Hi [[ session.user.profile.firstName ]]

IT Security

  • The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software Live 60 mins
    Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

    Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.

    Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
  • Ransomware: How to Battle the Most Evolved Ransomware: How to Battle the Most Evolved Ben Brobak and Marc Laliberte Live 60 mins
    Large corporations are no longer the primary target for hackers, making network security for small and mid-sized businesses more important than ever before. Ransomware has evolved dramatically over the last few years, but one thing remains the same: it can wreak havoc the likes of which many businesses will never recover from.

    Join Ben Brobak, Technical Product Manager, and Marc Laliberte, Information Security Analyst, as they take a look at the evolution of Ransomware – and the best ways for businesses to protect themselves.
  • Grid Cyber Lockdown: Ransomware in Critical Infrastructure Grid Cyber Lockdown: Ransomware in Critical Infrastructure - Recorded: Aug 25 2016 60 mins
    Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:
    - A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
    - A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
    - Best practices and technologies for protecting your organization against ransomware.

    Panelists
    Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
    Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
    Christopher Ellefsen, BKK Group, Senior Network Engineer
    Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
    Jack Whitsitt, EnergySec, Senior Security Strategist
    Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security
  • Video - Cyber Resiliency: Bouncing Back from a Security Breach Video - Cyber Resiliency: Bouncing Back from a Security Breach Misha Govshteyn, Founder & Chief Security Officer, Alert Logic Recorded: Aug 25 2016 31 mins
    Cyber resilience encompasses cyber security and business resilience, and aims not only to defend against potential attacks but also to ensure an organisation's survival following a successful attack. Companies cannot avoid cyber attacks 100-percent of the time, breaches will eventually occur but in order to bounce back quickly from attacks, companies must become cyber resilient.

    Misha Govshteyn, Founder & Chief Security Officer at Alert Logic delivered a talk at our London Cloud Security Summit - "Cyber Resiliency: Bouncing back from a security breach". In this session he examines cyber risk and the keys steps in building a cyber resilience strategy.
  • Video: Live Cyber Hack Demo Video: Live Cyber Hack Demo James Brown, VP of Global Solution Architecture and Richard Cassidy, UK Cyber Security Evangelist Recorded: Aug 25 2016 22 mins
    Watch a Live Cyber Hack Demo from Alert Logic's Cloud Security Summit as we show you the impact of implementing web applications that lack the correct security controls. The will also demonstrate how web applications are attacked, the latest tricks attackers are using, and what you should focus on to keep data and systems secure. An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security, tailored towards the AWS Cloud.
  • Grid Cyber Lockdown: Ransomware in Critical Infrastructure Grid Cyber Lockdown: Ransomware in Critical Infrastructure - Recorded: Aug 25 2016 59 mins
    Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:
    - A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
    - A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
    - Best practices and technologies for protecting your organization against ransomware.

    Panelists
    Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
    Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
    Christopher Ellefsen, BKK Group, Senior Network Engineer
    Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
    Jack Whitsitt, EnergySec, Senior Security Strategist
    Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security
  • How to Defend Against Email Fraud - in partnership with CSO How to Defend Against Email Fraud - in partnership with CSO Scott Brown, CERT Australia & Mark Guntrip, Email Protection, Proofpoint Recorded: Aug 25 2016 55 mins
    Online criminals used to favor scattershot campaigns that relied on emailing hundreds of people in the hopes of tricking even a few of them into clicking on malicious attachments. These days, however, businesses face a new threat as ever more-calculating attackers conduct extensive research to craft carefully worded emails designed to emulate the CEO, CFO or other key executive.

    These emails, known as email fraud or business email compromise (BEC), are fast exploiting perceptual weak spots by adopting executives' identities in emails pressuring employees into sending sensitive files or wiring large sums of money to a bank account.

    Recent FBI figures suggest the attacks are costing victims an average of $US130,000 per incident and cost more than $US2.3 billion worldwide. Furthermore, it is difficult if not impossible to get the money back.

