Hi [[ session.user.profile.firstName ]]

IT Security

  • Without the Fluff: SCA in the Real World
    Without the Fluff: SCA in the Real World
    Susan St. Clair, Technical Services Engineer at Checkmarx Recorded: Aug 13 2020 46 mins
    You already know half the story: your developers are using open source and software composition analysis (SCA) to find and fix associated vulnerabilities. Lack of visibility and remediation puts your software and your data at risk. But, to know the full story, you need to be able to visualize the experience of incorporating an SCA solution into your AppSec program. How does one secure software without complicating development workflows and causing implementation headaches? This is the difficult part of the story... cutting through the fluff to get real and honest insight.

    See what it’s like to:
    • Generate an accurate inventory of the open source libraries being used by your development teams
    • Automate analysis and inject security risk insight directly into your secure SDLC or CI/CD pipelines.
    • Clearly understand vulnerabilities in direct and transitive dependencies
    • Reduce the noise (false positives) in SCA results and prioritize remediation of actual risks
    • Perform SAST (static analysis) and SCA scans from your build pipeline and/or source code repo
  • State of Ransomware
    State of Ransomware
    Jim Hung, Assad Dahan Recorded: Aug 13 2020 61 mins
    Ransomware continues to evolve and despite what many in the industry had thought was a lull in the use of ransomware by cyber criminals; it hasn’t gone away and has returned with a vengeance. The “tried and true” source of revenue, projected at $17B in 2020, for cyber criminals now comes with capabilities and new tactics to ensure money is paid by the victims it has been inflicted upon.

    The Cybereason research team, Nocturnus, continues to follow the latest ransomware trends based upon what is happening in the underground and the Cybereason Incident Response team has first hand experience and lessons learned based upon what customers have encountered. Please join this webinar to get insights from Cybereason experts on the current state of ransomware and what you can do to prepare for the next ransomware attack.

    Some highlights of the ransomware discussion will include:

    Evolution of ransomware
    Current trends and new tactics
    Lessons from the field
    How to better protect your organisation from ransomware
    We look forward to having you attend this engaging and in-depth discussion with our experienced cyber security speakers. Be sure to register so you can gain a better understanding of what is happening with ransomware and how you can better protect your organisation from the latest ransomware attack.
  • “Lunch & Learn” Einfache Messbarkeit gegen MITRE, NIST & ISO
    “Lunch & Learn” Einfache Messbarkeit gegen MITRE, NIST & ISO
    Stefan Munz, GSS & Intelligence Lead & Christian Husemeyer, Solutions Architect Recorded: Aug 13 2020 41 mins
    Security Validation Deep Dive:
    • Wie erhalte ich zeitsparend wirkliche Transparenz hinsichtlich verschiedener Metriken?
    • Wie gelange ich an entsprechende Tools und Taktiken sodass ich meine Infrastruktur sinnvoll testen kann?
  • Nutanix Core and Storage Capabilities
    Nutanix Core and Storage Capabilities
    Shriya Patel | Systems Engineer, Nutanix Recorded: Aug 13 2020 9 mins
    Nutanix hyperconverged infrastructure (HCI) brings newfound simplicity and operational efficiency to your datacenter and remote sites. Nutanix combines compute, storage and virtualization into a hyperconverged solution that delivers agile infrastructure. Eliminate storage silos, expensive virtualization technology, and dedicated management. Achieve operational agility while retaining your ability to choose your hardware and virtualization technology.

    Join us for a 10-minute introduction into the Core and Storage Capabilities and see the reasons why customers choose Nutanix.
  • Defend Your Web Applications with Amazon CloudFront and Fortinet WAF
    Defend Your Web Applications with Amazon CloudFront and Fortinet WAF
    Shawn Brady, Head of Global Partnerships, AWS, & Brian Schwarz, Director, Product Marketing, Fortinet Recorded: Aug 13 2020 50 mins
    Today, you not only need to build applications that meet the global scale and performance requirements demanded by your customers, but also secure those applications against an ever expanding and evolving threat landscape. To help you keep pace with modern application deployments, Fortinet, an industry leader in application security, and Amazon CloudFront, AWS’s secure and high performing Content Delivery Network, have partnered to provide customers with industry-leading performance and security on AWS.

    Watch this webinar to learn how the combined offerings of Amazon Cloudfront, AWS WAF, Fortinet WAF Managed Rules and FortiWeb:

    - Secures your entire infrastructure including network, web applications, and APIs for both cloud and/or on-premises environments
    - Protects against known vulnerabilities such as the OWASP Top 10 and zero-day threats
    - Provides the high availability and low latency required for your data, applications, and APIs
    - Quickly deploys in AWS Marketplace with minimal management resources
  • Die Antwort lautet: Die Sicherheit muss aus der Cloud kommen
    Die Antwort lautet: Die Sicherheit muss aus der Cloud kommen
    Thomas Bier, Cybersecurity Specialist at Cisco Recorded: Aug 13 2020 64 mins
    Sie kennen das bestimmt: Die Grenzen des Unternehmensnetzes (der Perimeter) sind zwar nicht verschwunden, haben sich jedoch enorm verschoben: Immer mehr Mitarbeiter arbeiten immer öfter mobil oder aus dem Homeoffice, greifen auf Web-Applikationen und -Dienste wir Office 365, Dropbox oder Salesforce zu. Bei Ihrer Arbeit nutzen sie häufig nicht mal ein VPN und sind deswegen ein willkommenes Ziel für Angreifer. Gelingt eine Cyberattacke an dieser Stelle, ist es für Kriminelle ein Leichtes, von dort aus auf Ressourcen im Unternehmen zuzugreifen. Aus diesem Grund verläuft die Unternehmensgrenze inzwischen auf der Ebene des Benutzers beziehungsweise auf dem von diesem benutzten Gerät.


