Hi [[ session.user.profile.firstName ]]

IT Security

  • Security Predictions for 2018: An APAC Viewpoint
    Security Predictions for 2018: An APAC Viewpoint Bryce Boland, Asia Pacific CTO Recorded: Dec 13 2017 37 mins
    As the sun sets on 2017, the major trends, biggest breaches and latest innovations provide us with a sense for what the future will bring. Not many things are absolute in the security industry, but we know for certain that threat actors will continue to attack and defenders will be tasked with stopping them.

    Join Bryce Boland, Asia Pacific CTO at FireEye, as he shares a glimpse into cyber security in 2018, with insights drawn from our senior leaders, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs. Several timely topics will be covered in detail:

    •What types of nation-state activity we will be seeing
    •What new regulations such as GDPR mean for organizations
    •How to ensure a secure environment as more organizations migrate to the cloud

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • AWS re:Invent Recap
    AWS re:Invent Recap Patrick Gartlan, CTO; Travis Rehl, Technical Product Mgr; Todd Bernhard, Product Marketing Mgr; Jarrett Plante, Events Mgr Recorded: Dec 12 2017 23 mins
    Didn't make it to AWS re:Invent in Las Vegas this year? Or were you there but found it hard to visit all of the booths and attend all of the sessions? We will cover what you missed in this AWS re:Invent Recap webinar! Attendees with learn:

    - What new announcements were made by Amazon and CloudCheckr
    - What to expect in the new year
    - Observations from the show floor and sessions
  • Multi-Cloud Storage: Addressing the Need for Portability and Interoperability
    Multi-Cloud Storage: Addressing the Need for Portability and Interoperability John Webster, Senior Partner, Evaluator Group, Mark Carlson, SNIA CSI Co-Chair, Alex McDonald, SNIA CSI Chair Recorded: Dec 12 2017 43 mins
    In a recent survey of enterprise hybrid cloud users, the Evaluator Group saw that nearly 60% of respondents indicated that lack of interoperability is a significant technology-related issue that they must overcome in order to move forward. In fact, lack of interoperability was chosen above public cloud security and network security as significant inhibitors. This webcast looks at enterprise hybrid cloud objectives and barriers with a focus on cloud interoperability within the storage domain and the SNIA’s Cloud Storage Initiative to promote interoperability and portability of data stored in the cloud.
  • How to Think Systematically About Tone for Your Content
    How to Think Systematically About Tone for Your Content Pierre Gagnier, ADP Recorded: Dec 12 2017 57 mins
    Are you thinking about incorporating tone into your content strategy? If so, you've probably seen how confusing this topic can be.

    We know, because we are human beings, that language can misfire. Tone is where understanding and emotion come together – and sometimes that’s messy.

    Join Paul Perrotta, sitting in for Scott Abel, The Content Wrangler, and his special guest, Pierre Gagnier, Content Strategist at ADP Innovation Lab, for this free, one-hour webinar. Pierre will show you how a team of researchers at ADP were able to tame some of the trickiness of tone and measure its impact. What they learned will help you to make sense of tone and change it from a source of risk into a tool for creating effective content.

    Attendees will learn about 1) a simple, workable set of definitions that you can use to promote shared understanding among stakeholders of what tone is; 2) A framework for identifying and applying tone attributes so that you can create a foundation for consistent practice, and 3) Some typical factors that will help you to see how tone can go awry and will help you create your own risk factors.

    ABOUT THE PRESENTER

    Pierre Gagnier is a content strategist at ADP's Innovation Lab in New York. He works extensively with user experience researchers to help ADP web and mobile product teams align their content strategies consistently with users' realities.
  • Cybersecurity choices: SIEM, MSSP, or SOC-as-a-Service?
    Cybersecurity choices: SIEM, MSSP, or SOC-as-a-Service? Sridhar Karnam, Director of Product Strategy at Arctic Wolf; Terry R., Exec Editor at SC Media Recorded: Dec 12 2017 58 mins
    Gain insight into three cybersecurity solutions: SIEM, MSSP, and SOC-as-a-Service. Discover which solution is the best fit for your organization based on some of the following criteria:

    - company size offerings
    - detection and response capabilities
    - deployment times
    - support and expertise

    Think you're too small for a SIEM or SOC-as-a-Service? This webinar will explain why you're not. Think you're too big for an MSSP? Find out if that's truly the case.
  • 9 Ecommerce Tips for a Successful 2018
    9 Ecommerce Tips for a Successful 2018 Signifyd, Brightpearl and AmericanEagle.com Recorded: Dec 12 2017 42 mins
    In this webinar, we are joined by Brightpearl and AmericanEagle.com in giving you, merchants, practical tips and best practices that can help your ecommerce business improve and scale in 2018.

