Hi [[ session.user.profile.firstName ]]

IT Security

  • Benefits of Machine Learning in IT Infrastructure
    Benefits of Machine Learning in IT Infrastructure Dan Ortega - Vice President of Marketing Recorded: Apr 21 2017 4 mins
    During the next 5 years, machine learning is poised to play a pivotal and transformational role in how IT Infrastructure is managed. Two key scenarios are possible: transforming infrastructure from a set of under-utilized capital assets to a highly efficient set of operational resources through dynamic provisioning based on consumption; and the identification of configurations, dependencies and the cause/effect of usage patterns through correlation analysis.
    In the world of IT infrastructure, it’s all about efficient use of resources. With on-premise infrastructure (compute, storage and network) utilization rates for most organizations in the low single digits, the cloud has sold the promise of a breakthrough. For those organizations moving to Infrastructure as a Service (IaaS), utilization in the middle to high teens is possible, and for those moving to Platform as a Service (PaaS), utilization in the mid-twenties is within reach.
    Dynamic provisioning driven by demand is essentially the same operational concept as power grids and municipal water systems – capacity allocation driven by where resources are consumed, rather than where they are produced.
    The second part of the breakthrough relates to right-sizing infrastructure. Whether this is network capacity or compute Virtual Machine size – machine learning will enable analysis of the patterns of behavior by users and correlate them to the consumption of infrastructure resources.
    During the near term, these benefits will be much more tactical. Automated discovery combined with behavioral correlation analysis will virtually eliminate the need for manual inventory and mapping of components and configuration items in the IT ecosystem to reveal how the ecosystem is operating.
    Today, IT has the opportunity to automate the mapping of components in their infrastructure to provide a more accurate and actionable picture.
  • Modernizing Your SOC: A CISO-led Training
    Modernizing Your SOC: A CISO-led Training Edward Amoroso Recorded: Apr 21 2017 66 mins
    Modern SOCs looks very different than those that were built even a few years ago. This webinar discusses the fundamental shifts in thinking and technology that allow security teams to spend more time seeking out and detecting advanced attacks.
  • Cloud IAM: Accelerating and Securing Mergers and Acquisitions
    Cloud IAM: Accelerating and Securing Mergers and Acquisitions Jiong Liu, Product Marketing Manager, Okta Aaron Yee, Senior Technical Marketing Manager, Okta Recorded: Apr 21 2017 56 mins
    As every company becomes a technology company, merger and acquisition transactions increase and become more complex, and thus more susceptible to vulnerabilities. Often, companies involved are targeted by cyber attacks. Legacy IT systems are a costly, insecure barrier to realizing the full value of M&A.

    Cloud identity access management is transforming the IT delivery of M&A. Connecting all the major stakeholders, like employees, partners, and customers, to every type of technology that they use is crucial. As a result, M&A can happen faster, more securely and at a lower cost.

    Join our webinar to:

    -Learn about IAM challenges in M&A
    -Understand how Cloud IAM solves those challenges and provides business value
    -See a live demo of the Okta Identity Cloud in M&A scenarios
  • Let's Get Critical: The Capabilities You Need for an Analytics-Driven SIEM
    Let's Get Critical: The Capabilities You Need for an Analytics-Driven SIEM Girish Bhat, Director of Security Product Marketing at Splunk & Chris Shobert, Senior Sales Engineer at Splunk Recorded: Apr 21 2017 61 mins
    Splunk Enterprise Security (ES) is an analytics-driven SIEM that powers successful security operations teams. But did you know it is actually made up of distinct frameworks that can each be leveraged independently to meet specific security use cases?

    Join us to learn the technical details behind key ES frameworks including: asset and identity correlation, notable event, threat intelligence, risk analysis, investigation and adaptive response. Splunk experts will discuss real-world examples and demo the key frameworks, which will help you to solve your security challenges.

    Speakers:
    Girish Bhat, director of security product marketing at Splunk
    Chris Shobert, senior sales engineer at Splunk

    Agenda:
    10min - Overview of Splunk Enterprise Security
    40min - Demonstration of key frameworks
    10min - Q&A
  • Are You Prepared to Identify & Defend Against Ransomware?
    Are You Prepared to Identify & Defend Against Ransomware? Mo Abdullahi Recorded: Apr 21 2017 37 mins
    Ransomware’s showing no signs of slowing down – and neither are we!