    Please join the Australian Federal Police, CERT Australia and Proofpoint for a webinar to discuss the emerging threat and strategies for defending against it. Over the course of the session, you will learn:

    · How cybercriminals craft Email Fraud messages and where they get their information
    · How to help executives hide the information that cybercriminals may be using to shape Email Fraud
    · Why your current email filtering solution may struggle to keep up, and what technologies can help in the fight against Email Fraud campaigns
    · What kind of business controls can be put in place to protect against Email Fraud manipulations
  • Top 3 Cybersecurity Challenges Facing Healthcare with Real Life Lessons Learned Top 3 Cybersecurity Challenges Facing Healthcare with Real Life Lessons Learned Sam McLane, Head of Security of Engineering at Arctic Wolf Networks Recorded: Aug 24 2016 42 mins
    Healthcare organizations have become prime targets for cyber criminals. In this webcast, security experts identify three key areas that are critical to improving your organization’s cybersecurity and provide effective strategies to combat cyber attacks using real-life examples.
  • Managed Detection and Response Answers the Question, “Am I Safe?” Managed Detection and Response Answers the Question, “Am I Safe?” Young-Sae Song, VP of Marketing at Arctic Wolf Networks Recorded: Aug 24 2016 31 mins
    Cyber attacks are becoming more complex, and it is becoming harder to determine what the best strategy is for vigilant cybersecurity. Companies feel like they are playing catchup, and there always seems to be another security hole to fill. Join this 30-min webcast to hear about the emerging security service segment, managed detection and response (MDR).
  • Security in the Boardroom Series: Keeping Your Seat at the Table Security in the Boardroom Series: Keeping Your Seat at the Table Ashley Ferguson, Director, SecureWorks Governance, Risk & Compliance Recorded: Aug 24 2016 49 mins
    This webinar will explore another aspect of the CISO’s role as an essential business leader: guiding the organization through the crisis of a breach.

    Featuring insights from CISOs and C-suite leaders who have been there and done that, the program will address incident response planning, setting C-suite and board expectations, and tips for providing the right information in a breach crisis situation to aid decision-making and public disclosures. Learn how to establish your role as part of the solution team, and how to avoid a reactionary response that too often leads to finger-pointing at the security team. You’ll take away actionable insights to apply to your own journey as an essential business leader.
  • Using Container Technologies for Agile, Scalable Application Releases Using Container Technologies for Agile, Scalable Application Releases Ian Philpot, Sr. Technical Evangelist, Microsoft Corporation and John Willis, Director of Ecosystems Development, Docker Recorded: Aug 24 2016 39 mins
    Want faster time to deployment? Need to quickly scale your applications? Microsoft can help.

    Microsoft offers a comprehensive set of container technologies for scalable, high availability, and agile release cadence. Join us for an overview of how containers can improve your organization's application development lifecycle. The session will leverage real world examples and highlight Docker.

    Watch this webcast to understand:
    •The beneficial impact of adopting container technology
    •Installation, security, design considerations and deployment operations followed by a quick tour of the Docker platform
    •How container technology positively impacts operations

    Sign up now to save your space for the live event, or to receive notification when this webcast is available on-demand.
  • Active Hunting Revealed: How vSOC Identifies Threats in Your Environment Active Hunting Revealed: How vSOC Identifies Threats in Your Environment Stephen Jones, Dir. of Managed Services, GuidePoint Security & Kris Merritt, Sr. Director, Hunting Operations, CrowdStrike Recorded: Aug 24 2016 43 mins
    The GuidePoint Virtual Security Operations Center (vSOC) was designed to address many of the common complaints and issues customers experience with other managed service providers. We use the cloud to provide dynamic scalability and cost savings. vSOC analysts provide validated security incidents that allow you to focus on what’s really important: remediation.

    vSOC Detect now integrates with CrowdStrike Falcon by leveraging the Falcon Connect API to ingest Falcon host data in to the vSOC Detect monitoring platform. This integration enables vSOC Detect to leverage the CrowdStrike platform for endpoint monitoring and allows analysts to correlate endpoint data against SIEM security logs. This added correlation within our SIEM enables active hunting by vSOC Detect analysts to discover new and emerging threats in customer environments.

