Hi [[ session.user.profile.firstName ]]

IT Security

  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Recorded: Dec 9 2016 50 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Rapid7 InsightIDR Product Demo Rapid7 InsightIDR Product Demo Eric Sun and Pat Haley Recorded: Dec 8 2016 49 mins
    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.
  • The Role of Next-Generation IPS in Enterprise Networks The Role of Next-Generation IPS in Enterprise Networks Thomas Skybakmoen, VP, NSS Labs Recorded: Dec 8 2016 44 mins
    Thomas Skybakmoen of NSS Labs discusses:
    • The nature, role, and importance of third-party testing.
    • Trend Micro TippingPoint’s results in the 2016 NGIPS Group Test.
    • Practical uses of NGIPS in enterprise network environments.
  • Human Capital and Training Solutions: Pathways to High Performance Human Capital and Training Solutions: Pathways to High Performance OPM HR Solutions Recorded: Dec 8 2016 58 mins
    The Human Capital and Training Solutions (HCaTS) contracts are new government-wide contract vehicles for customized human capital strategy, training and development and organizational performance improvement services. HCaTS is first-of-its-kind interagency partnership between OPM's HR Solutions, Training and Management Assistance (TMA) Program, the General Services Administration Federal Acquisition Service ( GSA FAS).

    HCaTS features broad Human Capital Management scope, flexible contracting options - including an agency direct purchasing option through a delegated procurement authority - and access to more than 100 of the most sought-after private sector firms in federal human capital management and talent development.

    Join us to learn how our panelists are looking forward to addressing their human capital challenges and how HCaTS may address their needs. Learn how this unique contract works and why it can help you meet your agency's needs.
  • Deploy & Manage a Modern Data Platform on Microsoft Azure Deploy & Manage a Modern Data Platform on Microsoft Azure Jennifer Wu, Director of Product Management, Cloudera and Daniel Karuppiah Director of Product Marketing Microsoft Recorded: Dec 8 2016 66 mins
    Discover the new platform within the enterprise! The emergence of Big Data has driven the need for a new data platform within the enterprise.

    Apache Hadoop has emerged as the core of that platform and is driving transformative outcomes across every industry.

    Leverage the unique advantages of Cloudera Enterprise to help you improve products and service offerings, drive operational efficiencies, and reduce your business risk. The Cloudera offering in Azure Marketplace combines the latest open source components from the Apache Hadoop ecosystem with enterprise-grade security, governance, and management tools to help you move quickly from Proof of Concept (POC) to production and deliver value to the business.

    Join this webcast to:
    - See how Microsoft Azure provides first class support for your Linux-based Apache Hadoop applications
    - Explore the Cloudera Enterprise stack, from open source components to enterprise tooling
    - Review common use cases for Cloudera on Azure
    - Discover customer benefits and success stories
    - Learn how to deploy and start recognizing value with Cloudera on Azure

    This webinar is part of the ‘8-part Azure Open Source’ webinar series dedicated to discussing various open source solutions available on Azure, to ensure you're successful with your Linux-based applications provided by our trusted partners like Cloudera, Datastax, Cloudbees, SUSE, Pivotal, and more.

    This webcast is part of our Realize more benefits with open source on Azure webcast series. Sign up for this session, or the entire series today!
  • Office 365 Security - How to Secure Access Control in Office 365 Environments Office 365 Security - How to Secure Access Control in Office 365 Environments Alvaro Vitta, Principal Software Architect, Quest Security Recorded: Dec 8 2016 43 mins
    Enterprises are rapidly adopting cloud-based Office 365 to empower their workforce, reduce cost and boost productivity. Because Office 365 relies on Microsoft Azure Active Directory (AD) to provide directory services for Office 365 applications, it can introduce critical security weaknesses in hybrid scenarios where on-premise AD user profiles are projected into the cloud (which is the case for over 75 percent of enterprises with more than 500 employees).

    The 2016 Cloud Security Report confirms that 53 percent of organizations see unauthorized access through misuse of employee credentials and improper access controls as the single biggest threat to cloud security.

    Join the Office 365 security webinar and learn from cloud security expert Alvaro Vitta how to:

    - understand the dangers and pitfalls of not properly securing Active Directory for Office 365,
    - continually assess who has access to what – permissions, privileged groups, sensitive business groups, GPOs and data,
    - detect and alert through real-time monitoring when suspicious activities occur,
    - remediate and mitigate unauthorized actions across AD and O365 environments,
    - respond to alerts quickly to minimize damage from unsanctioned changes,
    - investigate and recover faster across your O365 environment.
  • Next Generation Data Breach Response: Preparing Your C-Suite and Board Next Generation Data Breach Response: Preparing Your C-Suite and Board King & Spalding, Rite Aid, and Kroll Recorded: Dec 8 2016 58 mins
    In today’s complex and ever-changing security landscape, every C-Suite and Board knows of cyber risk, but what does it really mean to be prepared to respond to a data breach incident? Top executives do not have to become cyber security experts, but they must make sure their organization’s breach response plans and strategies are defined and set. While they will not directly lead technical, legal and notification efforts to address data breaches, they do need to act as internal champions of proper planning and prevention.