    We'll teach you about ransomware, how you can protect your data AND demonstrate why Varonis customers have some of the fastest response times in the industry.

    Attend our Webinar to discover:

    Warning signs of an impending ransomware attack
    The most recent ransomware threats (Cryptolocker & its variants, Zcrypt, Locky, and more)
    How Varonis customers:
    Use DatAlert to detect suspicious behavior and insider threats
    Stay up-to-date defending against the latest ransomware variants
    Discover which files were affected and how to recover quickly
  • Career Conversations w/ Guest Jenn Henley
    Career Conversations w/ Guest Jenn Henley Lisa Jiggetts (Women's Society of Cyberjutsu) and Jennifer Henley (Facebook) Recorded: Apr 20 2017 60 mins
    Join us at our next Career Conversations session. Career Conversations gives WSC members the opportunity to connect with career professionals. We'll discuss topics such as "What made them decide on IT or Cyber Security?, "What were some of their work/life challenges?" , "What skills and education do they see as essential to success?"

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations!

    Guests: Jenn Henley, Director of Security, Facebook

    Lisa Jiggetts, Founder and CEO of the Women's Society of Cyberjutsu will moderate discussions.

    About the Speaker:
    Jennifer Henley is the Director of Security Operations at Facebook. In her current role, Henley is responsible for operational excellence, organizational management, and program management for the Facebook Security team. A jack of all trades, she also runs internal and external security awareness and outreach efforts, most notably, Facebook’s popular “Hacktober” events for National Cyber Security Awareness Month. She is also deeply passionate about attracting and retaining a diverse set of talent to the security industry. Prior to her employment at Facebook, she was Chief of Staff for the CISO at PayPal.
  • Content Encryption:  Key Issues to Consider
    Content Encryption: Key Issues to Consider Michael Osterman, President Osterman Research; Andy Nieto, DataMotion Recorded: Apr 20 2017 53 mins
    Osterman Research conducted an in-depth, primary market research study, surveying 150 IT professionals knowledgeable about use of encryption in their organizations. This informative webinar will provide attendees with details on the survey results, address critical issues surrounding content encryption, and offer best practice recommendations and business process improvements for decision-makers to consider.

    Highlights include the following:

    • Statistics on manual and policy based content encryption use for email and file transfer
    • Legal and regulatory impact of failing to encrypt content
    • Complications related to mobile devices and cloud-based application use
    • Barriers to adoption for content encryption
    • Best practice recommendations including risk and business case analysis
  • DataMotion Platform Overview for Secure Data Exchange
    DataMotion Platform Overview for Secure Data Exchange Matt Signorello Recorded: Apr 20 2017 5 mins
    The DataMotoin platform helps you safely exchange sensitive data in a secure and compliant way. This short 5 minute video gives you a high level overview of the some of the technical features and other abilities of the platform.
  • TechTalk: Live Demo
    TechTalk: Live Demo Tim Twarog, Director of Enterprise Sales Recorded: Apr 20 2017 46 mins
    CloudCheckr TechTalk is a webcast series designed to help unlock the power of unified cost and security management. Whether you’re a power user or new user, our product experts will help you maximize your production using the CloudCheckr platform.

    Join us for a deep dive into the CloudCheckr platform. Whether you or your team are new to CloudCheckr, everyone attending this session will learn:

    - Cost Management

    - Security Best Practices

    - Inventory and Utilization Tips and Tricks
  • Prevent Costly Data Leaks From SaaS Apps
    Prevent Costly Data Leaks From SaaS Apps Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks Recorded: Apr 20 2017 48 mins
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps. 
     
    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about: 
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • CEO PoV: Take Control of your Cloud Application Experience
    CEO PoV: Take Control of your Cloud Application Experience Praveen Akkiraju, CEO, Viptela Recorded: Apr 20 2017 39 mins
    Enterprises are undergoing a revolution in their infrastructure as the application world is being transformed by cloud technologies. Today your applications can be located in the data center, through IaaS, or in a SaaS cloud. Similarly, users are transforming with mobility; no longer are they tied to one location. Enterprises want to solve the problem of connecting users to their applications in a consistent and secure manner.

    The overarching issue is the connectivity between these two worlds as we're stuck in two-decades old technology. Enterprises are therefore challenged with the requirement to transform their infrastructure while integrating underlying legacy technologies, and for the user to access their applications while maintaining policy and security framework.

