Hi [[ session.user.profile.firstName ]]

IT Security

  • ITSPmagazine chats with Joe Sander, CEO from Arxan Technologies ITSPmagazine chats with Joe Sander, CEO from Arxan Technologies Joe Sander, CEO from Arxan Technologies Recorded: Feb 18 2017 8 mins
    ITSPmagazine discusses application security, autonomous vehicle security, financial services security, IoT security, and diversity with Joe Sander, CEO from Arxan Technologies
  • Scaling Business Continuity and Disaster Recovery On-Prem & in the Cloud Scaling Business Continuity and Disaster Recovery On-Prem & in the Cloud Todd Furst and Rich Ross, Technical Solutions Professionals, Microsoft Recorded: Feb 17 2017 44 mins
    Help protect your organization's data and applications. Even a minor outage can put you at a competitive disadvantage.

    Mitigate your risk and be ready with a business continuity plan that enables backup and disaster recovery if needed. Increase capacity, decrease costs, and delivery disaster recovery at cloud scale.

    Join this webcast to learn how to:
    - Implement disaster recovery for all your major IT systems
    - Unify data management, security, and protection
    - Provide protection for your data and applications, no matter where they reside
    - Extend on-premises backups storage and data archiving solutions to the cloud
  • ITSPmagazine chats with Kathy Hickey and Hadeel Dabbagh from CA Technologies ITSPmagazine chats with Kathy Hickey and Hadeel Dabbagh from CA Technologies Kathy Hickey, VP Security Product Management and Hadeel Dabbagh, Dir. Security Product Marketing Recorded: Feb 17 2017 7 mins
    ITSPmagazine chats with Kathy Hickey, Vice President Security Product Management, and Hadeel Dabbagh, Director, Security Product Marketing, from CA Technologies
  • Combattez les cybermenaces grâce à la sécurité réseau adaptative SonicWall Combattez les cybermenaces grâce à la sécurité réseau adaptative SonicWall Florian Malecki Recorded: Feb 17 2017 62 mins
    Les ransomwares sont une forme de logiciels malveillants qui bloquent l’accès au réseau/aux données jusqu’à ce que la victime s’acquitte d’une rançon. Ils se sont propagés à une vitesse record en 2016. Les cybercriminels en usent activement pour prendre en otage des entreprises, des institutions et même des particuliers. Les experts en sécurité parlent à cet égard de nouvelle crise de la cybercriminalité.
    Participez à notre webcast en direct où un expert en sécurité vous dira :

    •comment les cybercriminels peuvent exploiter les vulnérabilités de votre réseau ;
    •quelles mesures prendre pour prévenir et stopper cette menace dangereuse et potentiellement coûteuse ;
    •quelles sont les entreprises les plus à risque ;
    •comment protéger vos données où qu’elles circulent.
  • Au-delà du GDPR –Une cyberdéfense intégrée Au-delà du GDPR –Une cyberdéfense intégrée Zoltán Précsényi, Director European Government Affairs – Symantec EMEA ; Hervé Doreau, Directeur Technique - Symantec France Recorded: Feb 17 2017 57 mins
    Comment éviter que le GDPR ne devienne qu’un simple surcoût pour votre entreprise?Profitez-en pour remettre à plat vos stratégies de sécurité des informations et de confidentialité des données.Pourquoi?Le GDPR se fonde sur le principe de la bonne gouvernance des données. En l’adoptant, ce concept vous aidera à respecter plus facilement la réglementation tout en réduisant d'autres risques pour l’entreprise.En matière de protection des données, le choix d’une stratégie de long terme solide apportera des avantages permanents, en particulier à l’heure où les cybermenaces et la protection des données figurent parmi les plus grands risques pour les organisations.En intégrant la protection et la sécurité des informations dans votre plan GDPR, vous pourrez exploiter l’infrastructure existante pour apporter des améliorations dans des domaines jugés prioritaires.Notre panel de spécialistes vous expose les principaux obstacles à franchir pour les entreprises et explique comment les surmonter grâce à l’intégration technologique.Ce webcast vous présentera les grandes lignes du règlement GDPR, identifiera l’une des approches possibles pour mettre au point votre plan, et évoquera les atouts des différentes technologies disponibles pour améliorer la protection des données.Nos experts examineront également les répercussions à plus long terme, notamment en ce qui concerne la culture de la sécurité et le processus de conception, pour que vous puissiez mettre en œuvre votre stratégie avec succès.
  • ITSPmagazine chats with Pierre Calais from Stormshield During RSA Conference ITSPmagazine chats with Pierre Calais from Stormshield During RSA Conference Pierre Calais, CEO, Stormshield Recorded: Feb 17 2017 5 mins
    ITSPmagazine discusses innovation, collaboration, teamwork, leadership, and diversity with Pierre Calais from Stormshield
  • Rapid7 AppSpider Product Demo - APAC Rapid7 AppSpider Product Demo - APAC Hollis Howell Recorded: Feb 17 2017 23 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • Climbing the Corporate Ladder… in (Tasteful) High Heels Climbing the Corporate Ladder… in (Tasteful) High Heels Jo Stewart-Rattray (BRM Holdich) & Theresa Grafenstine (US House of Representatives) Recorded: Feb 16 2017 62 mins
    For many years, women have represented roughly half of all university graduates. Yet, there is a lingering imbalance of women that progress to senior leadership positions.

