The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
L’ambiente dei tuoi clienti è sempre più complesso, Backup Exec 15 permette loro di esguire backup e recovery in modo semplice ed efficace, sempre e ovunque.
Segui questo webinar e scopri come Backup Exec 15 può semplificare e rispondere alle esigenze delle diverse infrastrutture.
If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
•The benefits of upgrading
•Considerations to understand
•How to smooth the transition
•Q & A
This presentation provides an overview of the threats against a wide range of organizations and individuals during 2014. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of IP addresses associated with malicious activity, details on the reputation of URLs by category and location, phishing detection statistics, insights into file reputation and encounter rates with malware and PUAs and information on mobile app security for Android devices. All data presented comes from Webroot’s Intelligence Network and was observed during 2014.
Public cloud computing resources such as Amazon Web Services (AWS) are helping organizations like yours develop and deploy new applications rapidly; expand into geographic regions seamlessly and extend competitive advantages. Cyber criminals are well aware of the rapid expansion into the public cloud and are looking for weaknesses in your security posture. Don’t let them find one. The VM-Series for AWS, allows you to securely extend your corporate datacenter into AWS, using our next-generation firewall and advanced features to protect your data while native management features ensures policies keep pace with the changing to your applications.
In this webinar, attendees will learn:
- Common customer use cases for AWS
- Key security challenges and considerations
- How the VM-Series can protect your AWS environments
Targeted malware, zero-day vulnerabilities and advanced persistent threats are increasingly responsible for data breaches. Why? Because they work. Most security products have a hard time protecting from advanced malware. This problem is compounded because attackers can easily mass produce new malware variants. What’s an IT person to do?
Join us to learn key techniques to stop modern malware the first time. We will discuss:
•What tactics work
•Where to apply them
•How to optimize cost, staffing and security.
FireEye vous invite à un Web séminaire au cours duquel nous reviendrons sur les grandes tendances 2014 en matière de cyberattaques. Fruit de centaines d’interventions et d’investigations menées par Mandiant dans plus de 30 secteurs d’activité, le rapport annuel M-Trends contient également une mine de conseils pour mieux détecter, riposter et neutraliser les attaques avancées.
More than 100,000 information security professionals have invested time, effort and resources to achieve what has long been considered the Gold Standard security certification – The CISSP. Now that the security industry is growing and career trends are shaping the current job market, there is a bigger need to understand where the CISSP fits and what value it brings to any professional undertaking the path to become certified.
During this panel session you'll hear different perspectives, including that of the hiring manager, recruiter and credential holders themselves around the following questions:
- How is the CISSP viewed in the market place?
- Which career paths are worth exploring with a CISSP?
- What skillset does a CISSP have?
- Is the CISSP a differentiator for a candidate?
- How does the CISSP help the professional perform his job?
Software defined architectures are all the buzz, helping to start conversations about transforming customer data centers from cost centers into competitive advantages. But in today’s economy, no business can afford to stand still. And a business is only as agile as its IT organization allows. An agile data center and IT department can:
•Protect the infrastructure and easily recover if faults are found or predicted
•Control access to data while meeting compliance and regulatory requirements
•Deliver services quickly, resiliently, and cost-effectively
Join us on at 10am GMT on 16th April 2015 and learn how Symantec’s view of the “Agile Data Center” covers delivering the right resources in the right way to the users. Whilst bringing a broader view on how you can introduce critical solutions and new revenues around disruptive customer events.
Mobile is changing the way we work in the enterprise. Today’s workforce is demanding the ability to access and share business files from any device. In this webinar learn why Fortune 5000 companies select Syncplicity to achieve the promise of mobile productivity and solve the “Dropbox” problem.
Host-based IDS systems, or HIDS, work by monitoring activity that is occurring internally on a host. HIDS look for unusual or nefarious activity by examining logs created by the operating system, looking for changes made to key system files, tracking installed software, and sometimes examining the network connections a host makes. AlienVault USM features a complete integration of OSSEC, one of the most popular and effective open source HIDS tools.
