Hi [[ session.user.profile.firstName ]]

IT Security

  • New Legal Requirements for Mobile Security – EMM is not Optional New Legal Requirements for Mobile Security – EMM is not Optional Ojas Rege, MobileIron VP Strategy, and Carl Spataro, MobileIron Chief Privacy Officer Recorded: Aug 23 2016 36 mins
    As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.

    This webcast is for Mobile IT and information security professionals and their legal and compliance teams. This webcast will cover:

    The foundational security controls now required by law
    How these controls are applied to mobile
    Best practices to achieve compliance
    The central role of Enterprise Mobility Management (EMM)
  • Following FITARA: The Changing Tech Landscape Following FITARA: The Changing Tech Landscape Presented by: Dell Recorded: Aug 23 2016 63 mins
    The implementation of Federal Information Technology Acquisition Reform Act (FITARA) brought about a major shake-up for officials across government, forcing agencies to address a variety of technology issues. By expanding oversight into IT investments and expenses, adjusting the roles of IT mission owners including the enhancement of the CIO's authority and updating the technology acquisition and procurement processes, IT leaders are working towards the common goal of an effective, efficient and secure technological landscape across all federal agencies.

    How can agencies continue to push forward in achieving the requirements laid out by FITARA and controlling IT costs in general?

    Join IT experts on August 23 as we explore how your agency can:
    - Better understand your IT environment and start gaining insight around the current software and hardware assets
    - Improve security and performance
    - Streamline and achieve FITARA compliance
    - Position itself to take advantage of technological advancements and innovate for the future
  • Cradlepoint’s Extensibility Platform, SDK & New COR Devices Cradlepoint’s Extensibility Platform, SDK & New COR Devices Cradlepoint's Product Management Team Recorded: Aug 23 2016 44 mins
    Cradlepoint announced it is delivering an innovative Router Software Development Kit (SDK) and extensibility platform to enable enterprises to customize Machine-to-Machine (M2M) and Internet of Things (IoT) connectivity to meet their specific business needs, applications, and network requirements.

    With the new Router SDK and extensibility platform, enterprises can now build and customize more intelligent, application-specific solutions on top of Cradlepoint’s latest COR IBR routers. Developers and enterprise customers can now create tailored M2M and IoT applications on top of Cradlepoint Solution Platforms that can precisely address their specific business needs.

    The extensibility platform launches in conjunction with new additions to Cradlepoint’s COR family of M2M-IoT and in-vehicle routers — the COR IBR600B and COR IBR650B. The new routers include embedded Cat4 modems that will perform at higher speeds and support additional bands. They also support auto-carrier selection that automatically connects to the U.S. wireless carrier associated with the SIM card installed.

    The new routers support the COR Extensibility Dock that enables dual modems, extra Ethernet ports, and support for a third party expansion card, as well as, Cradlepoint’s SDK and extensibility platform that enable customers, partners, and third parties to write custom scripts and then securely push those scripts down to the router fleet for distributed computing at the Networks Edge.
  • How to migrate and manage security policies in a segmented data center How to migrate and manage security policies in a segmented data center Professor Avishai Wool, AlgoSec CTO Recorded: Aug 23 2016 53 mins
    Network segmentation is an effective strategy for protecting access to key data assets, and impeding the lateral movement of threats and cyber criminals inside your data center. With network virtualization, such as VMware NSX, now a reality it's now far easier and quicker to set up granular security policies for east-west traffic within the data center. Yet the added granularity of securities policies creates significant complexity.
    Presented by renowned industry expert Professor Avishai Wool, this technical webinar will provide strategies and best practices to help organizations migrate and manage security policies efficiently within a micro-segmented data center.
    During the webinar Professor Wool will cover how to:
    · Identify and securely migrate legacy applications to a micro-segmented data center
    · Effectively define and enforce security policies for East-West traffic
    · Manage the micro-segmented data center alongside traditional on-premise security devices
    ·Identify risk and manage compliance in a micro-segmented data center
    · Use network segmentation to reduce the scope of regulatory audits
    · Identify and avoid common network segmentation mistakes
  • Hunting for Threats: tips and tricks for SOC experts Hunting for Threats: tips and tricks for SOC experts Matias Bevilacqua, Mandiant Principal Consultant Recorded: Aug 23 2016 49 mins
    Many Security Operation Centers operate in a reactive mode. They primarily respond to alerts that are being presented to them by implemented detection technologies. And we all know alerts are generated in overwhelming volumes, severely crippling SOC’s effectiveness and efficiency. Today’s threat landscape requires SOCs to operate ever more proactively to keep up with the threat actors. More and more SOCs therefor are actively ‘hunting’ for threats that may be residing in the environment they are to defend. ‘Hunting' however requires a different approach from the traditional, reactive mode, not least for the SOC experts themselves.