    Join two industry trailblazers, Jo Stewart-Rattray, the first woman to serve as CIO with responsibility for both operational and business IT in the Australian utilities space and Theresa Grafenstine, the first woman to serve as the Inspector General of the US House of Representatives, as they discuss how they cracked through the proverbial glass ceiling.

    Attendees will get practical advice on becoming a trusted advisor, building your personal brand, joining the “Old Boys Club,” and the art of gaining influence.

    Jo and Theresa will also reflect on their careers and share lessons learned on the bumps and bruises they encountered along the way with “What they wished they knew 20 years ago…”

    At the end of what will surely be a spirited discussion, attendees will have a chance to pose questions to these two role models who blazed a trail for women in the IT profession.
  • Rapid7 AppSpider Product Demo Rapid7 AppSpider Product Demo Hollis Howell Recorded: Feb 16 2017 23 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • From Board Books to Boardroom: Tales from the Hi-Tech Working Mom Trenches From Board Books to Boardroom: Tales from the Hi-Tech Working Mom Trenches Jen Holtvluwer, Director of Digital Marketing, Cherwell Software & Elisabeth Thomas, President, Launch Product Marketing Recorded: Feb 16 2017 60 mins
    There is no question that being a working mom is a challenge. You never feel like you’re actually giving 100% to your family or your work. How do you manage everything amidst exhaustion and not feel guilty? Hear from two, hi-tech mommy marketers on how they have achieved a healthy balance of succeeding in the boardroom and on the home front. For entrepreneurs, learn how to find the right balance required to manage your own business. For women determined to climb the corporate ladder, hear tips on how to keep yourself and/or your team motivated.
  • Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture Backup on the Wire: Ransomware Recovery Based on Precision Packet Capture Tyson Supasatit, Product Marketing Manager, Kanen Clement,Senior Systems Engineer, ExtraHop Networks Recorded: Feb 16 2017 20 mins
    ExtraHop, the first and only provider of streaming analytics that transforms network data into actionable insight, today introduced a new version of its award-winning ransomware mitigation offering that, for the first time, allows enterprises to recover ransomware-encrypted files without a backup. The ransomware offering incorporates the ExtraHop platform's proprietary Precision Packet Capture capability, allowing companies to detect ransomware attacks in-progress and recover lost files in minutes, creating an end-to-end solution that puts control back in the hands of the enterprise.

    In this Webinar Tyson Supasatit and Kanen Clement explain how the ExtraHop solution for ransomware detection and file recovery works.
  • If You Can See It, You Can Protect It: Visibility & Cybersecurity If You Can See It, You Can Protect It: Visibility & Cybersecurity Jeff Harris, Ixia -- Glenn Chagnot, Ixia -- Zeus Kerravala, ZK Research Recorded: Feb 16 2017 61 mins
    Where business security is concerned, IT needs to move with speed and without hesitation. Visibility can make all the difference.