    Join us to explore “Hunting with CrowdStrike”— and how our Integrations make CrowdStrike Falcon Versatile and Effective.

    Topics will include:
    - Using the CrowdStrike Integration vSOC Detect
    - Learning how analysts can:
    - Perform ad-hoc searches and queries
    - Quickly Conduct comprehensive investigations
    - Identify insider threat activity
    - Create dashboards and reports
  • Creating Truly Personalized Apps with Transaction Data Insights Creating Truly Personalized Apps with Transaction Data Insights Evan Schuman, Moderator, VentureBeat Recorded: Aug 24 2016 61 mins
    Rapidly evolving trends among digital financial services are driving fintech developers to create much more personalized customer experiences within their applications. By harnessing the power of consumer transaction data, these industry innovators can enhance customer engagement and drive more targeted cross-sell and upsell revenue opportunities.

    Analyzing consumers’ financial data is quickly becoming the future of online banking and those in the fintech community that can leverage this information quickly and effectively will have the edge and be able to deliver the personalized services necessary to attract and retain the next generation of banking customers.

    Join us on August 24 to hear from a panel of industry experts as we discuss the evolution of consumer transaction data analytics and how to leverage it to create a more contextualized and personalized user experience.

    We’ll discuss:
    * The increasing demand for fintech apps to create an individualized digital banking experience
    * The rapid advancement of gathering and analyzing consumer transactional data
    * How fintech developers can leverage contextual data to improve customer products

    Speakers include:

    * Alex Cram, Co-Founder and Chief Technology Officer, Track Technologies
    * Robin Verderosa, Senior Director, Product Management, Envestnet | Yodlee
    * Jim Del Favero, Chief Product Officer at Personal Capital
    * Mani Fazeli, VP of Product, Wave
    * Evan Schuman, Moderator, VentureBeat

    Register for this free event today!

    Sponsored by: Yodlee
  • BrightTALK Network Security & Hacking Preview BrightTALK Network Security & Hacking Preview Various Recorded: Aug 24 2016 3 mins
    This September BrightTALK will be hosting some of the industry's leading cyber speakers as they discuss Network Security & Hacking.

    Click below to register for the Summit:

    https://www.brighttalk.com/summit/3453
  • Executive Webinar Series: Cut Audit Prep with Continuous Compliance Executive Webinar Series: Cut Audit Prep with Continuous Compliance John Parmley, Area VP, Tufin Recorded: Aug 24 2016 32 mins
    Today's expectations of security executives is to do more with less: provide tighter security with less resources for a dynamic, hybrid, complex IT environment.
    As an existing Tufin customer, you can turn the Tufin Orchestration Suite from a management tool into a strategic infrastructure.

    Join us for the second webinar in our Executive Webinar Series: "Cut Audit Prep and Tighten Security with Continuous Compliance" and learn how you can maximize your Tufin investment to:
    •Cut audit preparations by enforcing continuous compliance across the hybrid network
    •Tighten security posture with a unified zone-based security policy
    •Maximize agility AND policy compliance with proactive risk analysis
    Reserve your seat now!
    We look forward to you joining us.
  • Standardization and visibility of security controls in Hybrid Standardization and visibility of security controls in Hybrid Avinash Prasad and Munish Gupta of Infosys Ltd Recorded: Aug 24 2016 50 mins
    The needs for IT agility for business, is driving adoption of flexible computing environments including IaaS, Private Cloud among others. The challenge associated with this transformation towards the Hybrid cloud environment is the assurance around the security for the workloads and data. Specific issues arise due to the “Shared security model ” of the varying Cloud environments in terms of implementation of security, compliance and optimization in these environments.