    We'll cover:
    + What you can be doing throughout all of your marketing channels to achieve success
    + How can you make it easy for your customers to buy and get their orders right and on time.
    + How you can maximize revenue while taking less risks
  • Cybersecurity & Healthcare: How prepared are you?
    Cybersecurity & Healthcare: How prepared are you? Ernie Hood, Senior Research Director with the Advisory Board and former Vice President and CIO at Group Health Recorded: Dec 12 2017 53 mins
    Securing your healthcare organization goes beyond investing in technology to secure your devices, data, and applications. In today's complex digital healthcare environment, your healthcare workflows broaden your risk exposure by interacting with multiple apps, devices, and users spread across multiple geographies. Securing these interactions and all of the components within these workflows requires investing in a comprehensive cybersecurity ecosystem that is more focused on business objectives and less focused on securing individual applications and devices.

    This webinar will discuss the pieces of a cybersecurity ecosystem model, and how this type of model requires policies, processes, and technologies that allow your healthcare organization to take a more proactive approach to risk management and security.
  • Insider Threats: Exclusive Peer Perspectives, Strategies and Tactics
    Insider Threats: Exclusive Peer Perspectives, Strategies and Tactics Rob Marti, Director of Privileged Access Management, CA Technologies Recorded: Dec 12 2017 53 mins
    Discover the trends and opinions about insider threats that your peers have revealed in the recently published Cybersecurity Insiders report.

    Join Rob Marti, Director of Privileged Access Management at CA Technologies, as he guides you through the report and examines technologies and preventative measures.

    Selecting the right insider threat solution is a pivotal decision; make sure you know your options.
  • Needed Now: An Enterprise Cyber Threat Survival Kit
    Needed Now: An Enterprise Cyber Threat Survival Kit Swapnil Deshmukh, a Sr. Director of Emerging Technologies Security at Visa; Mike D. Kail, CTO, CYBRIC Recorded: Dec 12 2017 49 mins
    DevSecOps experts from Visa and CYBRIC discuss cyber threat survival. With rapid innovation and continuous delivery via DevOps, organizations are exposed to a constant threat and to catalyze it, threats are evolving rapidly. Equifax was recently the target of perhaps the most critical data breach ever. Hackers exploited a vulnerability in an open-source software package that allowed them to exfiltrate sensitive information on half of the US population.

    How can we protect ourselves against such breaches?

    Organizations need to seamlessly embed continuous security within existing ecosystems, to enforce continuous security and orchestration within the production environment. In this webinar, Swapnil Deshmukh, a Sr. Director of Emerging Technologies Security at Visa discusses the cultural changes needed for an enterprise to imbibe and deliver continuous security, including:

    • Coverage: Ensure proper metrics, analytics and reporting are in place to measure the effectiveness of existing security tools and processes; have an up-to-date inventory and complete coverage of all code published in production at any given point.
    • Continuous Monitoring: Broadly applied, continuous monitoring can provide network traffic visibility. This, coupled with behavioral analysis and anomaly detection, builds necessary trustworthiness into the information systems supporting the organization’s key control missions.
    • Feedback Loop: A constant feedback loop from security technology stacks is critical for overall maturity of the security operation center.

    Guest Presenter:
    Swapnil Deshmukh is a Sr. Director of Emerging Technologies Security at Visa. His team is responsible for attesting security for emerging technologies. He’s coauthored the Hacking Exposed series, is a member of OWASP and has helped Fortune 500 companies build secure operations centers.
  • Tech Demo: API Security with Imperva SecureSphere
    Tech Demo: API Security with Imperva SecureSphere Natasha Gupta – Product Marketing Manager and Amir Shladovsky – API Security Expert Recorded: Dec 12 2017 38 mins
    APIs have sped up application delivery by enabling software automation and programmability of services, and has become a mainstay practice for any business with workloads on the cloud. As businesses make their APIs publicly available to increase their touchpoints with customers, this introduces new vulnerabilities that exposes applications to malicious users, unauthorized access, and potential attacks. In this webinar, learn how SecureSphere can help monitor and protect API gateways in your network and walk through a brief demonstration on using SecureSphere to combat API-centric attacks.
  • CPE Webinar: Critical Actions to Finalize Your GDPR Compliance Program: Part 1
    CPE Webinar: Critical Actions to Finalize Your GDPR Compliance Program: Part 1 Dr. Branden Williams; Chris Covell, Absolute, Jake Olcott, BitSight, Brian Philbrook, OneTrust, and Marshall Toburen, RSA Recorded: Dec 12 2017 71 mins
    Attendees can earn 1 CPE credit on this session.

    The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than 20 years. It represents an extraordinary shift in the way businesses will be expected to operate when they gather, process, maintain, and protect customer data. Any organization that retains information of EU citizens must be in compliance or face huge fines of up to 4% of worldwide turnover.

