Hi [[ session.user.profile.firstName ]]

IT Security

  • The Critical Infrastructure Attack Surface: Assessing Its Threats and Defences The Critical Infrastructure Attack Surface: Assessing Its Threats and Defences Sameer Bhalotra, frm. cybersecurity director at the White House, Kennet Westby, president of Coalfire, James Carder, CISO Recorded: Jan 24 2017 59 mins
    The recent DDoS attack on Dyn did much more than simply disrupt service to websites of some of the biggest online brands. It caused many to question our definition of critical infrastructure and the best way to ensure crucial functions are protected.

    In this webcast, a panel of experts discuss a number of questions around critical infrastructure and the challenges of protecting it against advanced cyber threats. The panelist also highlight the issues and risks the Internet of Things (IoT) pose to securing critical infrastructure.

    You’ll learn:

    • The definition of critical infrastructure
    • The responsibility the private sector plays in protecting the nation’s critical infrastructure
    • How IoT is amplifying the scope of critical infrastructure
    • Where organisations should focus to best mitigate the growing and shifting cyberthreats
  • Combatir las amenazas con soluciones SonicWall de seguridad de red adaptativas Combatir las amenazas con soluciones SonicWall de seguridad de red adaptativas Nicasio De Tomas Recorded: Jan 24 2017 61 mins
    El ransomware es una forma de malware que impide el acceso a los datos/a la red hasta que la víctima pague un rescate. En 2016, el ransomware se está propagando a un ritmo sin precedentes. Los cibercriminales lo utilizan de forma activa para tomar empresas, instituciones e incluso individuos como rehenes. Los expertos en seguridad definen el ransomware como la nueva crisis del crimen cibernético.
    Participe en nuestro webcast en directo con un experto en seguridad de red y descubra:

    •Cómo los cibercriminales pueden explotar las vulnerabilidades de su red
    •Las acciones que puede emprender para prevenir y detener esta amenaza peligrosa y potencialmente costosa
    •Los tipos de empresas con mayor riesgo de sufrir ataques de ransomware
    •Cómo proteger sus datos allá donde vayan
  • ATM Threats to the Financial Sector ATM Threats to the Financial Sector Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Recorded: Jan 24 2017 54 mins
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
  • Accelerate threat detection and incident response through a managed SOC service Accelerate threat detection and incident response through a managed SOC service Sridhar Karnam, Director, Product Marketing @ Arctic Wolf Networks Recorded: Jan 23 2017 31 mins
    A SIEM is costly and complex, IDS/ IPS are not enough, threat intelligence is overwhelming, and a SOC takes years to build and an army of security staff to manage. So where do I start with security? How should I prioritize? How can I integrate all the tools? How many security staff will I need? How do I integrate a SOC and a NOC?

    Managed Detection and Response is the answer to all these questions. With a focus on detecting and responding to threats, the service configures the right combination of tools and provides the people and process to help you quickly implement the best security within your budget. With a simple subscription-based model, you will pay a fixed price that is not dependent on your data volume. It is time to throw your SIEM, IPS, and other point solutions out and move forward with MDR.

    This webinar covers how you can implement three years worth of work on your security roadmap in just 60 min.
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Recorded: Jan 23 2017 61 mins
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • What To Ask Your Vendor on Enterprise SD-WAN Capabilities What To Ask Your Vendor on Enterprise SD-WAN Capabilities Ramesh Prabagaran, VP Product Management, Viptela Recorded: Jan 20 2017 46 mins
    What are the absolute essential requirements in an SD-WAN solution? Although Gartner has defined the four key requirements for SD-WAN (see below), there are some more critical features required to meet the enterprise-grade capabilities. For example, network segmentation for different kinds of applications is a widely deployed feature across all major industries, primarily to isolate critical applications and to reduce the attack surface during vulnerabilities.

