easily provision secure mobile access and role-based privileges
•Keep company data secure in-flight and at-rest on devices
No security posture is 100% effective against attackers. That is why IT teams must proactively identify and protect sensitive and regulated data whether “at rest” in file stores or “in motion” as it is sent or received.
Proofpoint Information Protection is the only cloud-based suite of solutions designed from the ground up to provide visibility and control of sensitive data across cloud-based email such as Microsoft Office 365, on-premises email, file shares, storage area networks (SAN), network attached storage (NAS), and SharePoint — all with out-of-the-box policies that provide insight to your attack surface in just 24 hours.
- Proofpoint Data Discover: Quickly discover exposed sensitive and confidential information in shared drives, NAS, SAN and SharePoint sites
- Proofpoint Email DLP: Prevent accidental negligence by employees with greater accuracy and control
- Proofpoint Email Encryption: Communicate securely with policy-based encryption of messages and attachments
It has been said that there are two types of companies: those who have discovered they have been breached, and those who have not discovered it yet. Although unsettling, this rationale is conducive to constructing a healthy attitude towards your organization’s’ security practices. This hour long webinar will help guide your security process to protect your organization’s most valuable assets by applying the scientific method—specifically, forming and testing hypotheses about potential incursions, and then acting upon the results.
In this webinar, you will learn:
1. How to apply a hypothesis-driven approach to security activities
2. Applying this mindset across time past, present and future—to enhance defenses
3. How DomainTools data and tools enable you to apply this strategy to your own organization
Comment les entreprises gèrent la croissance des volumes et la variété des données sans augmenter les coûts ? Est-ce que votre architecture de données est capable de gérer les nouveaux défis du Big Data ? rejoignez-nous pour ce webinar pour apprendre comment optimiser votre architecture de données et réduire considérablement ses coûts avec Hadoop. Particulièrement, nous allons traiter les sujets suivants :
- Réduire les coûts de stockage en déplaçant les données vers Hadoop
- Optimiser les traitements type ETL et les faire sur Hadoop
- Collecter et traiter de nouvelles sources de données
CSA, along with support from key corporate members like Rackspace and Intel, has been incubating a new intelligence exchange within the CloudCISC Working Group. Join CSA and technology partner TruSTAR to discuss:
- The challenges of building effective intelligence exchange
- How the CloudCISC exchange is designed differently
- How you can get involved in the growing collection of vetted CSA members exchanging intelligence everyday!
Healthcare organizations face increasing regulatory pressure to maintain compliance with HIPAA regulations, while also needing to significantly modernize their technology to comply with ACA, Meaningful Use, and other federal, state, and local requirements. At the same time, the Healthcare field has never had a better opportunity to increase personalized care, lower costs, and leverage technology for measurably better outcomes. Cloud computing offers nearly unlimited computing and storage capacity - but with great power comes great responsibility. The agility Healthcare is enjoying in the cloud comes with increased risk and exposure to security breaches due to lack of compliance with Healthcare regulations and industry best practices.
Cloudticity's HIPAA Compliance as a Service, powered by Chef Compliance, is a fully automated software-as-a-service solution. In this webinar, you will see firsthand how Cloudticity has mapped Chef Compliance's CIS profiles directly to HIPAA CFR regulations, providing a powerful automated solution to leverage the cloud's agility while minimizing risk. Governance + agility = powerful outcomes at reduced costs.
IT, Security, and IT infrastructure teams are faced with a complex set of challenges, and identity and access management (IAM) done the old way tends to compound things. Companies who haven’t modernized their IAM infrastructure can spend months dedicated to setting up each new business application, both on premises and in the cloud, and another several months launching it to their users. It doesn’t have to be this way, with cloud-based solutions such as OneLogin reducing the time, effort, and risk of IAM modernization.
Join us for an informative webinar with OneLogin presenters Nathan Chan, Solutions Architect, and Al Sargent, Sr. Director of Product Marketing.
With the phenomenal growth of data and the IT trends toward cloud and mobility adoption, enterprises are facing rising threats to sensitive data from both inside and outside the organization. They need to be able to protect data end to end without introducing complexities to users, while lowering the implementation and management costs of security solutions.
Join Hewlett Packard Enterprise and (ISC)2 on Aug 03 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to protect data from end to end.