    In this webinar series you will hear from industry experts facing the same challenges you face and find out how they're meeting and surpassing critical implementation check points, and you will learn what actions other organisations are taking preparation for data protection – not only for GDPR, but for long-term data protection.
  • Defense Against a Ransomware Attack: Latest Research and Best Practices
    Defense Against a Ransomware Attack: Latest Research and Best Practices Kevin Haley, Director of Security Response, Symantec and Matt Sherman, Malware Outbreak Specialist, Symantec Recorded: Dec 12 2017 61 mins
    On May 12 2017, a new variant of the WannaCry ransomware (Ransom.Wannacry) suddenly appeared, infecting thousands of computers worldwide within a matter of hours.

    It was a new and particularly dangerous form of threat because of its ability to self-propagate and spread itself across an organization’s network and on to other organizations via the Internet.

    The ransomware landscape has shifted dramatically in 2017 and organizations bore the brunt of the damage caused by new, self-propagating threats such as WannaCry and Petya. These outbreaks caused global panic and caught many organizations off-guard, with infections spreading rapidly across corporate networks.

    The impact of these incidents will not go unnoticed on the cyber crime underground and it’s likely that other groups may attempt similar tactics. Because of the nature of these attacks, organizations are particularly at risk. Businesses need to educate themselves about this new avenue of attack and ensure they have defenses in place.

    Symantec experts recommend adopting a multilayered approach to minimize chances of infection. This strategy includes protecting against ransomware in three stages:

    1. Prevent – Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented.

    2. Contain – In the event of a payload arriving on a computer, a critical step is to limit the spread of the attack.

    3. Respond – Contact Incident Response experts, back up important data, and never pay the ransom.

    Join us for a discussion about the current state of ransomware and learn the strategies and the technologies for effective protection against ransomware and unknown threats.

    Register Today
  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • OCC 2018 Part 1: Cybersecurity and Operational Resiliency
    OCC 2018 Part 1: Cybersecurity and Operational Resiliency Sam Abadir, Director of Product Management, LockPath Recorded: Dec 12 2017 39 mins
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. Coming in at #1: cybersecurity and operational resiliency. Whether you’re a banker or service provider to the financial industry, this should not come as a surprise. In this webinar, you’ll learn how to get out in front of OCC’s #1 priority and the role of cybersecurity in managing operational risk.

    Attendees will learn:

    • OCC’s approach to cybersecurity and operational resiliency for banks of all sizes
    • The cybersecurity framework that examiners will review
    • Managing the rising risk from changes to product, process, and providers
    • The impact of current and proposed cybersecurity regulation
    • How GRC technology supports integrated risk management programs


    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • 10 Must-Answer Questions For Your 2018 Data Center Strategy
    10 Must-Answer Questions For Your 2018 Data Center Strategy Matt Stansberry, Senior Director Content & Publications, Uptime Institute Recorded: Dec 12 2017 60 mins
    Are you adapting your infrastructure strategy to business, geopolitical and technology trends?

    Our panel of experts discuss the questions you must have the answers for along with trends that will impact your organization in the coming year.

    How will you adapt your strategic plan to climate change? What are the implications of new regulatory enforcement? How will your staff adapt to changing infrastructure deployment models? Will new workloads overwhelm your infrastructure plans? Change is here, so learn to adapt.
  • Combattere le minacce avanzate con SonicWall Hosted Email Security
    Combattere le minacce avanzate con SonicWall Hosted Email Security Cristiano Cafferata Recorded: Dec 12 2017 56 mins
    Partecipa al webinar “Combattere le minacce avanzate con SonicWall Hosted Email Security” che si terrà martedì 12 dicembre alle ore 17:30 (CET).

    La posta elettronica continua ad avere un ruolo fondamentale per le aziende. Purtroppo, però, insieme al volume di messaggi aumenta anche il numero di ransomware e di attacchi di phishing, business email compromise (BEC), spoofing, spam e virus.

    I criminali informatici falsificano l'indirizzo dei mittenti delle e-mail per aggirare i destinatari, danneggiando la reputazione delle aziende all'oscuro di tutto. Le aziende possono ovviare a questo problema sostituendo le proprie applicazioni legacy con la soluzione di sicurezza e-mail di SonicWall basata su cloud, facile da utilizzare e conveniente, che offre protezione contro le minacce mutevoli e in continua evoluzione.

    Argomenti principali del webinar:
    •Protezione contro le minacce e-mail avanzate
    •Come SonicWall Hosted Email Security riesce a potenziare MS Office 365
    •Altri vantaggi del servizio in abbonamento Email Security basato su cloud
  • Lessons Learned in 2017: Reflecting on the Year's Security Trends
    Lessons Learned in 2017: Reflecting on the Year's Security Trends Dan Dahlberg, Data Scientist, BitSight Recorded: Dec 12 2017 41 mins
    From WannaCry to NotPetya, 2017 demonstrated an increase in the sophistication of cyber attacks occurring worldwide. As these incidents become more frequent and target more prominent organizations, is your business adequately prepared in your cyber risk strategy moving into 2018? Join BitSight Data Scientist Dan Dahlberg as he discusses:

    - BitSight’s own research on outdated endpoints and their correlation to the May 2017 WannaCry attacks.

