The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Join this interactive Q&A panel to discover the biggest lessons of the recent Equifax breach and how to apply them toward improving your and your organizations cyber security.
Viewers will learn:
- The magnitude of the impact of this breach across consumers and industries
- The true costs of a breach
- How to discover if your personal information has been exposed and what you can do about it
- What to expect in terms of cyber threats in the future
- How can to protect your data and secure your organization
- Expert recommendations on improving breach protection, detection and response
- Brian Robison, Sr. Director of Security Technology, Cylance
- Stephan Chenette, CEO, AttackIQ
- Michael Davis, CTO, CounterTack
- Kevin Flynn, Global Director of Products, Skybox Security
Join us for this virtual panel discussion where guest speaker, Forrester's Joseph Blankenship and Siemplify's Amos Stern will present research and best practices driving Security Operations and how Security Orchestration and Automation are shaping the SOC of the Future.
Security Automation and Orchestration are increasingly looked to enable analysts to triage the tsunami of alerts flooding the organization, provide context to accelerate investigation, and provide the playbooks and workflow to drive consistency and efficiency throughout security operations.
In this discussion we will address:
- How to drive efficiency and effectiveness across security operations
- What does the SOC of the future look like and how do we get there
- What should security teams be looking for in Security Orchestration
As malware and ransomware become more commercialized, and the evolution of threats accelerates, it’s hard for organizations to keep up – even when they have multiple security products deployed. The latest SANS Cyber Threat Intelligence Survey showed that organizations using threat intelligence can gain dramatic improvements in visibility into threats, to enable a faster and more accurate response.
Join AlienVault for this practical session to learn how smart security teams are integrating cyber threat intelligence into their day to day operations. You'll learn:
- What threat intelligence is, and how it speeds threat detection and incident response
- Key questions to help you evaluate threat intelligence sources and plan for integrating it into your operations
- How AlienVault USM Anywhere integrates threat intelligence with other security capabilities to save valuable time
- A demo of AlienVault USM Anywhere showing how threat intelligence adds valuable context to alarms
Today, malicious bots represent an unprecedented threat to organizations of all sizes. The threat is only going to get worse in the next few years, as more-and-more vulnerable IoT devices make their way to the Internet. Bots can be blamed for the world’s largest DDoS attack on record, generated by IoT cameras that were infected with the Mirai malware, and commandeered into a bot army with amazing firepower. And if you think that’s bad, wait till you see what they’re going to do next. Your applications, websites, networks, APIs, and your data will become their next targets.
Join this webinar with other cybersecurity professionals where you’ll learn:
- Why malicious bots represent an unprecedented threat to businesses of all sizes
- What other hazards can we expect to experience due to the malicious bot phenomenon
- What actions can organizations take to manage their risk in the coming bot Armageddon
Join this interactive webinar to learn more about threat hunting:
- What is a Threat Hunting Program?
- What is included in it?
- The reasons and benefits of why a business should have a threat hunting program.
- Dennis Leber, CISO at Commonwealth of Kentucky Cabinet of Health and Family Services
- Adrian Kirk, Information Security and Compliance Analyst - Kentucky Cabinet of Health and Family Services
Across organizations, Office 365 is accelerating the digital transformation. This transformation also includes many other popular SaaS applications. This means new ways of communication and collaboration. As employees feel empowered to achieve more, what new considerations does this means for you to ensure security, protect data, and mitigate compliance risk?
Watch this webinar to learn:
· Hear about new types of risk this transformation introduces to your people and data
· Learn about the evolution of compliance requirements in the modern workplace
· Identify steps and effective countermeasures to protect your people, data, and brand in Office 365, G Suite, and more.
Web Isolation gives you safe access to uncategorized and potentially risky websites, without risk of malware infection.
This powerful category of technology, predicted by Gartner to be adopted by 50% of enterprises by 2021. Web Isolation creates a secure execution environment between end-users and the web, sending only a safe visual stream to users’ browsers.
