The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Nehmen Sie an diesem Webinar teil und finden Sie heraus, wie Sie von einem sicheren und schnellen Netzwerk profitieren, ganz ohne Ihr Budget zu sprengen. Immer mehr Organisationen setzen auf schnelle, erschwingliche Breitbandverbindungen, um die Vorteile der Cloud für ihr Geschäft zu nutzen. Möglicherweise verwenden auch Sie, wie viele Unternehmen, SSL zur Datenverschlüsselung. Leider tun das auch Cyberkriminelle, um Malware zu verschlüsseln. Für ein High-Speed-Netzwerk braucht es aber einen High-Speed-Schutz.
Participez à ce webinaire pour savoir comment offrir rapidité et protection à votre réseau tout en respectant vos contraintes budgétaires. Les entreprises telles que la vôtre s’appuient sur des connexions rapides et abordables pour se tourner vers le cloud. Si vous savez utiliser SSL pour chiffrer les données, c’est aussi ce que font les cybercriminels pour chiffrer les programmes malveillants. Votre réseau haut débit exige une protection ultrarapide.
With a struggle to bridge the gap in their enterprise security operations, many companies know they need to progress, but they don’t know how. If your organization is struggling with this, we can help.
It’s essential to be able to evolve from:
1. Alert to action
2. The unknown to the known
3. Policy to implementation
Join us to learn how we are addressing the top 3 operational concerns in security to help you gain better control of your enterprise network.
Cybersecurity is a mess. The number of guides, standards, laws, rules, and regulations grows every day, and most organisations don’t have the ability or the resources to handle the continuously changing (and expanding) set of requirement:
In this webinar run jointly by (ISC)2 and Unified Compliance, you will learn
· How to efficiently manage complex compliance requirements by creating customised control sets and compliance templates in seconds
· What harmonisation of compliance across multiple regulations, standards & frameworks looks like—including Sarbanes Oxley to FFIEC, PCI, GLBA and HIPAA to CMS, NERC, NIST, and ISO among others
· How to understand and clarify overlaps and conflicts between documents in your regulatory requirements
· How to save time and eliminate duplicate efforts by asserting compliance across multiple authority documents simultaneously
Taking this new approach will save organisations considerable time, effort, and resources when it comes to audit and cybersecurity compliance. More importantly, this will improve the efficiency and effectiveness of their overall Governance, Risk Management, and Compliance programs.
Cyber criminals are constantly innovating threat tactics to more easily and effectively breach organizations and make off with valuable data, and it seems like enterprise security is always at least a few steps behind. Keeping up with new attacks and effectively defending against advanced threats is one of the biggest challenges facing security teams today. Join Mike Spanbauer from NSS Labs and Taylor Ettema from Palo Alto Networks as they discuss the need for perpetual improvement to security products and actionable threat intelligence for truly effective security to defeat cybercriminals by closing the gap between detection & prevention.
New business collaboration tools provide users with access to a range of rich functionality from a single interface. These tools complement and displace existing collaboration apps. Despite strong value propositions, the many choices with similar functionality may cause uncertainty and hesitation among buyers.
A panel of industry experts will discuss the dos and don'ts that organizations should consider when investigating or deploying these solutions.
Before tackling a SIEM project to improve detection and response, learn from these case studies as their scenario likely matches yours. To firebreak your network brings together technologies, processes and people in the right balance across four phases. More than a security point solution or another box, you need to turn craft into a discipline to improve detection and response.
Learn from your peers about the following:
- Before environment and issues
- Transition effort, cost and impact
- After environment and benefits
- Best practices for managed SIEM
- Your network and next steps
IT professionals are facing an explosion of data and an avalanche of devices to protect. So how do you do more with less?
Learn how the technology associated with next generation all-in-one backup appliances – physical and virtual – can help you solve the core problems of protecting more IT infrastructure and data with less effort and more confidence.
Data breaches continue to be top of mind for organizations large and small. Two key dynamics are making that challenge much harder — the cloud and the growing sophistication of attackers.
In this webinar David Mcneely, VP of Product Strategy at Centrify, explores the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud and one where IT functions are split between internal and 3rd-party administrators. Attend this webinar to learn about:
- Trends impacting data security and increasing identity-related risks
- How to reduce the risk of security breach by minimizing your attack surface
- Best practices for managing and governing privileged identities in the modern enterprise
Is Your Unstructured Content At Risk? Watch this quick video to see how our SmarterDLP solution can help you secure sensitive unstructured content.
85% of all stored data is unstructured and unmanaged (source: IDC). The cost of the average U.S. data breach is $5.85M, so it’s time for a better solution. SmarterDLPTM‘s information protection software identifies and secures your sensitive, unstructured business data. Use it to control and manage access – even after information has left a firewall. Automatic EDRM and NSA-level encryption secure your company’s crown jewels and much more.
Cyber insurance is becoming an increasingly competitive market. In order to differentiate their offerings, underwriters are beginning to offer unique risk mitigation services to their insureds. But with all the noise in this space, how do risk managers find and choose the policy that is best for them?