    The need of the hour is to ensure effective security governance through standardization of security controls/Policies across Hybrid cloud deployments are driven by embedded security mechanisms with lesser bolted-on overhead on the IT security teams. One successful example is the leveraging of “security for the cloud from the cloud” to provide elastic and adaptive security services for the hybrid cloud

    In this webinar, Avinash Prasad, AVP, Information & Cyber Risk Management and Munish Gupta, Principal – Information & Cyber Risk Management , Infosys (NYSE: INFY) will share their experiences with respect to standardization of security controls in Hybrid cloud environments.
  • Introducción a las pruebas de DSL: parte 2 Introducción a las pruebas de DSL: parte 2 Jesus Resendiz, Applications Engineer, EXFO Recorded: Aug 24 2016 59 mins
    Participe en este seminario web sobre las técnicas, la tecnología y las prácticas recomendadas de las pruebas de DSL.

    En este seminario trataremos los conceptos siguientes:

    •Evolución de la tecnología de DSL
    •Características y aplicaciones principales de las diferentes tecnologías de DSL
    •Técnicas y parámetros principales para las pruebas de DSL
  • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Aug 24 2016 36 mins
    Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

    The path to narrowing the time gap between compromise and discovery, and then neutralising business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

    In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

    You’ll learn:

    • How to calculate the total cost of ownership of a SIEM
    • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
    • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

    Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.
  • Breach Detection Systems The final protection? Breach Detection Systems The final protection? Thomas Skybakmoen Aug 25 2016 6:00 pm UTC 45 mins
    Find out how a breach detection system, which is designed to detect the activity of malware inside your network after a breach has occurred, can strengthen your defense.
  • Secure Storage: Keys to Successful State and Local Data Strategy Secure Storage: Keys to Successful State and Local Data Strategy Presented by: Veritas Aug 25 2016 6:00 pm UTC 60 mins
    As citizens increasingly demand faster and more responsive government platforms, harnessing the enormous amounts of data state, county and municipal governments generate is essential to optimizing operations and delivering these services. Left siloed and unattended, big data proves a costly headache; however, when properly managed, this data is a treasure trove that can fundamentally change the way services are delivered.

    In this viewcast, we'll take a look at the results of a recent Government Business Council research survey on how state and local officials are dealing with unstructured data and their strategies for organizing, protecting and leveraging it. Data experts will explore case studies and best practices on managing and processing big data at the state, county and municipal level.

    Join us to hear about the following:
    - Storing data with effective and cost-efficient methods
    - Securing data through the cloud
    - Using data to deliver more services faster and at a higher quality
  • How to (effectively) prevent ransomware infections How to (effectively) prevent ransomware infections Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Aug 26 2016 2:00 am UTC 60 mins
    Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.

    In this webinar you learn how Palo Alto Networks addresses today’s issues of network complexity, overwhelming data flows, and convoluted security rules with the Panorama network security management solution.
  • How to (effectively) prevent ransomware infections How to (effectively) prevent ransomware infections Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Aug 26 2016 9:00 am UTC 60 mins
    Today’s security deployments are quickly becoming unmanageable. Multiple user interfaces, too many security policies, and mountains of data from many different sources create the complexity of today’s cyber security environment. Combined with the global shortage of security personnel this situation calls for streamlined management solutions that empower network security administrators to do more with less.