    This webinar will more broadly cover the essential enterprise SD-WAN features and how they translate to common deployment scenarios in different industries. These features include:

    - Overlay capability over MPLS, Broadband and LTE
    - Unified and centralized management of all WAN infrastructure
    - Network segmentation with per-segment topologies
    - Predictable Application SLA with centralized policies and real-time traffic steering
    - Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
    - Unified and centralized management of all WAN infrastructure
    - Robust-zero trust WAN security including authentication, encryptions, segmentation and service chaining

    As a background, here are Gartner’s four key requirements for SD-WAN:
    - SD-WAN solutions provide a lightweight replacement for traditional WAN routers, and are agnostic to WAN transport technologies (that is, they support MPLS, Internet, Long Term Evolution [LTE], etc.).
    - Based on business and/or application policies, SD-WAN solutions allow for load sharing of traffic across multiple WAN connections in an efficient and dynamic fashion.
    - SD-WAN solutions dramatically simplify the complexity associated with management, configuration and orchestration of WANs.
    - SD-WAN solutions must provide secure VPNs, and have the ability to integrate additional network services and offload Internet-destined traffic closer to the edge of the network.
  • Top 5 Cloud and Mobile Cybersecurity Threats in 2017 Top 5 Cloud and Mobile Cybersecurity Threats in 2017 Doug Splinter & PJ Johnson, Technical Solutions Professionals, Microsoft Recorded: Jan 20 2017 41 mins
    Connected cloud and mobile technologies present immense business opportunity, but there is potential for increased risk as organizations increase their exposure to cybersecurity threats. The digital world requires new approaches to protect against, detect and respond to security threats.

    Join this webcast to learn more about:
    - Protecting against identity compromise and identity breaches before they cause damage
    - Ensuring device security while enabling mobile work for your users
    - The unique perspective Microsoft brings to cybersecurity
  • LiveAction: Gaining Deep Visibility Into The WAN Overlay LiveAction: Gaining Deep Visibility Into The WAN Overlay David Izumo, Principal Engineer, Technical Marketing, LiveAction & Manan Shah, Director of Product Management, Viptela Recorded: Jan 20 2017 38 mins
    Operation teams need to detect and correlate application problems with the real-time events happening on, both, the overlay and underlay networks. They also need capability for retrospective visualization into such problems. SD-WAN introduces new requirements for such advanced monitoring capabilities.

    LiveAction’s LiveNX™ is a robust visualization and analytics engine that integrates the network-generated metadata from Viptela SD-WAN technology to monitor application traffic on an end-to-end basis in real time. The retrospective visualization capability complements the intelligence provided by Viptela’s management solution and thus simplifies SD-WAN planning, monitoring and troubleshooting.

    This webinar will cover the major integration capabilities between LiveAction’s LiveNX and Viptela’s SD-WAN and share existing best practices to effectively manage the entire lifecycle of an SD-WAN deployment. These include:

    • Planning: Selecting pilot sites when planning SD-WAN deployments, identifying unsanctioned applications and end users, and establishing network utilization baselines which are used for right-sizing
    • Deployment: Using LiveNX real-time visualization to verify Viptela SD-WAN policies and assure services are not impacted in the event of brownouts or abnormal events
    • Management: Monitoring bandwidth and visualizing path control so network administrators can ensure application performance and mitigate problems before they affect users. Reporting on business applications to manage and optimize voice and video communications
  • TFD: Network Engineer Roundtable on Deploying SD-WAN TFD: Network Engineer Roundtable on Deploying SD-WAN Panel of 8 Network Architects, moderated by Tech Field Day Recorded: Jan 20 2017 51 mins
    Ten seasoned network engineers will debate on their views and experiences with SD-WAN. This roundtable discussion moderated by Tech Field Day focuses on how network professionals are analyzing and adopting SD-WAN technology, and integrating it into existing network architectures.

    SD-WAN has been the most rapidly deployed SDN technology. But major concerns remain on which features are the most fundamental and differentiating, and the maturity of the technology for large scale deployments. The major discussion topics will include:

    - Maturity of SD-WAN for prime-time deployment
    - Relative importance of features like routing, security, segmentation, vCPE, multi-tenancy, Application steering, SaaS, and Cloud.
    - ROI and the Before/After picture
    - Most typical use-cases across industries
    - Best practices in deploying SD-WAN based on personal experiences
  • Rapid7 AppSpider Product Demo - APAC Rapid7 AppSpider Product Demo - APAC Hollis Howell Recorded: Jan 20 2017 22 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • 5 Highest-Impact CASB Use Cases 5 Highest-Impact CASB Use Cases Bob Gilbert, Chief Evangelist at Netskope​ Recorded: Jan 19 2017 61 mins
    Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in ServiceNow, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations.

