The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.
AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
How AlienVault USM detects communications with the command and control server
How the behavior is correlated with other signs of trouble to alert you of the threat
Immediate steps you need to take to stop the threat and limit the damage
No complexo ambiente de negócios de hoje, a sua organização se depara com dificuldades de segurança cada vez maiores e exigências legais que fazem com que seja essencial controlar e monitorar seus usuários privilegiados.
O gerenciamento senhas de contas privilegiadas é um ponto de partida para proteger o seu ambiente de TI, mas ainda há muito a ser feito.
Nesta sessão, descubra como o CA Privileged Identity Manager pode ajudar sua organização a gerenciar identidades privilegiadas (PIM) e controlar de maneira completa seus usuários privilegiados a fim de reduzir o risco de falhas de conformidade ou de violações de segurança com alto custo.
Cybersecurity is a top concern for IT professionals. Gartner expert Lawrence Orans leads an important discussion of the current cybersecurity landscape. He analyzes recent cybersecurity events, emerging threats, and how new technologies are affecting the security calculus.
Security incident disclosures and vulnerability warnings are being released at an alarming rate, posing a major challenge for Security & Risk (S&R) Professionals. Additionally, firms that adopt virtualized and public cloud infrastructure like AWS are quickly finding that their traditional vulnerability management solutions and processes were not designed for these dynamic, elastic, and API-services centric architectures. An April, 2015 Forrester Research, Inc. report entitled “Market Overview: Vulnerability Management” stated that the vulnerability management technology space has evolved and will help " S&R Pros repair their strained or broken processes and move past low-impact checkbox scanning to proactive, risk-based assessments."
Join guest speakers Rick Holland, Principal Analyst at Forrester Research, Tim Prendergast, CEO and Co-founder, Evident.io, and Theodore Kim, Senior Director, SaaS Operations at Jobvite, to learn about:
* The state of vulnerability management and why Forrester recently said "security and risk pros can't keep up with the tsunami of vulnerabilities."
* How public cloud infrastructure like AWS adds to vulnerability complexity and has created the the need for new cloud native solutions
* How Jobvite has implemented an effective security configuration and vulnerability management process for AWS
The risk of experiencing a security breach is now higher than ever. Over the last 12 months, some of the highest profile companies have been compromised including Anthem, Sony, Home Depot, JPMorgan Chase, Target and more.
2015 is turning out to be no different. Clearly no organization is immune to a breach and human error continues to play a primary role.
This webcast will address:
- Key trends and traits common to high profile security breaches
- Critical takeaways and lessons learned for a comprehensive security strategy
- Best practices to reduce the risk of a security breach
With major data breaches on the rise, it’s hard to deny that they've become a common occurrence in the security threat landscape. Large companies such as Target, Nieman Marcus and Sony (among others), have suffered major data breaches in the past year.
As security professional, it is important to understand why and how these organizations were breached so you can learn from what was done right, what worked and what didn’t.
In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, will discuss lessons learned from recent breaches. By analyzing the available information about recent data breach incidents from the perspective of detection, Smith and Ingleby have assembled a list of security monitoring lessons and ideas.
You’ll get tips on how to eliminate double false positives, a number of generalized monitoring scenarios and guidelines on how to monitor for new executables running for the first time on your environment.
Recent studies have shown that 50-70% of all attacks on information security are coming from within the organization, and often the length of time that the breach existed is unknown. There are many issues involved in closing the gaps that cause such insider incidents and strengthen the protection of data. Using the "need to know" principal, organizations can limit who has access to data. Controls that adjust given access rights to actual needs exist and should be utilized. This session will focus on how to adjust data access rights, implementing the "least privilege principal", and the use of detective and proactive risk-oriented controls.
Organizations have long struggled to find objective ways to measure and compare performance, leaving many executives to trust metrics and data points that may not be painting the clearest picture of security posture.
To highlight this issue, BitSight recently surveyed over 300 IT executives in 4 major industries to assess their confidence in their security performance. We then compared responses to our own security ratings data, which measures effectiveness across key performance areas including security events, configurations, and user behaviors.
In this webinar, BitSight EVP of Sales & Marketing Tom Turner takes a deeper look into these fidings and discusses the business implications of optimism bias.
Download this webinar to learn:
How security performance varies among Finance, Healthcare, Retail, and Energy/Utilities
Whether optimism bias exists in these industries and how it may be affecting overall security performance
Why continuous performance monitoring should be a critical component of enterprise risk management and how leading organizations are using BitSight Security Ratings to manage their cyber risk
With the proliferation of mobile devices and emergence of free file sharing services, information workers expect and demand fast, responsive services. If enterprise software limitations restrict productivity, end users will circumvent the policies set by their organization in order to get their job done.
In this 60-minute webinar, Ron Charity, Business Development Manager at AvePoint and Miguel Caron, Technical Solutions Professional at AvePoint, will discuss how AvePoint Perimeter can make your on-premises SharePoint environment more powerful than Dropbox, Google Drive, and even Office 365 by enabling two-way collaboration and external sharing without ever having to leave SharePoint.
In this webinar, you’ll learn how you can:
• Overcome native SharePoint limitations and productivity challenges
• Collaborate with external users just like how you work internally
• Stop your end users from using unsecure file sharing services like Dropbox and Google Drive
• Increase collaboration with two-way editing and external sharing
• Enhance the value of on-premises SharePoint and drive adoption
NTT Com Security would like to invite you to join us and our partner LogRhythm on July 28th, 2015 from 2:00-3:00 p.m. EST for a webinar addressing the current and ongoing cyber-threat to Financial and Insurance institutions.
The SHA-1 algorithm at the core of many SSL certificates is in danger of being compromised by criminals. Google, Mozilla, and Microsoft are phasing out SHA-1 support in their browsers very soon by showing degraded visual indicators.
Fortunately, SHA-2 replacement certificates are available and much stronger to protect your website. Join us for this webinar to learn:
-Key dates for replacing SHA-1 certificates
-How you can get a stronger SHA-2 certificate at no extra cost
-How to replace your certificate
We'll also highlight how Symantec is helping you stay ahead of internet threats and keeping your business secure.
Over 90% of targeted attacks start with email. Criminals create very convincing emails to trick your users into clicking on a link, opening an attachment, or replying with their credentials. The attack methods criminals employ with phishing emails are constantly changing and so must your email security to block these attacks before damage occurs. Learn about the newest trends in phishing email attacks and how to protect your organization.
Join data security expert Graham Cluley as he presents a mid-year review of the information security stories that have made news so far in 2015, and how the predictions he made in our January webinar have fared.
With over 300,000 new pieces of malware created every day, company data has never been at greater risk. Hear from Graham about the vulnerabilities and risks that remain, and what organizations can do to address them.
All webinar registrants will receive a copy of Graham’s report “Information Security in 2015: Just how much worse can things get?” on 2015 threats and keeping your data safe.
Are you prepared for a data breach? Are you confident you will find a breach in a timely manner? Facts are over 70% of businesses report a security breach and 75% of breaches are undetected for days or even months. Once discovered, incident response teams are under extreme pressure to close the breach, figure out what happened, what was lost, and calculate the risk. Organizations need a sophisticated incident response plan.
Attend this webinar and learn how to:
· Discover sensitive data, risk, and vulnerabilities
· Detect and block active attacks
· Investigate incidents and automate remediation
· Demonstrate consistent policy application across all sensitive data
Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.
As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.