Hi [[ session.user.profile.firstName ]]

IT Security

  • Intune is the Microsoft Mobile Device Management platform. It is the only MDM solution that can integrate with System Center Configuration Manager. Administrators can manage their on premise and mobile devices using a single console. In this webinar Enterprise Client Management MVP Gerry Hampson will be discussing his favourite features of the solution
  • Despite the rapid enterprise adoption of SaaS, many organizations still rely on a hybrid mix of on-premise and SaaS apps to run their business, creating administrative challenges and inefficiencies.

    Identity-as-a-service (IDaaS) solutions have evolved to provide business and security professionals with a viable and compelling alternative to traditional IAM options. Besides delivering all the great cloud benefits, cloud-based IAM offerings can integrate with on-premise environments to increase business agility, reduce operational inefficiencies, mitigate identity risks, and improve real-time visibility for today's hybrid enterprise.

    Join featured speaker Merritt Maxim, Senior Analyst at Forrester Research, as he discusses the state of IDaaS in the context of new architectures and real world use-cases, including:

    – Current IDaaS Market Trends
    – Critical considerations for building an IDaaS architecture & strategy
    – Challenges in extending on-premises
    – IAM approaches to the cloud
    – Key benefits from deploying IDaaS in hybrid environment
    – Quick Demo of OneLogin IDaaS solution for hybrid environment
  • As recently reported in the WSJ, 1% of users represent 75% of cybersecurity risk. We know, we were surprised too. This and other shocking truths about the causes and consequences of cloud vulnerabilities are uncovered in our latest cybersecurity report - gathered from our findings across over 10 million users, 1 billion cloud assets, and 91,000 unique apps.

    Get the inside scoop in our webinar where you’ll learn what it all means directly from our customer insights and data guru, Ayse Kaya Firat:

    – Top cloud cybersecurity trends that fly under your radar
    – What the distribution of cloud cybersecurity risk means for your ability to act on it
    – Three key security skills you should master for an immediately safer cloud environment
  • Cloud adoption in higher education is greater than in any other industry, with 83% using Google Apps or Office 365. As universities move from on-premise to public cloud apps to meet the need for modern collaboration tools and the increasing demand for BYOD, IT leaders are increasingly aware of the security risk to sensitive research data and student personal information.

    In this webinar will discuss the unique security issues of higher education including faculty file sharing and employee BYOD.
  • Whether you are building an incident response program from scratch or expanding an existing security operations centre you need to ensure it is aligned to helping you build a better cyber defence centre. The services team at Mandiant have gained experience responding to hundreds of computer security incidents every year and with this knowledge we would like to take a few minutes to discuss how you can develop your organisation’s full portfolio of technical, organizational and administrative capabilities to effectively protect themselves against advanced threat actors.
  • A discussion on the current state of advanced threat protection and incident response preparedness that will include both highlights from Arbor's Worldwide Infrastructure Security Report (WISR) as well as original research by Arbor's Security Engineering & Response Team (ASERT). The WISR is a global survey of security professionals, highlighting the key trends in the threat landscape along with the strategies network operators adopt to address and mitigate them. We’ll also provide a deep understanding of two attack campaigns discovered by ASERT. One multi-stage attack campaign was focused on government organizations and a second was focused on financial services organizations.

    This session will cover:

    • The primary challenges facing security teams with emphasis on the balance between technology, people and process.

    • Insight into attack campaigns happening on the broader Internet and an understanding of why it is critical to connect that activity to conversations on internal networks.

    • How businesses are adapting and changing their threat detection and incident response to reduce risk posture
  • ROAD MAP TO CSA STAR CERTIFICATION – OPTIMIZING PROCESSES, REDUCING COST AND MEETING INTERNATIONAL REQUIREMENTS

    With Japan’s introduction of the quartz wristwatch in 1969, the majority Swiss market share dropped from 80% at the end of World War II to only 10% in 1974 . Ironically, it was the Swiss who had invented the quartz watch but failed to see its potential. *

    When a paradigm shifts, you cannot ignore change and count on past success. New technology, like the quartz in watchmaking, can revolutionize a market, creating a tectonic shift in accepted practice. The advent of the Cloud is such an advancement in technology and optimization of its capability - the new paradigm. Technological developments, constricted budgets, and the need for flexible access have led to an increase in business demand for cloud computing. Many organizations are still wary of cloud services, however, due to apprehensions around security issues. There is a real concern across the globe about the accelerated rate that companies are moving information to the cloud and the subsequent demise of physical boundaries and infrastructure. How organizations evaluate Cloud Service Providers (CSPs) has become key to maximizing that optimization. CSA STAR Certification has proven to be the security standard of excellence in the cloud security market.

