Hi [[ session.user.profile.firstName ]]

IT Security

  • GDPR: Responding to a Breach
    GDPR: Responding to a Breach Ray Ford, Ian West, Mark Rasch, David Morris Live 90 mins
    When a Breach occurs, what are the best practices to comply with the GDPR's notification requirements. This session will cover:
    Breach Notification rules
    Who, what and when to notify?
  • Is Threat-Centric Security Running so Fast just to Stand Still?
    Is Threat-Centric Security Running so Fast just to Stand Still? Antti Reijonen, Dr. Richard Ford & David Coffey Live 45 mins
    A traditional threat-centric approach focuses on prevention and detection of attacks that exploit vulnerabilities in the software. The cloud environment abolishes the “walls” that helped us feel more protected. Cloud application security requires a new user-centric approach that respects the dynamic nature of users and how they interact with data, enabling organizations to recognize and respond to real risks.

    You will learn:

    * How user-centric security is different than traditional threat-centric security
    * How organizations can make the transition to user-centric security
    * Forcepoint’s vision for securing the organization in the future

    Presented by:
    * Antti Reijonen, VP of Cloud Solutions, Forcepoint
    * Dr. Richard Ford, Chief Scientist, Forcepoint
    * David Coffey, VP of Cloud Security R&D, Forcepoint
  • Mobile App Reverse Engineering is easier than you think: Arxan AppSec Series 2/3
    Mobile App Reverse Engineering is easier than you think: Arxan AppSec Series 2/3 Chris Stahly, Arxan Senior Security Architect | Deborah Clark McGinn, Arxan VP of Marketing Live 60 mins
    Everyone knows that high-value mobile applications like banking or payment apps can be the gateway to a treasure trove of sensitive information. What most organizations may not understand, however, is just how easy it is to reverse engineer applications after they’ve been deployed to an app store, using freely available tools. In part two of our application security series, Arxan Senior Security Architect Chris Stahly will demonstrate how easily an attacker can gain access to IP, customer data, and even encryption keys if a high-value app is not properly protected. We’ll discuss ways to improve mobile app security, reduce threat response times and minimize the impact of an attack using real-time threat intelligence.
  • LIVE Cyber Attack Simulation: A Crypto Crime in Action
    LIVE Cyber Attack Simulation: A Crypto Crime in Action Hank Schless and Christian Lappin from Threat Stack Live 60 mins
    Crypto mining and cyber crime are at the top of the list for headline-grabbing attacks. Want to see how it’s actually done?

    The reality of what happens on a day-to-day basis is the breakdown of people and process. Join us on May 23rd for a live simulation of hackers bypassing security controls and executing a crypto mining attack. Watch how a security engineer is able to quickly identify the attack, and then learn the tips you can take home to improve your own security posture.
  • Advancing Healthcare Cybersecurity | Epic Hyperspace Security Monitoring
    Advancing Healthcare Cybersecurity | Epic Hyperspace Security Monitoring Julian Crowley and Vaughn Adams Live 90 mins
    The health care industry is increasingly threatened and the target of cyber attacks as the value of their patient records, infrastructure and services grow. With an expanding attack surface due to cloud infrastructure, it's critical the health care industry continues to mature its security capabilities for it's most valuable data and apps.

    Epic Systems is a market leading Electronic Health Records (EHR) vendor widely used by large hospitals and health systems to access, organize, store and share patient medical records. Given the volume and sensitivity of personal data on Epic platforms, it’s critical to ensure threats to patient privacy are detected and mitigated quickly.

    In this webinar, learn how organizations in health care are using LogRhythm’s Epic Hyperspace App combined with traditional security data to provide greater value and network visibility. Members of LogRhythm’s Strategic Integration team and Health Care Sales Engineering team will show you how LogRhythm’s Epic Hyperspace App provides a focused point solution for real time visibility, as well as detection of suspicious activity within an Epic deployment. See how this app provides:

    · Real-time visibility (including alarms and reports) into:
    · Inappropriate access or access attempts to patient medical records
    · Inappropriate attempts to record or download patient medical records
    · Users and systems trying to access the EHR
    · Context of the user who is accessing the patient records
    · Logic or reasoning behind the attempted access to medical records

    If you have Epic and LogRhythm, this is a must-see webinar. If you use another EHR, use the information from this webinar as a template on how and why to monitor your EHR platform.