    Join our CEO as he discusses how IT infrastructure is being transformed during the era of cloud technologies, and how Enterprises across a number of industries can embrace the network revolution.
  • A new way forward: Managing the blinding effects of visibility
    A new way forward: Managing the blinding effects of visibility Eric Ogren, Senior Analyst with the 451 Group, and Matt Rodgers, Head of Security Strategy at E8 Security Recorded: Apr 20 2017 38 mins
    Get inspired and informed by Eric Ogren, Sr Analyst at 451 Group, and Matt Rodgers, Head of Strategy at E8 Security, as they discuss how behavioral analytics is transforming security operations with improved visibility across endpoints, users, and networks. Learn how that translates into better detection and faster investigation time for security incidents.

    Behavioral analytics is about un-complicating your security environment. The information is there, but how do you make the most of it? Security analysts should understand what’s happening without having to piece an incident together from scratch.

    Topics include:
    1. Why security teams are a company’s true heroes
    2. Black holes: turning “more data” into “better data”
    3. Navigating the grey area between the binary poles of true positive and false positive
  • 10 Security Best Practices for Government Organizations
    10 Security Best Practices for Government Organizations Tony Cole, Vice President and Global Government Chief Technology Officer, FireEye Recorded: Apr 20 2017 53 mins
    Government networks, critical infrastructure and data are under a constant state of attack. The nature of these threats evolve on a daily basis. Hacktivists, nation states and cyber criminals push people, processes and technologies that make up Government cyber defenses to their breaking points.

    In this webinar, Tony Cole, Vice President and Global Government Chief Technology Officer at FireEye, will be sharing how to:

    -- Interpret and respond to trends in adversary capabilities and motivations.
    -- Integrate and apply cyber intelligence to reduce risk, cost and operational overhead.
    -- Improve readiness and response to minimize the impact of a breach.

    Learn how you can apply best practices in intelligence-led security into your defenses.
  • Easy Ways to Improve Your Security Posture
    Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec Recorded: Apr 20 2017 28 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 4 of 5: Easy Ways To Improve Your Security Posture

    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323
  • The Business Impact of Poor Website Usability, Performance, or Security.
    The Business Impact of Poor Website Usability, Performance, or Security. Tin Zaw, Verizon Digital Media Services | Laz, InfoSec Strategist | Edward Roberts, Distil Networks | Sean Martin, Moderator Recorded: Apr 20 2017 60 mins
    E-commerce, partner portals, customer service portals, and other cloud-enabled business services: Websites are the new front door to many businesses, and we expect to gain access whenever we want, from anywhere in the world, and from any device.

    But what happens to the business when the website doesn’t perform as expected? And how do you protect your website(s) from nefarious traffic looking to harm your business by bringing it down, scraping content, changing content? Do you know whether your traffic is a human user - or is it a bot? Does the language (or a lack of communication whatsoever) between the business and the IT personnel leave you wondering what the potential issues might be?

    During this expert panel discussion, we will explore the business impact of an underperforming or compromised website. You will:
    - Learn more about what good website performance look likes
    - Gain a deeper understanding of traffic on websites
    - Understand how your website's performance affects other departments within the business
    - Hear practical recommendations for business leaders on how to protect your website from compromise

    FEATURED EXPERTS
    Tin Zaw, Director Security Solutions, Verizon Digital Media Services
    Laz, InfoSec Strategist and Professor
    Edward Roberts, Director of Product Marketing, Distil Networks

    YOUR MODERATOR
    Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
  • The Digital Imperative: Creating the Secure and Productive Enterprise
    The Digital Imperative: Creating the Secure and Productive Enterprise Ali Mazaheri, Chief Technical Architect, Microsoft; Dean Suzuki, Technology Architect, Microsoft Recorded: Apr 20 2017 25 mins
    It’s a fact: Digital Transformation is arguably the number one growth opportunity among today’s IT and business leaders. Organizations that embrace advanced technologies are attracting the best talent, optimizing productivity and creating enduring value for customers and shareholders.

    Join us to engage with subject matter experts, network with peers and learn about new innovations that will streamline operational efficiencies and reinvent the way your organization performs with the advanced security you require in the cloud era.