    Die Konsequenz für Sie lautet, dass Ihre Security-Strategie genau hier ansetzen muss. Egal, wo sich der User aufhält und welches Gerät er nutzt – sie müssen ihn effektiv schützen. Aber wie? Die Antwort lautet: Die Sicherheit muss aus der Cloud kommen.


    Im Webcast am 7.5. stellen wir Ihnen einen Ansatz vor, mit dem Sie ihre Mitarbeiter und damit Ihr Unternehmen besser schützen können. Dabei verbinden sich User unabhängig von ihrem Standort über ein Secure Internet Gateway (SIG) mit dem Internet. Es dient als eine Art Zufahrt und stellt gleichzeitig Ihre erste Verteidigungslinie dar, indem es den Netzverkehr auf schädliche Inhalte untersucht. Wie das im Detail funktioniert, erläutert der Studioexperte Thomas Bier von Cisco im Webcast am 7. Mai. Sie erfahren während der Sendung unter anderem:

    - Wie man Malware, Phishing und Command & Control-Rückrufe über jeden Port oder jedes Protokoll blockiert - bevor Bedrohungen Sie erreichen.
    - Wie Sie die nötige Transparenz erreichen, um den Internetzugang über alle Geräte in I- hrem Netzwerk, alle Bürostandorte und Roaming-Benutzer zu schützen.
    - Wie Sie das Beste aus einem Secure Internet Gatway (SIG) herausholen.
  • Preventing Cyber Attacks on Industrial OT Networks and ICS Assets
    Preventing Cyber Attacks on Industrial OT Networks and ICS Assets
    Mati Epstein, Head of ICS Sales, Check Point Software & Emanuel Salmona, VP of Global Partnerships, Claroty Recorded: Aug 13 2020 60 mins
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 92% of industrial organizations use IoT, many organizations are exposed.

    A range of IoT devices are connected to corporate networks, which extends the attack surface, providing more entry points for hackers.

    Join the webinar to learn how to prevent industrial-related cyber attacks by:

    •Exposing all IoT security risks across Industrial and OT networks
    •Easily creating zero trust policies to secure thousands of IoT devices
    •Enforcing multi-layered protections at the network and device levels

    Can't make this session? Join us for another session on August 13th at 9 am PST | 12 pm EST: https://bit.ly/2DPPPMa
  • Case study: Motorists Insurance
    Case study: Motorists Insurance
    Video case study Recorded: Aug 13 2020 2 mins
    Okta Secures Motorists Insurance’s Hybrid Environment
  • Security Policy Clean-Up and Optimization through Administrative Automation
    Security Policy Clean-Up and Optimization through Administrative Automation
    Alex Apt, Solutions Architect, APAC Sales - Tufin Recorded: Aug 13 2020 37 mins
    Security policy clean-up does not need to be a drag. Imagine automated identification or alerts for policies which haven’t been used for three months, automatic populating of tickets to decommission these rules, automated server decommissioning, and automated group modifications aligned with your IPAM changes.

    Join us for a TechTalk to learn how to take the drag out of security policy clean-up, and how to optimize your policy management efficiently, productively and accurately.
  • Without the Fluff: SCA in the Real World
    Without the Fluff: SCA in the Real World
    Susan St. Clair, Technical Services Engineer at Checkmarx Recorded: Aug 13 2020 46 mins
    You already know half the story: your developers are using open source and software composition analysis (SCA) to find and fix associated vulnerabilities. Lack of visibility and remediation puts your software and your data at risk. But, to know the full story, you need to be able to visualize the experience of incorporating an SCA solution into your AppSec program. How does one secure software without complicating development workflows and causing implementation headaches? This is the difficult part of the story... cutting through the fluff to get real and honest insight.

    See what it’s like to:
    • Generate an accurate inventory of the open source libraries being used by your development teams
    • Automate analysis and inject security risk insight directly into your secure SDLC or CI/CD pipelines.
    • Clearly understand vulnerabilities in direct and transitive dependencies
    • Reduce the noise (false positives) in SCA results and prioritize remediation of actual risks
    • Perform SAST (static analysis) and SCA scans from your build pipeline and/or source code repo
  • SecureCloud Webinar Series: Cloud Security Posture Visibility
    SecureCloud Webinar Series: Cloud Security Posture Visibility
    Jonathan Campbell, Cloud SME and Pat Chiu Pre Sales Engineer, North Asia - Tufin Recorded: Aug 13 2020 35 mins
    Gaining visibility into public cloud and Kubernetes environments is a critical first step to ensuring your cloud is secure. Using Tufin SecureCloud, we will show you how to gain valuable insight and visibility into your cloud security posture, and discuss the next steps to actionable remediation and continued compliance.

    This webinar will review the key metrics, insights, industry standards, and best-practices required to determine your current cloud security posture. Topics covered:
    • Cloud platform vendor best practices
    • CIS Benchmarks – how to interpret and act on them
    • Find and understand overly permissive security policies
  • How Symantec Detected and Prevented the WastedLocker Ransomware Attack
    How Symantec Detected and Prevented the WastedLocker Ransomware Attack
    Kevin Haley, Director of Security Response, Eric Chien,Technical Director, Broadcom, Symantec Enterprise Division Recorded: Aug 13 2020 47 mins
    Evil Corp is not just a fictional company from “Mr. Robot”. It's a real-world sophisticated cyber crime gang of the same name that has continued on undeterred by FBI indictments of its leaders. Evil Corp recently launched a new targeted ransomware attack called WastedLocker against some of the largest U.S. companies and could have easily knocked them all out.

    Symantec threat hunters discovered and identified a breach inside dozens of corporate networks and were able to protect these companies before ransomware was deployed and caused damage. Want to hear more about how the attack worked, how Symantec discovered it and what to expect next from WastedLocker?