    Speakers:
    Julian Crowley, Strategic Integration Engineer | Vaughn Adams, Enterprise Sales Engineer
  • Finding Out Your Cybersecurity Posture Doesn’t Take a Genius
    Finding Out Your Cybersecurity Posture Doesn’t Take a Genius Mukul Kumar, CISO & VP of Cyber Practice Live 45 mins
    3.5 million unfilled security jobs in the coming years coupled with increasingly sophisticated attacks doesn’t paint a pretty picture. As Cisco’s SVP security said at RSA this year, ‘we are completely screwed.’ But we don’t have to be, and you don’t have to be a genius either!

    Join us, as we share results of recent surveys from ESG, Cybersecurity Insiders, and Cavirin that look at key concerns when migrating to the hybrid cloud, things like DevSecOps, container monitoring, and continuous compliance.

    We will then provide you a sneak peek into Cavirin’s CyberPosture Intelligence and its simplicity which provides you with a real-time view across your hybrid cloud, both account security posture as well as workload continuous compliance. One button assessments and immediate comparisons to your desired ‘golden posture’ help you maintain control without hiring more security experts.
  • Accelerating Incident Response with Intelligence-Driven Security Orchestration
    Accelerating Incident Response with Intelligence-Driven Security Orchestration Al Cooley,Director Product Mgmt, Symantec / Meny Har, VP Product, Siemplify / Nimmy Reichenberg, CMO, Siemplify Live 45 mins
    Security operations teams are modern-day detectives, combing through clues to thwart cyberthreats. But the deluge of alerts from disparate technologies, manual processes and multiple consoles often hinder teams from building the story they need to respond to truly malicious activity.

    Join Symantec and Siemplify on Wedensday, May 23, to see how intelligence-driven orchestration helps SOCs overcome these challenges by enabling deeper, higher quality investigations and expediting incident response.

    During this session you’ll learn:

    - The vital role context plays in security operations and how it powers incident investigation and response

    - How threat intelligence and security orchestration provide deeper insights to streamline alert validation, incident prioritization and response

    - How Siemplify and Symantec DeepSight Intelligence integrate, drive a standardized workflow and improve security incident response

    Register Today
  • GDPR is Here! Now What?
    GDPR is Here! Now What? Theresa Abbamondi (Arbor Cloud & Services, NETSCOUT) & Azar Khansari Silver (NETSCOUT) Recorded: May 23 2018 22 mins
    The General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. While GDPR is a regulation enacted by the European Union, if your company has global operations or reaches a worldwide audience, your company is also likely subject to GDPR. This session will help you build your GDPR preparation checklist based on the key elements of a GDPR compliance program for companies based outside the EU, explain GDPR provisions most relevant to the use of security solutions, and discuss questions you should be asking your security team and service providers to understand the features available within your solutions to help you comply with GDPR.

    Speakers:
    - Theresa Abbamondi, Director, Product Management, Arbor Cloud & Services, NETSCOUT
    - Azar Khansari Silver, Associate General Counsel, NETSCOUT
  • Accudata + Forcepoint Security Series | Risk-Adaptive Protection
    Accudata + Forcepoint Security Series | Risk-Adaptive Protection Bharath Vasudevan, Senior Director Recorded: May 23 2018 30 mins
    What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. Join our webinar to learn how risk-adaptive protection is helping organizations:

    - Continually improve security effectiveness through machine learning and AI
    - Better understand risky behavior
    - Automate policies
    - Dramatically reduce the quantity of alerts
    - Streamline and accelerate investigation of those alerts

    Tune in May 23!
  • Transform IT with Storage and Data Protection to deliver maximum ROI
    Transform IT with Storage and Data Protection to deliver maximum ROI Steve Spataro, Garret Van Siclen Recorded: May 23 2018 60 mins
    If your information infrastructure is not robust and flexible, then business agility is reduced, managing applications is time consuming, and total cost of ownership is higher than necessary. Learn how Dell EMC’s storage and data protection solutions help organizations like yours by leveraging an information infrastructure that is designed for change and delivers both high performance and high availability.
  • Chief Information Office and Chief Marketing Officer: A Technology Partnership
    Chief Information Office and Chief Marketing Officer: A Technology Partnership Praveen Asthana & Meerah Rajavel Recorded: May 23 2018 19 mins
    The typical Enterprise CMO is driving a comprehensive marketing technology stack often including more than 90 marketing cloud applications. Lead data, analytics and processes must flow quickly, integrate, and results must be available immediately – around the globe. At the same time, customer and prospect data must be secured from increasingly sophisticated attacks while complying with privacy laws. A strong partnership between the CMO and CIO is critical to keep everything in sync, securely, to keep revenues growing.