In this live webinar, we'll show you how USM helps you get more out of OSSEC with:
Remote agent deployment, configuration and management
Behavioral monitoring of OSSEC clients
Logging and reporting for PCI compliance
Data correlation with IP reputation data, vulnerability scans and more
We'll finish up by showing a demo of how OSSEC alert correlation can be used to detect brute force attacks with USM
Host Amber Williams chats with Tom Bain of CounterTack about endpoint security, the Black Hat movie, and the future of security and Todd Bell of Intersec World Wide about the need for an MBA in the CISO role, swimming with the sharks, and turning the IS department into a profit center.
The rapidly expanding supply chain supporting the cybercrime economy is empowering cyber criminals, cyber terrorists and even nation states in ways that put companies, critical infrastructure and governments at increased risk. The fate of an organization whose defenses have been compromised will be determined by the speed with which they can detect and respond to intruders. A mature security intelligence posture boosts an organization’s resiliency amidst these advanced threats. If intruders are detected early in their lifecycle, organizations can respond quickly and potentially avoid loss altogether.
In this webinar, three cyber security veterans will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s new Security Intelligence Maturity Model™ (SIMM). They will explore how the SIMM provides organizations with a framework to plan for continuous reduction in their mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to high-impact threats.
• Emerging cyber threat vectors in 2015.
• Security Intelligence and the critical role it plays in addressing high-impact threats
• Using the SIMM to assess your current Security Intelligence Maturity
• How to move from “greatly exposed” to “highly resilient” via End-to-End Threat Lifecycle Management
While anonymizers can serve a positive purpose by protecting a user’s personal information by hiding their computer’s identifying information, their use in your network environment can be dangerous. Anonymizers can evade enterprise security devices, and their misuse can make your organization susceptible to malware and unwanted intrusions. Attend this session to learn how you can detect and block elusive anonymizers from wreaking havoc on your network.
Recently cyber attacks against Industrial Control Systems (ICS) used by
utilities and other Critical Infrastructure organizations have hit the
newlines worldwide. Stuxnet is the best known cyber attack against an
industrial installation, but it's not the only one.
But what if cyber attacks were not the biggest threat to industrial
networks and systems? Although malware is still a major point of
interest, the sword of Damocles for critical industrial networks is
represented by system misuse performed by disgruntled employees,
contractors and vendors, as well as unintentional mistakes,
network and system misconfiguration; all this could lead to the
divergence or failure of critical processes.
In this talk we will reshape the concept of ICS cyber security and will present our vision for a comprehensive approach to cyber security for ICS.
Please join AvePoint and YADA at 10:00 a.m. – 11:00 a.m. CST on Tuesday, April 14, 2015 as Alexander van Welzen, Managing Director at YADA, discusses migration to SharePoint and Office365 in preparation for the end of EMC Documentum eRoom platform.
EMC Documentum eRoom has been in maintenance mode for years and its product lifecycle will likely end in the near future. Customers are being pressured to make a decision about the future of their eRoom installation and a successor for it. Many of the eRoom customers have already been migrated over to Microsoft SharePoint or Office365, or have even started to clean up their eRoom systems in preparation for such a migration.
In this 60-minute webinar, learn how YADA’s unique worldwide eRoom assessment, cleanup, and migration toolset plus methods, including AvePoint’s DocAve Migrator, enable a smooth system cleanup and migration of content – saving time and money while insuring a positive user experience.
Risk management is an increasingly important
business driver and stakeholders have become
much more concerned about risk. Risk may be a
driver of strategic decisions, it may be a cause of
uncertainty in the organisation or it may simply be
embedded in the activities of the organisation. An
enterprise-wide approach to risk management
enables an organisation to consider the potential
impact of all types of risks on all processes,
activities, stakeholders, products and services.
Implementing a comprehensive approach will
result in an organisation benefiting from what is
often referred to as the ‘upside of risk’.
The global financial crisis in 2008 demonstrated
the importance of adequate risk management.