    Join us for a conversation between Eric Chien, Symantec Technical Director, and Kevin Haley, Director of Security Response on July 16th at 10am PT/1pm ET

    You will learn:
    - The details of these attacks
    - How Symantec discovered them
    - What you can do to protect your organization going forward
  • Cloudy with a Chance of Misconfiguration
    Cloudy with a Chance of Misconfiguration
    Bulut Ersavas, Senior Manager, Product Management, Rapid7 and Brandon Turner, Senior Director, Software Engineering, Rapid7 Recorded: Aug 13 2020 40 mins
    Misconfigurations in the cloud are becoming a prevalent source of risk for organizations as more and more businesses move their infrastructure to the cloud. The root cause of this increased risk is that in a cloud environment, far more people can set up and deploy network infrastructure, whereas in an on-premises network, that ability is usually restricted to IT professionals who are well-versed in security best-practices.
  • Preventing Phishing Attacks in the Digital Workforce
    Preventing Phishing Attacks in the Digital Workforce
    James Locus, Sr. Product Marketing Manager - Menlo Security & BP Lau, Director Systems Engineer - Menlo Security Recorded: Aug 13 2020 57 mins
    Poor cybersecurity habits and simple mistakes made by employees place organisations at greater risk of credential theft and infiltration. Despite all the advancements in cybersecurity, phishing continues to be the number one source of breaches. As companies move toward a more digital and remote workforce—especially during the Covid-19 pandemic—the risk of employees falling for a phishing attack increases.

    Cybercriminals are becoming more adept at fooling employees with timely topics, sometimes when people are at their most vulnerable. A particularly important goal of attackers is to gather employee credentials, which are then used to capture and control company data for malicious financial gain.

    In this webinar, we will discuss the current phishing trends of 2020 and demonstrate how to prevent attacks in the digital workforce. Some of the questions we will discuss include:

    - How have phishing attack trends changed as a result of Covid-19?
    - What common phishing techniques are working for attackers?
    - How can you eliminate the risk of phishing for your digital and remote workforce?
  • Tech Bite: Moving to 1-year validity TLS certificates
    Tech Bite: Moving to 1-year validity TLS certificates
    Dean Coclin, CISSP - Sr. Director Business Development, DigiCert Recorded: Aug 13 2020 12 mins
    From Sept. 1, 2020, browsers will no longer accept publicly trusted TLS webserver certificates valid for longer than 398 days. This announcement made in February by Apple and followed by Chrome and Mozilla will significantly change the way domain owners and businesses will have to administrate their TLS environment. In this bite-size session, our host Dean Coclin, CISSP, will help you understand this browser announcement:

    - What it is and how it happened
    - Which certificates are affected
    - Mitigation strategies for shorter certificate lifetimes
  • Understanding and Leveraging the MITRE ATT&CK Framework
    Understanding and Leveraging the MITRE ATT&CK Framework
    John Hubbard, Certified Instructor at SANS; Matt Cauthorn, VP of Cyber Security Engineering at ExtraHop Recorded: Aug 12 2020 61 mins
    In this webcast, sponsor representatives and report author John Hubbard will discuss the new SANS report, "Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework." The discussion will explore themes from the paper, including:

    - What the MITRE ATT&CK Framework is
    - Where ATT&CK is going
    - Best practices for using ATT&CK information

    Register today and learn how to leverage the information and ecosystem of tools surrounding ATT&CK to develop, bolster and assess your own defenses.
  • Foundational Network and Security Building Blocks for Digital Transformation
    Foundational Network and Security Building Blocks for Digital Transformation
    PG Menon, Senior Director of Product Marketing at Infoblox Recorded: Aug 12 2020 46 mins
    Infoblox DNS, DHCP and IP Address Management (or DDI) Core Network Services deliver next-level visibility, resiliency and control for traditional, software-defined, and multi-cloud networking environments. It empowers IT and DevOps through automated provisioning and centralized control of the distributed enterprise, ensuring that only approved device access network resources. Cloud service requests are directed to the most efficient entry points, and guarantees local survivability of active sessions even if datacenter connections are lost. Our capabilities enable you to stay ahead of the growing demands of your organization and helps protect against rising cyber security threats and improves remediation response times. This webinar will cover how to:

    - Simplify and automate multi-cloud deployments
    - Strengthen and optimize your security posture
    - Provide cloud-native foundation for locally survivable secure Edge
  • Security in the API Economy
    Security in the API Economy
    Keith Casey, API Problem Solver, Okta Recorded: Aug 12 2020 37 mins
    Technology has revolutionized how we interact with the world around us. The critical systems we rely on are pervasive in every imaginable format and on every connected device. Unfortunately, our security practices haven’t kept pace with this evolution and every day people and companies fall victim to identity theft, data breaches and irate customers and employees.

    In this talk, we’ll look at the industry approaches to authentication and authorization, the tradeoffs that come with each strategy, and how we can, and why we must do better. By changing our mindset and building on a reliable foundation of well-established standards, we can protect our systems and users now and into the future.
  • Mitigate Ransomware Risks With An Enterprise Content Firewall
    Mitigate Ransomware Risks With An Enterprise Content Firewall
    Tim Gallo, Security & Intel Architect, FireEye; Cliff White, CTO, Accellion; Chris Unick, Director, FireEye Recorded: Aug 12 2020 45 mins
    When you have to choose between paying a cyber ransom or losing your IP and customer content and taking a hit to your reputation, it’s really no choice at all. Ideally, you should avoid the problem entirely—detect and quarantine incoming files that contain ransomware before they do damage.

    Attend this webinar to learn how to combine Accellion’s enterprise content firewall with FireEye Malware Analysis and Helix to protect all your communication channels with a unified infrastructure, unified security and unified visibility.

