Hi [[ session.user.profile.firstName ]]

IT Security

  • Wisdom of Crowds Virtual Roundtable - Data Security with RSA, Dell and more.
    Wisdom of Crowds Virtual Roundtable - Data Security with RSA, Dell and more. Rashmi Knowles, Charles Race,William Culbert, Paul Ferron,Jason Goode and Jackson Shaw Recorded: Jul 27 2017 20 mins
    Participants in the Roundtable: Rashmi Knowles from RSA, Charles Race from OneLogin, William Culbert from Bomgar, Paul Ferron from CA Technologies, Jason Goode from Ping Identity and Jackson Shaw from Dell Security

    How has the adoption of ‘cloud’, including SaaS applications, changed the security landscape?

    What are the benefits of an Identity Access Management solution, why should it be implemented, and would you recommend an on-premise, cloud or hybrid solution?

    How does a single sign-on policy help to improve productivity and save costs, and what are the principle differences between SSO and federated identity?

    How should businesses and organisations leverage provisioning and deprovisioning for cloud applications, and what impact will this have?
  • Beginner's Guide to Public Sector Cloud Infrastructure
    Beginner's Guide to Public Sector Cloud Infrastructure Todd Bernhard, CloudCheckr Product Marketing Manager & Jonathan Morse, State Local Higher Education Account Executive Recorded: Jul 27 2017 63 mins
    Migrating to the cloud poses challenges for any organization, but there are particular concerns for the public sector. Government regulations like FedRAMP and the upcoming DFARS must be met, but security in the cloud is different than in the data center. Cloud providers use a Shared Responsibility Model, where they secure the physical infrastructure and the rest is up to the customer. In the public sector, budgets have to be justified... and used, at the risk of decreasing in the next year. Given the potential for Cloud Sprawl, without a Cloud Management Platform, expenses can get out of control.

    This webinar serves as a guide for public sector organizations looking to embrace the cloud. We will discuss the specific requirements of public sector organizations and explain the choices that will need to be made during such a migration. Topics covered include:

    - What terms do I need to know?
    - What questions do I need to ask?
    - What are some common pitfalls?
    - What tools are available to help?
  • Using SecureMail with Office 365
    Using SecureMail with Office 365 DataMotion Recorded: Jul 27 2017 2 mins
    Does the native message encryption meet your compliance and ease-of-use needs? This short 60 second video reviews how DataMotion SecureMail works with Office 365 to enhance its encryption capabilities.
  • Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results
    Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results Bill Searcy, Vice President for Global Justice, Law Enforcement, and Border Security Solutions, Unisys Recorded: Jul 27 2017 41 mins
    U.S. consumers rate national security in relation to war or terrorism as their top security concern, though fears over viruses/malware and hacking are rising dramatically, according to the new Unisys Security Index™ that surveyed more than 13,000 consumers in April 2017 in 13 countries. This study, the only recurring snapshot of security concerns conducted globally, gauges the attitudes of consumers on a wide range of security-related issues.

    About the speaker:
    Bill Searcy is the Vice President for Global Justice, Law Enforcement, and Border Security Solutions. As a recognized law enforcement solutions expert, he is responsible for developing market strategies, overseeing delivery, ensuring customer satisfaction, and driving business performance to meet goals.​​
    During his 21-year career as a Special Agent with the Federal Bureau of Investigation, Bill was recognized as an innovator who regularly sought new ways to use technology to solve complex problems. He is credited with leading numerous award winning IT initiatives, among them the FBI’s Grid Computing Initiative (Attorney General’s Award for Innovation) and the Next Generation Workstation (FBI Director’s Award).
    Prior to joining Unisys, Bill served as the Deputy Assistant Director of the FBI’s IT Infrastructure Division, where he was responsible for the engineering, development, deployment, and support of the FBI’s worldwide IT enterprise.
    A graduate of the United States Military Academy at West Point, Bill was commissioned as an officer in the U.S. Army where he commanded a Field Artillery battery. He went on to earn a Master of Science in Information Assurance from Norwich University and he is a Certified Information Systems Security Professional (CISSP).
  • See It In Action - Advanced Email Protection Live Demo
    See It In Action - Advanced Email Protection Live Demo Proofpoint Recorded: Jul 27 2017 52 mins
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us Thursday, July 27, 10 AM PT for a live demo that will explore Proofpoint Email Protection and Targeted Attack Protection.

