Hi {{ session.user.profile.firstName }}

IT Security

  • As security professionals, defending our organizations can often times seem like a monumental, almost impossible task. Yet, there has never been as much focus, data, or development available to the security industry as there is today. The sharing of tactics, techniques, and procedures, as well as threat intelligence in an open and free manner throughout the security community is becoming standard practice, and is key to building a proactive defense posture against today’s adversaries.

    Join us, where the Palo Alto Networks threat intelligence team will examine the latest security trends, including:

    - Trends across application usage and the threat landscape, including regional and industry-specific variances
    - Ways to reduce the attack surface available to an adversary
    - Potential effects of non-standard network activity
    - Reuse of legacy attack tactics
    - Benefits of open threat intelligence sharing
  • In 2015, it goes without saying that Banking is an increasingly complex as well as a global business. Leading Banks now generate a large amount of revenue in Global markets and this is generally true of all major worldwide banks. Financial crime is a huge concern for banking institutions given the complexity of the products they offer their millions of customers, large global branch networks and operations spanning the spectrum of financial services. The BSA (Bank Secrecy Act) requires U.S. financial institutions to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, to file reports of cash transactions exceeding $10,000 (daily aggregate amount), and to report suspicious activity that might signify money laundering, tax evasion, or other criminal activities. After the terrorist attacks of 2001, the US Patriot Act was passed into law by Congress. The Patriot Act augments the BSA with Know Your Customer (KYC) legislation which mandates that Banking institutions be completely aware of their customer’s identities and transaction patterns with a view of monitoring account activity. This webinar discusses the key business issues and technology considerations in moving your AML regime to a Hadoop based infrastructure and the key benefits in doing so.
  • The use of third parties is unavoidable in today’s global economy. The growing use of third party suppliers and business partners, whilst bringing significant business advantages, also exposes organisations to substantial risk, such as financial loss, reputational damage, regulatory prosecution and fines from major breaches of security. In the last few years we’ve witnessed many of these risks being realised; examples have included major breaches of security and costs to recover escalating into millions of dollars, as a result of the third party supplier being comprised. Changes in regulation, the evolving threat landscape and policy changes globally further complicate matters, generating further risk and expense for business.

    Despite considerable efforts from many industries to address these issues, it remains difficult to manage. As well as the risks described, companies perceived as the ‘weakest link’ in the supply chain could end up not having third party contracts renewed. These challenges are discussed in more detail, and some suggestions put forward to help tackle the increasing burden on teams and risk mitigation strategies.
  • A webinar for IT Security, Legal and Compliance Managers.

    The EU-US Safe Harbor agreement for data transfers has been declared invalid. Hear what this means for you, your organization and your data on EU citizens. Can you save data in US cloud services, and if so, what do you need to know to ensure you don’t break privacy laws. Join us for this webinar to hear:

    · What does the recent European Court of Justice ruling mean to me?
    · Do I need to review my contracts with US cloud providers?
    · Am I responsible for shadow IT services in the cloud?
    · What other steps can I take to be lawful?
    · How can I proactively protect my data in the cloud?
  • Although we shall witness many strides in cybersecurity in 2016, there will still be a narrow margin between these and the threats we’re foreseeing. Advancements in existing technologies—both for crimeware and for everyday use—will bring forth new attack scenarios. It’s best for the security industry as well as the public, to be forewarned to avoid future abuse or any monetary or even lethal consequences.
  • IT organizations today are under constant pressure to deliver better services more quickly and with lower cost. Traditional approaches are being rapidly replaced with enabling technologies such as virtualization, software-defined architectures, and cloud computing, introducing more complexity while the relentless growth of data pushes the limits of scalability. As IT undergoes this transformation, backup and recovery services must transform with it, and together can enable a greater transformation for your business.

    Join our upcoming webcast to:
    •Identify three ways NetBackup 7.7 reduces the complexity of enterprise data protection
    •Understand three ways NetBackup 7.7 helps you scale with growth
    •Realize three ways in which NetBackup 7.7 can make your organization more agile
    •Learn about the latest capabilities added in the 7.7.1 release.

    Find out how you can improve enterprise backup and recovery and ultimately move faster and take bigger risks trusting that your information is safe.
  • In recent days we have heard from CEO’s about the challenges they face when a breach occurs in determining what data has been lost. Was it sensitive customer data? If so, how many customers are impacted? Not knowing this information immediately causes further damage to customer confidence and significantly increases the cost of dealing with the breach itself.

    In this webinar Informatica will introduce a new generation of Data Security Intelligence capabilities which will provide insight into exactly where company and customer sensitive data resides, how it is moving through the organization and what security measures are in place to protect it. We will also look at some of the proactive measures that can be quickly put in place at the database layer to prevent even authorized staff credentials from making unusual data requests, which are often the precursor to a costly breach.