    Key Takeaways:
    • Detect and quarantine ransomware with FireEye detection capabilities with Accellion’s content firewall
    • Use a content firewall to unify governance and security of traffic from all content communication channels
    • Use FireEye Helix to monitor and analyze the clean, pre-normalized security logs of all the consolidated content flows

    Reserve your seat for our live event on Wednesday, August 12, 2020 at 11am Pacific. l 2pm Eastern

    Speakers:
    Tim Gallo | Global Security and Intelligence Architect, FireEye
    Cliff White | CTO, Accellion
    Christopher Unick | Director Technical Partnerships, FireEye
  • Workspace Essentials | Episode 2 | Workspace Essentials + ShareFile
    Workspace Essentials | Episode 2 | Workspace Essentials + ShareFile
    Daniel Jim, Citrix | Eric Kenney, Citrix Recorded: Aug 12 2020 5 mins
    In this three-part mini webinar, or “webinette”, series, we highlight the key elements into the entry level offering of Citrix Workspace, Workspace Essentials, designed with SMBs in mind.

    In the second episode, Daniel and Eric from Citrix's product marketing team are back again to cover how Workspace Essentials and Citrix ShareFile work better together in just over 5 minutes.
  • Assess Your Certificate Management Maturity: A Workshop with PKI Experts
    Assess Your Certificate Management Maturity: A Workshop with PKI Experts
    Sami Van Vliet, Principal Product Manager and Ryan Yackel, VP Product Marketing Recorded: Aug 12 2020 55 mins
    As SSL/TLS certificate usage continues to reach extreme levels, other factors like the shorter certificate lifespans, expanding use cases, and the rise of quantum have put pressure on certificate management practices.

    However, the broad scope of certificate management makes it hard to know how mature your current practices are today and where they need to be for the future. The transition from manual spreadsheet-based tracking to full certificate lifecycle automation often comes with significant bumps in the road, but in our experience, it is well worth the effort.

    That’s where this model comes in to help.

    Join Sami Van Vliet, Principal Product Manager, and Ryan Yackel, VP Product Marketing as they walk through each level of a practical guide on how to scale and automate certificate management.

    In this webinar, you will learn:
    -How to self-assess your team’s progress against five maturity levels
    -Common scenarios experienced at each level
    -Tips for implementing required process changes that will get you to your next level in certificate management maturity
  • Achieve Rapid AppSec with Open Source Security (ZeroNorth demo, 8/12@1:00pm ET)
    Achieve Rapid AppSec with Open Source Security (ZeroNorth demo, 8/12@1:00pm ET)
    The ZeroNorth Team Recorded: Aug 12 2020 18 mins
    Ensuring security keeps pace with accelerating application development can be a major challenge for organizations with immature or resource-stretched application security (AppSec) programs.

    In this 20-minute webinar, complete with a live demo, learn how you can jump-start and accelerate critical security initiatives, leveraging the free-to-use scan tools the come out of the box with the ZeroNorth platform—SCA, SAST, DAST, container and cloud management—to enable security across both the development and operational phases of the development lifecycle.
  • The Maturing of Business Email & Account Compromise in Financial Services
    The Maturing of Business Email & Account Compromise in Financial Services
    John Checco, Resident CISO & Sean Odowd, FinServ Solutions Director at Proofpoint Recorded: Aug 12 2020 48 mins
    Historically, business email compromise (BEC) has focused on spoofing a sender to convince the recipient to click on a URL or download a malware payload. With the progression of both back-end technologies, as well as front-end user security awareness training, there has been a significant drop in BEC-initiated compromises. But the growing prevalence of cloud-based office suites – and their misconfigurations – has allowed bad actors to takeover access to legitimate email and use it to bypass most existing detection techniques. So how can you better protect your user?

    Join our Proofpoint experts in this webinar as they discuss:

    - The factors that make so-called email or enterprise account compromise (EAC) a hard problem to solve
    - The areas where enterprises are most vulnerable based on recent use cases
    - How a people-centric approach will better secure your end users
  • COVID-19, Incident Response & Standing Privilege: Where's the Easy Button?
    COVID-19, Incident Response & Standing Privilege: Where's the Easy Button?
    Tom Kellermann, Head of Cybersecurity Strategy from VMware Carbon Black and JD Sherry, CRO from Remediant Recorded: Aug 12 2020 53 mins
    Cyber security investigators, data breach analysis reports, and security professionals continue to confirm that lateral movement (enabled by user profile propagation), and the abuse of standing privileges remain at the center of most major incidents.

    Unfortunately, it's also one of the most complex cyber security challenges to solve. As a result, privileged access security controls are evolving from an authentication-centric model built upon legacy vault-based credential processes to a journey towards “zero standing privilege.”

    Join our upcoming webinar with VMware Carbon Black Head of Cybersecurity Strategy, Tom Kellermann, and Remediant CRO, JD Sherry, as they talk about current trends and threats facing today's modern enterprise. Discussion and questions will include:

    - Dramatic increase in counter-incident response
    - Remote Access Security
    - Impact to security operations due to COVID

    Finally, they will explore how to simplify the implementation of a “zero standing privilege” model that focuses on just-in-time administration and the eradication of standing privilege to better prevent minor incidents from becoming major ones.
  • Building an Executive Cyber Risk Dashboard w/ Brinqa & Slalom
    Building an Executive Cyber Risk Dashboard w/ Brinqa & Slalom
    Syed Abdur, Pezhman Nikpour, Adrian Hoffman Recorded: Aug 12 2020 56 mins
    Executive cyber risk dashboards present a high-level view into the cybersecurity and risk posture of an organization. Commonly used by cybersecurity executives to get a quick window into the state of their programs or to identify problem areas that need more attention, these dashboards are also invaluable when communicating the state of cybersecurity initiatives to non-technical audiences like the c-suite, boards, and other executive leadership. The good news is that most organizations already have programs and security toolsets in place that capture the information necessary for building such a view. The bad news is that these data sources are often highly technical, siloed, and intractable.