    Learn about:

    -- Today’s threat landscape and to how to build your defense against spam, malware, and non-malware threats
    -- Approaches for identifying suspicious messages
    -- The latest in security software to fight against advanced threats
  • [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack
    [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Recorded: Jul 27 2017 61 mins
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • The Cost of Insecure Endpoints – New Findings from Ponemon Institute
    The Cost of Insecure Endpoints – New Findings from Ponemon Institute Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute & Richard Henderson, Global Security Strategist, Absolute Recorded: Jul 27 2017 64 mins
    Just how dangerous, inefficient, and ineffective are the endpoint security solutions used in most organizations today? Ponemon Institute independently surveyed hundreds of IT security professionals to find out — and are ready to share the surprising results in this important webinar.

    On July 27th, join founder and chairman, Dr. Larry Ponemon, and Richard Henderson, global security strategist at Absolute, for an interactive webinar on the results, including:

    • Exposing the largest dangers and greatest inefficiencies with endpoint security management today
    • Average financial and productivity costs associated with insecure systems – and how to mitigate in your organization
    • Steps you can take now to prevent attacks and stay compliant
  • Protect Your Data in the Wild
    Protect Your Data in the Wild Liam McCart & Artom Harchenko Recorded: Jul 27 2017 19 mins
    There are many ways to approach securing corporate data. Most tactics for securing data are tied to identity, mobility requirements, cybersecurity concerns or any combination of the three. Data leaks can occur in even the most secure systems if the right precautions are not taken to mitigate the risk.
    Considering employees share corporate files and documents every day, the challenge organizations are now looking to address is how to control data that escapes “into the wild”.
    What can we do once the data leaves the secure walls of the organization?
    What is the risk when sharing corporate data?
    What is the effect on the organization if the data gets out?
    In this webinar, Avaleris will show you how to use AIP to classify and label data and how your organization can control access to it.
  • Tech Demo - Addressing Data Across Borders for the GDPR
    Tech Demo - Addressing Data Across Borders for the GDPR Cheryl Tang, Director of Product Marketing and Sumit Bahl, Sr. Technical Product Manager Recorded: Jul 27 2017 32 mins
    This is part 3 in our demo series focused on GDPR. One of the key requirements of GDPR relates to cross-border data transfers. Our security experts demonstrate how SecureSphere can help address this regulation with monitoring and access control of personal data.
  • "Cloud-First" Ransomware - A Technical Analysis
    "Cloud-First" Ransomware - A Technical Analysis Bob Gilbert and Sean Hittel of Netskope Recorded: Jul 27 2017 43 mins
    Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months. Why?  Because many organizations don't inspect their cloud SSL traffic for malware and the same functionalities of the cloud dramatically increase productivity (sync, share, collaborate, etc) also provide ransomware developers with a perfect medium for faster delivery of malware payloads to more targets.

    Join Netskope chief evangelist, Bob Gilbert, and Threat Detection Engineer, Sean Hittel, for a fascinating look at how malicious actors now design ransomware to make best use of popular cloud services to hide in plain sight, and do more damage in less time. 
     