    In this webinar you learn how Palo Alto Networks addresses today’s issues of network complexity, overwhelming data flows, and convoluted security rules with the Panorama network security management solution.
  • Thunderstorm in the Cloud Thunderstorm in the Cloud Mathias Fuchs, Senior Incident Response Consultant, Mandiant Aug 26 2016 12:00 pm UTC 45 mins
    Immer größer wird die Anzahl der Unternehmen die ihre IT-Services teilweise oder ganz an Clouddienstleister abgeben. Dies führt zu einem erhöhten Aufwand und einigen Komplikationen wenn es zu Sicherheitsvorfällen kommt.
    In diesem Webinar präsentiert Mathias Fuchs Strategien wie Unternehmen trotzdem effizient Sicherheitsvorfälle untersuchen und eindämmen können. Anhand einer Fallstudie wir gezeigt wie sich cloudbasierte Untersuchungen von herkömmlichen unterscheiden.
  • Social Engineering - Are you the weakest link? Social Engineering - Are you the weakest link? Greg Iddon, Technologist, Sophos Aug 30 2016 1:00 pm UTC 60 mins
    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
  • Managing Cyber Risk From Third Party Contractors Managing Cyber Risk From Third Party Contractors Jake Olcott Aug 30 2016 3:00 pm UTC 60 mins
    Many recent data breaches have exploited security weaknesses in the networks of third parties to attack businesses. With supply chains growing and business functions increasingly outsourced, the number of third party organizations with access to your company’s most sensitive data has increased dramatically. How should organizations assess and manage the cyber risk by their vendors and suppliers? What kinds of policies and controls should organizations put in place in order to mitigate third party cyber risk? How can organizations continuously monitor the cybersecurity performance of their critical vendors in real time?

    Getting familiar with third party cyber risk management best practices and industry standards is a good start towards mitigating cyber risk for your organization. Join Jake Olcott, VP of Business Development as he discusses these topics and more.
  • CSA Research: Mitigating Top Cloud Threats CSA Research: Mitigating Top Cloud Threats Salim Hafid and Rich Campagna of Bitglass, and John Yeoh of CSA Aug 30 2016 4:00 pm UTC 60 mins
    With cloud adoption on the rise, IT leaders are looking to peer organizations to understand security best practices in the cloud. Bitglass and CSA surveyed infosec professionals to uncover the top threats to cloud security and the tools most often used to secure cloud apps.

    In this webinar, John Yeoh, Senior Research Analyst at CSA, joins Bitglass to discuss the results of the "Mitigating Risk for Cloud Applications" report and to explore the major issues facing organizations in their move to the cloud, from Shadow IT and inadequate visibility to concerns around government access.
  • RANSOMWARE SURVIVAL GUIDE RANSOMWARE SURVIVAL GUIDE Jennifer Cheng Director, Product Marketing, Proofpoint Aug 30 2016 5:00 pm UTC 60 mins
    What every organization needs to know before, during, and after a ransomware attack.

    Ransomware has one goal: to get your money. It locks away files until payment is made. Ransomware attackers collected more than $US 209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015.

    Ransomware makes headlines when hospitals are taken offline or police departments pay cybercriminals to decrypt their files. Proofpoint has unparalleled visibility into the advanced threats, including ransomware, that are aimed at organizations today. Proofpoint can dynamically analyze and block in real-time the malicious URLs and attachments that can evade antivirus and reputation filters to deliver ransomware.

    Join Jennifer Cheng, Director, Product Marketing, Proofpoint for this webinar to learn how to defend against ransomware with our anti-evasion technology.

    •Why ransomware is surging.
    •Where it comes from.
    •What to do before, during, and after an attack.
    •Should you pay or not? What to consider.

    Exploit kits don’t stop. Neither should your business.
  • Breach Detection Systems – Product Selection Guide Breach Detection Systems – Product Selection Guide Jason Pappalexis Aug 30 2016 6:00 pm UTC 45 mins
    Understand Breach Detection System selection criteria and what enterprises should consider prior to purchase.
  • Ask the Experts: Realizing the Value of Microsoft Azure  Ask the Experts: Realizing the Value of Microsoft Azure  Evelyn Padrino, Group Product Marketing Manager, Microsoft Aug 30 2016 6:00 pm UTC 60 mins
    Tune in for the latest in our Ask the Experts Series! This session is all-about-Azure: cloud computing and PaaS for the enterprise. During this session we will show you how and why to use the benefit/credit that comes with your Visual Studio Subscription.