    Join us for this webinar as we welcome Pez Nikpour and Adrian Hoffman of Slalom Consulting to discuss how they use Brinqa to leverage customers' existing cybersecurity controls monitoring programs and create an Executive Cyber Risk Dashboard that clearly and concisely communicates cybersecurity and risk posture to executives and cybersecurity leadership in large enterprises.
  • Prioritizzare gli investimenti in sicurezza della rete nell’era COVID e oltre
    Prioritizzare gli investimenti in sicurezza della rete nell’era COVID e oltre
    Flavio Di Cosmo, Pre Sales engineer, Italy - Tufin Aug 13 2020 1:00 pm UTC 60 mins
    I livelli di sicurezza della rete hanno subito una brusca trasformazione con il passaggio improvviso al telelavoro. La necessità imprescindibile di velocità, con disagi minimi per i dipendenti, ha impedito a molte organizzazioni di seguire le proprie procedure tradizionali in materia di sicurezza. Scopri la trasformazione che i nostri clienti Fortune 500 hanno attuato dall'oggi al domani, le implicazioni relative ai rischi per la sicurezza della propria rete, le soluzioni utilizzate e i piani per il futuro.

    Sulla base dei risultati di un recente sondaggio condotto tra i clienti Tufin, in questo webinar esamineremo in maggiore dettaglio:
    • Le principali sfide per la sicurezza che le organizzazioni si sono trovate ad affrontare nel passaggio al telelavoro.
    • Le pratiche migliori per valutare e potenziare la sicurezza della rete, con un gran numero di dipendenti che lavora da remoto, attraverso la segmentazione e il controllo degli accessi.
    • Gli investimenti che i clienti prevedono di effettuare per ripristinare il proprio livello di sicurezza, aumentare la produttività dei team incaricati della rete e della sicurezza e prepararsi a un altro possibile colpo o scossa in futuro.

    Unisciti a noi il 13 agosto alle 15:00 (CEST).

    Se non puoi partecipare al webinar in diretta, iscriviti qui e ti invieremo la registrazione.
  • Aruba and the New Normal Workplace
    Aruba and the New Normal Workplace
    Jon Howell - Smart Spaces & Experience Lead EMEA, and Simon Reynolds - Aruba Aug 13 2020 1:00 pm UTC 60 mins
    A presentation by Jon Howell and Simon Reynolds from Aruba on how Aruba can help organisations adapt their working environments
  • Archiving Innovations: Meeting today’s Compliance and e-discovery needs
    Archiving Innovations: Meeting today’s Compliance and e-discovery needs
    Michael McGrath, Senior Director, Compliance and Digital Risk, Proofpoint Jen Gough, Competitive Specialist, Proofpoint Aug 13 2020 1:00 pm UTC 60 mins
    Economics, social and regulatory pressures have fundamentally changed the demands on archiving solutions. This creates new challenges and opportunities for the enterprise – from need of supervision to help ensure regulatory compliance and provide proof of compliance, to broader application of the technology. For instance, the monitoring of business digital communications for opportunities for training or targeted actions can help improve employee performance, reduce policy violations, and much more.
    Welcome to the next wave in Archiving Compliance technologies.
    In this Live Webinar, we’ll discuss how archiving has evolved to address today’s information management challenges and unveil how you can improve information governance, compliance and financial position by:
    Streamlined e-discovery to increase efficiency and reduce costs.
    Refined insights expand visibility for mitigating risks.
    Enhanced regulatory compliance supervision to improve review accuracy across email, social, and enterprise collaboration data.
    As an added bonus, we’ll wrap up the webinar with a live demo of Proofpoint Enterprise Archive, including key features in E-Discovery Analytics and Intelligent Supervision.
  • CertifiCare: Best Practices for Certificate Management
    CertifiCare: Best Practices for Certificate Management
    Murali Palanisamy, Chief Solutions Officer Aug 13 2020 2:00 pm UTC 39 mins
    x.509 certificates have become a mainstay of digital security for businesses around the globe. The key to making a network outage-proof and fully secure is a well-rounded certificate management program, but does the perfect implementation exist? No, but here's the next best thing. In this webinar, we'll go over the recommended best practices, updated for the year 2019. In a linear, step-by-step fashion, we'll tell you exactly what you need to do (and what not to), to create a highly secure certificate infrastructure.

    Key Takeaways:
    Components of the certificate lifecycle.
    Obstacles to implementing a secure certificate management system.
    The latest best practices for certificate management.
    How AppViewX CERT+ can help you adhere to them.
  • Secure SD-WAN without compromise
    Secure SD-WAN without compromise
    Andy Brown, Solutions Architect, Zscaler & Simon Pamplin, Director of Technical Sales, Silver Peak Aug 13 2020 2:00 pm UTC 44 mins
    As applications migrate to the cloud and the world becomes increasingly mobile, organisations are embracing SD-WAN and cloud-based security as an alternative to cumbersome router-centric WANs and costly security appliances. Discover how secure SD-WAN can help enterprises achieve the full transformational promise of the cloud. 

    Join Andy Brown, Solutions Architect, Zscaler & Simon Pamplin, Director of Technical Sales, Silver Peak on the 12th May at 2pm BST to discover:

    - The challenges of legacy approaches to networking and security
    - Why shifts in traffic patterns and the fundamental nature of apps are forcing organisations to embrace new wide area network and security models
    - How the Silver Peak and Zscaler Secure SD-WAN solution delivers lower costs, simplified operations, and the highest quality experience for your IT organisation and end users
  • Augmenting Native Cloud Security Services to Achieve Enterprise-grade Security
    Augmenting Native Cloud Security Services to Achieve Enterprise-grade Security
    Thomas Martin former GE CIO and founder of NephōSec and Christopher Hertz, VP Cloud Security Sales at Rapid7 Aug 13 2020 2:00 pm UTC 45 mins
    Appropriate use of native security controls in Amazon Web Services, Microsoft Azure, and Google Cloud Platform is essential to managing cloud risk (and avoiding a costly breach). However, many organizations struggle with determining when and how to use these native security controls, doing so in a consistent fashion, and also understanding how and when to augment these to ensure continuous security and compliance.