    You will learn:

    * What are the cornerstones of a productive partnership between the CIO and CMO?
    * What is the right balance between innovation and security?
    * How can the CIO ensure compliance before new cloud apps are deployed?

    Presented by:
    * Praveen Asthana, CMO, Forcepoint
    * Meerah Rajavel, CIO, Forcepoint
  • Remediation & Mitigation: How To Find The Best Fix Location
    Remediation & Mitigation: How To Find The Best Fix Location Glenn Whittemore, CA Veracode Solutions Architect Recorded: May 23 2018 16 mins
    Learn how you can fix more than 2.5x the average number of application flaws.

    As you embark on the mission to tackle the flaws and vulnerabilities found after scanning, you need to prioritize and optimize your approach. You know you cannot let potential system flaws or weaknesses in your application be exploited to compromise the security of your organization’s most critical assets.

    Join this 20-minute webinar to see how Veracode can help you prioritize and find the best location in which to fix and remove the vulnerabilities and flaws that can put your organization at risk. Recognized as a Gartner Magic Quadrant Leader since 2010, Veracode provides on-demand application vulnerability testing to detect and offer solutions for vulnerabilities and other security issues.
  • Building Out your B2C Cloud in a Way that Scales
    Building Out your B2C Cloud in a Way that Scales Jerry Combs, Principal Architect, Pointblue Technology and Kent Purdy, Micro Focus Recorded: May 23 2018 42 mins
    Implementing an access management system that provides services to the public presents many challenges that are not found in typical enterprise implementations. Chief among these are issues of scale as public facing systems typically serve many thousands or even millions of end users. Business-to-Consumer (B2C) and Government-to-Citizen (G2C) systems require processes, tools, and methodologies that allow a high degree of automation and self-service. Manual administration of such large numbers of user identities is simply not practical.

    In this webinar we will describe the challenges typical of public facing access management systems and an approach to solving them.
  • Cisco ASA to Firepower Migration: A Simplified Solution
    Cisco ASA to Firepower Migration: A Simplified Solution Joe Schreiber, Technical Director, Business Development, Tufin and Dan Rheault Sr. Product Marketing Manager, Tufin Recorded: May 23 2018 24 mins
    Are you a Cisco ASA customer eager to migrate to Firepower next generation policy?
    You are not alone!
    Join this webinar on May 23 at 11am EDT/4pm BST to learn about a migration solution that leverages policy optimization and automation for the most efficient adoption of Cisco Firepower. The solution is based on Tufin proprietary technology and on a longstanding relationship with Cisco. Tufin policy search and analysis capabilities simplify policy browsing and selection, while an API-to-API integration streamlines the selected policy migration from ASA to Firepower.

    Don’t miss this session presented by Dan Rheault, Product Marketing and Joe Schreiber, Technical Business Development, as they uncover the added value of Tufin automated migration solution:
    •Optimize rule sets prior to migration
    •Align rule sets to Firepower Access Control Groups
    •Ensure the most efficient migration process with automation
  • The Black Report
    The Black Report Chris Pogue, Head of Services, Security and Partner Integration Recorded: May 23 2018 44 mins
    The second edition of The Nuix Black Report has been released including new insights and information on the source of the threat, the attackers and penetration testers themselves. Join Chris Pogue, Head of Services, Security and Partner Integration, discuss the true nexus between attacker methodology and defensive posture in this live webinar.

    You will gain a deeper understanding of the nexus between attacker methodology and defensive posture, including

    1. Which security programs and countermeasures will improve your security posture? They’re not the ones you think
    2. What’s the best spend for your security dollar and why?
    3. If hackers could speak to your organization’s leaders, what would they say?
  • Cryptocurrencies: Trends and Threats
    Cryptocurrencies: Trends and Threats David Grout, Technical Director for Southern Europe, FireEye Recorded: May 23 2018 49 mins
    Cyber criminals have always been attracted to cryptocurrencies, which provide a certain level of anonymity and can be easily monetised. In recent years, criminals have gone beyond using cryptocurrencies as a payment method for illicit tools and services. Seeing their value and growing popularity, many actors are targeting cryptocurrency operations and exchanges with attacks such as malicious cryptocurrency mining, collection of cryptocurrency wallet credentials and extortion.

    Join your host David Grout, Technical Director for Southern Europe, for a 45-minute webinar to discuss the latest cryptocurrency threats and trends.
  • [Panel] GDPR & Cyber Security
    [Panel] GDPR & Cyber Security Julian Saunders (PORT.im) | Bob Honour (SonicWALL) | Raef Meeuwisse (ISACA) Recorded: May 23 2018 60 mins
    The General Data Protection Regulation (GDPR) is a key legislation going into effect in May that it will affect all organizations that handle, store or pass through data of EU citizens.