    View this webcast to:
    • Learn about Microsoft’s vision for Digital Transformation
    • Explore innovations that bridge the gap between intelligence and security
    • Discuss how to optimize for teams and get the most from your biggest investment: People

    Who Should view this webcast:
    • Business leaders across Finance, Operations, Communications, Sales and Marketing
    • CISOs, and VPs of Information Security
    • CIOs and Innovation Officers
    • IT Managers
  • Moving Toward Better Security Testing of Software for Financial Services
    Moving Toward Better Security Testing of Software for Financial Services Steve Kosten, SANS instructor & Mike Ware, managing principal at Synopsys Software Integrity Group Recorded: Apr 20 2017 62 mins
    The financial services industry (FSI) maintains high-value assets and typically operates in a very complex environment. Applications of all types—web applications, mobile applications, internal web services and so forth—are being developed quickly in response to market pressures by developers with limited security training and with relatively immature processes to support secure application development. This combination presents a juicy target for attackers, and data shows that the FSI continues to be a top target. Attempts to introduce security into the application life cycle frequently face challenges such as a lack of available application security expertise, concerns about costs for tooling, and a fear among product owners that security processes might impede the development cycle and slow their response to market conditions.

    This webinar will explore:
    - Who is the financial services industry (FSI)?
    - Drivers of application security
    - Inhibitors of application security
    - The foundation of a secure SDLC
  • Secure Wi-Fi with Ryan Orsi: Iot Current and Future Threats
    Secure Wi-Fi with Ryan Orsi: Iot Current and Future Threats Ryan Orsi, Secure Wi-Fi Expert Recorded: Apr 20 2017 21 mins
    It's expected that by 2020, annual revenues around IoT solutions could exceed $470 billion. As all things IoT saturate the market (cars, tea kettles, toasters!) what does that mean from a security standpoint? What vulnerabilities aren't included in the fine print of these technologies? Join Ryan Orsi in episode three of our webinar series for a look at the current state of Wi-Fi Iot and what may lay ahead.
  • Cyber Threat Visualization and Data Capture Solutions
    Cyber Threat Visualization and Data Capture Solutions Gary Southwell, General Manager, CSPi and William Bent, Product Manager, CSPi Recorded: Apr 20 2017 35 mins
    CSPi's Myricom nVoy Series assists in targeted cyber forensic analysis, and compliance assurance for IT and security resources. In this webinar, you'll learn how the nVoy solution makes it easy no matter if they’re just starting out building their network security capabilities or want to add to the infrastructure they already have in place. With just a few minutes of effort, they can build a cost-effective cyber threat visualization solution and implement better network monitoring, data capture, forensic analysis, and regulatory compliance adherence functionality.
  • How to Optimize Your Infrastructure for Big & Fast Data: With Dell EMC & Splunk
    How to Optimize Your Infrastructure for Big & Fast Data: With Dell EMC & Splunk Cory Minton,Principal SE, Dell EMC, Dean Jackson, Principal Sys. Eng., Dell EMC,Jenny Hollfelder,Global Alliances SE, Splunk Recorded: Apr 20 2017 52 mins
    Are you tormented by latency or outages that lead to lost revenue? Are you frustrated with the lack of comprehensive visibility that siloed solutions create? Never fear!

    Join this webinar to learn how you can solve these problems and optimize your infrastructure with Dell EMC and Splunk. You’ll also see certified apps that Dell EMC has built in Splunk to help joint customers derive Operational Intelligence from their IT assets. We’ll share best practices, tips and tricks for successful deployments and rapid time-to-value that Splunk and
    Dell EMC have learned from working with customers around the globe.
  • Security by design
    Security by design Paul Rose, CTO, CNS Group Recorded: Apr 20 2017 15 mins
    Cyber security is not working – budgets increasing only to be outstripped by the number and sophistication of threats and breaches. Organisations need to do things differently – stop just thinking about technology and start thinking about how security works for your business.

    This webinar will look at forming a strategy tailored to your business and how organisation should start integrating and automating as much as possible. We'll also explore the importance of planning, prioritising spending and capability and maturity to manage risk
  • Growth opportunities with Integrated Symantec Solutions
    Growth opportunities with Integrated Symantec Solutions Ramsés Gallego, Strategist & Evangelist, Office of the CTO, Symantec Recorded: Apr 20 2017 61 mins
    Learn how to drive new sales opportunities by adding complimentary Symantec solutions into your customer conversations. This session will overview the Symantec portfolio and identify the latest integrated value propositions your customers will want to understand.
  • Zero-Day Attacks and What To Do About It
    Zero-Day Attacks and What To Do About It Chris Candaffio System Engineer, Symantec and Q&A with Robert Arandjelovic & Gavin Fulton Recorded: Apr 20 2017 35 mins
    Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?