    Identifying and closing security gaps, directing communication channels, and developing and regularly testing incident response plans are as important now as managing any other business risk or concern. Therefore, company leadership must take charge and direct their organizations to conduct extensive preparation efforts to mitigate those risks and make certain everyone stands ready to execute against the established procedures and policies when a breach occurs.
    In this webinar, you will hear from experts who have been on the inside and outside of data breach response efforts. You will learn:

    •Why the C-Suite and Board need to champion planning and prevention efforts.
    •How to get Executive buy-in.
    •Ways to build stronger response structures from the top.
    •How to construct response architectures. Who needs to be responsible for what?
    •Cyber Risk – What are the latest threats and what does the C-Suite and Board need to understand?
    •Developing and directing an Incident Response Plan: Where do the C-Suite and Board fit in?
    •Examples our experts have seen – the good and the bad
  • CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access Hadeel Dabbagh, Sr. Principal Product Mgr; Kathy Hickey, VP, Product Mgmt.; Brandon Dunlap (Moderator) Recorded: Dec 8 2016 60 mins
    The steps for strengthening your enterprise and increasing customer engagement has seen the rise of cloud adoption and a "bring your own app" trend in the workplace which continues to grow. IT and security leaders are hard pressed to keep up with the demands of a seamless user experience while protecting user identities across the cloud environment. On December 8, 2016 at 1:00PM Eastern, CA Technologies and (ISC)2 will examine how to leverage identity-as-a-service to secure access to cloud applications - including provisioning, onboarding and deployment, deliver a seamless user experience without compromising security and how to keep up with the pace of cloud adoption.
  • Cyber-Security Trends – Security Analytics Is The Game Changer Cyber-Security Trends – Security Analytics Is The Game Changer Stephan Jou, CTO at Interset Recorded: Dec 8 2016 49 mins
    In the past year there were numerous high-profile breaches including; insurance companies, government organizations, kid’s internet gaming, power utilities and dating sites. With the ever-changing landscape of threats and advanced cyber-attacks showing no sign of slowing down, organizations need to be prepared.

    As the breadth of corporate information expands, IT security teams face the daunting task of effectively protecting intellectual property, PII data, and PHI data from internal and external threats.

    Enter machine learning and security analytics – a technology that is at the top of most everyone’s hot new technologies for 2017, but can this technology detect and help stop cyber-attacks?

    Listen to guest speaker Stephan Jou, CTO at Interset, discuss what you need to know for the coming year and predict how user behavior analytics will play in the fight to stop cyber-attacks.
  • Re:Invent Re:Cap Re:Invent Re:Cap Mark Nunnikhoven, Vice President of Cloud Technology, Trend Micro Recorded: Dec 8 2016 62 mins
    re:Invent 2016 was a whirlwind of announcements and new possibilities. AWS unleashed a torrent of new functionality across all 50+ services. Join leading cloud expert, Mark Nunnikhoven, as he reviews the highlights of the show, unearths the hidden gems, and discusses how these new features could impact your approach to security in the AWS Cloud.
  • Coalfire and vArmour: PCI Compliance with Software-Based Segmentation Coalfire and vArmour: PCI Compliance with Software-Based Segmentation David Anderson, Director of Technology Marketing at vArmour, and Chris Krueger, Principal, Cloud & Virtualization at Coalfire Recorded: Dec 8 2016 60 mins
    Join PCI Qualified Security Assessor Coalfire and vArmour to learn how application-layer network visibility, software-based segmentation, and micro-segmentation can help organizations adhere to PCI DSS 3.2 requirements in data center and cloud environments.

    We’ll dive into:
    -vArmour Distributed Security System architecture and capabilities
    -Coalfire evaluation criteria and findings
    -PCI requirements addressable by vArmour DSS
  • Smarter Cybersecurity™ solutions start with next-gen protection Smarter Cybersecurity™ solutions start with next-gen protection Shane Cooper | Senior Sales Engineer Recorded: Dec 8 2016 44 mins
    Discover the smarter way to protect endpoints.

    Today’s threats evolve at an alarming pace. That means cybersecurity and threat intelligence have to move even faster to help businesses stay secure against modern cyberattacks. Join us for in-depth technical demonstration of Webroot SecureAnywhere® Business Endpoint Protection to learn how Webroot works to safeguard your employees, clients, and data without adding complexity or slowing users down.
  • 2016 Has Been a Security Minefield; Are You Ready for 2017? 2016 Has Been a Security Minefield; Are You Ready for 2017? Scott Crawford (451 Research) and Rodney Joffe (Neustar) Recorded: Dec 8 2016 60 mins
    Ransomware. Politically-motivated hacking. Distributed denial-of-service – and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017?