Since no code is actually executed on endpoint machines, Symantec Web Isolation eliminates web-borne threats from ever reaching their devices.
Find out how Symantec is integrating Web Isolation with other products in its Web and Cloud Security portfolio to keep you safe from ransomware and other advanced threats.
In a rapidly evolving and digitized economy, the adoption of cloud services is accelerating for companies both small and large who want to remain competitive and relevant to their market and clients. Network transformation becomes critical for enterprises to support these cloud initiatives and in this context the emergence of SD-WAN is very timely. If you are considering SD-WAN to access cloud applications and leverage the Internet for your wide area network, this webinar will provide insight into real life SD-WAN deployment considerations. This knowledge will help you fast track your SD-WAN decision-making process and avoid costly mistakes.
Join this webinar to learn:
• How connectivity and security need to be a critical consideration of SD-WAN deployment, both at the data center and small branch office level
• How SD-WAN network analytics can provide you with detailed visibility into the behavior of your network and can help your IT organization better manage workload and performance
• Why it’s important to select a partner who is flexible and can offer choices from the design, deployment and management of the transformation
• And more
Far too often, testing software for security flaws falls into the “nice-to-have” category, taking a backseat to the demands of the marketplace and inflexible feature release schedules. In addition to the expense of hiring an outside security testing team, testing for and fixing obscure security bugs is a brake on an engineer’s ability to put new code in the hands of their customers. Fortunately, there is a workaround to this dilemma that will allow you to promote application security awareness while helping to reduce security bugs in your applications.
An internal bug hunt contest - in which your employees compete for prizes by finding and reporting security bugs - enables you to harness the creativity and problem-solving skills of your workforce while reducing security bugs in your applications. It can also help promote a culture of security awareness - without a large security testing budget.
An internal bug hunt contest can you help you:
• Find and remediate vulnerabilities before external entities can exploit them
• Provide a safe platform for your application owners to test for security bugs
• Promote application security awareness
• Engage employees outside of the central security team who want to explore the security domain
In this webcast, you will learn how an internal bug bounty program can help you find security flaws in your applications before criminals or spies, while improving the security culture at your company.
Today’s businesses are embracing anywhere, anytime connectivity. But what often gets ignored is the need for secure network access control. Some are using a “laid back NAC” solution while others choose the same vendor for both security and network infrastructure. The danger of these approaches is that they give the illusion of security and compliance, but in reality leave extensive security gaps.
What is your business doing to protect your network?
•What’s on my network?
•How do I simplify mobile security?
•Can I limit mobile devices without limiting productivity?
•How do I unify internal and external security tools?
View this webinar to learn how you can improve the end-to-end security across your enterprise.
Join us for our follow-up webcast with a focus on Panorama and Networking enhancements to get a quick overview of software deployment, integration architecture and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Registrants will:
•Learn about the key capabilities introduced by 8.0
•See the value of the update to security deployments
•Receive a voucher for 8.0 training course - $500 value.
Software Asset Management (SAM) plays a critical role in a fast growing, mission-critical use case: Enabling and Strengthening Cybersecurity. In today’s world of mounting external security attacks, we are often too focused on trying to anticipate new threats originating outside our organizations. However, we also, and maybe first, need to look within. One of the first steps in establishing a strong cybersecurity practice involves knowing what you need to protect and where those assets are. Most of the processes and methodologies used in establishing effective SAM should be applied hand-in-hand with your organization’s security protocols to ensure that all parts of your IT enterprise are continually up-to-date and secure from both internal and external threats. This session will address these points and best practices for leveraging SAM to strengthen your cybersecurity.
As a valued Tufin customer, we invite you to learn about the latest release of Tufin Orchestration Suite R17-2 that includes new features to automate firewall administration tasks and includes new support for Cisco Firepower, VMware NSX, Microsoft Azure, Check Point R80.10, and Palo Alto Networks Panorama solutions.