    Join Bob Gilbert, chief evangelist of Netskope, for a session on the top five CASB use cases that have the highest impact on cloud-consuming enterprises.

    Attendees will learn:

    •Industry-specific data that’s foundational to any cloud security business case;

    •The five highest-impact CASB use cases from our customers, demonstrated from the perspective of users and security professionals; and

    •How those use cases translate to “must have” requirements for any CASB evaluation.
  • 10 Reasons you May Have Outgrown your Current Accounting Software 10 Reasons you May Have Outgrown your Current Accounting Software David Gersten, Technology Specialist, Microsoft Recorded: Jan 19 2017 61 mins
    You know the old saying - time is money.

    Have you often wondered if your current accounting methods or software, is right for your business? Have you wanted to learn more, but don’t want to be sold a system you don’t know will work. We’ll explore how businesses are moving into the future of Accounting and show you some of the features and functions of this solution that helps you track and save money and save time.

    In this webcast you will learn:
    - Why businesses have moved from spreadsheets to software
    - What are the pitfalls of current accounting software
    - How to choose the right one
    - How you can move in front of your competition but operationalizing your methods
    - How simple it is to adopt and learn

    If you are a CFO, C-level executive, IT Director, IT Manager, Business Development Decision Maker, or Technical Decision Maker, you won't want to miss this discussion!
  • Anuta: Network Orchestration for Managed Branch Services Anuta: Network Orchestration for Managed Branch Services Kiran Sirupa, Director of Marketing & Praveen Vengalam, Co-Founder and VP of Engineering, Anuta Networks Recorded: Jan 19 2017 36 mins
    SD-WAN presents a transformational opportunity for Telcos and MSPs to offer value added services. Anuta NCX orchestrator bridges the multi-vendor legacy and SD-WAN infrastructure for a smoother transition. Join us live to learn about Anuta's SD-WAN and vCPE customer deployments at global Tier-1 MSPs.
  • Rapid7 AppSpider Product Demo Rapid7 AppSpider Product Demo Hollis Howell Recorded: Jan 19 2017 22 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • Zscaler: Cloud Security with SD-WAN, Case Studies and Best Practices Zscaler: Cloud Security with SD-WAN, Case Studies and Best Practices Sri Subramanian, Sr. Director of Product Management, Zscaler & David Klebanov, Director of Technical Marketing, Viptela Recorded: Jan 19 2017 47 mins
    Gartner estimates that by the end of 2019, 30% of enterprises will use SD-WAN technology in all their branches, up from less than 1% today. And as of Nov 2016, Gartner has estimated about 50,000 production SD-WAN deployments. SD-WAN is a transformational approach to simplifying branch office networking.

    However, security is a critical factor for SD-WAN adoption, especially for cloud and Internet applications. With Zscaler and Viptela you can now secure all Internet traffic without having to backhaul it to centralized DMZs. Customers have seen more than 50% WAN cost-savings while keeping their branch offices and employees protected.

    Join Viptela and Zscaler to discuss the best practices for securing your distributed enterprise with cloud security and SD-WAN. They will also cover:

    - Common use case scenarios for SD-WAN and cloud security
    - Real world deployment examples
    - Best practices for improving your security posture with cloud security
    - Zscaler and Viptela technical integration elements
  • General Dynamics IT: Integrating the Cloud into Your Security Program General Dynamics IT: Integrating the Cloud into Your Security Program Sallie Sweeney, Principal Cyber Solutions Architect, General Dynamics IT Recorded: Jan 19 2017 34 mins
    As more organizations migrate to the cloud, CISOs are faced with several challenges, such as: How do we securely migrate our mission-critical applications? What tools and methods are offered to secure our cloud? How will migrating to the cloud affect our overall security strategy? Learn how to effectively integrate the cloud into your security program and explore what role FedRAMP should play in your cloud security plan.
  • Intune and Mobile Application Management: Build your own custom apps with Intune Intune and Mobile Application Management: Build your own custom apps with Intune Paul Ungoed Recorded: Jan 19 2017 58 mins
    Our overview of Intune will include a review of different deployment options while we present sample architectures from business cases drawn from our consultants’ real world experience. Discover how you can use Intune to make your own in-house developed apps available to your employees on mobile, as opposed to using the pre-connected apps from Microsoft. We will explore Mobile Application Management through enterprise application deployment and other deployment considerations.
  • Best Practices for Securing your DNS against Advanced Malware Best Practices for Securing your DNS against Advanced Malware Chip Mesec, Product Manager and Sam Pierre, Product Marketing Manager, Hewlett Packard Enterprise Recorded: Jan 19 2017 44 mins
    The challenge with detecting malware is that it easily gets past traditional security solutions, placing your DNS infrastructure in harm’s way before you even notice it’s there. Hear how DNS operates and malware utilizes the DNS protocol to communicate with outside threats and exfiltrate data from an enterprise.