    Join Matias Bevilacqua, Mandiant Principal Incident Response Consultant, as he discusses tips and tricks for hunting for those lurking threats: what to look for, what tools to use, etc.? You will leave the session with some hands-on material to start turning over stones and uncover threats you never knew were there.
  • eSummit Session 3: Under the Shadow of the Cloud eSummit Session 3: Under the Shadow of the Cloud Rik Ferguson, Vice President Security Research, Trend Micro, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Aug 23 2016 49 mins
    This presentation will enumerate some of the risks, old and new, of migrating to a cloud infrastructure as well as the risks posed by consumer and employee “cloud creep”. I will detail how your business could impacted and illustrate some architectural and procedural changes that can help to mitigate these risks.
  • eSummit Session 2: Cloud Breach – Detection and Response eSummit Session 2: Cloud Breach – Detection and Response Matthias Maier, Product Manager EMEA, Splunk, Adrian Davis, Managing Director (ISC)² Recorded: Aug 23 2016 47 mins
    Your next breach or insider attack will most likely have you digging for evidence in the cloud. Are you prepared? The old styles of imaging disks and tapping networks won't work. They will not scale. Join this webinar to discover response scenarios for cloud enabled and cloud dependent enterprises, a model for preparing for cloud response and examples of cloud breach investigations.
  • eSummit Session 1: Protecting Cardholder Data in the Cloud – A PCI Perspective eSummit Session 1: Protecting Cardholder Data in the Cloud – A PCI Perspective Jeremy King, International Director PCI Security Standards Council, Adrian Davis, Managing Director (ISC)² Recorded: Aug 23 2016 46 mins
    With more and more organisations using the services of a cloud provider, what impact does this have on securing Cardholder Data. This presentation will give an general overview of the PCI SSC, and then focus specifically on the issues relating to storing data in the cloud. Especially it will look at the key issues of “Who is responsible?” and “What happens when there is a data breach”. In addition the presentation will look briefly at the impact of the recent GDPR on cloud storage and cloud providers.
  • Lessons Learned from Data Breaches at Banks Lessons Learned from Data Breaches at Banks Lawrence Chin, Security Market Architect, Palo Alto Networks Recorded: Aug 23 2016 40 mins
    In recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has come to light. Join this webinar for a review of these attacks, the role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council). Additionally, learn about some best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.
  • Lessons Learned from Data Breaches at Banks Lessons Learned from Data Breaches at Banks Lawrence Chin, Security Market Architect, Palo Alto Networks Recorded: Aug 23 2016 40 mins
    In recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has come to light. Join this webinar for a review of these attacks, the role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council). Additionally, learn about some best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.
  • 2016 Webroot Quarterly Threat Update 2016 Webroot Quarterly Threat Update Tyler Moffitt | Security Threat Research Analyst Recorded: Aug 22 2016 48 mins
    According to the latest annual Webroot Threat Brief, 97% of malware is unique to a specific endpoint, rendering static, signature-database security virtually useless. In fact, many attacks are staged, delivered, and terminated within a matter of hours, or even minutes, having harvested user credentials and other sensitive information. With the rising popularity of polymorphism and other trends, it is more crucial than ever that organizations strengthen their security postures with next-generation endpoint protection and real-time, highly accurate threat intelligence. Join this webinar for an in-depth discussion of the most recent quarter’s malware stats and trends, and how businesses can leverage this data to keep themselves, their users, and their customers safe from advanced attacks.
  • The modern way of hunting  - How three CTOs tackle incident response The modern way of hunting - How three CTOs tackle incident response OpenDNS CTO, Dan Hubbard, Lancope CTO, TK Keanini, and Threat Grid CTO, Dean De Beer Recorded: Aug 22 2016 53 mins
    Your corporate network is open terrain. And it's hunting season. Malware, ransomware, and phishing scams are lurking. It's time to identify these threats to the enterprise earlier in the kill-chain and protect your employees, your data, and your network. The next evolution of Incident Response is here.