In this webinar hosted by Advisen, Tracie Grella, Global Head of Professional Liability at the world's largest insurer, AIG, Neeraj Sahni, Vice President, FINEX North America—Cyber and Technology Risks at Willis, and Ira Scharf, General Manager of Cyber Insurance at BitSight Technologies, to learn how underwriters, brokers and technology firms are working together to bring risk mitigation services to their clients
Join this webinar to learn:
- How cyber coverage has evolved
- How the insurance market is bringing value related to cyber risks
- How risk mitigation services lower expected costs and help insurers do a better job of underwriting
- Why risk mitigation services and cyber insurance create a safer cyber ecosystem
Business Intelligence for Access Intelligence - with Garancy Access Intelligence Manager, organizations can review access rights, assess risks, and drill down to get all the detail needed to make good decisions.
If your organization cannot afford downtime from DDoS attacks, join this timely discussion from Neustar, with special guest perspective from IDC’s Christina Richmond. Explore the complexity and purpose behind today’s attacks and what you can do to defend your Internet presence. You will learn:
· What the DDoS threat environment looks like today
· Why “smokescreening” is a particular danger
· Where attacks can have impact across your organization
· How you can take steps to thwart DDoS threats
This presentation will highlight lessons learned from many years of responding to targeted attacks by nation state actors and other groups. We will highlight why adversaries continue to successfully compromise their targets at-will, and provide insight to the investigative techniques and security controls that can keep-pace with attacker methodologies. (Hint: there are no silver bullets, and buying more security widgets is not always the answer to these challenges!) We’ll discuss the benefits, and potential pitfalls, of the emerging market for “threat intelligence”. Finally, we'll take the risk of predicting the future and provide some thoughts on how targeted attacks and state-sponsored threats may continue to evolve.
- Identify frequently-missed blind-spots and operational failures that help attackers persist in a compromise environment
- Discover how to better utilise existing resources and technologies to reduce the time gaps between successful compromise, detection, and remediation
- Identify which approaches to remediation have been most successful at driving attackers out of a compromised environment and limiting the likelihood of re-compromise
- Understand how targeted and state-sponsored attackers are evolving their methodologies in response to increased exposure and analysis
- Learn practical ways in which threat intelligence can be utilised to detect and respond to attackers
Join this webinar to learn how to achieve both speed and protection for your network, while staying on budget. Organizations like yours are leveraging fast, affordable broadband to move to the cloud. And while you may use SSL to encrypt data, cybercriminals also use it to encrypt malware. Your high-speed network demands high-speed protection.
It's not about IF, but WHEN - This statement has been over hyped by media and Sales people love it as they want to sell you something. There is a lot of negative news around cyber security and rightly because Data breaches have become a part of our daily news. BUT 90% of the breaches could have been avoided according to a recent report by Online Trust Alliance 2015 had best practices and security controls been applied correctly.
So what can we do about it?
From this webinar, I would like to bring some cyber defence strategies into play which i have been researching on lately. There is no silver bullet to Cyber Security. "You dont need another Security product".
Prepare for the worse by having a sound cyber resilience strategy in place.
Takeaways from this webinar -
a) Best Practice - Defence in Depth
b) Cyber Defence strategy models
c) Cyber Resilience Framework
For more than two decades organizations worldwide have failed at creating the security awareness we have aimed for. Instead of continuing doing things we already know are failing to give us the results we need, Mr. Roer and his team set out to analyse what the key elements in successful awareness programs are, and what the major reasons for failure are. The research project was the basis to create the Security Culture Framework, a free and open methodology on organizing successful awareness campaigns that creates lasting cultural change. Today, the framework is being used by a large number of organizations around the world, to build and maintain security culture. In this talk, Mr. Roer will walk you through the four basic principles of the Security Culture Framework, and explain how to be successful when building security culture.
Combating insider threats is an extremely daunting task. Even more challenging is to unearth and defend crimes that could be committed by potential malicious insiders who are organized and enjoy a high degree of trust. This presentation shall discuss the current state of insider threats, the detection mechanisms available, why they are not enough and also suggest practical methods that can help detect and prevent potential frauds. Elucidated through a case study, this presentation shall walk you through on how we developed and implemented a framework using BIG DATA technology, user attributes and proven methods of behavioral science to unearth potential malicious insiders. With a detection rate of 90 percent, this is a highly adaptable model and gets easily integrated within your SIEM/Incident management and delivers great Return on Investment.
Shan Lee is the Head of Information Security at JUST EAT Plc where he is passionate about promoting a "Security Culture" in what is a fast moving and rapidly expanding, multinational environment.
In this presentation he will touch upon the following subjects: security culture, awareness, education, and the problems around the real threat being the (non-malicious) employees that don't even realise their online behaviour is a problem.
As the trend of employees using smartphones and tablets as corporate access devices in the workplace grows, businesses of all sizes continue to see information security risks being exploited. These risks stem from both internal and external threats including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications.
During this webinar Steve Durbin, Managing Director of ISF, will explain why it is important for organisations to embrace these new technologies to develop and deploy effective enterprise-wide strategies and to safeguard their data.