We will explain how these Tufin features will improve the management of your network and security through:
•The addition of server decommissioning to the previously released rule decommissioning for more efficient firewall administration
•Integration with Cisco Firepower Management Center – the first NSPM vendor to add support!
•Support for Check Point R80.10, Microsoft Azure Resource Manager, and updated change automation for Palo Alto Networks Next-Generation Firewall policies
•Automation of VMware NSX in Palo Alto Networks environments
Managing container infrastructure in a production environment is challenged by problems of scale. One of the biggest problems is trust—specifically trust of the application. To put it another way, can you trust that all containers in your Kubernetes or OpenShift cluster are performing the tasks you expect of them? We know that containerization has increased the pace of deployment, but has trust kept pace? If a container becomes compromised in some fashion, how many other containers are at risk and how far has trust been broken?
Tim Mackey explores the nature of data center threats, why threat models fail, how malicious attackers design their attacks, when the threat risk increases prior to attack and why information flow matters, and how traditional defenses are inadequate for container workloads. Tim then shares measures you can take to proactively identify risks, including OpenShift integrated tooling to identify container images with increased risk.
Gartner predicts that, “By the end of 2018, over 50% of companies affected by the GDPR will not be in full compliance with its requirements.”*
In less than a year, the EU General Data Protection Regulation (GDPR) will require global organisations to control, process and protect the personal data of EU citizens at a much higher level than they do now. It’s arguably the most important regulation in a generation, but it is time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you are going to address it especially with your cloud-based applications.
The first step for any organisation to operate within the boundaries of GDPR, is to understand how important your data is and the risk of it being compromised. To protect from hackers, you need to think like one. How are you assessing vulnerabilities and configuration flaws that might leave your data comprised? Breaches are often not discovered until weeks or months later, how are you detecting and assessing indicators of compromise so that you can know you have been breached and respond within the 72-hour deadline?
Join Oliver Pinson-Roxburgh, EMEA Technical Director from Alert Logic for an in-depth discussion about GDPR, highlights include:
• Cutting through the ambiguity and focusing on the key cloud security considerations
• Important steps to preventing targeted attacks and protecting your data
• How to develop GDPR and Cloud enabled security blueprints
• Best practices to getting on the road to GDPR-ready in the next 30 days
Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.
*Gartner, Focus on Five High-Priority Changes to Tackle the EU GDPR, Bart Willemsen, 30 Sept 16
Once a policy is written, how should you get employees engaged? GRC Pundit, Michael Rasmussen discusses best practices in policy awareness and communication. You’ll learn:
• The role of training and ramification
• The policy portal—building an interactive employee experience for policy management
• Getting employee questions answered
• Attestations, read and understood, certifications
• How technology enables employee engagement on policy
SonicWall Exec. Director, Product Management, Dmitriy Ayrapetov explains how you can maximize zero-day threat protection with SonicWall Capture ATP, a cloud-based multi-engine solution.
Mission critical assets can represent 80% of an organisation's total value. As critical assets are not always obvious, few organisations understand the extent to which these are exposed and need to be protected.
In this Webinar, Steve Durbin, Managing Director of the ISF, explains how to:
•identify an organisations mission critical information assets and the greatest threats to them
•determine how to counter adversarial threats
•determine the right protection to put in place and how to implement these protections.
In the quarterly Cybercrime Tactics and Techniques report our Malwarebytes Labs team looks deep into what is dominating the threat landscape. The Labs team saw a significant shift in dominance of new threats and infection techniques.
Ransomware continued to dominate while utilised new techniques such as NotPetya and WannaCry
Exploit Kit and Malicious Spam (malspam) lead the way for distribution
Windows and Mac malware predictions
As organisations use CI/CD pipelines to build, test and deploy software at ever increasing speed it becomes imperative that the software supply chain should be secured to prevent the deployment of code of unknown provenance or with known vulnerabilities. In this webinar we will examine this topic from the following perspectives:
1. Ensuring that a ‘chain of custody’ is maintained from source control through to deployed production code.
2. Understanding how software components and artefacts are introduced into the supply chain.
3. Best practices for controlling and assessing third party components in the supply chain.
Rejoignez-nous à l'occasion de notre webinaire pour mieux comprendre le succès de ces attaques, découvrir les meilleures stratégies pour défendre votre organisation contre celles-ci et en savoir plus sur l'attitude à adopter face à une attaque qui a pénétré votre système.