    - Cybersecurity trends shown throughout the year, and their implications on the nature of the incidents we can expect in 2018.

    - Recommendations for creating a strong security strategy that proactively mitigates risk within your organization and across your supply chain in 2018.
  • Balancing Speed & Security in a DevOps World
    Balancing Speed & Security in a DevOps World Stephen Elliott, Product Manager Google Container Registry and Dave Meurer, Director Technical Alliances Recorded: Dec 12 2017 49 mins
    DevOps teams are using cloud platforms and containers to build, deploy, and manage applications faster than ever, and utilizing large amounts of open-source software to increase agility. Google Cloud platform makes building and shipping containers even easier with Google Container Builder, Google Container Engine (GKE), and Google Container Registry (GCR). But when you deploy a container or cloud-native application, it’s hard to know exactly what contents are inside, and that can make managing security painful.
    Secure DevOps means having full visibility and control of your software supply chain to implement security and governance policies. How do you protect your DevOps without slowing down? Join experts from Google and Black Duck to discuss how to secure the software supply chain including:
    - Understanding the modern attack landscape
    - How to select safe and healthy open source software in development
    - How you can automate open source control and visibility in containers with Black Duck and both Google Container Builder and GCR
    - The Grafeas and Kritis projects, and the work Google and Black Duck are doing to enhance security visibility and provide policy enforcement for containers.
  • Technology Trends Impacting Network Security in 2018
    Technology Trends Impacting Network Security in 2018 Reuven Harrison, Tufin CTO and Joe Schreiber, Tufin Technical Director Recorded: Dec 12 2017 38 mins
    As enterprise networks continue to grow more complex and change before our eyes, and as security threats continue to grow in frequency and sophistication, organizations need to understand the technology trends that will be most prominent in 2018.
    Traditional IT security leaders and cloud architects alike will learn about ways to reduce risk and improve business agility in the coming year. We will discuss:
    •Our predictions for the trends we expect to see in 2018
    •What technology shifts we predict to influence network security
    •How the role of network security policy will affect these trends
  • From Data to Action: Extending GuardDuty with Cloud Insight
    From Data to Action: Extending GuardDuty with Cloud Insight Patrick McDowell, Amazon Web Services, and Ryan Holland, Alert Logic Recorded: Dec 12 2017 41 mins
    Knowing the where, why, and how to respond quickly to cyber threats is the foundation of protecting your AWS workloads. But due to rapid deployment and constant changes in the cloud, it’s easier said than done. Fortunately, we’re turning cloud security findings into prioritized, actionable insight.

    Join Ryan Holland, Senior Director, Technology Services Group at Alert Logic, and Patrick McDowell, Global Technical Lead, Security Partners at AWS, for an overview of two new integrated security solutions: Amazon GuardDuty™ and Alert Logic Cloud Insight™ Essentials. This engaging webcast covers:

    • Quickly attaining complete visibility of your cloud environment
    • Identifying unexpected and malicious activity through Amazon GuardDuty
    • Transforming security findings into action with Cloud Insight Essentials
    • Preventing future compromises with prioritized AWS cloud configuration best practices
  • Security Predictions for 2018
    Security Predictions for 2018 Luke McNamara, Senior Analyst, Strategic Team, FireEye iSIGHT Intelligence Recorded: Dec 12 2017 51 mins
    As the sun sets on 2017, the major trends, biggest breaches and latest innovations provide us with a sense for what the future will bring. Not many things are absolute in the security industry, but we know for certain that threat actors will continue to attack and defenders will be tasked with stopping them.

    Join Luke McNamara, Senior Analyst at FireEye, as he shares a glimpse into cyber security in 2018, with insights drawn from our senior leaders, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs. Several timely topics will be covered in detail:

    •What types of nation-state activity we will be seeing
    •What new regulations such as GDPR mean for organizations
    •How to ensure a secure environment as more organizations migrate to the cloud

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Endpoint Security for Cloud Generation & New Integrations Extend Data Protection
    Endpoint Security for Cloud Generation & New Integrations Extend Data Protection Sam Tong, Senior Principal Systems Engineer, Symantec; Moderator: S.C. Leung, Member, Asia-Pacific Advisory Council, (ISC)² Dec 13 2017 6:00 am UTC 60 mins
    First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:

    •Defend against ransomware with multi-layered protection
    •Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
    •Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    •Extend advanced security to mobile devices
    •Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
    •Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    New Integrations Extend Data Protection Beyond Traditional DLP

    Powered by the industry’s leading data loss prevention technology, to give you greater visibility and control over your confidential data.