    Isn't it time you adapted your security stack to gain visibility into threats across you endpoints, network, and cloud? We can arm you with the tools you need most to see what’s happening not just on your network and your endpoints, but also out on the Internet in the wild.

    Join the product CTO’s from both OpenDNS and our Advanced Threats Groups, Dan Hubbard, Dean De Beer, and TK Keanini as they review how to modernize your response with critical solutions that provide visibility into the network, endpoint, and cloud and additionally talk about how to use these tools to investigate threats in the present, retrospectively, and into the future.

    Join not one, but three CTOs from OpenDNS, AMP Threat Grid and Lancope for a complete review of what it takes to accelerate investigations, decrease incident response times, and uncover potential attacks before they are launched.

    Hear from OpenDNS CTO, Dan Hubbard, Lancope CTO, TK Keanini, and Threat Grid CTO, Dean De Beer on August 22nd at 10am PT. You’ll learn:

    -Strategies for addressing customer incident response challenges across Network, Endpoint and Cloud
    -Three unique approaches for digging deeper into what happened before, during, and after an attack
    -How together OpenDNS, AMP Threat Grid and Lancope combine to give you the best incident response portfolio

    Register now and let the hunting begin.
  • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Aug 18 2016 35 mins
    Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

    The path to narrowing the time gap between compromise and discovery, and then neutralizing business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

    In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

    You’ll learn:

    • How to calculate the total cost of ownership of a SIEM
    • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
    • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

    Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.
  • Know Your Enemy: New Financially-Motivated & Spear-Phishing Group Know Your Enemy: New Financially-Motivated & Spear-Phishing Group Steve Elovitz, Manager, Consulting Services (Mandiant), Ian Ahl, Manager, Incident Response (Mandiant) Recorded: Aug 18 2016 50 mins
    Beginning in January 2016, Mandiant identified a financially-motivated threat actor that launched several tailored, spear-phishing campaigns—targeting industries that process large volumes of consumer credit cards such as retail, restaurant, and hospitality. To date, Mandiant has seen this group at over 150 organizations. This group is interesting due to the large number of organizations they quickly targeted, how quickly they shift tools, tactics, and procedures (TTPs), and their unusual persistence in attempting to re-compromise an organization after remediation.

    During this conversation, we will walk through examples from several Mandiant investigations of this groups activity. We will take a technical look at this threat actor's TTPs as well as talk about what to look for to determine if they are active in your environment.

    Register for this webinar as our experts share key insights on this new cyber threat group!
  • Improving on "Whack-a-Mole" Vulnerability Management Improving on "Whack-a-Mole" Vulnerability Management Joseph Blankenship Senior Analyst, Forrester & Jimmy Graham Director, Product Management, Qualys Recorded: Aug 18 2016 50 mins
    The need to prioritize vulnerability management (VM) is greater than ever as IT security teams become overwhelmed with trying to protect against every threat that pops up. Organizations that understand the varying risks across vulnerabilities can focus on resolving dangerous exploitation, and avoid wasting crucial time addressing insignificant ones.

    We invite you to attend the “Improving on 'Whack-a-Mole' Vulnerability Management” webcast featuring guest speaker Joseph Blankenship, Senior Analyst at Forrester, and Jimmy Graham, Director of Product Management at Qualys.

    The following topics will be discussed during the webcast:

    * Forrester data trends and insights from real-world client scenarios

    * Why vulnerability management needs to be prioritized and elevated

    * How Qualys ThreatPROTECT shows you what to remediate first (led by Qualys)


    This webcast includes a live Q&A.
  • The Business Impact of Fast Data Analytics The Business Impact of Fast Data Analytics Impetus; Fannie Mae Recorded: Aug 18 2016 61 mins
    The promise of big data is greater than ever before…due to an explosion in the number and variety of data sources. This has caused a shift from traditional structured, and batch or periodic data warehouse environments to today’s more complex combination of structured with semi & unstructured data, along with the requirement to apply analytics in real-time. To determine how best to deliver on the full promise of this opportunity, enterprises today have to sort through an often confusing array of commercial and open source solutions.