    By registering, you’ll gain valuable insights into:

    Which techniques effectively block zero-day attacks.
    Why robust endpoint protection plays such a critical component.
    How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
  • How to Apply DevOps in a Regulated Organisation
    How to Apply DevOps in a Regulated Organisation Colin Domoney, Sr Product Innovations Manager Recorded: Apr 20 2017 36 mins
    With the mainstream adoption of DevOps, what does this mean for heavily regulated industries, such as financial services? How can an organisation that requires a clear segregation of duties between Dev and Ops, as well as strict regulations adopt the DevOps way?
    Join this webinar for an optimistic view of how Dev(Sec)Ops can be applied in such challenging environments as well as examples of industry best practices.
  • Interview: CTO of Symantec on advanced cybersecurity
    Interview: CTO of Symantec on advanced cybersecurity Darren Thomson, CTO & VP of Technology, Symantec, EMEA & Andrew Bird, EA Visionary, Interview Moderator Apr 24 2017 3:00 pm UTC 30 mins
    Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
    ----------
    BrightTALK caught up with Darren Thomson, CTO & VP of Technology, Symantec, for an in-depth conversation on the future of cybersecurity in the context of IoT, AI and Machine Learning.

    Among topics discussed:

    - Trending business vulnerabilities in 2017
    - Particularities of pentesting
    - How to prepare for GDPR in 2018
    - Implications of IoT, AI & machine learning on cyber security
    - Yahoo breach
    - Brexit and cybersecurity
    - Recommendations to CISO's developing security strategies

    About the speaker:
    Darren is an industry recognised IT innovator and strategist, with +20 years of industry experience. He is a published author. His latest work has recently been published by Wiley Co. and is entitled, “Delivering Utility Computing: Business Driven IT Optimisation”. Details can be found at www.amazon.com.
  • What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data
    What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data Stacy Cannady, Cisco Systems and Richard Nass, Embedded Computing Design/OpenSystemsMedia Apr 24 2017 5:00 pm UTC 60 mins
    Join Stacy Cannady, Cisco Systems and Richard Nass, Embedded Computing Design/OpenSystemsMedia in a webcast Monday, April 24, 10 a.m. Pacific/ 1:00 p.m. East to talk about the hottest issue today in the IoT and embedded design: security.

    With Embedded Computing Design (ECD), the Trusted Computing Group (TCG) conducted an Internet of Things (IoT) Security Survey January to February 2017 to find if and how designers were addressing these concerns.

    The webcast will look at how designers perceive security, whether they’re including security in their designs, challenges to embedded and IoT security, and their awareness and use of trusted computing.

    Attendees will see survey results and hear from our experts on trending security issues and potential solutions to protecting devices, networks and data.
  • Surveillance, Then and Now: The Growing Need for Privacy & Security by Design
    Surveillance, Then and Now: The Growing Need for Privacy & Security by Design Ann Cavoukian, Executive Director, Privacy & Big Data Institute at Ryerson University Apr 24 2017 5:00 pm UTC 60 mins
    The growth of state surveillance appears to be escalating dramatically. With the most recent Wikileaks Vault 7 revelations, it is clear that independent oversight is totally lacking and yet, much-needed if we ever hope to curb such unwarranted surveillance. Transparency relating to such activities is essential in order to hold governments accountable for their actions. The need for both global privacy and security - by design, is growing on a daily basis, and will be outlined in this presentation, in an effort to move things forward.