    Join Thomas Martin (former GE CIO and founder of NephōSec) and Christopher Hertz (VP Cloud Security Sales at Rapid7) for a discussion on:

    - How and when to use native cloud security controls
    - Why and when you may want to augment these control
    - How to leverage automation to gain continuous security and compliance in public cloud
  • The New Avast Business Multi-tenant Management Console for Partners
    The New Avast Business Multi-tenant Management Console for Partners
    Pavel Jirsak, Senior Product Manager Aug 13 2020 2:00 pm UTC 60 mins
    The Avast Business Management Console now allows IT service providers to manage multiple customers from a single pane of glass. The new multi-tenant, cloud-based platform will help you reduce the burden of operationalizing, maintaining, configuring, and optimizing endpoint security.

    Join our 30-minute demo to learn how to:
    - Register for the new multi-tenant console
    - Navigate through the new console
    - Access the Remote Control service in Beta
    - and much more!
  • Cybersecurity For Manufacturing In The Digital Age
    Cybersecurity For Manufacturing In The Digital Age
    Thomas Coke Aug 13 2020 2:00 pm UTC 60 mins
    Manufacturing companies face unique challenges in identifying and responding to vulnerabilities in their networks and equipment. The transformation to industry 4.0 makes this even more difficult. Cyber criminals (and state-actors) are focusing on stealing and holding hostage the intellectual property so many family-run businesses have built over generations. BitLyft Cybersecurity addresses these issues and more to equip manufacturers with the tools and knowledge to improve their cybersecurity posture to protect against cyber attacks.

    What you'll learn:
    • How to secure manufacturing 4.0
    • Best practices to protect your intellectual property
    • How to identify attacks and how to respond
    • Best approaches to train employees on phishing emails
    • Work from home and security risks
  • Librarian best practices ensure uninterrupted access to research and education
    Librarian best practices ensure uninterrupted access to research and education
    Emily Singley, Boston College; Naomi Visser, Stellenbosch University Aug 13 2020 2:00 pm UTC 60 mins
    Librarians play a critical role in ensuring their researchers, students and faculty have access to research and the learning tools they need to be successful.

    The global pandemic has forced educational institutions to close campuses and shift learning and research services to remote options. This shift took many people by surprise, but not to librarians who were already prepared to provide remote access and online resources to their users without disruption. In this webinar, librarians share their best practices on enabling uninterrupted access to research and education.

    Topics covered in this webinar include:

    •Infrastructure readiness – were policies in place for potential university lockdowns or was there a need to provide them?
    •What worked right away and what improvements were made to services that didn’t work out of the box?
    •Communicating and promoting available remote access options to users
    •Challenges to working remotely
    •Showcasing the move to remote online learning

    Presenters:

    Emily Singley, Head of Library Systems, Boston College
    Naomi Visser, E-Resources Librarian, Stellenbosch University
  • Secure Office365/GSuite: Direct-to-Internet Connections to O365 and GSuite
    Secure Office365/GSuite: Direct-to-Internet Connections to O365 and GSuite
    James Locus, Sr. Product Marketing Manager - Menlo Security Aug 13 2020 2:30 pm UTC 12 mins
    Secure Office 365 and Secure G Suite from Menlo Security provide unprecedented levels of protection against malware and phishing to help your business safely access email and the Internet with cloud-based isolation. Built on top of our Global Cloud Proxy, these solutions provide faster, more secure SaaS usage with direct-to-Internet connectivity for branches and end users.

    Secure Office 365 and Secure G Suite offer equivalent feature sets to match the desired software package.
  • APIs, digital transformation and the need for a new approach to security
    APIs, digital transformation and the need for a new approach to security
    Ken Jochims, Arxan Senior Director of Product Marketing | Randy Heffner, Forrester Principal Analyst for App Dev & Delivery Aug 13 2020 3:00 pm UTC 42 mins
    APIs are more than a tool for integration: they are changing the way companies do business. APIs enable new business models and faster time-to-market, make it easier to drive digital transformation, and make it possible to create better customer experiences for web and mobile apps. But without a comprehensive API strategy enterprises will be hard pressed to expand access to corporate assets without unnecessary risk. Today most organisations don't even know how many APIs they’ve deployed, let alone if they are secure. That’s a scary proposition when you consider that API exploits are expected to become the most frequent attack vector for enterprises over the next two years.

    In this webinar, guest speaker Randy Heffner of Forrester and Arxan’s Ken Jochims will discuss how APIs are driving digital innovation, how these changes expand an organisation’s attack surface, and key considerations for API security. You’ll learn:

    -Common ways enterprises use APIs
    -The security risks and attack scenarios APIs face
    -The key components to comprehensive API protection
    -Why it’s important to incorporate API security as part of DevOps
    -How to get started with an API security strategy
  • Structured Content Powers the Healthcare Voice Revolution
    Structured Content Powers the Healthcare Voice Revolution
    Bill Cava Aug 13 2020 3:00 pm UTC 45 mins
    We're on the cusp of a remarkable revolution in the healthcare industry. There's a transformation taking place — a metamorphosis in the way that hospitals, labs, pharmacies, medical offices, clinics, and medical device manufacturers deliver information. The most likely changes are designed to improve the patient experience, more-often-than-not, by leveraging the power of artificial intelligence and conversational content.

    Join us for a chat with digital healthcare experience guru, Bill Cava, co-founder and chief product officer with Orbita, a company that designs healthcare solutions for voice-activated devices.