    This webinar will feature a real-world example describing how Fannie Mae worked with partners Hortonworks and Impetus Technologies to develop a streamlined solution to:
    -Reduce the cost and complexity of their data infrastructure by leveraging more efficient and effective big data and fast data ingestion platforms
    -Deliver net new analytics capabilities
    -Apply data quality checks and data enrichment at the point of ingest through the use of real-time analytics
  • Briefings Part 2: The Evolving Nature of Ransomware Attacks Briefings Part 2: The Evolving Nature of Ransomware Attacks Ryan Benson, Senior Threat Researcher, Exabeam; Brandon Dunlap, Moderator Recorded: Aug 18 2016 59 mins
    Like all cyber threats, ransomware continues to evolve and its effects will cause significantly greater impact to corporate organizations and networks. Just as computer viruses caused more damage as they grew in sophistication, ransomware is increasing its way to enter networks and wreak more havoc. Newer strains now know to look for networked file shares as encryption targets. Do you know what signals to look for to detect ransomware as it begins to attack? Exabeam researchers have analyzed nearly 100 strains of malware and have categorized some of the more aggressive techniques being used. Join Exabeam and (ISC)2 on August 18, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms ransomware might use to propagate and how to detect signs of these mechanisms in use.
  • Simplify Your Google Apps Collaboration and Management with IDaaS Simplify Your Google Apps Collaboration and Management with IDaaS Nathan Chan, Solutions Architect at OneLogin Recorded: Aug 18 2016 44 mins
    Google Apps for Work is a preferred solution for productivity and collaboration in the modern enterprise. But with a large suite of tools, proper provisioning and maintenance is anything but easy. Attempting to roll out Google Apps to the right users with the right access often results in over-extended IT resources, delayed employee on- and off-boarding, and misallocated access to key documents and data.

    It doesn’t have to be this way. Hundreds of organizations are using OneLogin’s best-in-class directory integrations to achieve faster Google Apps time-to-value and on-going application security and automation.

    Join OneLogin for an informative webinar designed to get you through the most complex of Google Apps deployments.
  • Intelligent Endpoint Security: Why Taking A Modern Approach Matters Intelligent Endpoint Security: Why Taking A Modern Approach Matters Robert Westervelt, Research Manager at IDC Security and Alejandro Borgia, VP Product Management at Symantec Recorded: Aug 18 2016 61 mins
    Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.

    Join us for an interactive discussion and learn more about:

    • How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection

    • What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack

    • Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems

    • How risk assessment plays a role in strengthening your security to preempt future attacks
  • Microsoft SQL Series: 5 steps to Migrate from Oracle to SQL Server Microsoft SQL Series: 5 steps to Migrate from Oracle to SQL Server Kevin Orbaker & Rajinder Gill Recorded: Aug 17 2016 65 mins
    Migration is a process. We have in-depth methodologies, resources, offers and tools to help you move from Oracle to SQL Server quickly and painlessly. Learn 5 steps to migrate from Oracle and unlock value from your data using the cutting edge capabilities of SQL Server.

    Join this session to learn about the 5 steps in migration:
    •Assess your current data systems
    •Develop a Migration Plan
    •Deploy to the new system
    •Validate everything is working properly
    •Cutover from your old system
  • Five Reasons NOT to Run a Bug Bounty Program Five Reasons NOT to Run a Bug Bounty Program Adam Bacchus, Chief Bounty Officer, HackerOne Recorded: Aug 17 2016 27 mins
    Thinking of starting a bug bounty program, but have some concerns about it? HackerOne's Chief Bounty Officer Adam Bacchus will address five of the most commonly heard reasons organizations do NOT want to start a bug bounty program. He'll dispel some of the most common concerns holding your organization back from working with the world's best hackers to help you find bugs before the bad guys do, including:

    1. Who are these hackers?
    2. It’s a budgeting black hole!
    3. We don’t have bandwidth to start and run a bounty program!
    4. It’ll be a PR disaster!
    5. ...you’ll have to watch to find out!)
  • Thwarting Cybercrime in Healthcare with Continuous AppSec Testing Thwarting Cybercrime in Healthcare with Continuous AppSec Testing Lynne Dunbrack, IDC Health Insights; Michael Goldgof, WhiteHat Security Recorded: Aug 17 2016 55 mins
    Healthcare organizations are increasingly vulnerable to devastating cybercrime attacks on a daily basis. Web applications in healthcare are particularly exposed to such attacks. This webcast will explore how continuous application security assessment-as-a-service which combines machine and human intelligence can help healthcare organizations improve their security and risk posture.