    Bob and Sean will provide technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and how to defend against them.  These include:
     
    • Virlock, which encrypts files and also infects them, making it a polymorphic file infector 
    • CloudFanta, which uses the SugarSync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities
    • CloudSquirrel, which takes advantage of multiple cloud apps throughout the ransomware kill chain with the intent to steal and exfiltrate user data
    • The Zepto variant of Locky ransomware, now distributed both by popular cloud storage apps and via DLL
  • Deploying Cloud onRamp for AWS, Azure, and Office365
    Deploying Cloud onRamp for AWS, Azure, and Office365 David Klebanov, Director of Technical Marketing, Viptela Recorded: Jul 27 2017 38 mins
    Cloud transformation has been a top priority for enterprises, but the adoption is plagued with complex workflows and poor user experience. Even though enterprises onboard AWS or Azure, the workflows to establish connectivity, security and segmentation across VPC (and VNET) are fairly complex. On the other hand, for SaaS, the issue is primarily around user experience. Enterprises deploying Office365 are realizing that performance with Skype for Business and Sharepoint is not reliable. In this webinar we will take a further look at the wide-ranging capabilities the Viptela Cloud onRamp solution offers, and deploying it for AWS, Azure, and Office365.
  • Not All Endpoint Protection Platforms Are Created Equal
    Not All Endpoint Protection Platforms Are Created Equal Torry Campbell, Senior Director Product Management, Symantec Recorded: Jul 27 2017 60 mins
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • Expert Panel: Bug Bounty Trends and What They Mean
    Expert Panel: Bug Bounty Trends and What They Mean Casey Ellis, Founder & CEO, Bugcrowd Jeremiah Grossman, Chief of Security Strategy, SentinelOne HD Moore, Founder of The Meta Recorded: Jul 27 2017 60 mins
    Traditional methods for vulnerability discovery are failing us. With rapidly expanding attack surfaces, motivated adversaries, and the growing shortage of full-time infosec professionals, organizations are fighting a losing battle. One thing is clear: We need a new approach.

    Enter the Bug Bounty model. Bug bounties have quickly evolved from a “nice to have” to a “must have” for most application security teams.

    What’s behind this trend? Why are bug bounties growing, and why now?

    Join our expert panel as we discuss the key findings from The 2017 State of Bug Bounty Report.

    Speakers:
    - Casey Ellis, Founder & CEO of Bugcrowd
    - Jeremiah Grossman, Chief of Security Strategy at SentinelOne
    - HD Moore, Founder of The Metasploit Project
  • Time for Banks to Reassess Their Risk of DDoS Attacks
    Time for Banks to Reassess Their Risk of DDoS Attacks Tom Bienkowski, Director of DDoS Product Marketing, Arbor Networks Recorded: Jul 27 2017 38 mins
    A study by McKinsey suggests the increased operational risk of digital innovation threatens 6% of the net profit for a retail bank. Renowned hactivist group Anonymous’ OpIcarus; a Distributed Denial of Service (DDoS) attack siege on the world’s banking infrastructure and other well publicized successful attacks have exposed just how vulnerable banks are to such threats. The reality is modern day DDoS attacks are getting more frequent, more sophisticated, and are commonly used as a distraction during the data exfiltration stage of advanced threat campaigns. The unfortunately reality is that in many cases, these attacks succeed because the targets were simply inadequately prepared to stop them.

    Join this webcast to learn:
    •The latest trends in DDoS attacks.
    •Commonly overlooked costs due to DDoS attacks.
    •And best practices in DDoS attack defense.
  • CSPs must adopt turnaround strategies to transform customer/employee experience
    CSPs must adopt turnaround strategies to transform customer/employee experience Ken Jacobsen, Group Sales Director, Media and Comms & Rob Allman, Group General Manager, Customer Experience, Dimension Data Recorded: Jul 27 2017 45 mins
    CSPs need to engage turnaround strategies to transform customer and employee experience issues across the sector. This will turn current challenges into positives for 2018 and beyond! The latest CX benchmarking report provides insightful findings about the top issues and how to address them through innovative solutions and services.

    According to Joe Manuele, Dimension Data’s Group Executive, CX and Collaboration said: “The world has formed a digital skin and business, service, technology and commercial models have changed forever. However, organisations are strategically challenged to keep pace with customer behaviour.” Join us for this webinar where we’ll be discussing the CSP specific findings from the report.
  • Cyber-Threat Report 2017 - Selected Case Studies from Darktrace
    Cyber-Threat Report 2017 - Selected Case Studies from Darktrace Andrew Tsonchev, Director of Cyber Analysis and Bethany Edgoose, Lead Research Analyst Recorded: Jul 27 2017 34 mins
    Over the course of the past year, cyber-attacks have frequently made headlines. In 2017 alone, global ransomware damage costs are expected to exceed $5 billion, with the total cost of cyber-crime expected to reach trillions of dollars.