    This webinar is ideal for IT and security managers who have limited experience with DNS or malware but are interested in how threats use this often overlooked protocol.

    Viewers will learn:
    •Practical strategies to protect your enterprise from bad DNS traffic
    •Best practices for securing your DNS infrastructure
  • Exploring the Current State of Cybersecurity in the Legal Sector Exploring the Current State of Cybersecurity in the Legal Sector Jake Olcott, VP of Business Development at BitSight Technologies and Jay Jacobs, Sr. Data Scientist at BitSight Technologies Recorded: Jan 19 2017 45 mins
    Despite the fact that third party breaches have been on the rise, organizations may not be doing enough to manage the cybersecurity of all of their critical vendors. Law firms, in particular, are one of the most widely used third parties, yet the Legal sector may be getting overlooked in vendor security discussions.

    In fact, the latest BitSight Insights Industry Index report revealed that although companies in the Legal sector have high security ratings and low rates of vulnerabilities, the industry remains a key target for cyber criminals. Therefore, it’s crucial for organizations in this space to understand their cybersecurity posture and improve their vendor risk management techniques.

    Join Jake Olcott, VP at BitSight, and Jay Jacobs, Sr. Data Scientist at BitSight as they discuss data security in the Legal sector and beyond. In this webinar, you’ll learn:

    - How the cybersecurity posture of the Legal sector has changed over time
    - How the Legal sector stacks up against six other industries
    - The importance of cybersecurity in the Legal sector
  • Which CASB Deployment Mode is Right for Me? Which CASB Deployment Mode is Right for Me? Srini Gurrapu and Brandon Cook of Skyhigh Recorded: Jan 19 2017 56 mins
    When kicking off a cloud security project, you'll quickly discover that there are multiple deployment options for a cloud access security broker (CASB) – Log Collection, API, Reverse Proxy, and Forward Proxy – delivered via the cloud, on-premises, or hybrid - and with or without agents. But which CASB deployment mode is right for your organization? It depends on which use cases you need to support across which users and devices.

    In this webinar we’ll share an objective overview of the use cases each CASB deployment option supports. Just as importantly, we’ll detail which use cases each deployment mode does not support and provide case studies explaining how companies like Aetna, AstraZeneca and Western Union leveraged various deployment architectures to cover all their key use cases (visibility, compliance, data security, and threat protection) across O365, Salesforce, Box, and Shadow IT.

    Speakers:
    Srini Gurrapu – VP, Solutions Strategy
    Srini Gurrapu is the VP, Solutions Strategy at Skyhigh Networks, with 20 years of experience in networking, security, virtualization, mobile and cloud security markets. Srini's primary forte is building trusting advisory relationships with customers and delivering innovative solutions that make customers successful in their strategic initiatives.