    Please join us as IDC’s Lynne Dunbrack and WhiteHat Security’s Mike Goldgof discuss the role of application security in healthcare. You will learn:

    - Today’s cyberthreat landscape in the healthcare industry
    - Relevant security regulations for healthcare: HIPAA, Breach Notification IFR, HITECH Act, and more
    - Vulnerability statistics for healthcare organizations
    - How continuous application security testing can help your security and risk posture
  • Preventing Ransomware in Healthcare Preventing Ransomware in Healthcare Matt Mellen, Security Market Architect, Palo Alto Networks Aug 24 2016 2:00 am UTC 60 mins
    The business model behind crimeware has changed. In recent years, the price of stolen records has plummeted, compelling cyber attackers to look for new sources of income. Many attackers have turned to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data. Now, barely a week passes without another healthcare organization experiencing a ransomware event. These events impact the quality of care clinical facilities can provide, costs organizations money in remediation efforts, and hurts their reputation as competent providers of care. But while as scary as ransomware can be, with new variations coming out all the time, there are straightforward steps organizations can take to prevent this threat.

    In this presentation, Matt Mellen, a former Information Security Lead at a hospital, will discuss practical steps healthcare organizations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will cover practical steps healthcare organizations can take on systems and network devices to prevent exposure to this rampant attack.

    Palo Alto Networks invite you to attend a webinar where you can learn how to protect your healthcare organization from ransomware attacks. We will cover:
    - How the most current variants of ransomware work
    - How to prevent successful ransomware attacks in Healthcare

    Ransomware Prevention Recommendations:
    https://www.paloaltonetworks.com/content/dam/adobe-campaign/Email-Assets/APJ/DG%20Hub/industries/ransomware-prevention-recommendations.pdf
  • 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 利用大数据实现积极且具有高度关联性的安全防御Using Big Data For Active And Contextual Security 周德振(Adam), 高级解决方案顾问, Akamai Technologies Aug 24 2016 6:00 am UTC 60 mins
    *This webinar will be conducted in Mandarin
    Organizations are turning to leverage big data and analytics to ‘look’ for indicators of intent or indicators of compromise, thus helping organizations focus their security resources on the threats at hand. The challenge though is how to process the vast amount of data, and furthermore, keep it relevant, timely, actionable – contextual. The challenge becomes harder when threat actors utilize a variety of techniques to maintain anonymity, reduce their ‘fingerprint’ and mask their intent.

    In this webinar, Adam will share how Akamai leverages the vast amount of data that it sees daily to help its customers improve their security decisions, when the threat would otherwise be unclear. John will showcase how Akamai’s big data and analytics platform, Cloud Security Intelligence, powers its Client Reputation service. A service that provides the ability to forecast intent and protect applications against Distributed Denial of Service (DDoS) and application layer attacks, and how active defence can be applied to a variety of response mechanisms, delivering an intelligent contextually aware defence.

    各家机构正越来越倾向于使用大数据资源来“查找”各种恶意行为的迹象、甚至是破坏的先兆,来帮助机构把有限的安全资源集中在关注现有的威胁之上。但是,挑战在于如何处理这样大量的数据,而且保证数据的相关性、及时性和可用性不会受到影响。而且,随着安全威胁使用了更多样的技术来保证其匿名性、减少留痕并掩盖其意图,机构所面临的安全挑战也越来越严峻。

    在本次的网络研讨会中,Akamai 高级解决方案顾问-周德振先生(Adam),将会向您展示Akamai是如何在威胁尙不明确的情况下,使用每日承载的海量数据来帮助客户做出更加明智的网络安全决策的。Adam将会展示Akamai的大数据及分析平台、云安全智能是如何强化其客户端信誉(Client Reputation)服务。这种服务能够提前预告各种行为的迹象,并保护应用程序不会受到DDoS和应用层攻击。此外,您还将看到这种积极的安全防御是如何帮助各种响应机制,是如何交付智能化、高度关联的防御。

    8月24日(周三)| 时长60分钟 | 北京时间 14:00
    演讲人: 周德振(Adam), 高级解决方案顾问, Akamai Technologies
    主持人: 毛宇, CISSP, AMBCI, CCNP, PRINCE2, (ISC)²官方授权讲师


    预留席位,就在此刻!