    Join this panel of Governance, Risk, Compliance and Security experts for an interactive Q&A as they discuss the importance of being GDPR-compliant:
    - What GDPR means for cyber security
    - GDPR requirements around data collection and governance, exposure and breach disclosure
    - Evaluating your cyber risk
    - Recommendations for achieving compliance post-deadline day
    - Other regulation on the horizon

    Speakers:
    - Julian Saunders, CEO, PORT.im
    - Bob Honour, EMEA Marketing Director, SonicWALL
    - Raef Meeuwisse, CISM, CISA, ISACA Governance Expert & Author “Cybersecurity for Beginners”
  • [APAC Breach Prevention Week] Driving Innovations in Securing the Public Cloud
    [APAC Breach Prevention Week] Driving Innovations in Securing the Public Cloud Anuj Sawani, Product Marketing Manager Recorded: May 23 2018 48 mins
    Organizations are rapidly adopting the public cloud to keep pace with growing business demands. Risk management is a top concern, as legacy security tools and techniques designed for the traditional datacenter cannot adapt to the continuous deployment model in the cloud. The tools for securing public cloud services infrastructure are manual and fragmented, making operations time-consuming and error-prone. Security, DevOps, and compliance teams need a frictionless approach to securing public cloud workloads.

    In this session, learn about recent Palo Alto Networks innovations that are changing how organizations secure the public cloud. We will cover:

    •Understand the several options available today to secure the public cloud
    •Build a strategy to manage and reduce your public cloud risks
    •Deploy security with a frictionless approach in a multi-cloud environment
  • Der Stichtag. Die DS-GVO Umsetzung fängt jetzt erst richtig an.
    Der Stichtag. Die DS-GVO Umsetzung fängt jetzt erst richtig an. Thomas Hemker and Alexander Peters Recorded: May 23 2018 55 mins
    Die DSGVO ist da! Wenn Sie jetzt nicht vorbereitet sind, kann Sie das teuer zu stehen kommen.

    Am 25. Mai endet der Countdown für die DSGVO-Umsetzung. Ab dann gelten neue gesetzliche Bestimmungen zum Schutz sensibler Kundendaten – und zwar für alle Unternehmen, die personenbezogene Daten von EU-Bürgern verarbeiten, speichern oder weitergeben, unabhängig davon, ob ihr Sitz in oder außerhalb der EU liegt. Die DSGVO definiert strenge Regeln für den Umgang mit kritischen Daten, und es ist alles andere als einfach, Compliance sicherzustellen. Hinzu kommt, dass die Bestimmungen sofort in Kraft treten – und bei Verstößen hohe Bußgelder drohen.

    Sprechen Sie mit den Symantec-Experten!
    •Erfahren Sie, was die DSGVO für Sie bedeutet – und was Sie bei einem Angriff tun müssen
    •Wir helfen Ihnen, Risiken richtig einzuschätzen, und geben Ihnen Tipps für die Zeit nach der Einführung.
    •Was kommt noch auf Sie zu? Alles über die anstehenden gesetzlichen Neuerungen
    •Bleiben Sie durchgehend auf dem Laufenden
  • [APAC Breach Prevention Week] Driving Innovations in Securing the Public Cloud
    [APAC Breach Prevention Week] Driving Innovations in Securing the Public Cloud Anuj Sawani, Product Marketing Manager Recorded: May 23 2018 47 mins
    Organizations are rapidly adopting the public cloud to keep pace with growing business demands. Risk management is a top concern, as legacy security tools and techniques designed for the traditional datacenter cannot adapt to the continuous deployment model in the cloud. The tools for securing public cloud services infrastructure are manual and fragmented, making operations time-consuming and error-prone. Security, DevOps, and compliance teams need a frictionless approach to securing public cloud workloads.

    In this session, learn about recent Palo Alto Networks innovations that are changing how organizations secure the public cloud. We will cover:

    •Understand the several options available today to secure the public cloud
    •Build a strategy to manage and reduce your public cloud risks
    •Deploy security with a frictionless approach in a multi-cloud environment
  • Hunting Rogue Elements: Fighting the Insider Threat
    Hunting Rogue Elements: Fighting the Insider Threat Kevin Eley, LogRhythm & Jonathan Zulberg, LogRhythm Recorded: May 23 2018 43 mins
    Customer data falling into the hands of cybercriminals. It’s the stuff of nightmares for any organisation. Today the insider threat has the potential to pose a bigger risk to cybersecurity than external hackers.