    In this episode of Coffee and Content, you'll hear how some healthcare firms create exceptional customer experiences that take full advantage of chatbots, personal assistants, and other accelerating technologies. Cava will share some real-world examples and take questions from the audience. You'll leave understanding why structured content and data are required to deliver the personalized content experiences the healthcare voice revolution makes possible.
  • Modernize and automate your IT service management like a boss
    Modernize and automate your IT service management like a boss
    Bill Hansey, senior product marketing manager, and George Rubio, technical marketing leader Aug 13 2020 3:00 pm UTC 54 mins
    Oftentimes, IT teams aren’t able to innovate due to spending so much time simply trying to keep their tools working. And an overall lack of visibility only compounds the problem by creating risk, as the team is always in a reactive—rather than proactive—mode. Does this sound familiar?

    Join our webinar on modernizing IT by consolidating to a single system of engagement. You’ll learn how to accelerate your digital transformation and propel your organization’s growth—all while delivering outstanding employee experiences.

    By attending our webinar, you’ll learn how to effectively:

    -Modernize IT by consolidating legacy tools to a single cloud-based system of engagement and gain real-time visibility, going from firefighting to innovation
    -Scale your IT staff using conversational virtual agents and automating routine work
    -Provide service desk agents with everything they need—including AI-assisted recommendations—to deliver better experiences that make IT a hero

    Hosted by: Bill Hansey, senior product marketing manager, and George Rubio, technical marketing leader, both of ServiceNow
  • Reduce Your App Threat Surface and Improve User Experience
    Reduce Your App Threat Surface and Improve User Experience
    Jay Kelley, Principal Product Marketing Manager - F5 Networks Aug 13 2020 3:00 pm UTC 16 mins
    Get the latest intel on the app threats that matter.

    The majority of breaches in the US in 2019 were the result of access-related attacks. Why? An explosion of applications residing in multiple cloud environments have created complexity while previously breached username and password combinations have created new common attack types.

    Learn how the F5 zero-trust solution integrates with your favorite identity as a service to deliver single sign on for ALL apps, regardless of where they reside, and provides an enhanced, per request, inspection to ensure appropriate access.

    Register Today
  • How to manage access control with Zero Trust
    How to manage access control with Zero Trust
    Tawnya Lancaster, Lead Product Marketing Manager & Theresa Lanowitz, Head of Evangelism Aug 13 2020 3:00 pm UTC 64 mins
    A perspective from the AT&T Cybersecurity and the AT&T Chief Security Office (CSO)

    Alongside NIST CSF, Zero Trust (ZT) principals for information security have become one of the main cybersecurity frameworks organizations refer to when developing their security architecture. Access control has always been a part of ZT, however in 2019 Forrester formalized the requirement to “limit and strictly enforce access control” into a core, critical pillar of the framework — of equal importance to network security. Controlling and maintaining access to the business without disrupting operations has reached a new level of importance. Especially now that businesses are dealing with the needs of a sudden, remote workforce and increasingly embrace mobile, cloud, and edge computing.

    Join us in a conversation with the AT&T Chief Security Office (CSO) as we discuss its current point of view on how to manage access control using ZT principals, including best practices. In this webinar, we’ll discuss:

    -What steps you can take to help improve access control and move closer to a ZT environment
    -Why network segmentation and virtualization are so important
    -How to use automation and orchestration for managing and dynamically enforcing access
    -Why you should define security policy by network components (versus IP addresses) and how to extend multi-factor authentication

    Meet Your Hosts:
    Tawnya Lancaster
    Lead Product Marketing Manager, AT&T Cybersecurity
    Steve Sekiguchi
    Director, Cybersecurity for AT&T Chief Security Office (CSO)
    Rich Bowman
    Lead Member of Technical Staff for CSO
  • Normaliza el bienestar de tus ocupantes y continuidad de tu negocio
    Normaliza el bienestar de tus ocupantes y continuidad de tu negocio
    Eduardo Soto Aug 13 2020 3:00 pm UTC 120 mins
    Ante la nueva normalidad, los negocios necesitan adaptarse y minimizar riesgos para los ocupantes de las instalaciones y espacios públicos. Hoy Honeywell es líder en sistemas de tecnología que generan ambientes sanos en los edificios. Conoce las tendencias, nuevos lineamientos y regulaciones que han cambiado. Descubre el sistema de administración de instalaciones que permitirán la continuidad de tu negocio mediante el control calidad del aire y la salud de las instalaciones. Únete a los expertos y generemos juntos los cimientos de la nueva normalidad.
  • Optimizing Health Care Delivery with the Internet of Medical Things
    Optimizing Health Care Delivery with the Internet of Medical Things
    Dr. Mark Wolff, SAS Institute Aug 13 2020 3:00 pm UTC 60 mins
    The Internet of Medical Things (IoMT) and the concept of Digital Health, specifically, connectivity between patients, clinicians, machines and care environments, is emerging as a powerful tool in addressing some of healthcare biggest challenges. Recent advances in the development of Real Time Location Systems (RTLS) for reliable monitoring of assets, people and processes in the delivery of care have overcome many barriers to both their implementation and adoption. RTLS allows reliable and accurate monitoring and tracking of critical assets and resources and importantly makes possible the application of real time Operational Analytics to the delivery of care. Such analysis fundamentally addresses better patient outcomes and cost management by optimizing patient flow, staffing, scheduling, asset tracking, resource utilization and greater personalization of care. Additionally, real time location data used with advanced Machine Learning and Artificial Intelligence can generate critical insights and information about patient care delivery that previously were hidden or were difficult if not impossible to derive.
  • CISOs Panel Discussion: Securing remote collaboration during a pandemic
    CISOs Panel Discussion: Securing remote collaboration during a pandemic
    Michael Sherwood, City of Las Vegas Norman McKeown, LSH Auto UK Limited Daniel Baird, Grahams the Family Dairy Aug 13 2020 3:00 pm UTC 60 mins
    Join BitDam’s CEO & Co-Founder, Liron Barak, as she hosts CISOs for discussion on the hottest cybersecurity topics nowadays including:

    - WFH and the implications on organizations’ information security
    - Protecting from ransomware and phishing across all collaboration platforms
    - How to deal with the inevitable malware detection gap

    Panelists:

    Michael Sherwood, City of Las Vegas
    Norman McKeown, LSH Auto UK Limited
    Daniel Baird, Grahams the Family Dairy Ltd
  • Prioritizing Network Security Investments During Covid & Beyond
    Prioritizing Network Security Investments During Covid & Beyond
    Roi Alon, Senior Product Manager - Tufin Aug 13 2020 3:00 pm UTC 60 mins
    Network security postures were transformed almost overnight with the shift to remote working. The overriding need for speed, with minimal disruptions for employees, prevented many organizations from following their standard security processes. Learn how our Fortune 500 customers transformed overnight, the implications on their network security risks, the solutions employed, and what’s next.

    Based on results of a recent survey of Tufin customers, in this webinar, we’ll take a closer look at:
    Key security challenges organizations introduced when enabling remote workers
    Best practices for how-to asses and improve network security, with a large remote workforce, through segmentation and access controls
    Investments customers plan to make to restore their security posture, increase the productivity of their network and security teams, and prepare for another possible pivot or shock in the future

    Please join us on August 13th at 11am (EST)

    If you're unable to attend the live webinar, sign up here and we’ll send you the recording
  • A new cloud security strategy for a new normal
    A new cloud security strategy for a new normal
    BT cloud security experts Aug 13 2020 3:00 pm UTC 30 mins
    Your cloud security strategy will have changed over the last 6 months. You will have reacted at pace to the pandemic so now’s the time to pause and re-assess for the future.

    Join us as we explore the trends and topics shaping the future of cloud security. You will also get a unique insight into how our own cloud security strategy has evolved over the last few months. We will share with you how our approach has changed and what the future looks like for us.

    Speakers:
    o Phil Packman, CISO, BT
    o David Stark, Director Security Portfolio, BT
    o Michael Wolkowicz, US Sales Director, BT
    o Michala Hart, UK Sales Director, BT (Moderator)
  • NSA & CISA Alert AA20-205A, How To Meet Recommended Actions For OT Systems
    NSA & CISA Alert AA20-205A, How To Meet Recommended Actions For OT Systems
    Nadir Izrael, Co-Founder & CTO at Armis and Curtis Simpson, CISO at Armis Aug 13 2020 3:00 pm UTC 60 mins
    In an unprecedented move the NSA and CISA, two US government entities with the greatest visibility into system attack surfaces and exploitation in the wild, issued an urgent joint cybersecurity advisory to all critical infrastructure and services operations that rely upon OT systems to deliver core services with Alert AA20-205A. This included recommendations that corresponding operations act with urgency to rapidly assess and manage the holistic set of security exposures placing such environments at risk.

    Join Curtis Simpson, CISO at Armis (former CISO for Sysco Foods) for this in depth review of Alert AA20-205A, including:
    -The rise in threats to OT systems
    -The six recommended mitigation techniques proposed in AA20-205A
    -The need for a complete view of every device - OT, IT, and IoT
    -How to understand and evaluate Cyber-risk on “As-operated” OT Assets
    -How to implement a continuous and vigilant system monitoring program

    All IT and OT professionals responsible for OT security for critical infrastructures and industrial operations are encouraged to attend.
  • The DoS goes loop-di-loop
    The DoS goes loop-di-loop
    Allon Mureinik, Senior Manager, Synopsys Aug 13 2020 3:30 pm UTC 50 mins
    Do you know the common ways Node.js applications may be vulnerable to denial-of-service attacks?

    The single-threaded nature of Node.js makes it very susceptible to DoS attacks. While the Node.js event loop allows you to perform some operations asynchronously, it’s still quite easy to write a vulnerable Node.js application by making a few simple mistakes.

    In this talk, Allon will cover some common ways a Node.js application may be vulnerable to DoS attacks and some common best practices and countermeasures to defend against such attacks.
  • How To Extract More Value from Your IoT Devices
    How To Extract More Value from Your IoT Devices
    Shiva Mogili, Senior Product Manager, Lumada Edge Intelligence, Hitachi Vantara Aug 13 2020 4:00 pm UTC 27 mins
    Succeeding with Internet of Things (IoT) hinges on your ability to collect, analyze and act on data. With evermore sensors, videos feeds and OT systems, effective edge data management is more important than ever, and can even become critical to your ability to compete. You need to implement the right strategies and technologies to collect, transport, store and process IoT data, to drive the ROI your business expects.

    Join our experts and learn how Lumada Edge Intelligence can help you address this challenge and simplify data-driven business decisions in industries such as manufacturing, energy / utilities, and transportation.
  • Preventing Cyber Attacks on Industrial OT Networks and ICS Assets
    Preventing Cyber Attacks on Industrial OT Networks and ICS Assets
    Mati Epstein, Head of ICS Sales, Check Point Software & Emanuel Salmona, VP of Global Partnerships, Claroty Aug 13 2020 4:00 pm UTC 60 mins
    Cyber criminals are taking advantage of the increase in remote workers due to the coronavirus, by increasing their attacks on IoT devices. Given 92% of industrial organizations use IoT, many organizations are exposed.

    A range of IoT devices are connected to corporate networks, which extends the attack surface, providing more entry points for hackers.

    Join the webinar to learn how to prevent industrial-related cyber attacks by:

    •Exposing all IoT security risks across Industrial and OT networks
    •Easily creating zero trust policies to secure thousands of IoT devices
    •Enforcing multi-layered protections at the network and device levels

    Can't make this session? Please join us for another session on August 13th at 9 am London | 11 am Paris | 4 pm HKT: https://bit.ly/2DTcG9L