Hi [[ session.user.profile.firstName ]]

IT Security

  • Webcast:  Mid-Year Threat Review Webcast: Mid-Year Threat Review Stephen Cobb, Senior Security Researcher, ESET Live 60 mins
    ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
    •Ransomware
    •Regulatory risk
    •PoS malware
    •PCI and two-factor authentication
    •PUAs and scamware
    •IoT vulnerabilities
    •Privacy by design
    •General Data Protection Regulation (GDPR)
  • Virtualization Unwrapped – How to Scale While Remaining Secure Virtualization Unwrapped – How to Scale While Remaining Secure Chris Olive, Vormetric & Adam Sekora, SimpliVity Live 60 mins
    There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/compliance issues. Join us for the insightful webcast where we will show how many organizations are tackling these concerns faster and easier than they thought possible. Come away from the webcast with your action plan on how you can start or continue your journey to the cloud without the challenges that may have been holding you back.
  • Ransomware: The Darker Side of Bitcoin Ransomware: The Darker Side of Bitcoin JP Vergne (Scotiabank Lab, Ivey B-School), Alexander Hinchliffe (Palo Alto), Samee Zafar (Edgar Dunn) Mark Lavender (BT) Recorded: Jul 27 2016 60 mins
    Bitcoin has been making remarkable breakthroughs in the currency world. Its ability to allow users to be fully in control of their transactions along with its no-borders transfer policy have made it attractive to both investors and consumers alike.

    However, recent reports have revealed a darker side to Bitcoin. The cryptocurrency is being hoarded by financial institutions as ransom money to pay off potential cyber attackers. Has Bitcoin officially crossed the line and now become a black market currency? Has its untraceable nature inspired the new generation of cyber criminals to initiate unprecedented levels of targeted Ransomware attacks?
    Join this panel of industry-leading speakers, who'll be discussing the following:

    -Why has Bitcoin-related ransomware become more popular in recent years?

    -How can you prevent a Ransomware outbreak in your organisation?

    -Is it possible to catch and subsequently prosecute blockchain criminals?

    -How can authorities and financial institutions adopt and adapt in the face of rising levels of Ransomware threats?
  • SANS Health Care Provider Breaches and Risk Management Roadmaps: SANS Health Care Provider Breaches and Risk Management Roadmaps: Sandeep Kumar, Director of Product Marketing, Forescout Recorded: Jul 27 2016 62 mins
    This webcast will look at health care security from the top down, focusing on what the survey tells management in terms of priorities, breach management, controls and budgets. Attendees will learn about:

    - Supporting operational priorities and business drivers (including mobile and cloud computing priorities)
    - Reducing risk while supporting new business drivers
    - Educating leadership and getting them on your team
    - Efficacy of controls, desired improvements and wish lists
    - Budgets and best practices
  • Passive Detection Doesn’t Work: Non-Reactive Approaches To Incident Response Passive Detection Doesn’t Work: Non-Reactive Approaches To Incident Response Devon Kerr, Incident Response Manager, Professional Services, Mandiant Recorded: Jul 27 2016 59 mins
    Intrusion investigations are a response to the detection of a threat in the environment. Organizations are investing heavily in technology, training, and personnel who can quickly detect and respond to threats after they’ve gained some amount of access to their environments. It’s this process that leads to containment and gives businesses back control.

    Companies are getting better at detecting threats as a result, but actors may still have been in the environment for several months before that critical moment when tools and personnel finally detect the bump in the night and the investigative process can begin.

    During this conversation, we’ll look at the security ecosystem and some of the reasons why technologies that react to threat activity may not be adequate in this golden age of cyber threats. We’ll also discuss a few of the most important skillsets necessary to cultivate and why personnel and expertise are your secret weapons. Lastly, we’ll suggest some of the most effective sources of evidence to examine as well as some of the analysis techniques you should be using to filter through the noise.

    Register today!
  • More than Digital Board Papers More than Digital Board Papers Nathan Birtle Recorded: Jul 27 2016 31 mins
    Most people know that a board portal is an intuitive, efficient and, above all, secure way of distributing and viewing confidential board and committee meeting materials. But did you know that board portals can help you with more than just document distribution? A sophisticated tool should enhance your board member's experience and improve overall collaboration- leading to better business decisions.