    Darktrace has detected over 30,000 in-progress cyber-threats, and has firsthand experience with modern, never-before-seen attacks, including fast moving ransomware, new strains of malware, compromised IoT devices, malicious insiders, attacks on cloud environments, and more.

    Join our Director of Cyber Analysis, Andrew Tsonchev, and our Lead Research Analyst, Bethany Edgoose, as they present Darktrace's 2017 Threat Report, review novel cyber-attacks, and break down how they were detected by the Enterprise Immune System.
  • Symantec Monthly Threat Briefing - July 2017 update
    Symantec Monthly Threat Briefing - July 2017 update Jeff Barto and Angelique Pereira, Trust Strategists at Symantec Recorded: Jul 27 2017 40 mins
    Hear the latest on the current website security threats for July 2017 from Symantec. This month’s briefing spotlights the monetary effects and costs of cybercrime and violations of trust.
  • Secrets of the Superstar CISO
    Secrets of the Superstar CISO Jake Olcott, VP of Strategic Partnerships, BitSight; Chris McClean, Vice President, Research Director, Forrester (Guest) Recorded: Jul 27 2017 59 mins
    As business success grows more reliant on data, technology, and third parties, CISOs and security leaders are finding themselves more often in the spotlight. They're being asked to brief board members, respond to third party requests, guide critical decisions, and make tough strategic calls. These increasing expectations are creating great opportunities for CISOs to shine, but to do so, they need to rise to the occasion. This webinar takes best practices and lessons learned from "superstar" CISOs, explaining what top security leaders are doing to lead their companies successfully through some of today's most complex business and technology challenges.
  • Security a Revenue Center: How Security Can Drive Your Business
    Security a Revenue Center: How Security Can Drive Your Business Joe DiPietro Recorded: Jul 27 2017 57 mins
    Traditionally Security was viewed as necessary cost center or an insurance policy you hoped you’d never have to cash in. Yet by automating security policy management you can actually save your organization both time and money and even enable and support the revenue generation processes.

    Presented by Joe DiPietro, SE Director, this technical webinar will provide an overview of how automated security policy management goes beyond providing ROI and cost savings, to directly impacting business productivity and agility.

    This webinar will:

    * Highlight the security policy processes that can be automated, including challenges, benefits, planning and prioritization considerations.
    * Provide an overview of the security management maturity model and highlight opportunities for automation and optimization for each stage of the model.
    * Dissect and assess cost saving and revenue generation opportunities for specific key challenges including security change management, risk management, application migration, and auditing and compliance.
  • An Exciting Day in the Life of a Risk Manager! - Really!
    An Exciting Day in the Life of a Risk Manager! - Really! Amar Singh, Chris Payne, Dom Saunders Recorded: Jul 27 2017 50 mins
    Policy? We have a policy? Have you read the policy? Thats right...who actually reads company policies?

    Risk and compliance managers globally have lost the fight against user policy acceptance leading to increasing organisational risk and the decreased ability to stand up and demonstrate effective compliance to regulatory bodies.

    Does it have to be this way? In this webinar, we

    * Demo what we use to transform and make mainstream what is often boring and ignored.

    * Show how you can effectively measure (yes measure and report) on how effective your policy implementation is.

    * Better engage and enforce your policies with third parties.
  • How IoT and Predictive Analytics Transform Operations in the Digital Age
    How IoT and Predictive Analytics Transform Operations in the Digital Age Ray Wang, Constellation Research, David Bishop & Martin Boggess, Hitachi Solutions, & Rahul Garg, Microsoft Jul 28 2017 6:00 pm UTC 105 mins
    Today's manufacturers are operating in a world of uncertainty. Successful manufacturers are combating market volatility by focusing on productivity gains via new technology. The Internet of Things (IoT) and predictive analytics are likely to determine who wins and who loses in this age of uncertainty.