    In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine these trends and highlight key tactics to better prepare you for what the coming year may bring. We’ll explore:

    Key factors in today’s security landscape that shape our future defense strategies:
    •Many attacks are about money today, what will they be about tomorrow?
    •Without DNS, there’s no Internet as we know it. Recent attacks against DNS have set new records for scale and taken down some of the Internet’s biggest names. What’s your strategy for assuring that DNS doesn’t fail your business?
    •The hidden agenda of attackers who use these techniques as a means to a more serious end
    •Tactics for strengthening your resilience, to better prepare you for the coming year – and beyond

    Has your security strategy responded to these factors – and is it ready to take the hit from what may come next? Join us to learn more about what your organization can do to be better prepared for these too-often hidden aspects of highly visible threats.
  • Customer Service: Maximizing Service Management Beyond IT Customer Service: Maximizing Service Management Beyond IT Paul Kelsey, Kifinti Solutions Inc. & Mike Heberling, HEAT Software Recorded: Dec 8 2016 57 mins
    Customer Service: Maximizing Service Management Beyond IT

    There is a distinct need for a tech support staff with a desire for supporting customers with immediacy and social intelligence— creating a better connection in a digital world.

    Both internal and external customers are utilizing more communication channels and more devices now than ever before. The mobile workforce, remote work, consumerization, increased self-service, and emerging technologies have all played a part in creating the demand for better ways to serve customers and users.

    Join us for this Customer Service webinar & learn:

    Instant information to clients
    - Workflow to run based on known and secure criteria
    - Voice system knows everything the Service Desk knows

    Multiple communication channels
    - Integration and capabilities
    - Omni Channel
    - Single message representation

    Distributed Support/Telecommuting
    - Globalization
    - Repatriation of Call Centers

    Voice of the Customer Score
    - Personalization of Interaction and Routing
    - Custom Surveys based on Service and Category

    Auditing and Compliance
    - Reporting on actual effort for Labor Law compliance

    Who should attend?
    - VP of Support
    - IT Service Desk managers
    - Desktop Support managers
  • Have or building an SaaS Application? Learn from IDC Have or building an SaaS Application? Learn from IDC Robert Mahowald,Program Vice President, SaaS and Cloud Services IDC & Jim Geronaitis, Sr. Industry Marketing Manager, Akamai Recorded: Dec 8 2016 53 mins
    Join Akamai and guest speaker Robert Mahowald, Program Vice President, SaaS and Cloud Services IDC. If you have a SaaS application or are building one you should attend! In this webinar you’ll learn about the key enablers to Cloud Software Adoption including:

    1.The significance of Security and Performance for cloud software
    2.The expected benefits and impact of SaaS
    3.The most critical SaaS attributes by different organizational roles
  • Threat Detection 101: Why Advanced Monitoring is Key to Ensuring Cybersecurity Threat Detection 101: Why Advanced Monitoring is Key to Ensuring Cybersecurity Matt Thurston, Chief Architect, Arctic Wolf Networks Recorded: Dec 8 2016 35 mins
    Advanced persistent threat detection is part art and part science. This presentation provides a simple, straightforward explanation for non-technical people to help them understand how threat detection works. Having the best firewall and antivirus in the world will not keep you safe from cyber attacks. Attend this webinar to see why advanced monitoring is the only way to ensure vigilant cybersecurity.
  • The Role of Supervisors in Mitigating  Security Threats The Role of Supervisors in Mitigating Security Threats Anita R. Wood, Assistant Professor, Computer Information Technology at Pennsylvania College of Technology Recorded: Dec 8 2016 36 mins
    Cyber attacks are on the rise, both in volume and impact, and organizations worldwide are focusing on improving cybersecurity and data protection. A key aspect of this is raising security awareness across the organization. Join this presentation and learn about the the role supervisors play in awareness, preparedness and threat mitigation.

    Viewers will learn:
    - The types of insider cybercrimes
    - Mitigating insider's factors in cybercrime
    - Supervisors' value in the mitigation
    - Preparation of supervisors for mitigation
  • The Role of Internal Network Traffic Analysis in Cybersecurity The Role of Internal Network Traffic Analysis in Cybersecurity Rob Westervelt, Research Manager, IDC Security + Arabella Hallawell, Sr. Director ADVT Product Marketing, Arbor Networks Recorded: Dec 8 2016 61 mins
    This joint webinar between IDC and Arbor Networks will discuss how the threat landscape is rapidly evolving with financially motivated attackers, nation-states, and hacktivists out to disrupt business operations, steal data, or conduct corporate or cyberespionage.

    IDC analyst Rob Westervelt will examine an emerging category of solutions called Internal Network Traffic Analysis, which provide innovative approaches to attack detection and prevention. A comprehensive approach for data protection has network monitoring and traffic inspection at its core. Network traffic analysis is an essential element of most threat prevention and data protection strategies. He will explore why these solutions are a requirement and describes the most critical components necessary to identify and contain attacker movement before critical network resources and servers containing sensitive data are exposed.