    About the Presenter:
    Dr. Ann Cavoukian is recognized as one of the world’s leading privacy experts. She is presently the Executive Director of Ryerson University’s Privacy and Big Data Institute. Dr. Cavoukian served an unprecedented three terms as the Information & Privacy Commissioner of Ontario, Canada. There she created Privacy by Design, a framework that seeks to proactively embed privacy into design, thereby achieving the strongest protection possible. In 2010, International Privacy Regulators unanimously passed a Resolution recognizing Privacy by Design as an international standard. Since then, PbD has been translated into 39 languages. Dr. Cavoukian has received numerous awards recognizing her leadership in privacy, most recently as of the Top 100 Leaders in Identity (January, 2017).
  • Part II – How to get started with GDPR & Applying Appropriate Security Controls
    Part II – How to get started with GDPR & Applying Appropriate Security Controls Jason Hart, Gemalto, Christine Andrews, DQM GRC, Adrian Davis, (ISC)² EMEA, Nathaniel Ford, (ISC)² EMEA Apr 25 2017 11:00 am UTC 60 mins
    As a follow-up to our previous webinar, this panel discussion will dive into further detail about the GDPR. Presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) we will answer some of the big questions raised in the previous webinar and open up to the live audience for an interactive Q&A.
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review
    Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Jay Kane, VP Cyber Security & Mike Semaniuk, CISSP Systems Engineer, Palo Alto Networks Apr 25 2017 12:00 pm UTC 60 mins
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
  • Is Your Organisation GDPR Ready?
    Is Your Organisation GDPR Ready? Steve Durbin, Managing Director, ISF LTD Apr 25 2017 12:00 pm UTC 45 mins
    Many organisations are still unclear as to how they will meet the requirements of the EU GDPR legislation which will come into effect in May 2018. Fundamentally organisations need to start preparing for this now.

    In this webinar Steve addresses some of the key questions organisations are asking such as: does the EU GDPR regulation apply to me? how should I prepare for this legislation? and what additional resources do I need?
  • Going Beyond His/tory: The Female Storytellers Shaping Immersive Tech
    Going Beyond His/tory: The Female Storytellers Shaping Immersive Tech Luciana Carvalho, VR Evangelist Apr 25 2017 12:00 pm UTC 45 mins
    Humans have shared gathered around and communicated through stories throughout history. Text, pictures, images and videos have sought to capture our imagination, or portray the non-fictional in a relatable way. Now, as we move beyond the 2D flat screen to new ways of interacting/communicating with the world — virtual and augmented reality, for example — we begin to see the power of immersion in storytelling, and the impact it has, beyond anything we have ever seen, on those in the receiving end. Arguably, the ultimate empathy machine.

    As we shape the next 'Information Age', and given the state of the world today, never before have we been in more need of putting ourselves in other people’s shoes, and empowering diverse and inclusive voices worldwide. Never before have we seen more women jump at the opportunity to lead and make content that is all-encompassing, that touches and inspires, and that aims to build bridges not walls. Here is their story.

    Learner, maker, systems thinker, innovator and tech evangelist, Luciana splits her time between growing the Realities Centre London — a new innovation space, incubator and academy for B2B/enterprise VR, AR, MR and AI — and Unfold UK, promoting women/diversity in future in the UK. Passionate about VR and tech for good, she carries ongoing research on the possibilities and challenges immersive tech presents as re neuroscience, empathy and female empowerment.

    She was elected one of Code First Girls ‘25 Ones to Watch’, 'Top 5 Female Role Models in the Tech Industry', and Virtual Perceptions' 'Heroes of VR' in 2016.
  • Cloudera Government Forum Livestream 2017
    Cloudera Government Forum Livestream 2017 Cloudera Apr 25 2017 12:30 pm UTC 300 mins
    Exploring the path to a more data-driven government will be the focus of the 2017 Cloudera Government Forum, planned for April 25, 2017, at the Newseum in Washington, D.C. Government organizations have enormous data resources. Agency leaders and program management professionals seek practical, secure, and effective methods to extract the valuable information captured in their data repositories—from legacy systems to real-time.

    In its sixth year, the Cloudera Government Forum is an annual gathering to discover what’s new and what’s next for data management and advanced analytics strategies that can be applied for an immediate and positive impact on organizations and missions. Participants learn how they can leverage standards-based, cloud-enabled, and open source data strategies for meaningful digital transformation.
  • How to Avoid Business Outages from Misconfigured Network Devices
    How to Avoid Business Outages from Misconfigured Network Devices Joe DiPietro, SE Director at AlgoSec Apr 25 2017 2:00 pm UTC 60 mins
    A single change to a network device can have far reaching effects on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill – as we have recently seen in the news!