    In this webcast, you will learn:

     about other available Azure programs
     application development tests on Azure
     what other customers are doing on Azure and how it is paying large dividends
  • RegTech Webinar Series RegTech Webinar Series Shane Brett Aug 31 2016 1:00 pm UTC 45 mins
    Regulatory compliance is one of the biggest immediate challenges affecting the financial services industry today. Many market participants are unsure how to meet constantly evolving reporting requirements or how to move to an open API framework in a secure and compliant way.
  • Ransomware is Here: Fundamentals Everyone Needs to Know Ransomware is Here: Fundamentals Everyone Needs to Know Jeremiah Grossman, Chief of Security Strategy Aug 31 2016 3:00 pm UTC 45 mins
    If you’re an IT professional, you probably know at least the basics of ransomware. Instead of using malware or an exploit to exfiltrate PII from an enterprise, bad actors instead find valuable data and encrypt it. Unless you happen to have an NSA-caliber data center at your disposal to break the encryption, you must pay your attacker in cold, hard bitcoins—or else wave goodbye to your PII.


    Those assumptions aren’t wrong, but they also don’t tell the whole picture. Hear from Jeremiah Grossman, SentinelOne’s Chief of Security Strategy and a 20-year cybersecurity veteran, in this on-demand webinar that will explore the foundations of ransomware, and why you truly need to worry.
  • Office 365 Security: How to safeguard your data Office 365 Security: How to safeguard your data Greg Schaffer, CISO for FirstBank & Rich Campagna, VP of Products for Bitglass Aug 31 2016 5:00 pm UTC 60 mins
    Public cloud apps like Office 365 are being widely adopted in every major industry, with security & compliance at the top of the list of concerns. In this webinar, Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, will provide practical cloud security advice that you can apply immediately in your organization. Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and will give examples of how your peers have responded to the cloud security challenge.
  • An Asset-Centric Approach to Manage Cyber Risk An Asset-Centric Approach to Manage Cyber Risk Humphrey Christian, Vice President, Product Management, Bay Dynamics Aug 31 2016 5:00 pm UTC 60 mins
    Enterprises, both large and small, all have vulnerability management solutions. However, security teams are overwhelmed by the mountain of vulnerabilities uncovered by these solutions. Once they determine which endpoints, systems and applications are vulnerable to an attack, they do not know which steps to take next and in what order. As a result, they spend countless hours manually determining who owns the vulnerable asset, the value of that asset, if it was compromised and if there is an active threat to that asset.

    Join us for a live webinar on Wednesday, August 31, 2016 at 10am PT as Humphrey Christian, Vice President, Product Management, Bay Dynamics, discusses why organizations and business stakeholders, need an asset-centric approach to provide a fully integrated view of threats, vulnerabilities, asset value and business context. He will also give a live demonstration of the Bay Dynamics Risk Fabric cyber risk platform and provide examples of how our customers have used it to build asset-centric risk management programs that allow security teams, line-of-business leaders, C-level executives and boards of directors to determine which threats and associated vulnerabilities could lead to a compromise of their most valued assets and what steps need to be taken in order to reduce that risk.

    Register for the live webinar to learn more about:
    • Understanding your Assets at Risk by protecting your high value assets that can be exploited by threats and vulnerabilities
    • Why it is important to take an asset-centric approach to effectively manage cyber risk
    • How Risk Fabric cyber risk analytics platform servers as a centerpiece for this asset-centric approach through a live demonstration
  • Security by Design: The Alignment of Security and Agility Security by Design: The Alignment of Security and Agility Uri Sarid, CTO, MuleSoft; Kevin Paige, Head of Security, MuleSoft Aug 31 2016 5:00 pm UTC 60 mins
    By 2020, Gartner predicts 60% of digital businesses will suffer major service failures due to the inability of the IT security team to manage digital risk in new technology and use cases. With Target, Apple, Nissan, and Twitter all making the news recently for their security failures, CIOs and CISOs are under tremendous pressure to keep the business secure -- without slowing the business down.