    Arbor’s Arabella Hallawell, herself a former industry analyst with Gartner, will discuss the role of Arbor Networks solutions in addressing the challenges described above.
  • Aligning Security With Your Business Processes – a Technical Perspective Aligning Security With Your Business Processes – a Technical Perspective Joe DiPietro, SE Director at AlgoSec Recorded: Dec 8 2016 46 mins
    In this era of digital transformation, globalization, and relentless cyber-attacks, security can no longer remain a technology issue that simply focuses on defending networks and data. It must become a strategic, business driver that transforms the next generation datacenter to both protect and power the agile enterprise. Security teams are therefore now looking to implement intelligent automation that injects business context into their security management.

    Join Joe DiPietro, SE Director at AlgoSec on Thursday, December 8 at 11am EST for a technical webinar, where he will discuss a business-driven approach to security policy management – from automatically discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning – that will help make your organizations more agile, more secure and more compliant.

    During the webinar, Joe will explain how to:
    * Get holistic visibly of security risk and compliance across the enterprise network
    * How to reduce risk and avoid application outages
    * Tie cyber threats to business processes
    * Enhance and automate security processes with business context, including impact analysis and risk approval
    * Accelerate and ensure secure business transformation to the cloud
  • Introducing the Latest Release of Symantec Advanced Threat Protection: Email Introducing the Latest Release of Symantec Advanced Threat Protection: Email Jane Wong,Product Management,Gateway Security Group,Symantec & Nirav Shah, Email Security Product Marketing Manager, Symantec Recorded: Dec 8 2016 27 mins
    Stop Sophisticated Email Threats by Leveraging one of the World’s Largest Global Intelligence Networks

    Email continues to be the #1 threat vector for targeted and advanced attacks. The ubiquity of email and the widespread adoption of traditional email security solutions has led attackers to move beyond basic spam and phishing emails to more targeted and sophisticated attacks to infiltrate an organization.

    Join Symantec’s Jane Wong, Sr. Director, Product Management,Gateway Security Group and Nirav Shah, Email Security Product Marketing Manager to learn:

    - How Symantec can help your organization uncover, stop and respond to sophisticated email attacks while providing the deepest level threat intelligence.


    Register Today
  • Malware Detection: How to Spot Infections Early with AlienVault USM Malware Detection: How to Spot Infections Early with AlienVault USM Don Shin & Brian Bledsoe Recorded: Dec 8 2016 63 mins
    While malware has been a thorn in the side of IT pros for years, some of the recent variants observed by the AlienVault Labs security research team, like Mirai, have turned our own Internet of Things (IoT) devices into weapons against us. Join us for a live demo to learn about the most common types of malware, and how you can detect infections quickly with AlienVault USM.
    In this demo, we'll cover:
    Common types of malware (viruses, worms, Trojans/RATs, rootkits, and more)
    How new variants propagate while evading preventative security measures
    Signature versus anomaly detection (and why both are important)
    What to do when you detect malware activity on your network
    How USM can help identify malware infections so you can take action quickly
  • Lessons learned from implementing HCE for cloud-based NFC mobile payments Lessons learned from implementing HCE for cloud-based NFC mobile payments Sarah Clark, Rob Macmillan and Shaun Hodgkiss Recorded: Dec 8 2016 46 mins
    Join NFC World, Proxama and South Africa-based payments processor Tutuka to get real world insight into the practical issues involved in implementing a host card emulation (HCE) mobile payments service using Visa and MasterCard's cloud based payment standards.
  • SOC it to Me: Building A Modern Security Operations Center SOC it to Me: Building A Modern Security Operations Center James Carder, LogRhythm CISO and VP of LogRhythm Labs Recorded: Dec 8 2016 32 mins
    A SOC is a major component of a company’s GRC operations, as well as a critical IT center. But having your own SOC means more than just employing a couple of analysts to read log files. Do you know what kind of budget and expertise you’ll need to have if you decide to build your own SOC?

    In this webcast, James Carder, LogRhythm CISO and VP of LogRhythm Labs, discusses the decision-making process you’ll need to go through before you build your own security operations center (SOC) and the impact it will have on your organization.

    You'll learn:

    •The build vs buy trade-offs for a SOC
    •The impact of a SOC on your GRC program and processes
    •A SOC’s role in meeting compliance requirements
    •Questions you should be asking before building a SOC

    Watch now to learn the factors that go into planning for, building, and maintaining a modern SOC.
  • Die Bedrohungslandschaft – Rückschau auf das Jahr und ein Blick in die Zukunft Die Bedrohungslandschaft – Rückschau auf das Jahr und ein Blick in die Zukunft Thomas Hemker & Candid Wueest – Symantec Security Specialist Recorded: Dec 8 2016 62 mins
    Wieder einmal war es ein schlechtes Jahr für Computersicherheit. Doch obwohl wir uns jetzt zum Jahresende verstärkt mit der erhöhten Gefahr durch IoT-Geräte beschäftigen, gab es im vergangenen Jahr eine Vielzahl anderer signifikanter Sicherheitsvorfälle und Malware-Bedrohungen. Und sie alle haben eine Bedeutung für das kommende Jahr.