    •Expanded Information Centric (ICE) Encryption integration
    •Enhanced data classification integration
    •Sensitive Image Recognition
    •Stronger endpoint controls
    •Enhanced data at rest discovery
    •Improved cloud app policy and incident management
    •Flexibility on cloud deployment
    •And More …

    Join Symantec and (ISC)² on Dec 13 at 14:00 (Hong Kong time) and learn about the latest Evolution of Endpoint Security & Data Protection.

    This webinar will be conducted in Cantonese.
  • Avoid Security Landmines & Their Million Dollar Consequences
    Avoid Security Landmines & Their Million Dollar Consequences Anthony Giandomenico, Senior Security Strategist & Researcher, FortiGuard Labs Dec 13 2017 10:00 am UTC 45 mins
    Each quarter, our expert threat researchers from FortiGuard Labs analyse data from millions of sensors around the globe to identify the most current and dangerous threats, and dissect how and why they are succeeding.

    Join this webinar for a first-hand look at this past quarter's findings, plus actionable steps to help you avoid these pitfalls. Learn more about these top takeaways that include:

    •Insight into the Equifax breach; Apache and other exploit trends
    •Evidence mobile malware is on the rise and how to stop it
    •A list of vulnerabilities attacked, by frequency so you can prioritize patching
  • How today’s threats prey on the human factor | 2017 Human Factor Report
    How today’s threats prey on the human factor | 2017 Human Factor Report Patrick Wheeler, Director, Threat Intelligence, Proofpoint Dec 13 2017 11:00 am UTC 60 mins
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Implementing a Cyber Security Rx to Support the Latest Healthcare Advances
    Implementing a Cyber Security Rx to Support the Latest Healthcare Advances Tracy Hillstrom, Director of Product Marketing, and Ryan Orsi, Director of Product Management Dec 13 2017 4:00 pm UTC 60 mins
    The healthcare industry is experiencing a surge in transformative new technologies, and introducing telemedicine, more networked devices (Internet of Medical Things), and increases in protected EMR transmissions over Wi-Fi to enable better treatment, productivity, and communication within healthcare facilities. While they contribute to better overall outcomes - they can also open the door to new cyber security risks that need to be addressed with comprehensive security measures.
    Join Director of Product Marketing, Tracy Hillstrom, and Director of Product Management, Ryan Orsi, as they review the risks and the strategies to protect privileged information and support your compliance activities in Healthcare. You'll learn how medical providers can defend against malware with a cyber security “Rx” that supports a healthy technology adoption plan for every healthcare organization.
  • Deploy a New Kind of Security Analyst and Redefine Network Monitoring
    Deploy a New Kind of Security Analyst and Redefine Network Monitoring Chris Calvert, Co-Founder and VP Products and Mitch Webb, Director of Customer Success at Respond Software Dec 13 2017 5:00 pm UTC 60 mins
    Most organizations have multiple monitoring solutions in place but still have a shortage of experienced analysts to effectively process the event data collected. In fact, up to 90% of security data goes unanalyzed. Join this webinar to learn how the Respond Analyst™ for Network Intrusion improves the capability and capacity to evaluate, scope and prioritize all IPS/IDS telemetry within your existing infrastructure with no staffing overhead.

    The session includes real data from three use case studies where the Respond Analyst™ rebalances the man-machine workload to analyze more security data and reduce risk exposure.
  • Cloud and IOT Security: Considerations for securing data
    Cloud and IOT Security: Considerations for securing data Ulf Mattsson, David Morris, Juanita Koilpillai Dec 13 2017 5:00 pm UTC 60 mins
    As the adoption of cloud computing and Iot increases across many business sectors, your applications ingest and share data generated and stored within and beyond the limits of your own on premise firewalls and other security products. This has the potential of creating data blind spots that can affect your overall security posture—both for your internal data and those of your customers and clients. To protect your business, you need a balanced approach to managing IoT and cloud risk and respective security controls—combining compliance, responsiveness, and engineering without sacrificing usability and agility. During this Webinar, we will walk through a check list of questions to ask your business units to ensure your cloud usage is not putting your enterprise at risk.

    Cloud Security Platforms can provide cost effective Ecommerce, mobile, payment security, fraud management, and secure file transfer as a flexible software as a service (SaaS). These solutions, operating on tightly controlled secure data centers, provide a cloud security solution that adapts and integrates with a variety of business processes and organizations.

    Join this presentation to learn how to reduce risk associated with moving to the cloud while maintaining simplicity and efficacy.

    - IT is all about the data - Do you know what data you have, where it is, and how is protected?
    - What are your security responsibilities for IoT and those of your cloud service provider?
    - What is your current risk register regarding use of the your cloud service provider (confidentiality, integrity and availability)?
    - How do you perform a risk assessment for your current and emerging cloud services and IoT?
  • The Veracode Platform: Behind the Scenes Tips and Tricks!
    The Veracode Platform: Behind the Scenes Tips and Tricks! Mitch Horton, CA Veracode Principal Security Program Manager Dec 13 2017 5:00 pm UTC 45 mins
    Hear from one of our customer-facing Services experts to learn the ins and outs of the Veracode platform. See how Veracode can you started with assessing and managing security risk across your entire application portfolio. With a wide range of security testing and threat mitigation techniques, all hosted on a central, cloud-based platform – your security program will be up and running and ready to scale.