Since that time, new risk management standards
have been published, including the international
standard, ISO 31000 ‘Risk management –
Principles and guidelines’. This guide draws
together these developments to provide a
structured approach to implementing enterprise
risk management (ERM)
Virtualization drastically changes how datacenters are designed and operated, from storage to networking, server and inventory management. Yet all-too often, endpoint security such as antimalware is overlooked. This leads to major performance problems due to the architecture of traditional security products.
Bitdefender will detail these challenges, and cover solutions to the problems, including leveraging VMware vShield Endpoint technology.
Before tackling a SIEM project to improve detection and response, learn from these case studies as their scenario likely matches yours. To firebreak your network brings together technologies, processes and people in the right balance across four phases. More than a security point solution or another box, you need to turn craft into a discipline to improve detection and response.
Learn from your peers about the following:
- Before environment and issues
- Transition effort, cost and impact
- After environment and benefits
- Best practices for managed SIEM
- Your network and next steps
Generally, risks associated with continuity planning, from physical to cyber-security, are part of an ever-evolving threat to our systems and technologies. Continuity planning is simply the good business practice of ensuring the execution of essential functions through all circumstances, and it is a fundamental responsibility of public institutions and private entities responsible to their stakeholders. What are some of the risks associated with continuity planning? Why is managing risk important for continuity? What are some of the methods used to mitigate risks in continuity planning?
The COOP presentation will provide an understanding of Continuity and Continuity of Operations, explain the importance of a viable Continuity capability, and emphasize the need for a viable Continuity capability in all organizations, to demonstrate some of the linkages between continuity programs and:
Join us on April 21 as NCP’s senior continuity practitioner shares resilient continuity programs and outreach efforts. Hear from Eric Kretz, NCP, as he talks about Information Integration: Leveraging Risk, Physical and Cyber Security and Continuity Planning.
If your organization cannot afford downtime from DDoS attacks, join this timely discussion from Neustar, with special guest perspective from IDC’s Christina Richmond. Explore the complexity and purpose behind today’s attacks and what you can do to defend your Internet presence. You will learn:
· What the DDoS threat environment looks like today
· Why “smokescreening” is a particular danger
· Where attacks can have impact across your organization
· How you can take steps to thwart DDoS threats
Jayme Williams, Senior Systems Engineer at TenCate is protecting eight environments across the US and Canada – and each site has different storage. All sites require disaster recovery and backup across the application set. Having one solution would be ideal, but not possible – until they came across Zerto.
Zerto Virtual Replication is storage agnostic and made it easy to integrate a new site into their disaster recovery plan. Their original business continuity and disaster recovery (BC/DR) plan, affectionately named the “Hit by the bus” book due to its volume, has been greatly simplified and the service levels they are seeing are outstanding – single digit seconds for their recovery point objectives (RPO).
Finally, they are incorporating public cloud into their IT plans by backing up their applications from their DR site to AWS. With one solution, they can achieve their BC/DR and backup SLA, while reducing costs and introducing public cloud into their IT strategy at a pace that supports changing business requirements.
With Zerto Virtual Replication:
•Manage all sites in one pane of glass with one tool for replication and automation of failover, failback and testing processes as well as backup
•Increase efficiencies with the ability to track and manage consumption across the hybrid cloud
•Hardware agnostic solution does not require a change in the infrastructure reducing costs
•Consistency in the BC/DR solution dramatically reduces operational costs
•Replicates between different types of storage and versions of VMware vSphere making it easy to add new sites to the process
•Point-in-time recovery enables failover to a previous point to recover from any issue – logical corruption, datacenter outage, etc.
•Leveraging a public cloud strategy with backups stored in Amazon
Changing IT needs and complex infrastructures require flexible and dynamic solutions to help you transition your environment. The release of Symantec™ Backup Exec 15 is the perfect time for you to review your backup and recovery infrastructure to meet these changing demands. Whether you are an existing Backup Exec customer or not, now is the time to upgrade to a reliable choice; the leading-edge offering for virtual, physical and cloud platforms.