La sophistication de la cybercriminalité d'aujourd'hui nécessite une défense multicouche intelligente. Avec la technologie de télémétrie unique de Malwarebytes, vous pouvez de nouveau combattre à armes égales et bénéficier des meilleures capacités de remédiation et de protection actuellement disponibles sur le marché.
BEC emails are the top concern for most big companies. These phishing emails operate without links and attachments, two of the flags which can mark malicious messages. They also work off the power structures in a company, using the names of key players, customers, and even board members to trick employees into doing things like transferring money. Learn how these attacks work and how Area 1 Security stops them.
The massive Equifax data breach may involve as many as 143 million US consumers whose personal information was accessed by hackers between May and July.
Join this interactive discussion with security experts and researchers to find out how this breach impacts your life and potentially, your organization.
- Timeline of Equifax and why this may be the worst hack yet
- Has your data been exposed in the hack?
- What should you do right away?
- When to expect the scams and cyber attacks related to this hack?
- Expert recommendations on how to stay safe online in the age of breaches and ransomware attacks.
- Vince Tocce, Vince in the Bay Podcast
- Judy Towers, Cyber Intelligence Analyst, Private Company
- Ray Watson, VP Global Technology, Masergy Communications
- Rob Graham, a well-known cybersecurity expert, creator of BlackICE, sidejacking, and masscan
Security is more than just monitoring. True security requires ongoing assessment and compliance. This can be achieved by Best Practices and tools for automation. Join Allgress Chief Marketing Officer Jeff Kushner and CloudCheckr Product Marketing Manager Todd Bernhard for this informative webinar.
In this webinar, attendees will learn:
- The differences between monitoring, assessment, and compliance
- Best Practice Checks to stay secure
- Automation for Self-Healing
-How the combination of Allgress ComplianceVision and CloudCheckr provide comprehensive compliance Orchestration
For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.
In this webinar learn:
- How a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.
- A proxy based architecture is ESSENTIAL to meeting the needs of the cloud generation, to protect against the increasingly sophisticated web threats targeting your business.
Cognitive Security has game-changing potential to help tackle cybercrime, but how is this playing out in reality? In February this year IBM announced Watson for Cyber Security, described as 'the industry’s first augmented intelligence technology designed to power cognitive Security Operations Centres'. What do customers say about their experiences working with Watson for Cyber Security and how is it helping security analysts improve response times?
Mike Spradbery, IBM's UK&I Security Technical Leader, will discuss not only the promise of Watson for Cyber Security but the client results that IBM is seeing. Mike will talk live to Brian Jensen, the analyst responsible for Cyber Security during the high-profile Wimbledon tennis tournament, to understand the scale and type of attacks the team saw, and how innovative new technologies like Watson for Cyber Security helped the team keep Wimbledon safe and secure.
Damage, counterfeit, theft, delays: these are some of the most pressing challenges that pharma supply chain executives are facing. Consequences are not limited to disruptions and to higher costs for manually managing exceptions, identify irregularities, and tracing products: there's also direct impact on patient safety, and customer satisfaction putting company reputation at risk.
In this webinar IDC analysts will share its research findings and provide guidance to pharmaceutical executives that want to start harnessing the real value of third generation digital platform, and implement a consistent, efficient and future-ready approach to supply chain management.
About the Speakers:
Silvia Piai is Senior Research Manager within IDC Health Insights for Europe Middle East and Africa. She is responsible for analyzing key trends related to IT strategies and spending in European healthcare organizations, and global Public Health institutions. She advises healthcare organizations and ICT vendors on planning and implementing effective digital health transformation initiatives to drive business innovation. Silvia’s analysis offers in-depth coverage of the technologies that provide the most clinical value in terms of quality, cost, time, and agility and are transforming pre-care, point of care (POC), and post-care today.