    Dieser Webcast hält eine Rückschau auf die Bedrohungslandschaft 2016 – mit Schwerpunkt auf den Dingen, die wir für 2017 im Gedächtnis behalten sollten.

    Jetzt anmelden.
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Dec 9 2016 9:00 am UTC 60 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity (hint: it’s a big business!)
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Accelerating Threat Hunting Maturity - From Adhoc to Advanced Machine Learning Accelerating Threat Hunting Maturity - From Adhoc to Advanced Machine Learning James Hanlon, Security Markets Director, Splunk, Adrian Davis, Managing Director, (ISC)² EMEA Dec 9 2016 1:00 pm UTC 60 mins
    Threat hunting is evolving. Many organizations still carry out threat hunting in an adhoc manner without a defined and repeatable process. Yet some organizations are now looking at new machine learning driven approaches to accelerate their maturity and success. This session will review the current approaches to threat hunting and explain how Splunk can support & accelerate your threat hunting maturity.
  • Dev and Test Better in the Cloud Dev and Test Better in the Cloud Rajesh Agadi, Technical Solutions Professional & Rodrigo de Carvalho, Cloud AppDev Marketing Manager, Microsoft Dec 9 2016 7:00 pm UTC 60 mins
    Support your IT and applications team better than ever!

    Companies of all sizes are under pressure to deliver greater results. The search for quicker and more impactful results, while balancing costs, governance, and agility, are one of the biggest challenges of many IT organizations. While applications – developed internally, packaged, or off-shored – are the engine behind business transformation, the ability to deliver better apps is compromised by the lack of environments to proper develop and test them. High hardware procurement time and costs are usually major roadblocks faced by IT.

    Cloud Computing plays a key role in providing application teams with the tools needed to develop and test in production-like environment, while never ignoring costs, security, and agility.

    Join this webcast to learn how to:
    - Understand the challenges in IT to provision development and testing environments for applications teams
    - See how cloud computing and Microsoft Azure can be the answer for dev-test environments
    - Learn about Microsoft Azure and the Azure Dev-Test Offer
    - Receive an overview of dev-test labs and governance and security of dev-test environments
  • Abusing Bleeding Edge Web Standards For AppSec Glory Abusing Bleeding Edge Web Standards For AppSec Glory Ryan Lester, CEO & Co-Founder of Cyph Dec 9 2016 8:00 pm UTC 45 mins
    Through cooperation between browser vendors and standards bodies in the recent past, numerous standards have been created to enforce stronger client-side control for web applications. As web appsec practitioners continue to shift from mitigating vulnerabilities to implementing proactive controls, each new standard adds another layer of defense for attack patterns previously accepted as risks.

    With the most basic controls complete, attention is shifting toward mitigating more complex threats. As a result of the drive to control for these threats client-side, standards such as SubResource Integrity (SRI), Content Security Policy (CSP), and HTTP Public Key Pinning (HPKP) carry larger implementation risks than others such as HTTP Strict Transport Security (HSTS). Builders supporting legacy applications actively make trade-offs between implementing the latest standards versus accepting risks simply because of the increased risks newer web standards pose.

    In this talk, we'll strictly explore the risks posed by SRI, CSP, and HPKP; demonstrate effective mitigation strategies and compromises which may make these standards more accessible to builders and defenders supporting legacy applications; as well as examine emergent properties of standards such as HPKP to cover previously unforeseen scenarios.
  • Les cyber-menaces du monde réel et la technologie d’Enterprise Immune System Les cyber-menaces du monde réel et la technologie d’Enterprise Immune System Jérôme Chapolard, Account Executive Dec 12 2016 10:00 am UTC 45 mins
    Les cyber-menaces sont plus diverses et sophistiquées que jamais. Le défi vient également de la complexité de nos réseaux – avec des changements constants, y compris le « Internet of Things », les services de Cloud et les applications SaaS.

    Des nouveaux types d’attaques sont capables de contourner nos outils traditionnels de cyber sécurité. Il est évident qu’une nouvelle approche est nécessaire. 

    Rejoignez ce Webinar pour découvrir :

    • Le panorama des menaces changeant et les nouveaux types d’attaques
    • L’approche d’auto-apprentissage de Darktrace à la détection des menaces
    • Des exemples concrets de menaces détectées par Darktrace
    • Des témoignages clients d’Avancial et Apave Group et pourquoi ils dépendent d’une approche auto-apprenante pour dépasser ces menaces et regagner 100% de visibilité sur votre réseau
     
    www.darktrace.com
  • How Cybersecurity, Technology and Risk Is Maturing the Role of the Modern CISO How Cybersecurity, Technology and Risk Is Maturing the Role of the Modern CISO Gary Hayslip, CISO - City of San Diego, CA Dec 12 2016 5:00 pm UTC 60 mins
    The landscape that today’s CISOs operate in and the role they fill has fundamentally changed in the last few years. Today, CISOs must understand the technical side of cyber security, as well as enterprise risk management and how both disciplines impact their organization’s ability to successfully conduct business.