    In this first of three modules being offered by the co-authors of CSA STAR Certification - The British Standards Institution (BSI) and The Cloud Security Alliance, you will learn the history behind the vison and take the journey down the road to the certification, but more importantly review data on how it helps organizations optimize processes, reduce costs and meet the continuing rigorous international demands on cloud services.

    * Innovation in the Watch Industry by Aran Hegarty, Chapter 1, November 1996 accessed online June 2014
  • Train like you fight. Fight like you train. We could do well to heed this old military axiom and regularly drill for a variety of incident scenarios in the most realistic means as possible. During this (ISC)2 roundtable, we will explore the role of incident management simulation and testing from the world of critical infrastructure and provide some concrete and immediately actionable methods you begin incorporating into your own preparedness program. As the saying goes, “No plan survives first contact with the enemy,” so please join us On February 11, 2016 at 1:00PM Eastern in learning how to become a more resilient organization in the face of disaster.
  • Join us for a live 30 minute webinar to see how you can make data collection from the Internet of Anything fast, easy and secure. Designed to accelerate big data ROI from streaming analytics systems such as Spark and Storm, Hortonworks DataFlow delivers data from anywhere it originates to anywhere it needs to go. We will show you how you can transform your processes from months to minutes through:

    • Creation of a new, live dataflow in minutes, for your real-time analytics applications
    • Experience the power of Interactive user experience, command and control of data flows
    • Trace event-level data from source to destination in real-time
    • Highlights of the new features in HDF 1.1

    This is your opportunity to ask real-time questions of the experts in dataflow management - don’t miss out. Register here!
  • BYOD poses a curious challenge for security teams – how can you secure enterprise data on a device that you don’t own? And how can you provide the necessary security while still respecting the user’s expectations for privacy? These issues aren’t easily addressed with traditional technology, leading many organizations to a frustrating problem for securing BYOD.

    Join Palo Alto Networks and VMware AirWatch in this special webinar to learn:

    · The security challenges with BYOD
    · The issues and limitations with traditional security architectures in a mobile world
    · Advice on delivering the appropriate security measures to make BYOD safe
  • The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?

    While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.

    In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
    1. Monitor behavior on your internal network and detect abnormal behavior
    2. Identify authentication irregularities from your users
    3. Protect applications using two-factor authentication
    4. Restrict access to confidential data
  • Rejoignez ce webcast pour découvrir comment anticiper les nouveautés de l’accès mobile et les défis de sécurité avec le nouveau firmware Secure Mobile Access 11.3.

    Nouvelles fonctions :

    •Intégration Dell EMM/DMM : SSO avec conteneur Dell Mobile Workspace (iOS et Android pris en charge)
    •Nouvelle console CMS (Console Management System)
    •Délégation Kerberos contrainte (délégation KCD)
    •Accès sans client à SharePoint
    •Prise en charge de Chrome OS
    •Plus de clients HTML 5 pris en charge
    •Contrôle amélioré des protocoles SSL et Ciphers
  • What is the essence of information security governance, risk & compliance? How do you meet your governance, risk and compliance requirements and prevent a data breach? The key is to understand the spirit of risk management and create a customised information security management system (ISMS) for your business. This presentation details a practical, step-by-step guide for designing and implementing a cost-effective ISMS to minimise your risk of a breach and meet your Association’s legislative (Data Protection Act), regulatory (Payment Card Industry), or industry standard (ISO-27001) compliance requirements to include:

    · Practical ISMS documentation structure

    · Scope, objectives & risk strategy examples

    · Risk treatment plan, asset register & classification guide examples

    · Policy frameworks

    · Control objectives, evidence & policy examples

    · Audit & testing documentation examples
  • The success of cyber threat intelligence is measured by its effectiveness in reducing the impact of malicious actors. It is therefore important to understand the economy of malware in order to break the chains of success of such economy. Such success needs to be materialised by a change in attitude, policies and configurations.

    Whilst applicable to most organisations, most examples used during this seminar will feature the financial sector and aim to:


    · Analyse the core components of the economy of malware

    · Analyse how to gather intelligence to reduce the impact of malicious actors

    · Show how to use the intelligence gathered to improve the security posture of the organisation