    In this session, Uri Sarid, MuleSoft CTO and Kevin Paige, MuleSoft Head of Security, discuss the application networks and an emerging approach that CIOs and CISOs are driving together to deliver both security and business agility.

    Attendees will learn:

    – How to deal with security no longer resting in the hands of the security team due to shadow IT and other factors
    – How a well-defined API strategy can reduce risk
    – How application networks have emerged as an approach to deliver security and agility
    – How CISOs can drive agility and promote security by shifting mindsets
  • Webcast: Do More with ESET Remote Administrator Webcast: Do More with ESET Remote Administrator Ben Reed, Sr. Technical Content Strategist and Sales Engineer Aug 31 2016 5:00 pm UTC 60 mins
    5 ways to do more than JUST manage your AV

    IT Asset Management
    Track Hardware, OS info, Serial Numbers, and Logged-in users across your entire organization

    Software Management
    Applications installed in last 7 days
    Applications versions installed across organization to maintain a good security policy

    Remotely install and uninstall any software
    Automate Software Install and Uninstall based off pre-defined rules

    Update Management
    Manage Windows/Mac and Linux Updates

    User Notification/Communication
    Notify users when downtime will occur
    Notify users when they do something against company policy

    Troubleshoot Users Computers
    Utilize SysInspector to troubleshoot what might be going wrong with a computer.
  • How to improve network visibility and ease IT frustration How to improve network visibility and ease IT frustration Neela Sambandam Aug 31 2016 6:00 pm UTC 60 mins
    Today’s new generation of mobile-centric users and the sheer number of authentications due to mobility is driving the need for better visibility into who and what is on the network.

    Join Neela Sambandam, ClearPass Product Manager, to learn how the Insight reporting package within the ClearPass solution gives you:
    •Unsurpassed views into the users, devices and connections on your network
    •An easy-to-use dashboard and analytics engine
    •Triggered alerts based on pre-defined metrics
    •Improved reporting with pre-configured templates

    Learn how ClearPass Insights can improve network performance and user experience, as well as about future enhancements.
  • Roundtable:Threats, Vulnerabilities & Actors: (ISC)² Security Congress EMEA 2016 Roundtable:Threats, Vulnerabilities & Actors: (ISC)² Security Congress EMEA 2016 Aviram Zrahia, Juniper Networks, Dominique Brack, Swisscom, Alexander Haynes, CDL, Adrian Davis, (ISC)2 EMEA Sep 1 2016 11:00 am UTC 60 mins
    Offering a preview of what to expect from Track 2 of Security Congress EMEA, this session brings together speakers that examine varied developments in the threat landscape. Tackling trends from the role of social engineering in Industry 4.0 to the latest Tactics and Drivers behind DDoS Attacks and the Casino-style tactics deployed by hackers, delegates will gain both an overarching view of current concerns from the front- lines of defence, and an opportunity to examine a few questions that are rattling the security industry today:
    Is it time to accept breach as inevitable?
    Are we prepared for the aftermath?
    Should we welcome vulnerability disclosure?
    Can we do a good job of sharing and warning each other?
  • Briefings Part 1: The Digital Marketplace & Cybersecurity Briefings Part 1: The Digital Marketplace & Cybersecurity Michelle Waugh, Security Business, CA Technologies; Brandon Dunlap Sep 1 2016 5:00 pm UTC 75 mins
    Your business is part of a new digital reality and the digital relationships you have with individuals are your greatest assets. They are also the new perimeter, where identities are the unifying control point across apps & data and users demand access and insight with an exceptional user experience. While all this drives your business, it also opens you up to attacks and breaches. Join CA Technologies and (ISC)2 on September 1, 2016 at 1:00PM Eastern for this first event of a six-part webcast series where you will learn how leaders can adapt to the new digital reality -- embrace new identity and access management strategies that allow you to innovate in ways you never imagined.