    Join this presentation to learn about the evolving cyber threat landscape, the challenges for CISOs and the requirements to ensure cyber security throughout their organization.
  • Reducing Threats through Improving Identity Security Reducing Threats through Improving Identity Security David Coxe, Co-Founder, Criterion Systems and Co-Founder & CEO of ID DataWeb Dec 12 2016 6:00 pm UTC 45 mins
    Cyber threats are increasing in frequency and complexity, and all industry segments are vulnerable. Join this presentation to learn the advances in identity security and privacy, and how you can protect your organization in 2017.

    Presenter:
    David Coxe is the CEO of ID DataWeb, Inc. (IDW) and was the Principal Investigator for the Criterion Systems NSTIC pilot program. He is also co- founder of Criterion Systems, a successful IT services contractor that provides information security, cloud computing, software development and other services to civilian agencies, DoD, and the Intelligence community. David has 20 years identity management experience and is currently very active in the development and implementation of attribute exchange trust frameworks. He co-chaired the Attribute Exchange Working Group (AXWG) at the Open Identity Exchange (OIX) for implementing the business, legal, technical, policy/privacy and assessor/certification requirements for Attribute Exchange (AX) Trust Frameworks.
  • Combating Cloud Security Threats in 2017 Combating Cloud Security Threats in 2017 Manolo Gonzalez, VP, ​Platform and​ Technology Alliances​ at CloudLock Dec 12 2016 7:00 pm UTC 60 mins
    Gartner named CASB the #1 infosecurity technology in 2016. Why is cloud security number one? As users, data and applications move to the cloud and traffic happens off the network, new vectors for malware and threats open up and a new paradigm and breed of security solutions is required: Cloud Access Security Brokers (CASB).

    This presentation will demonstrate how to regain visibility and control in your cloud environments, as well as key use cases in the cloud, and how CloudLock works to provide effective security.
  • Protecting Your Business from the Ransomware Threat Protecting Your Business from the Ransomware Threat James Carder, CISO of LogRhythm, Ryan Sommers, Manager of Threat Intelligence and Incident Response, LogRhythm Labs Dec 13 2016 12:00 am UTC 45 mins
    The Scenario

    It's 2:00 p.m. on a Friday afternoon, and you get that fateful call. An employee's laptop was hit by the latest CryptoWall variant. The employee was merely searching for how to solve a computer problem, but within minutes of clicking a link, his files have been encrypted and he must pay a ransom fee to get them back.

    Unfortunately, his laptop wasn't the only thing affected. The file shares that he was connected to were also encrypted beyond reach. Other calls start coming in. Files in various department shares are "corrupted" and things are grinding to a halt. Another ruined weekend for the SOC and IT--and likely another payday for the bad guys.

    Defending Your Organization Against Ransomware

    In this webinar, LogRhythm will look at the business problems surrounding the new and evolved ransomware threat. The webinar will also give you a brief technical overview of how these schemes function and how they can be spotted and responded to early enough in the threat lifecycle to severely limit the potential damage. You'll also be given a framework that you can work through to better protect your organization in the face of this looming menace.

    Webinar topics include:

    • The early indicators of ransomware
    • Automated defenses that you can put in place to thwart the attack
    • The steps that must be followed (with robotic precision) to make a mole hill out of the potential mountain.
  • What Happened @ AWS Re-Invent 2016? (30 mins wrap up!) What Happened @ AWS Re-Invent 2016? (30 mins wrap up!) Mark Duhm, Hyperscaler Practice Lead; Rob Selby, Product Manager, Hyperscaler Services Dec 13 2016 9:30 am UTC 60 mins
    Not managed to go to Las Vegas this year to attend AWS re:Invent? Worry not, we are consolidating a week’s worth of presentations and announcements into just 30 mins of your time… Come join us to see how we have coped with this challenge!

    Duration: 30 mins + Q&A

    AWS has grown at a phenomenal rate since 2006 and released a total of 722 new features and services, just in the last year – how does one keep up you may wonder? Well, AWS re:Invent – the world’s largest AWS gathering – is a great starting point but of course, it’s about much more than feature releases – how do you figure out what is relevant to your business? How do you assess whether your business is ready to effectively use AWS? How do you take what is available and deploy it to your own benefit?

    In this webinar we discuss both the hottest ins and outs as well as the most thought provoking perspectives that came out of this years' re:Invent. Our Hyperscaler Practice Lead, Mark Duhm and Hyperscaler Services Product Manager, Rob Selby, will be covering a number of topics:

    - Key updates & announcements (and their relevance in today's marketplace)
    - The 'so what' to AWS strategy & roadmap updates
    - Relevant perspectives around AWS in a Hybrid Cloud world, Security and Migration

    This is your chance to get a very personal download on what's happened at re:Invent - don't miss out!