    Join this virtual event to hear from leading experts and analysts about technologies manufacturers need to adopt to stay competitive. Industry analyst, Ray Wang will outline the macroeconomics trends affecting the industry and lay a path forward. Experts from Hitachi Solutions will discuss the promise of IoT and the cloud for discovering new opportunities and achieving operational efficiencies. Microsoft’s IoT lead will share upcoming trends to watch.

    Hear leading experts and analysts discuss the state of manufacturing today—and a path to the future.
  • Automation, Machine Learning, and AI: Saving Security or Job Stealing Overlords?
    Automation, Machine Learning, and AI: Saving Security or Job Stealing Overlords? Michael Ball CISSP IT Security Consultant, Davi Ottenheimer President of flyingpenguin, Chris Pace, Recorded Future Jul 31 2017 3:00 pm UTC 60 mins
    Headlines as we left 2016 and predictions for 2017 suggest that the future of the IT department (including information security) looks to be increasingly reliant upon machines doing the work, courtesy of the adoption and explosion of automation technologies, artificial intelligence and machine learning. How capable can machines ultimately become in securing businesses from an increasing array of threats? What role does this leave for humans?

    In this webinar we will look at the rise in popularity of artificial intelligence generally, what it means for businesses and its potential to improve efficiency and security. Which areas of security strategy may have the most to gain and lose in this transformation?

    This webinar will:

    • Consider the power of AI in threat intelligence, security operations and incident response
    • Discuss how AI and predictive analytics can lower risk
    • Question whether automation will always require the human factor
  • Gain Visibility into Your Open Source Risk with Veracode Software Composition An
    Gain Visibility into Your Open Source Risk with Veracode Software Composition An Jacob Martel, Solution Architect, Veracode Jul 31 2017 4:00 pm UTC 30 mins
    Most development organizations don’t have the time or the resources to create every application from scratch, so they rely on third-party software and integrate open source components into their internally developed software. However, securing open source components is challenging for many security professionals because they lack visibility into what components are in use where in their organizations.

    At Veracode we know it can be difficult to pinpoint applications using vulnerable open source components. In this 30 minute webinar find out how Veracode Software Composition Analysis can help you:

    •Assess proprietary and open source code in a single scan
    •Build an inventory of your third-party components
    •Gain visibility into which applications have a vulnerable version of a component
    •Identify and remediate vulnerabilities to help comply with industry regulations
  • Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind
    Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Aug 1 2017 2:00 am UTC 60 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Die Vorteile von Security as a Service
    Die Vorteile von Security as a Service Sven Janssen Aug 1 2017 8:00 am UTC 75 mins
    Unternehmen stehen heute vor der Herausforderung, robuste Sicherheitsmaßnahmen zu implementieren und gleichzeitig die Investitions- und Betriebskosten in Grenzen zu halten. SecaaS bietet ihnen die Möglichkeit, auf robuste, skalierbare, kosteneffektive und immer verfügbare Cybersicherheitsservices zuzugreifen. Nehmen Sie an diesem SonicWall-Webinar teil und lernen Sie wichtige Vorteile von Security as a Service kennen.
  • Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind
    Phishing & Credential Abuse 101: Exposing the Ecosystem and Motives Behind Jen Miller-Osborn, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Aug 1 2017 9:00 am UTC 60 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join our Unit 42 threat intelligence analyst for an insightful perspective on credential-based attacks and phishing. In addition to presenting its unique attack life-cycle, she will:

    • Identify trends and techniques in methods used for credential theft and abuse.
    • Review how cyber criminals have changed their tactics to compromise networks.
    • Examine who is being targeted, and why.
    • Discuss techniques to stop credential leakage.
  • Staffing a Security Operations Center: Humans vs machines
    Staffing a Security Operations Center: Humans vs machines Seth Goldhammer (Sr. Director of Product Management at LogRhythm) Roselle Safran (Co-founder of Uplevel Security) Aug 1 2017 9:00 am UTC 90 mins
    Industry estimates project that there will be a shortfall of as many as one million cybersecurity professionals in the next few years.