    This technical webinar will walk you through a variety of scenarios that can cause device misconfigurations, including a basic device change, business application connectivity changes, and data center migrations. It will provide both best practices and demonstrate specific techniques to help you understand and avoid misconfigurations and ultimately prevent damage to your business, including how to:

    * Understand and map your enterprise infrastructure topology before you make a change
    * Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    * Common mistakes to avoid when making changes to your network security devices
    * How to better understand business requirements from the network security perspective
  • Five Ways to Transform Your IT With Analytics and Machine Learning
    Five Ways to Transform Your IT With Analytics and Machine Learning Priya Balakrishnan, Director, Solutions Marketing at Splunk; Alok Bhide, Director, Product Management at Splunk Apr 25 2017 2:00 pm UTC 60 mins
    The status quo of old monitoring solutions and approaches can't handle today's complex, highly distributed service-oriented architectures. We’ve all tried implementing solutions in the past, expecting that they’d offer more visibility and control. But eventually all we got was just one more tool to maintain that didn't provide much value.

    Splunk IT Service Intelligence (ITSI) solves this problem. The solution delivers an advanced data-centric approach to service monitoring driven by machine learning and analytics—taking operations and service intelligence to the next level.

    Join us in this webinar for a live demo to see how you can:
    - Gain service context by combining event and performance data
    - Get the big picture of your environment to streamline operations
    - Accelerate root-cause analysis and get ahead of customer-impacting outages
    - Prioritize incident investigation and reduce time-to-resolution with events analytics
    - Understand how analytics and machine learning can enhance service intelligence

    Featured Speakers:
    Priya Balakrishnan, Director, Solutions Marketing at Splunk
    Alok Bhide, Director, Product Management at Splunk
  • Walk this way - First steps towards firewall automation
    Walk this way - First steps towards firewall automation Erez Tadmor, Senior Product Manager, Tufin & Joe Schreiber, Technical Director, Business Development, Tufin Apr 25 2017 3:00 pm UTC 60 mins
    Automation systems bring a great deal of value. Having the ability to produce better, faster, and more reliable results can go a long way in improving business agility and simplifying day-to-day tasks. Firewall automation also helps tighten security posture and ensure continuous compliance with internal policies and industry regulations.

    Tufin presents the recommended steps to start your journey towards firewall automation. Join us for the first webinar of the series, focusing on rule decommissioning, to learn how you can initiate an immediate and substantial impact on your organization.
  • Tackle Your Toughest Security Challenges at Ignite 2017
    Tackle Your Toughest Security Challenges at Ignite 2017 Joerg Sieber, Director, Product Marketing, Palo Alto Networks Apr 25 2017 4:00 pm UTC 30 mins
    Join this webinar for a sneak preview of the content you can expect at Ignite 2017 in Vancouver, BC, Canada, June 12-15, 2017. This year will be the biggest and most advanced Ignite yet! We are expecting over 4,000 security experts gathering in beautiful Vancouver to tackle their toughest security challenges through a four-day program of hands-on educational sessions, peer-to-peer networking and multiple opportunities to explore all the capabilities and technologies of the Palo Alto Networks Next-Generation Security Platform, which is designed to put an end to the era of breaches by safely enabling applications and providing cyberthreat prevention measures at all steps in the cyberattack lifecycle. Space is limited, and you won’t want to miss this unique event, so sign up today at www.paloaltonetworksignite.com
  • Secure Your Leaky Mobile Apps: Discovery & Remediation
    Secure Your Leaky Mobile Apps: Discovery & Remediation Andrew Hoog, CEO of NowSecure & Setu Kulkarni, VP Product Management at WhiteHat Security Apr 25 2017 4:00 pm UTC 60 mins
    Mobile devices are everywhere throughout the workplace, and outside the workplace, but mobile phone security as a discipline has been focused on parts of the solution such as WiFi connections, anti-virus and spyware. Mobile security apps are everywhere - but what are they securing? What is the actual security impact to your organization of insecure mobile app usage? For meaningful risk management, you need to understand both the qualitative and quantitative values of mobile security risk.

    Join WhiteHat Security and our technology partner NowSecure for a discussion on leaky apps, and how they can expose private and sensitive data - but more, what kind of data can be exposed.

    We’ll review how insecure mobile applications can create incidents, and how they impact the enterprise or organization. Finally, we will introduce you to the different ways WhiteHat can help you build mobile security into your larger DevSecOps and vulnerability management programs.