Stefanie Naujoks is Senior Research Manager within IDC Manufacturing Insights, where she leads a new global program on Manufacturing Business Ecosystems Strategies. Her research includes managing supply networks, selling into new business ecosystems and manufacturing B2B Commerce, enabling better ecosystem collaboration through industry collaborative clouds, as well as automation and transparency within business ecosystems. Stefanie has published numerous market studies in the fields of digital transformation, IoT, Industry 4.0, Product Lifecycle Management (PLM), Manufacturing Execution Systems (MES) and Supply Chain Management (SCM).
Join 451 Research and CenturyLink on the 20th September at 3:00pm UK time, 4:00pm CET, to discuss how enterprises are choosing and deploying digital transformation initiatives for business gain. This webinar will focus on the strategies and actions impacting the European market.
Organisations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.
Digital transformation can play out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.
Join 451 Research and CenturyLink to learn how European enterprises are making assured first steps, and discover the following:
- Understand how companies with more progressive digital transformation strategies are prioritising their efforts for competitive differentiation, changing the nature of their business with innovative technologies, and making service provider choices to accelerate results.
- Gain insights and recommendations from a major survey of the IT priorities of enterprises in Europe.
- Identify the key shifts in business context that will continue to shape digitisation efforts, and how these need to be reflected in a digital transformation roadmap for IT organisations.
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.
What you will learn
What breach response will look like under the GDPR
What tools and processes a data privacy officer will rely on in case of a breach
What departments and entities will be involved beyond IT
What activities are currently happening within organizations to prepare for the GDPR
What the consequences of the breach could be
Real estate developers, owners and tenants are rethinking the office building experience. Not only are buildings becoming increasingly efficient in in-door energy management and operations, they are also beginning to interact with the people who work within the walls, and with the out of doors environment.
This type of sentient building design is making use of increased connectivity to and in buildings, as well as the use of sensors and IoT applications. This webcast will discuss communications and connectivity infrastructure that is being deployed in and to current real estate developments; what buiding owners, operators and tenants expect; the impact smart community development is having on smart buildings; and sample smart building IoT applications.
Yann Palmore, Vice President, Smart Building Solutions, JLL
Ray Moya, COO/CTO, Argent Associates, Inc.
>> Yann Palmore helps CRE investors, owners, and operators understand how to rethink building system infrastructure to support Internet of Things (IoT) technologies and drive smart building strategies. Yann’s key responsibilities are to guide clients through a structured process that prioritizes program goals, defines specific smart building strategies, specifies appropriate technologies, and oversees program implementation.
>> Ray Moya has over 25 years of network engineering and organizational management experience. His specializations include, wireline and wireless voice and data networks, network security, software development, and finance. He has designed, engineered and installed hundreds of Fortune 500 Company and Government networks. He leads network-consulting teams in LAN/WAN, software development, wireless technologies, and Network security.
For more about the speakers, please visit: http://www.tiaonline.org/webcast-iot-and-smart-buildings-new-construct
In the era of cloud, the significance of distribution to the supply chain is changing dramatically. Channel partners have moved-on from ‘tin shifting’ commoditized IT, instead working in tandem with vendors and providers to supply new kinds of complex cloud services to meet enterprise demand. As the focus moves from cloud construction to cloud consumption, the importance of these relationships increases, shifting the market opportunity to an ecosystem of connected specialists. Modern systems integrators, managed service providers and VARs are bringing higher-value, niche and vertical offerings to market that traditional ‘sell through’ models however, do not address. In this session, Rory Duncan, Research Director for Managed Services & Hosting, will outline the revised ‘sell with’ strategies that vendors and service providers alike must adopt in order to facilitate the delivery of high-growth services - including managed private cloud, security and disaster recovery – in partnership with their channel ecosystem.