    In this webinar, Seth Goldhammer, senior director of product management at LogRhythm, will join speakers from Dark Reading to discuss how organisations can manage the cybersecurity skills shortage.

    You’ll learn:

    - Methods for improving security operations capabilities with fewer resources
    - Time-saving tools for automating security functions
    - Effective ways to utilise outsourcing and third-party services
    - Best practices for hiring and retaining staff in a competitive market

    Watch now to learn how to manage the lack of skilled cybersecurity professionals.
  • 6 steps to GDPR compliance
    6 steps to GDPR compliance Adrian Davis, Managing Director, (ISC)² EMEA, Jan Smets, Certified Data Protection Officer, Gemalto Aug 1 2017 11:00 am UTC 60 mins
    The introduction of GDPR is set to bring data protection to the top of businesses’ priority lists. So how can businesses ensure they are compliant and what steps do they need to take?
    In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:

    1) Understand the GDPR legal framework
    2) Create a Data Register
    3) Classify your data
    4) Start with your top priority
    5) Assess and document additional risks and processes
    6) Revise and repeat
  • Introducing Mobile Threat Defense for the Cloud Generation
    Introducing Mobile Threat Defense for the Cloud Generation Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure Aug 1 2017 3:00 pm UTC 60 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks.

    Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats. Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Transforming K-12 Cybersecurity Through Visibility
    Transforming K-12 Cybersecurity Through Visibility Dr. Kecia Ray, Exec Director, Center for Digital Education & Erik Floden, K12 Education Strategist, ForeScout Technologies Aug 1 2017 4:00 pm UTC 60 mins
    As school districts continue to make technology adoption in the classroom a top priority, they face increasing network security risks, including persistent cyberattacks and the potential theft or manipulation of student data. Dr. Kecia Ray, Executive Director of the Center for Digital Education, will address these challenges and discuss how school districts can effectively manage the rapid expansion of the number of devices students, educators and administrators are adding to their IT networks. Webinar topics will include:
    • Cybersecurity and student data security trends in K-12
    • Top K-12 priorities to address these challenges
    • Recent funding and legislative developments at federal and state levels
  • Cradlepoint Unifies NetCloud Platform with New Updates
    Cradlepoint Unifies NetCloud Platform with New Updates Cradlepoint's Product Management Team Aug 1 2017 4:00 pm UTC 60 mins
    Join the Cradlepoint Product Management team to learn about these new updates to the Cradlepoint NetCloud Platform.

    Cradlepoint updates key software elements to unify them under the NetCloud Services umbrella: 
    NetCloud OS: Router firmware is named and elevated as a key pillar of the NetCloud Platform
    NetCloud Manager: Enterprise Cloud Manager, the single-pane-of-glass management service for all Cradlepoint solutions, is renamed NetCloud Manager
    NetCloud Engine: A Software-Defined Perimeter service offering dark cloud security

    When combined with Cradlepoint routers, this integrated platform of flexible, extensible, and rapidly deployable applications enables an entirely new way to easily build, secure, control, and manage end-to-end private networks in the cloud.

    Cradlepoint is also launching NetCloud OS 6.4 router software for enhanced network security and configuration flexibility. Cradlepoint leverages NetCloud Manager’s unique connectivity to enable secure cloud management for non-cloud-managed third-party devices, plus enhancements to Out-of-Band Management capabilities.

    Cradlepoint continues to invest in NetCloud Engine to bring the advantages of dark cloud security (or of a software-defined perimeter) to customers who need to integrate IoT connections into corporate networks. 
  • Web App Attacks: Stories from the SOC
    Web App Attacks: Stories from the SOC Paul Fletcher, Cyber Security Evangelist at Alert Logic Aug 1 2017 4:00 pm UTC 60 mins
    It’s well known that web application attacks are the leading cause of breaches, according to Verizon’s 2017 Data Breach Investigations Report.