    Brandon Cook – Sr. Director, Marketing, Skyhigh Networks
    Brandon leads the marketing team at Skyhigh Networks and has over a decade of experience in the tech industry identifying and developing new markets. As a regular contributor to the Cloud Security Alliance (CSA) events and blogs and author of the quarterly Cloud Adoption and Risk Report, he has expertise in “shadow IT”, cloud security, cloud governance, and cloud regulatory compliance.
  • Enabling AWS and Azure Migrations with SD-WAN Enabling AWS and Azure Migrations with SD-WAN Rob McBride, Solutions Marketing, Viptela & Ariful Huq, Product Management, Viptela Recorded: Jan 19 2017 49 mins
    Gartner has highlighted that the differences in network services (such as routing, security and application delivery) between internal data centers and IaaS environments cause major issues during cloud migrations. Networking teams face many challenges migrating their workloads to AWS and Azure. These include:

    - Extending secure connectivity from the enterprise to the cloud is operationally complex
    - Cloud traffic flows sub-optimally through the centralized data center/DMZ, instead of directly from the branch or from a regional exit - this affects performance of applications
    - Implementing a unified WAN policy on disparate pieces of cloud infrastructure is difficult

    This webinar will dig deeper into the networking problems of cloud migrations. And how Software-Defined WAN (SD-WAN) technology makes this faster and simpler the networking teams. The following topics will be covered:

    - Extend your WAN seamlessly to AWS and Azure
    - Implement a unified WAN policy across the enterprise and cloud
    - Typical deployment scenarios for AWS and Azure
    - Real customer examples of public cloud migration
  • I Heart Security: Developing Enterprise Security Programs for Millennials I Heart Security: Developing Enterprise Security Programs for Millennials Mary Jane Kelly, Security Consultant at NCC Group Recorded: Jan 19 2017 38 mins
    Open-minded, collaborative, and engaged, Millennials embrace values that can be effectively directed to reduce risk across an organization. While some may view the Millennial spirit as a security liability, with the right support, their views and priorities can actually help cultivate a stronger security mindset within their teams.

    In this talk, MJ Kelly explores how to develop security programs that resonate with Millennials. She presents practical approaches that incorporate deeply held priorities of the new generation, while ensuring that experienced team members remain included and engaged. Strategies include determining appropriate incentives, varying motivational focus, and testing new tactics such as gamification and novel information distribution channels to foster a strong security culture throughout the entire organization.
  • Preventing Threats in Modern Government Networks -Replacing Proxy Technology Preventing Threats in Modern Government Networks -Replacing Proxy Technology Pamela Warren, Director, Government & Industry Initiatives & Scott Brunstrom, Sr. Fed. Systems Engineer, Palo Alto Networks Recorded: Jan 19 2017 53 mins
    Proxy deployments today have outlived their usefulness and practicality with limited security functionality against today’s advanced threats. Today's security must consider new applications, access options and capabilities within our networks. This webinar provides insights on a next generation security approach to today's networks that considers the changing nature of our networks without compromising the protection of our data and the integrity of our networks.
  • Current State of Ransomware in State & Local Government Current State of Ransomware in State & Local Government Kevin Haley, Director of Product Management for Symantec Security Technology and Response Recorded: Jan 19 2017 58 mins
    Ransomware has become extremely popular with cyber criminals because it’s easy and very profitable. Organizations can defend themselves and lower the risk of ransomware or other common threats costing them time and money.

    Key Learning Objectives:

    - A look at the current state of ransomware

    - Simple and inexpensive steps that can advance state and local government security posture

    - Better understanding of the cyber security landscape

    - Best practices to take in cyber defense

    Join us for a review on simple ways, state and local government can protect themselves against ransomware attacks.

    Register for this free webinar today.
  • Doing the right thing: Privacy beyond GDPR Doing the right thing: Privacy beyond GDPR Jorge Carillo, President of the (ISC)² Czech Chapter, Adrian Davis, Managing Director, (ISC)² EMEA Jan 24 2017 12:00 pm UTC 60 mins
    With the large possibility amount of personal data availably, Data protection impact assessments are crucial to identify, understand and address any privacy issues that might arise when developing new products and services or undertaking any other new activities that involve the processing of personal data.

    The objective of this webinar is to provide a pragmatic approach to such type of assessments in the context of the GDPR and IoT.
  • Demanding More Out of Your SIEM - EMEA Demanding More Out of Your SIEM - EMEA Eric Sun Jan 24 2017 2:00 pm UTC 60 mins
    Security Information and Event Management (SIEM) tools have come a long way since their inception, but are they doing enough for your organization today?