    We hope you can join us for what promises to be an informative and highly topical webinar.
  • How can companies effectively measure their company’s risk of a data breach? What security metrics are most important when it comes to determining breach risk? How do different types of security compromises, whether botnet infections or brand name SSL vulnerabilities, contribute to an organization’s risk profile? Can you aggregate data to create high-level ratings to measure and report on cybersecurity risk?

    Join BitSight’s Chief Technology Officer Stephen Boyer and Senior Data Scientist Jay Jacobs to get these questions answered - and more. This data driven webinar will highlight the extensive analysis that the BitSight Data Science team undertakes to make security signals into concrete risk mitigation actions. Perhaps most importantly, the speakers will give guidance on how security and risk professionals at every level - from the board room to the server room - can drive positive change throughout their organizations.
  • Improper and inadequate management of a major kind of financial risk – liquidity risk, was a major factor in the series of events in 2007 and2008 which resulted in the failure of major investment banks including Lehman Brothers, Bear Stearns etc resulting in a full blown liquidity crisis. Inadequate IT systems in terms of data management, reporting and agile methodologies are widely blamed for this lack of transparency into risk accounting – that critical function – which makes all the difference between well & poorly managed banking conglomerates. Indeed, Risk management is not just a defensive business imperative but the best managed banks can understand their holistic risks much better to deploy their capital to obtain the best possible business outcomes. Since 2008, a raft of regulation has been passed by global banking regulators like the BCBS, the US Fed and others. These include the Basel III committee regulations, BCBS 239 principles on Risk Data Aggregation, Dodd Frank Act, the Volcker Rule,CCAR etc. Leading Global Banks are now leveraging Apache Hadoop and it’s ecosystem of projects to create holistic data management and governance architectures in support of efficient risk management across all the above areas. This webinar will discuss the business issues, technology architectures and best practices from an industry insiders perspective.
  • Join us for our webinar to learn the insights into effective McAfee Email Security migration and improving protection effectiveness.

    Email-based attacks have become more targeted—and harder to detect with conventional tools. That’s why today’s email security does so much more than filter spam and bulk email. Modern businesses need a solution that helps them stop threats, protect information, and respond to security events quickly and effectively. As Intel Security retires its email products, Proofpoint Enterprise Protection can help keep your organization secure.

    Join us for a live discussion on November 19, at 1:00 pm PT, and learn why Proofpoint is Intel Security’s exclusive McAfee Email Protection transition partner and the recognized market leader in stopping advanced threats.
  • A recent Forrester Consulting survey revealed that while organizations initially rated all Next Generation Firewall features as high priority during evaluation, only two features were actually used in more than 50% of deployments. Respondents cited configuration challenges, too much noise and slowdown in performance as the primary reasons for using fewer features. In this webcast we will discuss how to get full value out of a next generation firewall:
    · Finding an effective, accurate and extensible set of NGFW security features
    · Defining, configuring and validating an appropriate set of NGFW policies
    · Assessing actual performance of NGFWs
    · Monitoring NGFWs on a regular basis
    · Responding to the inevitable incident with your NGFW
  • You're invited to join us on Thursday, Nov. 19, to be among the first to see how ThreatSecure Network, which detects advanced threats and network anomalous behavior, is integrating with Splunk to make powerful big data capabilities a reality for your security team.

    The webinar will demonstrate how this integration will enable teams to:

    · Decrease the time of incident detection and reporting
    · Analyze data and make informed decisions on threat severity via a single interface
    · Demonstrate and determine the impact of malware across the network
  • How can you make it easier to manage users in GAFE and integrate with your on-premises AD? Join us and learn how Azure AD Premium creates and manages identity in GAFE. We'll use the same easy-to-use tools that Office 365 uses for AD integration and give your users a friendly web portal for all of their applications, both in the cloud and on premises.
  • It’s everywhere. From your phone to the enterprise, open source software (OSS) is running far and wide. Gartner predicts that by 2016, 99 percent of Global 2000 enterprises will use open source in mission-critical software. While it’s free, easy to find, and pushes software to the market faster, it’s vital to understand how to use OSS safely.

    Join Richard Sherrard, director of product management at Rogue Wave, for a live webinar reviewing the top five OSS trends of 2015. From OSS discovery, to risk, and governance, we’ll take a deep dive into the trends we’ve noticed this year while providing you with some predictions for 2016.

    In this webinar you’ll learn how to:

    -Discover the OSS in your codebase to ensure that code is free of bugs, security vulnerabilities, and license conflicts

    -Implement controls on OSS usage at your organization

    -Create a multitier approach to OSS risk reduction with open source tools, static code analysis and dynamic analysis