    Register for this eye-opening webinar presented by Paul Fletcher, Cyber Security Evangelist at Alert Logic, who will provide you with a global perspective of the current state of web application vulnerabilities and exploits. During this webinar you will gain insight on:

    • How attackers use reconnaissance tactics to identify a vulnerable target
    • Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    • How to effectively utilize your security tactics to better protect your web apps
    • How reconnaissance is used by attacks to discover and pinpoint systems to compromise
    • Remediation strategies to help defend against web apps attacks
  • Precision Hunting with Artificial Intelligence
    Precision Hunting with Artificial Intelligence Josh Zelonis, Senior Analyst at Forrester, and Stephen Pieraldi, Senior Director of AI and ML at E8 Security Aug 1 2017 5:00 pm UTC 45 mins
    You know it already: artificial intelligence (AI) is key to making sense of big data -- it’s the only way to scale security data analytics, because the “spray and pray” shotgun approach is too expensive and too imprecise to combat advanced attacks. So how do you use the power of machine learning (ML) for precision threat hunting, to proactively stay ahead of advanced attacks, and to focus on what’s important? What are the right questions to ask as you evaluate tools for your threat hunting team?

    In this 40-minute online fireside chat, guest speaker Josh Zelonis, a Senior Analyst at Forrester, and Stephen Pieraldi, Senior Director of AI and ML at E8 Security, will discuss how behavioral analytics is transforming security operations with improved visibility across endpoints, users, and networks.

    Join to learn how this translates into better detection and faster investigation time for security incidents. And be a part of the conversation with live Q&A during the chat.

    Topics include:
    - The top challenges that are facing security teams like yours
    - How machine learning (and AI in general) help scale security response
    - Three most common use cases for threat hunters using machine learning
    - What you can do to reduce false positives in your environment
  • Container Security 101
    Container Security 101 Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security Aug 1 2017 5:00 pm UTC 45 mins
    Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
    Join our webinar to learn:
    •What are containers?
    •How to use containers?
    •What are the security challenges they introduce?
  • Threat Hunting Tool: Sweet Security Supercharged [Hunter Spotlight]
    Threat Hunting Tool: Sweet Security Supercharged [Hunter Spotlight] Travis Smith, Principal Security Researcher at Tripwire Aug 1 2017 6:00 pm UTC 45 mins
    In this episode of the Threat Hunting series we will feature a network security tool developed and used by real-life threat hunters. Sweet Security is a network security monitoring and defensive tool which can be deployed on hardware as small as a Raspberry Pi.

    Using the power of Bro IDS and threat intelligence feeds, malicious network traffic can be exposed. This data is gathered and visualized with the ELK stack (Elasticsearch, Logstash, and Kiban). Going beyond detection, the device can implement blocking for specific devices on a granular level. Sweet Security can monitor all network traffic with no infrastructure change and block unwanted traffic. It ships with Kibana dashboards, as well as a new web administration UI. Even better, the installation can be separated between web administration and sensor.

    Want to deploy the web administration to AWS and install a dozen sensors? No problem! With the ability to intercept all network traffic combined with the power of Bro and ELK, you can unlock the ability to hunt for threats across any environment.

    Travis Smith will go through how the tool works, as well as some interesting findings he has discovered on his own home network.
  • Integrating Business Solutions for Always-on IT Security
    Integrating Business Solutions for Always-on IT Security Gabe Long, Sr Product Marketing Manager, Microsoft Aug 1 2017 6:00 pm UTC 60 mins
    In the age of cybercrime, threats, and breaches, it's more important than ever to secure your IT operations, devices, and infrastructure through an integrated approach.

    Now, for the first time ever, Microsoft is offering an integrated solution for your business that helps you achieve more together, anywhere it matters, with always-on security.