    In this webinar, LogRhythm experts will take you through a real use case in which data worth millions of pounds was stolen. And they will explain how the incident could have been stopped with the right response and mitigation approach.

    Join the webinar to:

    • Learn how cybercrime has evolved so much that insider threats now rival external threats
    • See a live display of activity generated by an insider threat
    • Discover cybersecurity innovations that can detect and respond to insider threats in real time

    Join us to get a better understanding of the insider threat – and how to combat rogue elements in your organisation.
  • GDPR: Achieving Compliance and Secure Authentication with 2FA & Customer IAM
    GDPR: Achieving Compliance and Secure Authentication with 2FA & Customer IAM Alex Yakubov (Yubico), Jesper Johansson (Yubico), Baber Amin (Ping Identity) Recorded: May 22 2018 31 mins
    The General Data Protection Regulation (GDPR) comes into effect May 25, 2018, and it impacts organizations throughout the world who sell, market to, and even collect any personal data of EU citizens. It has far reaching operational and IT impacts. Critical to GDPR compliance are security, data-access governance, and transparency in the collection and use of personal data for EU citizens, including use-based consent, self-service personal data management, and data encryption in every state (at rest, in motion, in use).

    As organizations look for efficient ways to check the compliance boxes, article by article, it is important to note that compliance is only a step towards strengthening your engagement with customers and preserving their data privacy.

    One of the key components for GDPR compliance is the need for strong authentication and identity management. Join this webinar to learn about the Secure Authentication requirements of GDPR, how to meet those requirements, and strengthen security at the same time.

    In this webinar, Yubico and Ping Identity will discuss:
    ● How Customer Identity and Access Management (Customer IAM) solutions provide key capabilities that help meet GDPR requirements ‘out of the box’
    ● Architectural best practices of Customer IAM that make compliance more cost effective and efficient
    ● How organizations can turn the GDPR compliance challenge into an opportunity by providing a single, unified view of the customer, building trust, and enabling secure, seamless and personalized customer engagement

    Moderator:
    Alex Yakubov, Senior Director - Ecosystem (Yubico)

    Speakers:
    Jesper Johansson, Chief Security Architect (Yubico)
    Baber Amin, Market Leader, Cloud Security Services (Ping Identity)
  • Get Started Fast: How to Create Reserved Instance Purchases
    Get Started Fast: How to Create Reserved Instance Purchases Kevin Buschle, CloudCheckr Support May 23 2018 6:00 pm UTC 30 mins
    Thank you for watching our Get Started Fast with CloudCheckr series.

    CloudCheckr Support Expert Kevin Buschle takes the reigns on this live demo to show you everything you need to know about Reserved Instances (RIs). Watch Kevin walk through lifecycle tracking and notifications, purchasing on the AWS console, checking advanced reports, and optimization techniques.

    You will learn:
    - The purpose of an RI
    - Benefits of having RIs
    - Fees and costs related to different purchasing options

    Be sure to ask Kevin questions along the way, and feel free to offer up feedback at the end.
  • How a Security Company Secures its Own Cloud
    How a Security Company Secures its Own Cloud Meerah Rajavel & Dr. Richard Ford May 23 2018 6:00 pm UTC 45 mins
    Driving Office 365 adoption is an important goal—87% of IT professionals say it’s a top priority -- yet, few have fully migrated their users and apps, with security, regulatory and resource challenges often the cause. Security companies too, face these same fundamental challenges. As a recent Office 365 adopter, Forcepoint has first-hand experience securely migrating users to the cloud.

    Join Forcepoint’s CIO and Chief Scientist as they share learnings, surprises and insights from our own migration.

    Presented by;
    * Meerah Rajavel, CIO, Forcepoint
    * Dr. Richard Ford, Chief Scientist, Forcepoint
  • Ransomware:  The Not So Good, Really Bad and Truly Ugly!
    Ransomware:  The Not So Good, Really Bad and Truly Ugly! Erich Kron CISSP, Security Awareness Advocate May 23 2018 7:00 pm UTC 60 mins
    Ransomware is spreading at an alarming pace and infecting networks across all industries and company sizes, primarily through phishing attacks. The cyber criminals behind the attacks are furiously innovating and keeping ahead of the defenses. In this session, we will have an interactive discussion related to the latest in ransomware threats and how to best protect your organization and yourself against this growing threat.
     
    This session will educate attendees about the newest features of ransomware strains designed to evade detection and spread in new and creative ways. It will also discuss recent attacks and how the organizations could have better protected themselves.
     
