Hi [[ session.user.profile.firstName ]]

IT Security

  • Fighting the ‘Gap of Grief’ With Business-Driven Security Fighting the ‘Gap of Grief’ With Business-Driven Security Peter Beardmore of RSA Mar 1 2017 6:30 pm UTC 60 mins
    Defending against human ingenuity demands a new way of thinking. With countless dollars spent and infinite alerts you still don’t have a true picture of what is going on. So when a breach happens, can you answer THE question: “How bad is it?” The inability to do so is what RSA calls the “gap of grief.” To answer, you must connect your security strategy and business risks.

    RSA’s cybersecurity expert, Peter Beardmore, will provide perspective on this important issue during this pointed webcast designed to help security leaders:
    - Learn how to garner the right visibility, in the right context to defend what matters most – and fast;
    - Discover the 6 steps to take command of your evolving security posture in this uncertain, high risk world; and,
    - Find out what it takes to link your security strategy with your business priorities.
  • How to Prevent Ransomware Infections How to Prevent Ransomware Infections Brook Chelmo Mar 1 2017 7:00 pm UTC 60 mins
    With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.

    SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.

    Learn how to:
    •Stay safe from ransomware and other advanced attacks
    •Practice good security hygiene
    •Use trusted automated tools to protect your network and endpoints
  • Advanced Endpoint Protection (AEP) - Market Analysis and Survey Results CY2016 Advanced Endpoint Protection (AEP) - Market Analysis and Survey Results CY2016 Paula Musich, Will Fisher Mar 1 2017 7:00 pm UTC 60 mins
    There is a lot of confusion in the crowded market of Advanced Endpoint Protection (AEP). This webinar will provide an overview of the NSS Labs AEP market assessment, including origins, drivers, inhibitors and major players. Included is results of a survey of buyer’s requirements, priorities and expectations.
  • Redefining Endpoint Threat Hunting with Behavioral Analysis Redefining Endpoint Threat Hunting with Behavioral Analysis Mike Vien, Malware and Forensic Expert Mar 1 2017 7:00 pm UTC 60 mins
    Join Mike Vien, Malware and Forensic Expert, for an interactive demonstration of determining the infection of know and non-know malware thru endpoint scanning using CounterTack’s powerful DDNA core that relies on behavioral intelligence, not signatures or patterns.

    Unknown threats don’t execute with any indicators and are not previously seen in an organization’s network, data center or within the user base. These are commonly referred to as zero-day threats. And most endpoint detection engines will not identify the right behaviors associated with unknown threats because they rely on signatures.

    ThreatScan PRO lets IT and security teams of any size and skill level apply the most powerful memory-based, endpoint scanning technology to determine the infection state based on malware infiltration. CounterTack delivers visibility into endpoint state for teams with a 100% cloud-delivered technology, and the expertise of a CounterTack expert to analyze critical scans. Leverages behavioral intelligence to identify malware artifacts and other indicators of potential compromise, calculating a module-level threat score, to give users the data they need, or the capability to remove it and eradicate it automatically.

    Attendees of this session will receive a limited-time only incentive to buy ThreatScan PRO.
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Mar 2 2017 2:00 am UTC 60 mins
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Mar 2 2017 8:00 am UTC 60 mins
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • How to Enable Zero Trust Security for Your Data Center How to Enable Zero Trust Security for Your Data Center John Kindervag, Vice President and Principal Analyst at Forrester Mar 2 2017 2:00 pm UTC 60 mins
    The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

    Topics covered in this webinar will include:

    - 5 Steps to achieving Zero Trust enabled data centers.
    - Extending Zero Trust design principles across hybrid cloud deployments
    - Security policy considerations and guidelines for implementing Zero Trust enabled data centers.
  • [Video Interview] Threat Management and the Keys to Avoiding a Major Data Breach [Video Interview] Threat Management and the Keys to Avoiding a Major Data Breach Ross Brewer, VP & MD, LogRhythm & Josh Downs, Community Manager, BrightTALK Mar 2 2017 3:00 pm UTC 30 mins
    Research shows that 76% of companies suffered a data breach in 2016, so it’s now almost inevitable that hackers will gain access to your company and your sensitive data.