    In this webcast, you will:
    - Discover an integrated solution powered by Office 365 and Windows 10, designed for small and mid-size businesses.
    - Learn how you can connect with your remote coworkers and work on a document in real-time using Word, Outlook, OneDrive, and Skype for Business.
    - See how inking in Windows 10 enables you to take notes with OneNote.
    - Learn how you can easily set-up policies to protect company data across devices with Microsoft 365 Business.
  • Enterprise Data Warehouse Optimization: 7 Keys to Success
    Enterprise Data Warehouse Optimization: 7 Keys to Success Scott Gnau, CTO at Hortonworks and David Loshin, President of Knowledge Integrity Inc. Aug 1 2017 6:00 pm UTC 60 mins
    You have a legacy system that no longer meet the demands of your current data needs, and replacing it isn’t an option. But don’t panic: Modernizing your traditional enterprise data warehouse is easier than you may think.

    Join us on August 1st at 11am PDT to hear from David Loshin, President of Knowledge Integrity, Inc. and Scott Gnau, Chief Technology Officer of Hortonworks as they discuss what it takes to optimize your enterprise data warehouse. When you attend, you will learn how to:

    • Leverage Horizontal Scalability/Elasticity with Open Source Technologies to Reduce Costs
    • Augment enterprise data warehouse storage with Hadoop and Hive
    • Use Flexible Data Organization to Enable Schema on Read
  • Securing Critical Infrastructure with Advanced Cybersecurity Controls
    Securing Critical Infrastructure with Advanced Cybersecurity Controls Keao Caindec, VP of Marketing and Dean Weber, CTO, Mocana Aug 1 2017 6:00 pm UTC 45 mins
    The US Department of Homeland Security has defined 16 critical infrastructure sectors, including: chemical, communications, critical manufacturing, dams, defense, energy, financial, food and agriculture, healthcare, IT, nuclear, transportation and water and waste management.

    Securing the industrial control systems (ICS) and SCADA networks requires a different approach that goes beyond threat detection, perimeter-based security, firewalls and physical security protections.

    In this webinar, you’ll learn about how to architect and embed strong cybersecurity controls such as: secure boot, multi-factor authentication, secure software updates, secure communications between industrial devices (PLCs, sensors, IEDs, RTUs and controllers), gateways and industrial clouds. You’ll also learn about how to enable applications to call cryptographic functions that leverage hardware secure elements such as TPM, SGX, TrustZone as well as HSMs and SIMs.
  • How does Credential Theft Affect Your Organization?
    How does Credential Theft Affect Your Organization? Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks Aug 2 2017 2:00 am UTC 60 mins
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • Mobile Edge Computing/Fog Computing: A Journey from Concepts to Reality
    Mobile Edge Computing/Fog Computing: A Journey from Concepts to Reality Naveen Mishra, Ajay Sunder, Frost & Sullivan Aug 2 2017 7:00 am UTC 60 mins
    The need to embrace digital transformation in all possible scenarios is paramount to bring efficiencies and improve current business processes. The challenges of real-time data processing, high network speeds and latency can be overcome by using ICT technologies, i.e., Mobile Edge Computing/Fog Computing. These computing technologies bring compute and storage capabilities to the edge of the network and enable real-time and context-based business applications. All industry verticals can find relevant application areas that can benefit from computing at the edge of the network.
  • How does Credential Theft Affect Your Organization?
    How does Credential Theft Affect Your Organization? Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks Aug 2 2017 9:00 am UTC 60 mins
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • Integrating Network Analytics Into Your Security Architecture
    Integrating Network Analytics Into Your Security Architecture Jon Oltsik, Senior Principal Analyst at ESG Jeff Costlow, Director of Security at ExtraHop Networks Aug 2 2017 10:00 am UTC 60 mins
    Over the next several years, ESG sees organizations adopting a security operations and analytics platform architecture (SOAPA) that ties together best-of-breed cybersecurity tools. Wire data—full L2-L7 analytics—from network security analytics platforms will play a key role in these SOAPA portfolios because of its real-time nature and because every threat must necessarily traverse the network. This webinar will explain the SOAPA approach and how wire data fits, and will include use cases for integration and orchestration of wire data with other security tools such as SIEM platforms.