    During this webinar, you will see a demo of the Veracode platform’s ability to scan all of the applications and components you build or buy, covering all major languages, frameworks, and application types. As a central repository for your applications and components, Veracode’s platform provides you with full visibility into your risk posture and integrates into each stage of your software development lifecycle, so you are building and delivering secure software.
  • Vectra Bootcamp
    Vectra Bootcamp Chris Morales, Head of Security Analytics, Vectra Dec 13 2017 5:30 pm UTC 30 mins
    The Vectra Bootcamp offers a live 30-minute introduction to the Vectra product and its underlying technology. In this session we will provide a foundation for understanding how Vectra can help you detect even the most advanced threats while making your security team faster and more efficient. We will provide a live demonstration and include interactive Q&A to answer any questions you may have.

    Get started with Vectra, and learn to find more threats with less effort.
  • Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security
    Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security Hussein Syed, RWJBarnabas Health; Alex Fry, Strong Crypto Innovations LLC; Mike Schuricht, Bitglass Dec 13 2017 6:00 pm UTC 60 mins
    Mobile computing and the use of cloud applications are touted as ways to help healthcare providers deliver better patient care. Clinicians carrying tablets or other devices to exam rooms and patients’ bedsides can quickly access and update patient data and other vital resources necessary for accurate and expeditious treatment.

    No one disputes the value of “anytime, anywhere” computing in healthcare – indeed, in other industries as well – but there is a concern about the risk associated with access to sensitive and regulated data via unmanaged devices and unsanctioned cloud applications.

    In this CISO panel discussion moderated by Hussein Syed, CISO at RWJBarnabas Health and joined by panelists Alex Fry, Principal Security Consultant at Strong Crypto Innovations LLC and Mike Schuricht, VP of Product Management, Bitglass, you’ll learn about real-world approaches to some of the most vexing challenges of mobile and cloud computing.
  • Are Your API Endpoints Becoming Your Weakest Link?
    Are Your API Endpoints Becoming Your Weakest Link? Andy Shoemaker, DDoS testing expert and NimbusDDOS founder Dec 13 2017 6:00 pm UTC 60 mins
    APIs are becoming the next-favorite frontier for hacker campaigns, since many modern applications (including mobile) leverage the Internet for API communications. These public APIs are often poorly protected against DDoS attacks and a host of other cyber threats. Those that are allegedly protected may still be vulnerable to attacks due to adverse interactions impacting the communication streams.

    Join Zenedge and DDoS testing expert and NimbusDDOS founder Andy Shoemaker to learn more about:

    - Why attacks on API endpoints can be so devastating
    - Why traditional mitigation approaches are often inadequate
    - What defense approaches are available that can protect your APIs
    - View a live attack demo highlighting the ease of causing an API outage

    About the Presenter:
    Andy Shoemaker has more than 20 years of operations experience in massive-scale consumer websites. His specific focus in these environments has been: Linux systems, LAN/WAN networking, security, performance troubleshooting, DevOps, and data center operations. Andy's work on these websites frequently exposed him to the challenges of defending against DDoS attacks, however his passion for researching DDoS stems from late nights investigating dark areas of the Internet over the last two decades.
  • IoT Security Overview: Threat Detection vs. IoT Device Protection
    IoT Security Overview: Threat Detection vs. IoT Device Protection Keao Caidec, Vice President of Marketing at Mocana Corporation Dec 13 2017 7:00 pm UTC 45 mins
    Protecting connected networks and the Internet of Things (IoT) is critical to ensuring data privacy and security of systems. In this webinar, you'll learn about hacking scenarios and defending against common cyber attack vectors. You'll also learn about the important differences between IoT threat detection and device protection and how to reduce your cyber risks.
  • Machine Learning in Black and White
    Machine Learning in Black and White Chris Poulin, Principal/Director, Booz Allen Hamilton and Staffan Truvé, CTO and Co-Founder of Recorded Future Dec 13 2017 7:00 pm UTC 60 mins
    Machine learning is no longer just the tool of tech companies. While it is now being baked into most security protection technologies, threat actors are a step ahead — adopting machine learning to conduct increasingly sophisticated attacks, and to circumvent AI-based defenses. In this webinar, Chris Poulin, Principal/Director with Booz Allen Hamilton and Staffan Truvé, CTO and Co-Founder of Recorded Future will show the good and bad of AI and machine-learning technologies, including:

    • How the collection and analysis of open source and technical data at unprecedented scale allows proactive decision making.
    • What humans can do — but beyond human scalability.
    • Examples of successful threat actor campaigns utilizing AI techniques.
  • Which Cyber/Cloud Security Certification Should I Obtain?
    Which Cyber/Cloud Security Certification Should I Obtain? Dr. Victor Berlin, Mission Critical Institute Dec 14 2017 12:00 am UTC 30 mins
    We will be reviewing the Certifications in the Cyber/Cloud Security industry and explaining the benefits of each.
  • 【最新機能が満載】ファイア・アイWeb脅威対策製品「FireEye NX」まるわかりWebセミナー
    【最新機能が満載】ファイア・アイWeb脅威対策製品「FireEye NX」まるわかりWebセミナー FireEye Japan Dec 14 2017 1:00 am UTC 45 mins
    セキュリティご担当の皆様

    昨今のセキュリティ攻撃は、ますます高度化が進んでいます。企業、組織のお客様がこうした脅威に対抗するべく、ファイア・アイのWeb脅威対策製品「FireEye NX」はどんどん進化をしています。


    この10月にリリースされた最新バージョンでは、侵害後の水平展開の動きを検知できる「スマートビジョン」やアナリストの解析を支援するアラート画面の刷新など、他社製品と比べ格段に強力なセキュリティ機能が搭載されています。また、新バージョンの性能を最大限に引き出す最新ハードウェアプラットフォームも合わせてリリースされます。


    つきましては、下記の通り、FireEye NXの最新機能で何ができるようになり、どういった脅威対策が可能になるのかを紹介するWebセミナーを開催いたします。

    本セミナーでは、ファイア・アイの会社概要、サンドボックス技術について、FireEye NXの基本機能を紹介した後、最新機能をわかりやすく解説します。標的型攻撃対策のポイントやファイア・アイの優位性などもお話させていただきますので、新たにセキュリティ担当になられた方、最新の脅威対策について知りたい方に最適な内容となっています。ふるってご参加ください。
  • 【パートナー様向けWebセミナー】 FireEye NX 最新バージョン OS 8.0のご紹介と 提案のポイント
    【パートナー様向けWebセミナー】 FireEye NX 最新バージョン OS 8.0のご紹介と 提案のポイント FireEye Japan Dec 14 2017 2:00 am UTC 45 mins
    ファイア・アイ製品の販売に携わるパートナー、リセラーの皆様
    日頃より、ファイア・アイの製品およびサービスの販売、サポートのご支援を賜り誠にありがとうございます。

    このたび、Web脅威対策製品である「FireEye NX シリーズ」の最新バージョン「OS 8.0」 がリリースされました。今回のバージョンでは、侵害後の水平展開の動きを検知できる「スマートビジョン」やアナリストの解析を支援するアラート画面の刷新など、他社製品と比べ格段に強力なセキュリティ機能が搭載されています。また、OS 8.0の性能を最大限に引き出す最新ハードウェアプラットフォームも合わせてリリースされます。
    つきましては、下記の通り、OS 8.0の新機能について詳細、および導入例やキャンペーン情報などをご紹介するWebセミナーを開催いたします。
    12月のお忙しい中とは存じますが、ぜひ本Webセミナーにご参加ください。また、当開催情報につきましては社内で共有いただき、より多くの営業ご担当またはSEの方にもご案内いただけましたら幸いです。
  • Your Proxy Just Got Smarter with Web Isolation
    Your Proxy Just Got Smarter with Web Isolation Timothy Chiu - Senior Director of Product Marketing, Symantec Dec 14 2017 11:00 am UTC 60 mins
    Did you know millions of hosts (Domains, Subdomains, or IP Addresses) pop up every day and many of these have lifespans of less than 24 hours.

    Many organizations choose to set Secure Web Gateway policies to block users from going to uncategorized sites because of the risk they represent, even though many may be legitimate destinations for business purposes.

    In a similar fashion, many enterprises choose to block sites that have a heightened risk rating, but are not conclusively risky. This leads to website over-blocking and unhappy end users. Some sites are known to be good, others are known to be bad, the problem comes for those in the middle where insight/information is lacking.

    Key Learning Objectives:

    •Learn about the world’s largest civilian threat intelligence service and how it will protect you from Malware attacks

    •Learn how to set policies to send any traffic with inconclusive risk or uncategorized by Global Intelligence Network down a Web Isolation path.

    •Learn how to boost productivity for businesses without incurring any additional risk.