    About the Presenters:
    Andrew is the Co-founder and CEO of NowSecure. As a former CIO, Andrew has unique insight into solving enterprise mobile security problems and is driven by NowSecure’s mission to advance mobile security worldwide. He is responsible for the vision, strategy and growth of the company.

    Setu Kulkarni is the VP of Product Management at WhiteHat Security. Setu is responsible for product vision, strategy, and direction at WhiteHat Security. Setu joins the WhiteHat leadership team after a 10+ year stint at TIBCO Software Inc., where he most recently led product management and strategy for the Operational Intelligence product portfolio.
  • Next Generation Defense in Depth Model
    Next Generation Defense in Depth Model Tari Schreider, CCISO, Chief Cybersecurity Strategist & Author, Prescriptive Risk Apr 25 2017 4:00 pm UTC 60 mins
    This session will focus on presenting a next generation defense in depth model and answer the question on many CISO’s minds - is it still relevant? A model of defense in depth will serve as a backdrop to introduce you to a wide range of solutions from across the cybersecurity industrial complex that just may change how you view your defense in depth approach.
  • Beyond Deployment Velocity: How Technology & Process Increase DevOps Success
    Beyond Deployment Velocity: How Technology & Process Increase DevOps Success Adrian Lane, CTO, Securosis, Jeff Craty, Dir. of Engineering, Veracode, & Tim Jarrett, Sr Dir. of Product Mktg at Veracode Apr 25 2017 5:00 pm UTC 60 mins
    DevOps increases teamwork, visibility and overall software quality. Yet, integrating security can be challenging for cultural and technological reasons.

    This webinar, featuring Adrian Lane of Securosis and Tim Jarrett and Jeff Cratty of Veracode, dives into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps, and discusses the challenging process and technical requirements for integrating security into DevOps.

    Learn how you can have both development velocity and security without compromising either one.
  • Security 101: More Than a Band-Aid: Patching is Critical for SMBs
    Security 101: More Than a Band-Aid: Patching is Critical for SMBs TJ Letourneau, Director of Technical Support Apr 25 2017 6:00 pm UTC 45 mins
    Security 101: Don't ignore those prompts to patch, learn about how cybercriminals exploit vulnerabilities in unpatched environments. Throughout the VIPRE Security 101 series, speakers have come back to the importance of patching. Im many cases, prompts to update Adobe, Java, Chrome, iTunes, Skype and others are to fix newly discovered security vulnerabilties in those products. Cyberminimals exploit those vulnerabbiliteies to open a backdoor onto your systems to drop malware and infect your network. Learn how to address these issues with steps to protect and product considerations.
  • Harness your Data with the Latest Cloud-Based Enterprise File Storage System
    Harness your Data with the Latest Cloud-Based Enterprise File Storage System Stephen Jeffries, TSP, Microsoft & Andres Rodriguez, Founder and CEO, Nasuni Apr 25 2017 8:00 pm UTC 60 mins
    Data growth is a given.

    How you access, manage, protect, and utilize your data is the challenge. Gartner reports the data volume is set to grow 800% over the next 5 years.

    Nasuni offers a complete Azure-based enterprise file storage system to handle this data volume growth. The IT goal hasn’t changed. How to accomplish it has. The debate is not hardware versus the cloud. It’s how to create an intelligent file infrastructure that utilizes the cloud.

    Join this webcast to learn how to:
    - Store data centrally in one self-protecting global file system
    - Make your data accessible anywhere, anytime
    - Scale your storage at unheard-of cost efficiency

    About the Presenter:

    Andres Rodriguez brings to Nasuni the energy and experience of a visionary entrepreneur with several successful companies behind him. He oversees sales, marketing and strategic partnership development—and is the face of Nasuni.

    His previous company, Archivas, developed an enterprise-class cloud storage system and was acquired by Hitachi Data Systems in 2006. As founder, CTO and charismatic frontman at Archivas, Andres was a key force in sales, partner development and marketing and oversaw all technology initiatives. After the acquisition, Andres became Hitachi’s CTO of File Services, supporting the worldwide rollout of the Archivas-based Hitachi Content Archive Platform (HCAP). Having seen his team and product successfully integrated with its acquirer’s, Andres turned his attention to his next venture, which, with its goal of making the benefits of cloud storage more accessible to the enterprise, was a natural progression from his last.