    Duration: 30 mins + Q&A (so come prepared!)

    Presenters:
    - Mark Duhm, Hyperscaler Practice Lead
    - Rob Selby, Product Manager, Hyperscaler Services
  • Privacy by Design: How to Protect your Hybrid Enterprise from the Inside Out Privacy by Design: How to Protect your Hybrid Enterprise from the Inside Out Paul Ferron, Digital Identity Strategist CA Technologies EMEA and John McGonagle, Sr. Associate, DLA Piper Dec 13 2016 2:00 pm UTC 60 mins
    As organisations transform digitally the opportunity exists to build security into the network and infrastructure from the beginning. The new EU General Data Protection Regulation extends to virtual and cloud environments as well as traditional on-premise – and there are implications for moving and sharing data within these environments too.

    Join this webcast with Paul Ferron, Digital Identity Strategist CA Technologies EMEA and Giulio Coraggio, Partner and Head of the Italian Technology Sector at DLA Piper as they explore

    -How to balance digital transformation with compliance and protect PII while also enabling identities.
    -How a Privacy by Design approach enables companies to realise economic growth by building Trusted Digital Relationships with stakeholders.
    -Using Trusted Digital Relationships as a basis for GDPR compliance.
    -Implications of GDPR on data sharing
    -How to leverage GDPR to benefit consumers
  • Eliminating security blind spots for Endpoints or on the move Eliminating security blind spots for Endpoints or on the move Kim Ellery, Director Product Marketing Dec 13 2016 3:00 pm UTC 60 mins
    Just a few years ago it was all about keeping things out with traditional security focused on the perimeter. Today it’s a given that many risks have already made it past the front door – with the acceleration to the cloud combined with the exponential growth of mobility, sensitive data can be accessed from anywhere. This new reality has brought productivity gains but also a new landscape of risks. As a result, many organizations have upped their game, employing a strong playbook traversing from the endpoint to the cloud. This layered approach ensures organizations can tackle and respond to each play as it happens. Join Kim Ellery from Absolute for an insightful presentation on the strategic benefits of this new landscape, and why many organizations still miss critical security blind spots.
  • 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" John Ray, Senior Product Strategist and EricHanselman, Chief Analyst at 451 Group Dec 13 2016 4:00 pm UTC 60 mins
    The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.

    Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.

    Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
    • Recent findings on enterprise cloud usage from 451 Group
    • How to analyze the security risks of your cloud platforms
    • Security practices for different cloud platforms and business processes
    • Future-proofing your Cloud security and data protection compliance
    • How security can work in the multi-cloud universe
    • Implementing a key management system that you own
  • Determine Which Processor is Right for your IoT Application Determine Which Processor is Right for your IoT Application Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Dec 13 2016 4:00 pm UTC 60 mins
    All processors are the same, right? Well, not exactly. In fact, they vary greatly in terms of price, performance, power consumption, and a host of other features that can make or break your design. In Day 1 of this three-part class, we will go over different design requirements and where the Intel Atom processor fits. Then we'll get into the feature set that's best for your specific IoT application: performance, security, media processing, image processing, time coordinated, computing, etc. Day 1 sponsored by Intel.
  • Protecting Online Shopping & Payment with PCI DSS Best Practices Protecting Online Shopping & Payment with PCI DSS Best Practices Maya Malevich - Director, Product Marketing Tufin Dec 13 2016 4:00 pm UTC 45 mins
    Black Friday and Cyber Monday are behind us, but if you are still working on your holiday shopping then you may be thinking about the risks associated with online payment options. Just in time for the 2016 shopping season, the PCI Security Standards Council recently announced changes to the Payment Card Industry Data Security Standard (PCI DSS).

    While usually associated with retail and financial services, PCI DSS compliance is in fact a challenge that crosses industries since online transactions are essential for any digital business. Join this webinar to learn how leaders from different industries are running network security policy orchestration to ensure continuous compliance with PCI DSS requirements.
  • Threat Analytics - The Key to Protecting Privileged Access and Preventing Breach Threat Analytics - The Key to Protecting Privileged Access and Preventing Breach Mark McGovern, VP, Product Management, CA Technologies Dec 13 2016 5:00 pm UTC 60 mins
    The hacker economy thrives on information fueled by techniques, tools and experience to run effective and targeted cyberattacks. One of the top goals for cyber attackers is to gain control of a privileged account and insiders can pose even more risk for an enterprise, yet according to a recent analyst report, only 1% of breaches are detected by monitoring programs. But there is hope. Threat analytics are the essential component in detecting and mitigating breaches.