    If you work with a SIEM, or are looking at purchasing one, check out this webcast that covers:

    Today's top challenges with SIEM tools
    Things to consider when expanding your deployment
    Why incident investigations are both challenging & tedious
    [Demo] How Rapid7 InsightIDR combines SIEM, UBA, and EDR to leave attackers with nowhere to hide
    If you're suffering from too many vague, un-prioritized incident alerts as well as ballooning data and deployment costs, you're not alone. Learn how organizations are accelerating insight from their mountains of operational data here.
  • Hortonworks Partner Demo Kit Hortonworks Partner Demo Kit Sean Roberts, Mark Lochbihler & Ajay Singh; Hortonworks Jan 24 2017 3:00 pm UTC 90 mins
    Demonstrate the capabilities of Hortonworks Connected Data Platform using the Partner Demo Kit. In this session, we will provide an overview of the Partner Demo Kit including:

    1) Cloud and On-Prem Setup
    2) IOT application to monitor and prevent traffic violations
    3) Data Science application to analyze earthquake patterns and predict its intensity
    4) Social Media monitoring to gain insight into trending topics and real-time discussions
  • Ataques de Inteligencia Artificial: Cómo Protegerse Usando 'Machine Learning' Ataques de Inteligencia Artificial: Cómo Protegerse Usando 'Machine Learning' Neil Goldfarb, Gerente Regional de Darktrace, y Victor Ibañez, Gerente del País de Cast Info Jan 24 2017 4:00 pm UTC 90 mins
    Los avances de inteligencia artificial siguen aumentando y estos avances nos están llevando a un desarrollo impresionante y peligroso en la tecnología de ciberataques, los cuales causan que las amenazas sean más rápidas y más sofisticadas. Desde el ransomware inteligente hasta malware sofisticadas y personalizadas que se integran a la red, los equipos de seguridad están luchando para seguir el ritmo de la nueva generación de amenazas.

    Dentro de la carrera de ciberarmas, una nueva estrategia es esencial para identificar y responder a los ataques de IA y a otros adversarios sutiles y avanzados. Durante el webinar, el Gerente Regional de Darktrace, Neil Goldfarb, y el Gerente Regional de CastInfo, Victor Ibañez, examinarán este desafío y explicarán por qué la ‘tecnología del sistema inmune’, propulsada por machine learning no-supervisado, será crítica en el futuro de la ciberdefensa.
  • Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM Platform Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM Platform Dave Shackleford, sr. sans analyst, and Seth Goldhammer, Director of Product Management Jan 24 2017 4:00 pm UTC 60 mins
    Enterprise-level security is no easy task. To detect, respond, and remediate advanced threats (and the vulnerabilities that cause them) security teams must get the most out of each security tool they use. For those with immense and complicated IT environments, your security intelligence platform should scale—incorporating cutting-edge security analytics to support everything from incident response case management and automated workflow. All of this should utilize automation to maximize the use of hunters and responders through more efficient searching, reporting, quantifying and visualization processes.

    In this webcast, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioral analytics, rapid forensic search and automated response.

    Learn about:

    • LogRhythm platform’s overall platform performance
    • LogRhythm 7’s streamlined administration capabilities for reduced operating costs
    • Accuracy of LogRhythm’s event prioritization
    • LogRhythm’s automation of security orchestration capabilities, with granular risk ratings and built-in case management
  • 2017 Trends in Cloud 2017 Trends in Cloud William Fellows, Founder and Research Vice President - Cloud and Melanie Posey, Research Vice President for VotE- Cloud Jan 24 2017 4:00 pm UTC 60 mins
    Digital transformation is a business imperative, not an option. Cloud is powering this change: It provides the new style of IT that supports the information, process and platform transformations required to link technology and information assets with marketing and customer experience to deliver new or enhanced digital processes.

    Join William Fellows, Founder and Research Vice President for Cloud, as he discusses what’s coming this year in cloud, and how the industry’s major battleground in 2017 will be how, from where and at what price cloud transformation services are delivered to customers.
  • Getting the Sec into DevSecOps Getting the Sec into DevSecOps Scott Crawford and Anna Chiang Jan 24 2017 5:00 pm UTC 60 mins
    Getting app development, DevOps and security teams all on the same page when it comes to implementing AppSec testing in development workflows is often a difficult task. Developers need to do frequent code releases to meet continuous integration (CI) process requirements. Adding security testing into this process is often met with resistance and poor adoption, unless it’s done correctly with the right security training, developer and CI tools integrations, and corporate security buy in by all involved.