Leadership Panel Session Featuring:
•Xavier Poisson Gouyou Beauchamps, Vice President, Indirect Digital Services, HPE
•Caroline Paine, Sales Director - Service Providers, OnApp
•Dan Havens, SVP of World Wide Sales, Ormuco
If you look at persistent threats through an attacker’s eyes, the most effective and nimble way to derail them is to detect their lateral movements across the environment—as early as possible in the attack process. Chad Gasaway is in the trenches every day helping Illusive customers conduct Red Teaming exercises and implementing deception technology to better guard highly sensitive assets from targeted attacks. In this webinar, Chad will provide an overview of how Illusive’s approach to deception helps organizations operate with greater agility to defend what matters most.
Organizations have spent massive amounts of money to protect the perimeter of their networks, but if your business exists on the internet, there really is no perimeter. In this presentation, we'll discuss Digital Footprints in understanding your company’s external attack surface. We will discuss social, mobile, web attacks and analyze and review lessons learned recently publicized attacks (Polish banking institutions, Apache Struts Vulnerability or WannaCry ransomware. The speed of business and cybercrime isn't slowing down, so how can you be prepared to address and defend against these types of threats? Attend our session to find out how.
Reducing Your Digital Attack Surface and Mitigating External Threats - What, Why, How:
What is a Digital Footprint?
Breakdown of External Threats (Social, Mobile, Web)
What are blended attacks?
What is actually being targeting at your company?
How are your brands, customers, and employees being attack outside of your company?
How to become proactive in threat monitoring on the internet?
Considerations in External Threat solutions
Threat correspondence tracking considerations
Is legal cease and desist letters adequate in stopping attacks?
Examination of a phishing attack campaign
How phishing kits work
Analysis and lesson learned from recent published attacks
What are the most important capability in a digital risk monitoring solution?
Getting started on an IoT project? Are you going to build a business or a liability for yourself? Canonical commissioned a research of 361 IoT professionals to find out how their projects are progressing. The findings were compiled in a report titled Defining IoT Business Models, which explored the practices of organisations currently implementing IoT projects. You can read it for yourself at http://ubunt.eu/vkTPIW
In this webinar, Canonical's EVP of Devices & IoT and 451 Research's IoT Analyst will discuss our findings as well as the challenges and opportunities businesses will face with the internet of things!
Join our webinar to find out...
>How businesses can monetise the internet of things in the long term
>What skills they need and where to find them
>How to address fundamental security considerations.
CI/CD tools like Jenkins enable development teams to deliver software faster. To prevent containers with either high-risk vulnerabilities or compliance violations making it to production, it’s important to integrate automated compliance and vulnerability monitoring that can check, alert on and fail builds. By detecting and remediating security risks early, you reduce overall risk, minimize costly rework, and reduce the effort of downstream security checks.
Join Twistlock Solution Architect Matthew Barker to see how Twistlock integrates directly into Jenkins to improve your risk and compliance posture without slowing down development.
Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.
In this webinar you will:
· Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
· Watch a live DDoS attack from the attacker's perspective
· Participate in a live Q&A with DDoS experts
The public cloud offers undeniable benefits for organizations including agility, cost savings, and competitive advantages. In fact, some enterprises are choosing to abandon their on-premises data centers altogether and go “all-in” with the public cloud. The reality, however, is that most companies are pursuing a “hybrid” approach, using a combination of public cloud, private cloud, and on-premises resources and infrastructure to deliver applications and services to their employees and customers. But how can you efficiently protect all of your workloads against the latest data breach threats and ransomware attacks across such diverse environments and infrastructures? Tune in to our webcast and learn:
•How to discover, secure, and monitor all of your hybrid cloud workloads from a single console
•How to respond to alerts and update policy across your hybrid cloud without hiring an army of experts
•How to manage virtualized and physical on-premises servers protected by Symantec Data Center Security (DSC) agents from the Cloud Workload Protection (CWP) console
As Fortune reported on Tuesday, the new Blueborne attack vector exposed 5B+ devices to hacking, endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux. Blueborne attacks devices via Bluetooth in a manner never seen before, and spreads through the air (airborne). Users do not need to be on the Internet, take any action, or even pair with another device to be impacted. Blueborne has been called “Bluetooth’s Stagefright moment.”