    The session will examine:
     
    •         Current phishing trends
    •         Ransomware and how it is infecting networks
    •         Effective mitigation strategies
    •         Recovering from an attack
  • The Top 5 Security Lessons Learned from Transitioning to the Cloud
    The Top 5 Security Lessons Learned from Transitioning to the Cloud Carla Arend, Arun Singh, Nico Fischbach May 23 2018 7:00 pm UTC 60 mins
    Join IDC Senior Program Director for Cloud, Carla Arend, Salesforce Director for Security Customer Engagement, Arun Singh and Forcepoint Global CTO, Nico Fischbach for a discussion on security and a cloud-first strategy.

    This 50-minute webinar addresses the top five information security lessons IT professionals have learned while transitioning to the cloud.

    The topics covered include:
    * Multi-cloud adoption: exposing challenges for security architectures
    * Cloud application visibility and control
    * Cloud-first and GDPR implications
    * Data management and DLP in the cloud
    * Leveraging User and Entity Behavior Analytics (UEBA) for protection"
  • Subject Access Rights: GDPR Implementation Guide
    Subject Access Rights: GDPR Implementation Guide Brian Philbrook, Privacy Counsel at OneTrust | Dr Andreas Splittgerber, Partner, Reed Smith May 23 2018 8:00 pm UTC 75 mins
    The GDPR grants data subjects new rights including: data portability, access to their data, erasure or “the right to be forgotten”, and rectification. For data controllers, there are specific record-keeping requirements around the time to respond, the ability to request an extension, the requirement to validate the identity, and securely transmitting the response to the individual.

    Join us for this educational web conference to hear about the new rights of data subjects and how organizations can use privacy management software to streamline and automate requests, validation, and notification processes.

    About the presenters:

    Brian Philbrook serves as Privacy Counsel at OneTrust where he provides guidance on global privacy regulations to assist compliance efforts and drive product innovation. Philbrook also conducts training and workshops on the GDPR and contributes to various publications and web-conferences on a regular basis. Prior to OneTrust, Philbrook served on the Privacy Team for RxAnte, a leading predictive analytics and clinical services company committed to improving medication use. He also worked as an extern on the IAPP’s training and publications teams. Philbrook earned his JD from the University of Maine School of Law, where he was the first recipient of the Certificate in Information Privacy Law.

    Dr Andreas Splittgerber is a partner in the Munich office of Reed Smith and member of the IP, Tech & Data Group.

    Andreas specialises in IT law, data protection/privacy, social media law and internet law (Germany and EU). He is passionate about technology and privacy and thought-leader when it comes to legally evaluating new technologies (e.g. internet of things, artificial intelligence).
  • Maximize your Office 365 Investment with Forcepoint
    Maximize your Office 365 Investment with Forcepoint Mike Smart, Product & Solutions Director, Forcepoint May 23 2018 8:30 pm UTC 60 mins
    Driving Office 365 adoption is an important goal - 87% of IT professionals say it's a top priority. Yet few have fully migrated their users and apps due to concerns around security, compliance and poor user experience caused by network architecture limitations and constraints.

    Forcepoint's Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite.

    * Enhance Microsoft's integrated cloud security and regain visibility & protection against advanced attacks and data loss
    * Extend compliance consistently into the Microsoft ecosystem and beyond
    * Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk
    * Have the right network architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud

    Join us as we explore these use cases and demonstrate how Forcepoint protects Office 365 and your expanding cloud environment.
  • Cybersecurity Trends & Impacts in 2018 and Beyond
    Cybersecurity Trends & Impacts in 2018 and Beyond Dan Waddell, President, ISC-2 Northern Virginia Chapter May 23 2018 9:00 pm UTC 45 mins
    Join this expert panel as they discuss their thoughts and predictions for the remainder of 2018 and beyond about how the cybersecurity arena is impacting, and is impacted by, human and workforce behavior, machine learning, threats and procedures, software assurance, supply chain risk, and more.