    Register Today
  • Filling the GDPR Compliance Gap
    Filling the GDPR Compliance Gap Adenike Cosgrove, Sr. Product Marketing Manager, Proofpoint Dec 14 2017 11:00 am UTC 45 mins
    Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
  • Cyber Security Predictions: What is in store for the EMEA region
    Cyber Security Predictions: What is in store for the EMEA region Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Dec 14 2017 11:00 am UTC 60 mins
    2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

    Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

    •Continued political tension in the region
    •Upcoming elections
    •Mixed security maturity
    •The effect of new compliance and data protection laws

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • How to Stop a Security Breach Becoming a PR Disaster
    How to Stop a Security Breach Becoming a PR Disaster Adrian Davis, Managing Director, (ISC)² EMEA, Neil Stinchcombe, Director, Eskenzi PR Dec 14 2017 12:00 pm UTC 60 mins
    Your CEO has just called your mobile because a reporter from the BBC wants to know how many customers are affected by a hack into your payment database.
    How should you respond?
    What is the one thing you should not say to avoid turning a cyber incident into an event that has to be reported under GDPR?
    Why is Crisis Comms so different from all other types of PR?
    What things do you need to demonstrate that will limit the damage?
    Do you have a tried and tested Crisis Comms plan?
    Does everyone know who is on the Crisis Comms team?
    What they have to do?
    Who they need to inform?
    What they can and cannot say, and how they should say it?
    What type of skills do you need to manage media communications and prevent a cyber incident becoming a crisis?
  • Big Data Analytics vs Privacy: Risks and Opportunities
    Big Data Analytics vs Privacy: Risks and Opportunities Rob Anderson, Head of Field Operations (Privitar),Tim Hickman, Associate (White & Case) Dec 14 2017 1:00 pm UTC 60 mins
    Today's modern businesses gain competitive edge and remain innovative by using advanced analytics and machine learning. Utilising big data can build customer loyalty by improving personalised marketing campaigns; optimises fraud detection; and improves products and services by advanced testing. However, the data sets required for advanced analytics are often sensitive, containing personal customer information, and therefore come with an inherent set of privacy risks and concerns.

    This roundtable will cover a few key questions on data utility and privacy:

    - In what ways advanced analytics help businesses gain competitive edge?

    - What is defined as sensitive data?

    - Will GDPR affect the way you're allowed to use customer data?

    - What opportunities are there to utilise sensitive data?

    Unlocking the data’s true value is a challenge, but there are a range of tools and techniques that can help. This live discussion will focus on the data analytics landscape; compliance considerations and opportunities for improving data utility in 2018 and beyond.

    Key takeaways:

    - A view of the data protection landscape

    - How to remaining compliant with GDPR when using customer data

    - Use cases for advanced analytics and machine learning

    - Opportunities for maximising data utility in 2018
  • Proteggere le utenze amministrative: meno rischi e più compliance.
    Proteggere le utenze amministrative: meno rischi e più compliance. Giovanni Usuelli, Principal consultant Dec 14 2017 1:30 pm UTC 75 mins
    Gestire e proteggere le credenziali con privilegi è essenziale per ridurre i rischi e soddisfare i requisiti di compliance. Parleremo delle diverse strategie messe a disposizione da CA PAM per controllare e gestire gli accessi da parte degli amministratori di sistema.
  • Build an Application-Aware, Cloud-centric Network with Citrix NetScaler SD-WAN
    Build an Application-Aware, Cloud-centric Network with Citrix NetScaler SD-WAN Shoaib Yusuf, Solutions Architect, Citrix Dec 14 2017 3:00 pm UTC 60 mins
    With SD-WAN, you can focus on your applications and not your network. With integrated visibility and simple centralized policy definitions, NetScaler SD-WAN provides a secure and reliable network for a hybrid and multi-cloud world, enabling a simple and systematic transition of applications to the cloud.
     
    What you will learn:
     
    • How to use SD-WAN to connect securely to Azure and AWS directly from branches and retail locations
    • How to secure data in transmit across the virtualized WAN using IPsec data encryption
    • What management tools are available to provide visibility and control of the network and applications
    • How NetScaler SD-WAN is paired with XenApp and XenDesktop to provide optimal performance and visibility
    • Easily roll-out SD-WAN to all locations with zero touch deployment service
  • Centrally Managing Access to Microsoft Applications AND 3rd Party Cloud Apps
    Centrally Managing Access to Microsoft Applications AND 3rd Party Cloud Apps Guido Gerrits Dec 14 2017 4:00 pm UTC 60 mins
    Is there a way to centrally manage access to Microsoft Applications AND third party cloud apps? The answer is ‘Yes!’ To reduce implementation and ongoing administration complexity, organizations are looking to vendor-agnostic solutions to resolve their critical cloud access quandaries—including the need to maintain security, compliance and user convenience across their hybrid Microsoft and 3rd party cloud estates. Thanks to standards-based technology, hybrid Microsoft and non-Microsoft cloud environments can be managed centrally, so that you can benefit from:
    •Single pane management of cloud applications
    •Flexible scenario-based access policies
    •Lower identity administration overheads
    •Reduced total cost of operation
  • Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead
    Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead Jeff Barto and Angelique Pereira, Trust Strategists at Symantec Dec 14 2017 4:00 pm UTC 60 mins
    As we wrap up another year, let's take a moment to discuss what 2017 brought to the industry, and what we should expect to see next year.