    *This webinar will be conducted in Mandarin
  • Preventing Ransomware in Healthcare Preventing Ransomware in Healthcare Matt Mellen, Security Market Architect, Palo Alto Networks Aug 24 2016 9:00 am UTC 60 mins
    The business model behind crimeware has changed. In recent years, the price of stolen records has plummeted, compelling cyber attackers to look for new sources of income. Many attackers have turned to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data. Now, barely a week passes without another healthcare organization experiencing a ransomware event. These events impact the quality of care clinical facilities can provide, costs organizations money in remediation efforts, and hurts their reputation as competent providers of care. But while as scary as ransomware can be, with new variations coming out all the time, there are straightforward steps organizations can take to prevent this threat.

    In this presentation, Matt Mellen, a former Information Security Lead at a hospital, will discuss practical steps healthcare organizations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will cover practical steps healthcare organizations can take on systems and network devices to prevent exposure to this rampant attack.

    Palo Alto Networks invite you to attend a webinar where you can learn how to protect your healthcare organization from ransomware attacks. We will cover:
    - How the most current variants of ransomware work
    - How to prevent successful ransomware attacks in Healthcare

    Ransomware Prevention Recommendations:
    https://www.paloaltonetworks.com/content/dam/adobe-campaign/Email-Assets/APJ/DG%20Hub/industries/ransomware-prevention-recommendations.pdf
  • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Aug 24 2016 1:00 pm UTC 45 mins
    Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

    The path to narrowing the time gap between compromise and discovery, and then neutralising business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

    In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

    You’ll learn:

    • How to calculate the total cost of ownership of a SIEM
    • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
    • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

    Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.
  • Introducción a las pruebas de DSL: parte 2 Introducción a las pruebas de DSL: parte 2 Jesus Resendiz, Applications Engineer, EXFO Aug 24 2016 3:00 pm UTC 60 mins
    Participe en este seminario web sobre las técnicas, la tecnología y las prácticas recomendadas de las pruebas de DSL.

    En este seminario trataremos los conceptos siguientes:

    •Evolución de la tecnología de DSL
    •Características y aplicaciones principales de las diferentes tecnologías de DSL
    •Técnicas y parámetros principales para las pruebas de DSL
  • Executive Webinar Series: Cut Audit Prep with Continuous Compliance Executive Webinar Series: Cut Audit Prep with Continuous Compliance John Parmley, Area VP, Tufin Aug 24 2016 3:00 pm UTC 30 mins
    Today's expectations of security executives is to do more with less: provide tighter security with less resources for a dynamic, hybrid, complex IT environment.
    As an existing Tufin customer, you can turn the Tufin Orchestration Suite from a management tool into a strategic infrastructure.

    Join us for the second webinar in our Executive Webinar Series: "Cut Audit Prep and Tighten Security with Continuous Compliance" and learn how you can maximize your Tufin investment to:
    •Cut audit preparations by enforcing continuous compliance across the hybrid network
    •Tighten security posture with a unified zone-based security policy
    •Maximize agility AND policy compliance with proactive risk analysis
    Reserve your seat now!
    We look forward to you joining us.
  • Standardization and visibility of security controls in Hybrid Standardization and visibility of security controls in Hybrid Avinash Prasad and Munish Gupta of Infosys Ltd Aug 24 2016 3:00 pm UTC 60 mins
    The needs for IT agility for business, is driving adoption of flexible computing environments including IaaS, Private Cloud among others. The challenge associated with this transformation towards the Hybrid cloud environment is the assurance around the security for the workloads and data. Specific issues arise due to the “Shared security model ” of the varying Cloud environments in terms of implementation of security, compliance and optimization in these environments.