    Join our experts from Ixia and ZK Research as they discuss the critical nature of unobstructed visibility in network security. Viewers will learn:

    · The building blocks of the Digital Enterprise and Digitization

    · Why the current state of IT Security is not scalable and how businesses are falling behind

    · How Visibility can tip the Security Scales in IT’s favor by exposing persistent threats and enabling the ability to “see” insider threats.
  • Top Five Reasons to Use Verified Asset Discovery Top Five Reasons to Use Verified Asset Discovery Dan Ortega - VP of Marketing for Blazent Recorded: Feb 16 2017 4 mins
    In this Top 5 video we list the top responses from a survey of 58 IT managers on the benefits they observed from using IT asset discovery and mapping technology.
  • Cloud Software Adoption: Uncovering the Key Enablers for your SaaS Applications Cloud Software Adoption: Uncovering the Key Enablers for your SaaS Applications Robert Mahowald,Program Vice President, SaaS and Cloud Services IDC & Jim Geronaitis, Sr. Industry Marketing Manager, Akamai Recorded: Feb 16 2017 53 mins
    Join Akamai and guest speaker Robert Mahowald, Program Vice President, SaaS and Cloud Services IDC. If you have a SaaS application or are building one you should attend! In this webinar you’ll learn about the key enablers to Cloud Software Adoption including:

    1.The significance of Security and Performance for cloud software
    2.The expected benefits and impact of SaaS
    3.The most critical SaaS attributes by different organizational roles
  • KYC in the online age KYC in the online age Panel Discussion featuring: UK Cabinet Office, CurrencyFair, IOX & Mitek Recorded: Feb 16 2017 47 mins
    Financial institutions from all over the world are facing increasingly strict regulations regarding the verification and authentication of their customers’ identity. The imminent enforcement of the 4AMLD and the publication of the 5AMLD will nothing but add pressure on the financial services industry.

    To keep a competitive edge and still be compliant with the latest Anti-Money Laundering (AML) and Know Your Customer (KYC) regulations, banks, prepaid card operators, digital currency processors, exchanges, and wallets are being compelled to embrace the digitalisation of traditionally cumbersome processes such as customer due diligence and ongoing authentication.

    Aiming to simplify KYC in this ever-changing regulatory environment, and optimizing the digital channels for further security and convenience, financial institutions need to successfully achieve this change within their policies, procedures, business models, and technology infrastructures.

    During this webinar, our panel of experts will provide answers to the following questions:

    •Are the technologies to underpin digital identity verification reliable and robust enough for financial institutions to rely on them?

    •Are customers prepared to go down the digital route?

    •Can financial institutions strike the right balance between rock-solid compliance, and smooth, easy, digital customer experience?

    •How are financial institutions coping with the challenges posed by the latest regulatory updates?

    Join us for this panel discussion with our expert speakers:

    Don Thibeau, Chairman & President, The Open Identity Exchange (OIX)
    Fintan Byrne, Head of Risk & Chief Compliance Officer, CurrencyFair
    Sarah Clarke, General Manager - Identity, Mitek
    David Rennie, Identity Assurance Programme, UK Cabinet Office
  • Shift-Left Security: How to Automate Security into Your Pipeline Shift-Left Security: How to Automate Security into Your Pipeline Benjy Portnoy, Aqua Security Recorded: Feb 16 2017 37 mins
    As DevOps role in the IT management is growing and virtual containers are rapidly gaining popularity – Docker is the fastest growing DevOps tool – DevOps now need to deal with security issues as well, and rethink their overall security strategy. How can they maintain an enterprise-grade security? Join our webinar to learn:
    •How to manage vulnerabilities in container images at DevOps speed?
    •How to fully automate security tests and bake them into your pipeline?
    •How to satisfy IT security and compliance requirements with minimal effort?
  • Transformation für mehr Sicherheit durch Sichtbarkeit Transformation für mehr Sicherheit durch Sichtbarkeit Kristian von Mejer, Strategic Account Director – Germany Recorded: Feb 16 2017 42 mins
    Kommt es Ihnen so vor, als hätten die Angreifer den Vorteil zunehmend auf ihrer Seite? Es gibt immer öfter Berichte über erfolgreiche Cyberattacken und Datenverluste, obwohl die Ausgaben für Sicherheitsmechanismen ebenfalls steigen. Der Schutz muss verbessert werden und dabei ist der erste Schritt mehr Visibilität.
    In unserem Webinar zum Thema Transformation für mehr Sicherheit durch Sichtbarkeit zeigen wir Ihnen, wie Sie in drei Schritten Ihr Netzwerk sicherer machen:

    • See: Erkennen Sie jedes Endgerät, sobald es sich mit dem Netzwerk verbindet. Dabei spielt es keine Rolle, ob Firmengerät, BYOD oder Endpunkte aus dem Internet der Dinge (IoT) – alle Devices werden ohne den Einsatz von Agenten erkannt
    • Control: Verwalten Sie Netzwerkzugriffsrechte für Gerätegruppen auf Basis von festgelegten Sicherheitsrichtlinien. Zudem können kritische Endpunkte automatisch bewertet und gesichert werden
    • Orchestrate: Teilen Sie Informationen mit bestehenden Sicherheitslösungen und automatisieren Sie Arbeitsprozesse durch die Extended Modules von ForeScout
  • Rapid7 AppSpider Product Demo - EMEA Rapid7 AppSpider Product Demo - EMEA Hollis Howell Recorded: Feb 16 2017 23 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • Taming the "God" User Taming the "God" User Amar Singh and Joseph Carson Recorded: Feb 16 2017 60 mins
    Privileged IT users hold significant power in an organisation. They can delete, change or read emails and create, reset or change user accounts amongst other things. In many cases the privileged user can easily bring a business to its knees.

    Businesses may be aware of the scale of the privileged insider threat but efficiently managing these users often remains an aspiration. Join Amar Singh in this interactive webinar as he talks to privileged management expert Joseph Carson and discusses how you can expertly manage your privileged users.

    Cyber Management Alliance's webinars are highly interactive and have a higher than normal user interaction during the webinar. So, sign-up now and take this opportunity to ask, learn and share.
  • Denken Sie über die DSGVO hinaus – Integrieren Sie Ihre Cyberabwehr Denken Sie über die DSGVO hinaus – Integrieren Sie Ihre Cyberabwehr Alexander Peters, Robert Arandjelovic Recorded: Feb 16 2017 64 mins
    Wie verhindern Sie, dass die DSGVO lediglich zu einem lästigen Kostenfaktor für Ihr Unternehmen wird? Indem Sie die Verordnung dazu nutzen, Ihre Strategien für Informationssicherheit und Datenschutz zu überarbeiten.

    Warum?

    Die DSGVO beruht auf dem Prinzip einer guten Daten-Governance. Wenn Sie sich dieses Prinzip zu eigen machen, können Sie die Verordnung nicht nur leichter einhalten, sondern auch andere geschäftliche Risiken mindern. Ein Fokus, der sich auf eine solide, langfristige Datenschutzstrategie richtet, bringt laufende Vorteile mit sich, zumal Cyberbedrohungen und Datenschutz zu den größten Risiken für Unternehmen zählen. Wenn Sie Informationsschutz und Sicherheit in Ihren DSGVO Plan einbeziehen, können Sie vorhandene Infrastruktur nutzen und sich auf die wichtigsten Verbesserungsbereiche konzentrieren.