Watch this webinar to learn:
• Understand the 8 zero-day vulnerabilities (4 critical)
• Which devices are affected
• How Blueborne can take over a device
• How BlueBorne can be used for a Man in the Middle Attack
• What’s involved in protecting your network
About the Speaker:
As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.
Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.
The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:
* Email Authentication
* Attachment Sandboxing
* Data Loss Prevention
With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.
What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?
Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
- The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
- Managing IT risk and vulnerabilities
- How to improve breach prevention, detection and response
- What to expect in the future
- Igor Baikalov, Chief Scientist, Securonix
- Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
- Sam Abadir, Director of Product Management, LockPath
Le API sono un abilitatore fondamentale per lo sviluppo di nuovi canali digitali. Tuttavia un layer di service exposure basato su API ha sia la complessità architetturale di un sistema middleware che le responsabilità di sicurezza tipiche di un frontend. E’ per questo che risulta fondamentale poter testare la API in modo auto-consistente sin dalle prime fasi di sviluppo del software, in parallelo rispetto al restante ecosistema applicativo ed in autonomia rispetto alle dipendenze infrastrutturali a cui sono vincolate.
As you plan the move to Microsoft Office 365, make sure you have a good handle on the security capabilities you will need to ensure advanced email protection and continuity.
Join Richard Davis, Proofpoint, and Roy Murdoch to hear how you can mitigating security and compliance risks to secure your Office 365 email environment.
Hear how to take advantage of the bottom-line benefits of Office 365 while mitigating security risks with an integrated approach including:
• Superior blocking of advanced threats
• Immediate threat visibility and rapid response
• Greater protection from compliance violations and information loss
• Uninterrupted access to live and historic email
To raise a question to Roy or Richard prior to the event email: O365questions@proofpoint.com
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.
What you will learn:
- What breach response will look like under the GDPR
- What tools and processes a data privacy officer will rely on in case of a breach
- What departments and entities will be involved beyond IT
- What activities are currently happening within organisations to prepare for the GDPR
- What the consequences of the breach could be
Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2013.
Join us in a live webinar as we discuss this threat group whom we asses to be involved in a long-term, resource intensive cyber espionage operation motivated by the prospect of collecting strategic intelligence, including information related to the aviation and energy industries, which would ultimately benefit a nation-state or military sponsor.
Register today to gain deeper insights into this threat group!
On Thursday, 21 September, from 14.00 to 15.30 BST/15.00 to 16.30 CET, Kaspersky Lab will be joined by senior business and IT experts at the Kaspersky CyberSecurity Summit 2017, to debate the top threats facing enterprises – and what they mean for CISOs in terms of incident response, business continuity and risk management. Participants will leave armed with clear, actionable intelligence.
Speakers: Duncan Brown, Associate Vice President, European Security Practice, IDC; Christian Toon, Chief Information Security Officer, Pinsent Masons LLP; Roderick Clayton, EVP and Co-lead, Global Issues and Crisis, Weber Shandwick; Juan Andres Guerrero-Saade, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab; and Alessio Aceti, Head of Enterprise Division, Kaspersky Lab.
The event will be moderated by Geoff White, Television news reporter (BBC and Channel 4 News) and investigative journalist.
The cyberthreat landscape is becoming ever more complex and destructive. Over the last 12 months, attacks targeting enterprises have increased significantly in both number and range – with a measurable impact on operations, revenue, customers and reputation.
In this summit, experts from IT and business will discuss the most dangerous cyberthreats targeting enterprises, how to stay protected even when breached, as well as threat intelligence, incident response, the legal, insurance and communications challenges – and more.
Participants will be able to join in the debate and ask questions. They will leave armed with clear, actionable intelligence.