    Join us as 451’s Scott Crawford and WhiteHat Security’s Anna Chiang discuss what’s needed to truly integrate security into a DevOps environment.
  • Advancing Business Performance: Align IT Vendor Risk to ERM Advancing Business Performance: Align IT Vendor Risk to ERM Scott Roller 3WP; Yo Delmar, MetricStream, Albert Biketi, HPE Security -Data Security, Riskonnect Jan 24 2017 6:00 pm UTC 60 mins
    Growing exposure to IT risks has made organizations across industries volatile. Recent IT vendor incidents like data and security beaches, violation of privacy guidelines, which caused substantial fines, penalties, brand value, highlight that IT vendor risks are business risks and require focus from the leadership. An immature ITVRM programs limits the insights which are necessary for strengthening vendor relationships and building a robust ERM program. Rather than treating each risk in isolation, organizations need to have an integrated approach to manage risks holistically and in line with their business operations and objectives. With the growing dependency on IT and IT vendors, organizations need to align enterprise and IT VRM objectives to build a resilient framework suitable for today’s environment.

    During the session, panelists will discuss how organizations can strengthen vendor management in the current landscape and improve business performance.

    - Causes of Vendor Risks incidents and the impact on the enterprise
    - Best approach to align IT vendor risk to enterprise risk
    - Building mature VRM Program
    - Role of technology in integrating Vendor risk to Enterprise risk management
  • Why you need to adopt an open architecture to secure your business Why you need to adopt an open architecture to secure your business Paul Brettle, ArcSight Architect, HPE Security Jan 24 2017 6:00 pm UTC 45 mins
    With more security threats than ever before, organizations are looking to new ways to secure, manage and monitor their environments. The cost and scope associated with this issue are huge. Security environments have traditionally been closed, sealed and ‘secured’ by nature; but as organizations look to solve problems, they are embracing the idea of adopting open standards and architectures.

    By embracing new, innovative and open standards, security organizations can look to solve complex problems in a modern new way. Explore how you can expand and grow your capabilities with simplicity, and more importantly in a predictable and cost-effective way.

    This webinar will cover the evolving approach to help you solve security issues with modern open architecture solutions. Using the right approach and the right technologies are important to addressing requirements of log data storage, analysis, analytics and advanced security monitoring. Learn why integration is key and where ArcSight comes in.
  • How to Prepare for Cyber Threats in 2017 How to Prepare for Cyber Threats in 2017 Patrick Wheeler Director,Threat Intelligence, Proofpoint Jan 24 2017 6:00 pm UTC 60 mins
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Patrick Wheeler, Proofpoint's Director of Threat Intelligence, for "How to Prepare for Cyber Threats in 2017" and learn:


    - What we predict for the threat landscape in 2017

    - Key actions you can take to prepare

    - What top resources will help support your security efforts
  • Assembling a Container Security Program Assembling a Container Security Program Securosis and Aqua Security Jan 24 2017 6:00 pm UTC 60 mins
    Webinar with Securosis: Containers are scaring security pros because of their lack of transparency. The burden of securing containers falls across Development, Operations, and Security teams — but these groups are not always certain how to tackle the issues.
    Join our webinar to:

    -Understand what are the primary threats to container environments
    -Learn how to set up a security program for virtual containers, from development to runtime
    -Hear why dynamic behavior detection should be part of your ongoing security monitoring
  • 2016 Malware Review and Top Threat Predictions for 2017 2016 Malware Review and Top Threat Predictions for 2017 Tyler Moffitt | Senior Threat Research Analyst Jan 24 2017 6:00 pm UTC 45 mins
    This presentation provides an overview of the threats against a wide range of organizations and individuals during 2016. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of top ransomware variants, details on the changes to exploit kits, phishing detection statistics, insights into file reputation and encounter rates with malware and new information on the IoT environment. All data presented comes from Webroot’s Intelligence Network and was observed during 2016. We will also be looking forward into 2017 and making our predictions regarding the evolving threat landscape.
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks Jan 24 2017 6:00 pm UTC 60 mins
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Demanding More Out of Your SIEM Demanding More Out of Your SIEM Eric Sun Jan 24 2017 7:00 pm UTC 60 mins
    Security Information and Event Management (SIEM) tools have come a long way since their inception, but are they doing enough for your organization today?