Join us to understand how Backup Exec 15 provides the flexibility to protect confidently whatever your platform, technology or application need. Delivering the power to protect your information faster, restore what you need when you need it and the ease the time and burden of “doing backup.
Whether you are evaluating your move to the public cloud or have started the journey and are already hosting DevTest or production workloads, security and compliance should be high on your list of priorities.
Applications hosted in the public cloud are your responsibility, and not AWS. The biggest challenge you have is that web applications are also the most targeted from cyber attacks, and you need to ensure that you have a solid security foundation to be able to continuously monitor and protect your workloads from compromise.
Join James Brown, Director of Cloud Computing & Security Architecture, Alert Logic for this live webinar which will cover:
• The shared security model: what security you are responsible for to protect your content, applications, systems and networks v AWS
• Overview of the OWASP Top 10 most critical web application security risks (such as SQL injections)
• Best practices for how to protect your environment from the latest threats
This webinar is essential for anyone who wants to understand how to build a plan for security and compliance in the cloud.
This webinar will demonstrate how Sequence Package Analysis (SPA), a new natural language method that utilizes a corpus of annotated training data comprised of a unique set of feature extractions, may detect early signs of terrorism and sedition. Using an SPA-designed BNF table consisting of sequentially-implicative (as opposed to syntactic) parsing structures, this natural language tool searches social media content and recordings of conversations of suspected terrorists to identify (and measure) collusion, collaboration, affinity with other terror or sedition suspects. Whereas conventional text mining methods are hindered by the speech system’s failure to identify keywords (most suspects intentionally refrain from the use of keywords that pinpoint location, names, dates and time), SPA is designed to work around these obstacles in which users refrain from referring to named entities that are likely to flag their communications as suspicious.
Wi-Fi security attacks, hacking, stolen mobile devices – are these keeping you awake at nights? Are you surprised that Wi-Fi networks can be more secure than your wired networks? Wireless LAN has come a long way from the days of its inception with inadequate security.
Contrary to common belief, security is not a single protocol or an appliance or an encryption. It is a system of different components working together to ensure your Wi-Fi network is secure and your confidential information is protected.
Join this webinar to learn about
- Advances in Wi-Fi security
- Multi-layers approach to holistic protection
- Controlling user and device access
- Controlling applications
-Xirrus security solutions
Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
Tech blogs are overflowing with examples of password hacks, data destruction, and data leakage. It’s time for a new approach. Imation’s recently-announced Secure Data Movement Architecture (SDMA) will safeguard your organization’s most valuable data against tampering, leakage, or loss - throughout its entire lifecycle including when it’s in the cloud or mobile devices, or anywhere in between. Join us as we give you a sneak peek into our new concept for painless data protection, and the rapidly evolving types of threats its meant to address.
Information is the lifeblood of any business. If the data required to operate and maintain market presence becomes inaccessible, compromised, or worse – unrecoverable, the business impact could be devastating. Learn about the existing and emerging risks to your critical data infrastructure and business operations. What mitigation strategies are available and what considerations do you need to assess? How does the changing landscape for consumption of IT such as cloud, on-premise, and hybrid solutions effect survivability and securitization of your prized assets?
After July 14, 2015, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute to protect your infrastructure. The end of support means two things: newly discovered vulnerabilities in Windows Server 2003 will not be patched anymore, nor will they be documented and acknowledged by Microsoft. This represents an increase in the risk of using Windows Server 2003. However, many organizations still count on Windows Server 2003 for critical business operations. It’s important for organizations to understand the risks of running out-of-support platforms against the costs and effort of migrating to a new one.
In this webinar, we will cover 2 important topics to help you secure, migrate and protect your legacy environment:
* What risks you are facing for Windows Server 2003 end-of-support
* How to shield vulnerabilities when the platforms are no longer be patched
Join the webinar to know the most comprehensive protection to help manage the risks of out- of-support platforms like Windows Server 2003!