    The need of the hour is to ensure effective security governance through standardization of security controls/Policies across Hybrid cloud deployments are driven by embedded security mechanisms with lesser bolted-on overhead on the IT security teams. One successful example is the leveraging of “security for the cloud from the cloud” to provide elastic and adaptive security services for the hybrid cloud

    In this webinar, Avinash Prasad, AVP, Information & Cyber Risk Management and Munish Gupta, Principal – Information & Cyber Risk Management , Infosys (NYSE: INFY) will share their experiences with respect to standardization of security controls in Hybrid cloud environments.
  • Creating Truly Personalized Apps with Transaction Data Insights Creating Truly Personalized Apps with Transaction Data Insights Evan Schuman, Moderator, VentureBeat Aug 24 2016 5:00 pm UTC 60 mins
    Rapidly evolving trends among digital financial services are driving fintech developers to create much more personalized customer experiences within their applications. By harnessing the power of consumer transaction data, these industry innovators can enhance customer engagement and drive more targeted cross-sell and upsell revenue opportunities.

    Analyzing consumers’ financial data is quickly becoming the future of online banking and those in the fintech community that can leverage this information quickly and effectively will have the edge and be able to deliver the personalized services necessary to attract and retain the next generation of banking customers.

    Join us on August 24 to hear from a panel of industry experts as we discuss the evolution of consumer transaction data analytics and how to leverage it to create a more contextualized and personalized user experience.

    We’ll discuss:
    * The increasing demand for fintech apps to create an individualized digital banking experience
    * The rapid advancement of gathering and analyzing consumer transactional data
    * How fintech developers can leverage contextual data to improve customer products

    Speakers include:

    * Alex Cram, Co-Founder and Chief Technology Officer, Track Technologies
    * Robin Verderosa, Senior Product Manager, Envestnet | Yodlee
    * Jim Del Favero, Chief Product Officer at Personal Capital
    * Mani Fazeli, VP of Product, Wave
    * Evan Schuman, Moderator, VentureBeat

    Register for this free event today!

    Sponsored by: Yodlee
  • Security in the Boardroom Series: Keeping Your Seat at the Table Security in the Boardroom Series: Keeping Your Seat at the Table Ashley Ferguson, Director, SecureWorks Governance, Risk & Compliance Aug 24 2016 6:00 pm UTC 60 mins
    This webinar will explore another aspect of the CISO’s role as an essential business leader: guiding the organization through the crisis of a breach.

    Featuring insights from CISOs and C-suite leaders who have been there and done that, the program will address incident response planning, setting C-suite and board expectations, and tips for providing the right information in a breach crisis situation to aid decision-making and public disclosures. Learn how to establish your role as part of the solution team, and how to avoid a reactionary response that too often leads to finger-pointing at the security team. You’ll take away actionable insights to apply to your own journey as an essential business leader.
  • Using Container Technologies for Agile, Scalable Application Releases Using Container Technologies for Agile, Scalable Application Releases Ian Philpot, Sr. Technical Evangelist, Microsoft Corporation and John Willis, Director of Ecosystems Development, Docker Aug 24 2016 6:00 pm UTC 60 mins
    Want faster time to deployment? Need to quickly scale your applications? Microsoft can help.

    Microsoft offers a comprehensive set of container technologies for scalable, high availability, and agile release cadence. Join us for an overview of how containers can improve your organization's application development lifecycle. The session will leverage real world examples and highlight Docker.

    Watch this webcast to understand:
    •The beneficial impact of adopting container technology
    •Installation, security, design considerations and deployment operations followed by a quick tour of the Docker platform
    •How container technology positively impacts operations

    Sign up now to save your space for the live event, or to receive notification when this webcast is available on-demand.
  • Active Hunting Revealed: How vSOC Identifies Threats in Your Environment Active Hunting Revealed: How vSOC Identifies Threats in Your Environment Stephen Jones, Dir. of Managed Services, GuidePoint Security & Kris Merritt, Sr. Director, Hunting Operations, CrowdStrike Aug 24 2016 6:00 pm UTC 60 mins
    The GuidePoint Virtual Security Operations Center (vSOC) was designed to address many of the common complaints and issues customers experience with other managed service providers. We use the cloud to provide dynamic scalability and cost savings. vSOC analysts provide validated security incidents that allow you to focus on what’s really important: remediation.

    vSOC Detect now integrates with CrowdStrike Falcon by leveraging the Falcon Connect API to ingest Falcon host data in to the vSOC Detect monitoring platform. This integration enables vSOC Detect to leverage the CrowdStrike platform for endpoint monitoring and allows analysts to correlate endpoint data against SIEM security logs. This added correlation within our SIEM enables active hunting by vSOC Detect analysts to discover new and emerging threats in customer environments.