    Security professionals are now looking to deal with breaches faster, to keep their company off the front page and with heavy GDPR fines on the horizon, they’re wise to do so.

    Organisations are fearful of damaging data breaches but unsure of the best course of action to protect themselves from major cyber incidents. Whilst a large per cent of businesses focus on building up perimeter defences, not enough are concentrating on monitoring their own network to detect threats and mitigate them before significant damage is done.

    Tune into this in-depth one-on-one interview to discover:

    •More about the current threat landscape and the dangers to your organisation.

    •How you can reduce the time to detect and respond to threats without adding staff to accomplish the job.

    •More about how cutting edge technology can be used such as:
    oAdvanced machine analytics, which are key to discovering potential threats quickly.
    oSecurity automation and orchestration capabilities, which increase the efficiency of the threat lifecycle management process.

    •The influence that GDPR will have and steps you need to take.
  • [VIDEO] Cyber Opportunities for the New US Political Administration in 2017 [VIDEO] Cyber Opportunities for the New US Political Administration in 2017 Josh Downs, Community Manager, BrightTALK & Simon Crosby, Co-Founder & CTO, Bromium Mar 2 2017 4:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with Bromium's Co-Founder and CTO Simon Crosby in conversation with Josh Downs, Community Manager, BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • The NYS Cyber Security Regulation Is Mandatory: Now What? The NYS Cyber Security Regulation Is Mandatory: Now What? Craig A. Newman, Partner at Patterson Belknap Webb & Tyler LLP, Steven Grossman, VP of Strategy and Enablement, Bay Dynamics Mar 2 2017 5:00 pm UTC 60 mins
    The New York State Cyber Security Regulation for financial organizations becomes mandatory March 1st. Since our last webinar, the requirements have been updated. The revised regulation, which NYS banks, insurance companies, and other financial services institutions regulated by the Department of Financial Services must follow, includes changes surrounding risk assessments, encryption, cyber security policies, cyber governance and more. Join us for this second webinar specifically addressing the revised components of the regulation and what financial organizations inside and outside of NYS should be doing now that the regulation is taking effect.
  • How Not to Get Fired as a CISO How Not to Get Fired as a CISO Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy Mar 2 2017 6:00 pm UTC 60 mins
    Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.

    That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it.

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:

    *What is the Two-Year Trap and how to avoid it
    *How to manage the long-term vs. short-term security view
    *What do about trendy security attacks

    Join us to learn how CISOs can extend their life expectancy with a long-term view.
  • CTO PoV: Enterprise Networks CTO PoV: Enterprise Networks Khalid Raza, CTO & Co-Founder, Viptela Mar 2 2017 6:00 pm UTC 45 mins
    Rapidly changing enterprise application requirements, the cloud, and mobile computing are placing stress on traditional wide area networks (WANs). Enterprises are being challenged to rethink network architectures to meet present and future business requirements.

    Khalid Raza, CTO and Co-Founder at Viptela, will discuss why current WAN infrastructures are not designed to support new enterprise traffic patterns, and how emerging approaches can help organizations adapt to these changes.

    In this webinar, we will cover:

    - Key applications molding enterprise network requirements
    - Impact on current WAN architectures & shift in present and future business needs
    - How enterprise network teams and service providers can adapt the traditional WAN to support new traffic patterns
  • How to Invest Your 2017 Cyber Security Training Budget for Maximum ROI How to Invest Your 2017 Cyber Security Training Budget for Maximum ROI Matt Kuznia & Jim Mitchell Mar 2 2017 6:00 pm UTC 60 mins
    When it comes to securing an organization’s network, most stakeholders understand that cyber security education and training are not a luxury – they're a necessity. In this webinar we will discuss how best to spend those precious training dollars to get a solid return on investment.