    If you work with a SIEM, or are looking at purchasing one, check out this webcast that covers:

    Today's top challenges with SIEM tools
    Things to consider when expanding your deployment
    Why incident investigations are both challenging & tedious
    [Demo] How Rapid7 InsightIDR combines SIEM, UBA, and EDR to leave attackers with nowhere to hide
    If you're suffering from too many vague, un-prioritized incident alerts as well as ballooning data and deployment costs, you're not alone. Learn how organizations are accelerating insight from their mountains of operational data here.
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Jan 25 2017 1:00 am UTC 60 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Demanding More Out of Your SIEM - APAC Demanding More Out of Your SIEM - APAC Eric Sun Jan 25 2017 3:00 am UTC 60 mins
    Security Information and Event Management (SIEM) tools have come a long way since their inception, but are they doing enough for your organization today?

    If you work with a SIEM, or are looking at purchasing one, check out this webcast that covers:

    Today's top challenges with SIEM tools
    Things to consider when expanding your deployment
    Why incident investigations are both challenging & tedious
    [Demo] How Rapid7 InsightIDR combines SIEM, UBA, and EDR to leave attackers with nowhere to hide
    If you're suffering from too many vague, un-prioritized incident alerts as well as ballooning data and deployment costs, you're not alone. Learn how organizations are accelerating insight from their mountains of operational data here.
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Jan 25 2017 9:00 am UTC 60 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • 7 Questions To Consider When Looking For An Effective Endpoint Solution 7 Questions To Consider When Looking For An Effective Endpoint Solution Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc. Jan 25 2017 2:00 pm UTC 45 mins
    The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
  • Preparing for a 1Tbps DDoS attack with Cogeco Peer 1 and Zenedge Preparing for a 1Tbps DDoS attack with Cogeco Peer 1 and Zenedge Nelson Chen Jan 25 2017 2:00 pm UTC 30 mins
    Join Cogeco Peer 1 and our partners ZENEDGE for a 30 minute webinar on DDoS attacks and how to protect yourself against them.
  • Pay TV, Video on Demand, and IPTV Growth Opportunities in Africa Pay TV, Video on Demand, and IPTV Growth Opportunities in Africa Deepti Dhinakaran, Naila Govan-Vassen and Oluchi Enuha, General Manager, iROKOX Jan 25 2017 2:00 pm UTC 60 mins
    The pay TV, VOD, and IPTV market is still evolving in terms of content and pricing models, but the demographics of Africa and its large population are highly attractive to existing and new market participants. Internet penetration, supplemented by a significant uptake in smartphone adoption, has altered the manner in which Africa consumes video content. This growth will be further augmented by the availability of cheaper DTT services, data-saving video consumption options, and attractively packaged triple-play services. It is critical for market participants to gauge market trends, price sensitivity and growth opportunities while offering their services. Along with pricing and richness of content, strategic partnerships will play a key role in defining the market leader in the next five years.
  • Ready for GDPR? Learn about challenges and ways to comply Ready for GDPR? Learn about challenges and ways to comply CEO Richard Hibbert & Head of Products, Oliver Vistisen Jan 25 2017 3:00 pm UTC 45 mins
    The GDPR comes into force 25 May 2018 and this will have a significant impact on the way in which organisations collect, process and share data. Companies that fail to prepare for the GDPR risk incurring hefty fines of 20m euros or 4% of world-wide revenues, whichever is greatest. As such all organisations need a strategy for GDPR. By implementing a structured approach through the use of cloud-based applications, organisations will be able to effectively achieve and maintain compliance.

    In this webinar we will: explore the key provisions of GDPR, examine the challenges organisations are facing with the new rules, provide guidance for Risk Managers, Compliance Leaders and other IT Professionals on how to approach these challenges, then demonstrate how our cloud-based GDPR Applications Suite can provide effective solutions that ensure your business can achieve and maintain compliance