    The panel will consist of the Board of Directors of the Northern Virginia Chartering Chapter of (ISC)2, including:
    * Dan Waddell, President, NoVA (ISC)2 and Senior VP at Zeneth Technology Partners
    * Ed Covert, Lead Enterprise Security Architect, Deutsche Bank
    * Joe Jarzonbek, Director for Government, Aerospace & Defense Programs at Synopsys, Inc.
    * David Rubal, Sr. Account Executive, DoD Modern Infrastructure, Dell Technologies
  • M-Trends 2018: セキュリティ最新動向ウェブセミナー
    M-Trends 2018: セキュリティ最新動向ウェブセミナー FireEye Japan May 24 2018 2:00 am UTC 45 mins
    ファイア・アイのコンサルティング部門Mandiantチームでは、最新のセキュリティ動向を毎年「M-Trendsレポート」としてまとめています。このレポートは、Mandiantチームが実際に実施したインシデント対応調査データに基づいており様々な示唆に富んだ内容を含みます。企業や組織のセキュリティ部門やIT部門の方が、今後セキュリティ対策の強化に向けてどのような点を考慮し注目するべきかのヒントとして、お役立ていただけます。
    このウェブセミナーでは、M-Trends 2018レポートのキーポイントを解説いたします。ぜひご参加いただき、今後のセキュリティ対策にお役立てください。

    ■主なトピック
    ・発生から検知までに要した日数
    ・新たに命名されたAPT攻撃グループ
    ・攻撃対象となる業種のトレンド
    ・見えないリスク

    本ウェブセミナーへのお問い合わせは、japan@fireeye.comまでお願いいたします。
  • [APAC Breach Prevention Week] Best Practices for Effective Endpoint Security
    [APAC Breach Prevention Week] Best Practices for Effective Endpoint Security Joel Boyd, Sr. Product Marketing Manager May 24 2018 2:00 am UTC 75 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • DriveLock Managed Endpoint Protection aus der Cloud
    DriveLock Managed Endpoint Protection aus der Cloud Martin Mangold, DriveLock Head of SaaS Operations May 24 2018 9:00 am UTC 60 mins
    Herausforderungen moderner IT-Sicherheit - Es ist nicht damit getan, eine Security-Lösung anzuschaffen und zu installieren. Vielmehr muss eine solche Lösung regelmäßig an die aktuelle Bedrohungssituation und die jeweiligen Business-Bedürfnisse angepasst werden.
    Die Lösung - Managed Endpoint Protection von DriveLock
    Eine Ready2go-Sicherheitslösung, die keine eigene Server-Infrastruktur benötigt, erfordert nur niedrige Investitionskosten.
  • [APAC Breach Prevention Week] Best Practices for Effective Endpoint Security
    [APAC Breach Prevention Week] Best Practices for Effective Endpoint Security Joel Boyd, Sr. Product Marketing Manager May 24 2018 9:00 am UTC 75 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • Public Cloud is Here - Use it Wisely! Hybrid Cloud Strategy Lessons Learned
    Public Cloud is Here - Use it Wisely! Hybrid Cloud Strategy Lessons Learned Gordon Haff, Red Hat and Lauren Nelson, principal analyst serving infrastructure & operations professionals, Forrester May 24 2018 9:00 am UTC 75 mins
    For many firms, the migration to public cloud is well underway. Understanding what motivates these migrators and the challenges they face along the way can help you in your own journey.

    Join this webinar for a rare look into an emerging group and a glimpse into the future of public cloud. You'll hear about the results of a Forrester Consulting study, commissioned by Red Hat, that looks at these aspects of firms migrating to the cloud:

    > Their motivations and challenges.
    > The strategies they're adopting for migration.
    > What cloud migration in practice looks like.
  • Llegó el día del RGPD: Si no está preparado, le podría salir caro
    Llegó el día del RGPD: Si no está preparado, le podría salir caro Ramses Gallego, Giampiero Nanni May 24 2018 9:00 am UTC 60 mins
    El 25 de mayo es la fecha clave de los datos. El plazo límite del RGPD lo va a cambiar todo en lo que se refiere a la protección de los datos de los clientes y afectará a aquellas empresas que gestionen, almacenen o trasfieran datos de ciudadanos europeos dentro y fuera de la Unión Europea. Se trata de una medida gigantesca con unos requisitos de cumplimiento muy completos y extensos. Además, a medida que entra en vigor, inevitablemente habrá atascos, desafíos legales y logísticos, así como duras penalizaciones en caso de incumplimiento.