    Join us to explore “Hunting with CrowdStrike”— and how our Integrations make CrowdStrike Falcon Versatile and Effective.

    Topics will include:
    - Using the CrowdStrike Integration vSOC Detect
    - Learning how analysts can:
    - Perform ad-hoc searches and queries
    - Quickly Conduct comprehensive investigations
    - Identify insider threat activity
    - Create dashboards and reports
  • Grid Cyber Lockdown: Ransomware in Critical Infrastructure Grid Cyber Lockdown: Ransomware in Critical Infrastructure - Aug 25 2016 2:00 am UTC 60 mins
    Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:
    - A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
    - A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
    - Best practices and technologies for protecting your organization against ransomware.

    Panelists
    Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
    Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
    Christopher Ellefsen, BKK Group, Senior Network Engineer
    Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
    Jack Whitsitt, EnergySec, Senior Security Strategist
    Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security
  • Grid Cyber Lockdown: Ransomware in Critical Infrastructure Grid Cyber Lockdown: Ransomware in Critical Infrastructure - Aug 25 2016 9:00 am UTC 60 mins
    Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:
    - A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
    - A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
    - Best practices and technologies for protecting your organization against ransomware.

    Panelists
    Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
    Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
    Christopher Ellefsen, BKK Group, Senior Network Engineer
    Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
    Jack Whitsitt, EnergySec, Senior Security Strategist
    Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security
  • Ransomware: How to Battle the Most Evolved Ransomware: How to Battle the Most Evolved Brendan Patterson and Ben Brobak Aug 25 2016 4:00 pm UTC 60 mins
    Large corporations are no longer the primary target for hackers, making network security for small and mid-sized businesses more important than ever before. Ransomware has evolved dramatically over the last few years, but one thing remains the same: it can wreak havoc the likes of which many businesses will never recover from.

    Join Brendan Patterson, Director of Product Management, and Ben Brobak, Technical Marketing Engineer, as they take a look at the evolution of Ransomware – and the best ways for businesses to protect themselves.
  • The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software Aug 25 2016 5:00 pm UTC 60 mins
    Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

    Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.

    Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
  • Secure Storage: Keys to Successful State and Local Data Strategy Secure Storage: Keys to Successful State and Local Data Strategy Presented by: Veritas Aug 25 2016 6:00 pm UTC 60 mins
    As citizens increasingly demand faster and more responsive government platforms, harnessing the enormous amounts of data state, county and municipal governments generate is essential to optimizing operations and delivering these services. Left siloed and unattended, big data proves a costly headache; however, when properly managed, this data is a treasure trove that can fundamentally change the way services are delivered.

    In this viewcast, we'll take a look at the results of a recent Government Business Council research survey on how state and local officials are dealing with unstructured data and their strategies for organizing, protecting and leveraging it. Data experts will explore case studies and best practices on managing and processing big data at the state, county and municipal level.

    Join us to hear about the following:
    - Storing data with effective and cost-efficient methods
    - Securing data through the cloud
    - Using data to deliver more services faster and at a higher quality
  • Breach Detection Systems The final protection? Breach Detection Systems The final protection? Thomas Skybakmoen Aug 25 2016 6:00 pm UTC 45 mins
    Find out how a breach detection system, which is designed to detect the activity of malware inside your network after a breach has occurred, can strengthen your defense.
  • How to (effectively) prevent ransomware infections How to (effectively) prevent ransomware infections Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Aug 26 2016 2:00 am UTC 60 mins
    Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.

    In this webinar you learn how Palo Alto Networks addresses today’s issues of network complexity, overwhelming data flows, and convoluted security rules with the Panorama network security management solution.