    In this webcast, we will discuss approaches to analyzing real time privileged user activity information, provide examples of real time threat analytics and discuss how to detect and mitigate breaches before they ruin your business.
  • Protecting Patient Information in Enterprise Data Centers and the Cloud Protecting Patient Information in Enterprise Data Centers and the Cloud Tyrone Jeffress, Manager, IT Risk Management, Meditology; and Steve Neville, Director of Hybrid Cloud Solutions, Trend Micro Dec 13 2016 5:00 pm UTC 30 mins
    • Learn about both the security benefits and risks of a hybrid cloud environment.
    • Learn about ways to overcome security challenges within Enterprise data centers and the cloud.
    • Gain insight on some of the most common concerns and myths surrounding hybrid clouds, in order to make informed decisions on the issue.
  • AppSec in 2017 – A Look into the Future AppSec in 2017 – A Look into the Future Poonam Yadav, Product Manager, HPE Security Fortify; Mike Pittenger, VP of Security Strategy, Black Duck Dec 13 2016 5:00 pm UTC 60 mins
    Application security broke new ground in 2016. The shift to DevOps has driven the need for new technologies and different levels of integration across the development ecosystem. The focus is pulling all your organization’s technologies together and bring in products that easily and seamlessly fit into any environment, thereby further automating security while maintaining development agility. These enhancements deliver a more complete view of application-security health, making it possible to assess Static, Dynamic, Interactive and Open Source security in a single view.
     
    Advancements have been made but as we’ve learned, application security is ever changing. New technology trends – container adoption, IoT, for example – mean new security considerations and AppSec innovation must continue in 2017.

    In this webinar presented by experts from HPE Security Fortify and Black Duck, you'll learn about:

    - The major AppSec advancements in 2016 and their impact on software security health
    - New ways AppSec will evolve in the coming year, including the areas of remediation improvement and cloud integration, DevOps, and Continuous Integration
    - Check list of AppSec best practices for your 2017 toolbox
  • Effective Patch Strategies for Windows 10 and Office 365 Effective Patch Strategies for Windows 10 and Office 365 Damon Covey, Director of Solutions Product Management – Symantec Dec 13 2016 5:00 pm UTC 60 mins
    Microsoft has made significant changes in how they provide updates to Windows 10 and Office 365. These changes have caused confusion and additional complexity for many enterprises.

    Please join us for this special webcast to gain a better understanding of:

    - What these change are and how new features in IT Management Suite can help simplify using Windows 10 and Office 365.

    Register Now
  • Who You Gonna Call? Arm the Service Desk to Ghost-Bust Issues Before They Occur Who You Gonna Call? Arm the Service Desk to Ghost-Bust Issues Before They Occur Chris Marsh, 451 Research; Chris Dunn, Easy Vista; & Bruce Aboudara, Scalable Software Dec 13 2016 6:00 pm UTC 60 mins
    The Service Desk is at the frontlines of a changing landscape in IT. IT is now, more than ever, required to provide 100% uptime of their services, and provide them to users anytime and anywhere – thanks in large part to the growth in new consumer apps and services accessed through mobile devices.

    To support this demand the service desk must be aware of and prepared for several key trends:

    •Mobile. More and more, users are accessing their services through their mobile devices. Powerful trends are shaping the mobile world that will impact the Service Desk. We in the service desk must adapt, but what does that mean?

    •Service Availability. Users expect their services to always be up – just like they experience with their other mobile apps and should there be an issue, they expect it to be resolved immediately. What can the Service Desk to make this dream a reality?

    •New Technologies. Prompted by this need for always-on, mobile-available services, infrastructure teams are looking toward newer technologies such as public clouds, software defined networking (SDN), and hyperconverged architectures. How does this impact the Service Desk?

    Join, Chris Marsh, lead mobility analyst at 451 research, Chris Dunn, Global Director of Product marketing for EasyVista, and Bruce Aboudara SVP at Scalable Software as they discuss the key trends the service desk need to know about as well as actions the service desk can take to capitalize on those trends.
  • Design considerations for implementing Zero Trust Data Center Architectures Design considerations for implementing Zero Trust Data Center Architectures John Kindervag, Vice President and Principal Analyst at Forrester Dec 13 2016 6:00 pm UTC 60 mins
    The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

    Topics covered in this webinar will include:

    - 5 Steps to achieving Zero Trust enabled data centers.
    - Extending Zero Trust design principles across hybrid cloud deployments
    - Security policy considerations and guidelines for implementing Zero Trust enabled data centers.
  • When Things Misbehave: How to Mitigate Massive DDOS Attacks When Things Misbehave: How to Mitigate Massive DDOS Attacks Moshe Elias, Director of Product Marketing and Scott Poretsky, AVP Solutions Architect Dec 13 2016 6:00 pm UTC 45 mins
    The Distributed Denial of Service (DDoS) attack launched Friday, October 21, against Dyn - one of the largest managed DNS infrastructure providers - was the most destructive attack to date launched from an IoT botnet. The threat of mega attacks launched from infected connected devices is now a reality that dramatically changes the paradigm for mobile and fixed operators whose core infrastructure is susceptible to global attacks that are large enough to significantly disrupt subscriber quality of experience (QoE).

    Join us in this webinar to learn:
    •The impact of IoT driven DDoS mega attacks
    •Architectural approaches to volumetric DDOS mitigation
    •How to measure and maintain subscriber quality of experience during an attack