    Únase a Symantec antes de la fecha clave de los datos para:
    •Comprender los requisitos del RGPD en cuanto a cumplimiento, exposición y fugas.
    •Evaluar sus riesgos y obtener recomendaciones posteriores a la fecha clave de los datos.
    •Saber qué desafíos se avecinan. Entérese sobre los reglamentos de implementación pronta e inmediata.
    •Mantenerse actualizado con relación a los últimos desarrollos.
    Inscríbase ahora
  • Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks
    Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst May 24 2018 9:00 am UTC 45 mins
    ‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    During the webinar, we’ll cover:
    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    most.
    -- How bad actors are using cloud services to their benefit
    -- Live Q&A with the speakers
  • People-Centric Information Security Best Practices
    People-Centric Information Security Best Practices Josh Green, Solutions Engineer - Duo Security May 24 2018 10:00 am UTC 45 mins
    In a survey of 722 IT leaders by CIO Magazine, four out of five respondents were concerned about shadow IT projects lacking proper IT oversight in their organizations*. This concern is justified -- when users create "shadow IT" workarounds or avoid security processes altogether, it can leave organizations at risk.

    Security teams are learning that when you account for the human element, you can develop policies that users actually want to adopt. Join us for a discussion on how you can build a strong security culture by learning from user behavior research, and employing concepts like gamification to collaborate with your users.
  • GDPR: An Evolution, Not a Revolution
    GDPR: An Evolution, Not a Revolution Nicola Howell, Senior Compliance & Privacy Attorney at Dun & Bradstreet May 24 2018 11:00 am UTC 45 mins
    Feel prepared, not panicked, with our GDPR “need-to-knows” and tips for staying compliant beyond 25th May.

    Join our interactive session (part of the BrightTALK GDPR Deadline Day & Beyond Summit), to hear Nicola Howell, Senior Compliance & Privacy Attorney at Dun & Bradstreet, and Tash Whitaker, Head of Compliance at Moorcrofts LLP lead discussion on the following key topics:

    • Why the GDPR should be treated as an evolution, not a revolution, of current data protection laws

    • The crucial “need-to-knows” for compliance as the deadline approaches

    • Guidance on ongoing compliance monitoring and risk assessment – how to stay compliant past the 25th May deadline

    • Plus - live Q&A with our GDPR experts
  • GDPR: Cutting Through the Noise
    GDPR: Cutting Through the Noise Alex Jordan, Senior Analyst, ISF LTD May 24 2018 12:00 pm UTC 45 mins
    Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.

    So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?

    Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:

    -The ISF’s phased approach to GDPR implementation
    -Ways to determine the criticality of data and how to protect it appropriately
    -The urgent actions that a business can take to get GDPR compliance started
    -Common myths surrounding the GDPR, and guidance on cutting through the noise.
  • M-Trends 2018 – Rétroviseurs sur les grands faits 2017 et leurs impacts futurs
    M-Trends 2018 – Rétroviseurs sur les grands faits 2017 et leurs impacts futurs David Grout, Directeur Technique, South EMEA May 24 2018 12:00 pm UTC 60 mins
    Chaque année, les experts FireEye à travers les équipes Mandiant répondent à une grande variété d'incidents informatiques à travers le monde, ces attaques sont dans la plupart des cas orchestrées par des groupes d’attaquants avancés. Ce retour d’expérience, fruit d’heures d’analyses et d’investigations, est résumé dans le rapport annuel M-Trends qui d’années en années nous donne une visibilité sur le changement et l’évolution de la menace et des techniques utilisées lors des attaques mais aussi sur les progrès et les capacités que les entreprises mettent en place pour y répondre.

    Au cours de ce webinaire, notre Directeur Technique, David Grout, discutera de plusieurs sujets incluant :

    • Les tendances dans le paysage actuel des menaces et ces évolutions
    • Les principaux groupes APT ayant fait parler d’eux en 2017
    • Les risques de récurrence d’attaques
    • Mais aussi de sujets plus ouverts comme la recherche de talents et la complexité de recruter, les architectures ciblées et leurs faiblesses ou encore la préparation possible à travers des exercices de type Red Teaming.
  • GDPR: Se non sei pronto, potrebbe essere rischioso”
    GDPR: Se non sei pronto, potrebbe essere rischioso” Giampiero Nanni, Ramses Gallego May 24 2018 1:00 pm UTC 60 mins
    Il 25 maggio è il “gran giorno”, quello in cui diventerà applicabile il GDPR. Cambierà il modo in cui le aziende gestiscono le informazioni sui soggetti interessati nell’UE. È un’impresa improba che metterà alla prova le organizzazioni, con problemi di natura legale e logistica, e sanzioni potenzialmente gravose in caso di mancata conformità.
    Unisciti a Symantec alla vigilia del giorno fatidico, per acquisire informazioni su:
    •I requisiti di conformità del GDPR, l’esposizione al rischio e le violazioni
    •Il tuo rischio e i consigli per gestire la nuova normativa una volta applicta
    •Le altre normative all'orizzonte •Gli ultimi sviluppi del GDPR