    Hören Sie sich an, was die Teilnehmer unserer Diskussionsrunde zu den Hürden zu sagen haben, vor denen Unternehmen am häufigsten stehen, und erfahren Sie, wie die Integration von Technologie dabei helfen kann, diese zu bewältigen. Das Webinar bietet einen grundlegenden Überblick über die Bestimmungen der DSGVO, erläutert einen Ansatz für die Ausarbeitung Ihres Plans und erörtert die Vorzüge verschiedener Technologien zur Verbesserung des Datenschutzes. Außerdem werden die weiteren Auswirkungen aufgezeigt, insbesondere im Hinblick auf Sicherheitskultur und Prozessgestaltung, um die erfolgreiche Umsetzung Ihrer Strategie zu gewährleisten.
  • Think beyond GDPR – Integrate your cyber defences Think beyond GDPR – Integrate your cyber defences Sunil Choudrie & Robert Arandjelovic Recorded: Feb 16 2017 64 mins
    How do you stop GDPR becoming just a burden to your business? By using it to fundamentally review your information security and data privacy plans. Why?

    As GDPR is based on the principal of good data governance, adopting that mindset will not only ease your ability to comply, but reduce other business risks. A focus on a robust, long term, data protection strategy will deliver ongoing benefits, particularly as cyber threats and data protection are cited as top risks to organisations. Encompassing information protection and security, within your GDPR plan will allow you to utilise existing infrastructure allowing to focus on the key improvement areas.

    Join our panel to hear their views on the most common hurdles organisations face, and how integrating technology can help you overcome these. The webinar will provide a basic overview of the GDPR regulations, identify an approach you can take to develop your plan and discuss the merits of different technologies in improving data protection. The panel will also identify the wider implications, particularly regarding security culture and process design to ensure successful implementation of your strategy.
  • Protección de Accesos Privilegiados en entornos Híbridos Protección de Accesos Privilegiados en entornos Híbridos Rodrigo Lopez, Rodrigo.Lopez@ca.com Recorded: Feb 16 2017 49 mins
    En este Brighttalk, hablaremos de cómo los cambios en IT derivados de la Transformación Digital afectan directa y exponencialmente a la gestión de los usuarios y cuentas con acceso privilegiado a la información sensible de la empresa.
  • Cyber threats – fight back with SonicWall adaptive network security solutions Cyber threats – fight back with SonicWall adaptive network security solutions Florian Malecki Recorded: Feb 16 2017 63 mins
    Ransomware is a form of malware that denies network/data access until a victim pays a ransom fee. Ransomware is spreading at record pace in 2016 as cybercriminals actively use it to hold businesses, institutions and even individuals hostage. Security experts are calling ransomware the new crisis in cybercrime today.
    Attend our live webcast with a network security expert to learn:

    •How cybercriminals can exploit vulnerabilities in your network
    •Actions you can take to prevent and stop this dangerous and potentially costly threat
    •The types of companies most at risk for ransomware attacks
    •How to protect your data wherever it goes
  • SEP 14 Product Tour: 15 Years Running, a Leader in Gartner Magic Quadrant SEP 14 Product Tour: 15 Years Running, a Leader in Gartner Magic Quadrant Symantec Recorded: Feb 16 2017 5 mins
    Every endpoint is a launch pad for a cyber attack, no matter how it touches your network. Our multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection 14 is our lightest and the strongest endpoint protection on the market.
  • Best Practices for Protecting Your Applications on Azure Best Practices for Protecting Your Applications on Azure Vince Bryant, Cloud Platform Partner Executive Recorded: Feb 15 2017 35 mins
    Microsoft Azure is experiencing enormous growth as an increasing number of organizations turn to Azure to more easily launch and scale applications and services, and achieve the benefits of using the cloud. Azure offers several native platform capabilities and services to help ensure these workloads are secure, easy to manage, and able to scale to meet demand. Organizations are rethinking their approach to securing these dynamic environments, not because cloud platforms are insecure themselves, but because the vast majority of legacy on-premises security products and strategies do not work for cloud workloads. 

    Join Alert Logic team member Vince Bryant, Cloud Platform Partner Executive, for an in-depth webinar where we will discuss best practices for securing applications running on Azure and in multi-cloud deployments, including: 

    • Five things you must consider when securing applications running on Azure or multi-cloud deployments 
    • Tips for addressing your responsibilities in the Microsoft Azure Shared Security Model 
    • Case study: Learn how Bentley Systems addressed customer and compliance requirements in their multi-cloud deployments