    Join our free 30 minute webinar “More than Digital Board Papers” to learn how features such as archiving, note-sharing, electronic voting and questionnaires can help your board take the next step towards secure digital collaboration.
  • Gartner names Palo Alto Networks a Magic Quadrant Leader - for the fifth year. Gartner names Palo Alto Networks a Magic Quadrant Leader - for the fifth year. Navneet Singh, Product Marketing Director, Palo Alto Networks Recorded: Jul 27 2016 46 mins
    Gartner has just released its 2016 report. For the fifth time, we’ve been named a Magic Quadrant Leader for Enterprise Network Firewalls.

    Webinar highlights:

    • Compare next-generation firewalls with legacy products
    • Evaluate top industry leaders
    • Considerations when making purchasing decisions
  • Gartner names Palo Alto Networks a Magic Quadrant Leader - for the fifth year. Gartner names Palo Alto Networks a Magic Quadrant Leader - for the fifth year. Navneet Singh, Product Marketing Director, Palo Alto Networks Recorded: Jul 27 2016 46 mins
    Gartner has just released its 2016 report. For the fifth time, we’ve been named a Magic Quadrant Leader for Enterprise Network Firewalls.

    Webinar highlights:

    • Compare next-generation firewalls with legacy products
    • Evaluate top industry leaders
    • Considerations when making purchasing decisions
  • Fast and Effective IT Security Analytics Use Cases Fast and Effective IT Security Analytics Use Cases Mike Paquette, VP Products Prelert Recorded: Jul 26 2016 53 mins
    Security professiona​​ls realize that analytics are becoming an increasingly important part of the IT Security technology arsenal. However, most security analytics solutions are complex, requiring the movement of data to the analytics platform, custom use case development involving professional services, and sometimes weeks of personnel and model training before useful results can be obtained. In this webinar, see how security use cases can be quickly and effectively deployed using analytics recipes pulled from Prelert’s “Hot Sheet” security use case library. This webinar will highlight examples of the use cases being deployed in an Elasticsearch environment.
  • Upgrade to new supported LG PCoIP zero clients, get 5 free and trade-in value Upgrade to new supported LG PCoIP zero clients, get 5 free and trade-in value David Bernstein - Anything IT, Phillip Johnson - LGE Solutions & Pat Greig - Teradici Recorded: Jul 26 2016 51 mins
    Join us for this informative webinar to learn how to upgrade your Tera1 PCoIP zero clients to new LG devices, receive 5 free zero clients with money back and feel good about recycling not only your zero clients but laptops, desktops, printers and hard drives.
    • Earlier this year, LG Electronics USA, was recognized by the EPA on their dedication to increasing consumer awareness about the importance of third-party certified recycling through nationwide education and outreach efforts.
    • According to the EPA, the positive environmental impact of LG’s responsible recycling is equal to taking 12,300 passenger cars off the road for a year or saving enough energy to power more than 8,000 U.S. homes for a year.
    Guest speaker David Bernstein with Anything IT will explain the process to receive rebates on Tera1 zero clients and dispose of them in accordance with industry’s highest e-waste standards
    Anything IT and LG will explain a simple, fast and easy approach to upgrade:
    • Assess the value of your current obsolete devices (any brand and any quantity)
    • Claim your rebate
    • Get 5 free zero clients
    • Logistics and Process to upgrade and replace

    Q&A will follow at the end of the session.
  • Five Requirements for Securely Adopting Cloud Applications Five Requirements for Securely Adopting Cloud Applications Mark D. Campbell and Brandon Whichard of IBM Security Recorded: Jul 26 2016 62 mins
    The business benefits of cloud applications are undeniable, however security concerns can still slow their adoption. While many mainstream cloud applications offer secure platforms and excellent security capabilities, much of the security burden is still on you. You still need a strategy and the technology tools to ensure your organization can safely and efficiently utilize these cloud apps.

    Join IBM Security as we discuss five essential requirements for ensuring safe and efficient adoption of cloud applications.
  • Learn how an app-centric approach will improve security & operational efficiency Learn how an app-centric approach will improve security & operational efficiency Joe DiPietro, SE Director at AlgoSec Recorded: Jul 26 2016 51 mins
    The constant barrage of application connectivity and security policy change requests, not to mention the relentless battle against cyber-attacks have made the traditional approach to managing security untenable. In order keep your business both agile and secure – across today’s highly complex and diverse enterprise networks – you must focus your security management efforts on what matters most – the applications that power your business.

    Join Joe DiPietro, SE Director at AlgoSec on Tuesday, July 26 at 11am EDT for a technical webinar, where he will discuss an application-centric, lifecycle approach to security policy management – from automatically discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning – that will help you improve your security maturity and business agility. During the webinar, Joe will explain how to:
    • Understand the security policy management lifecycle and its impact on application availability, security and compliance
    • Auto-discover and map business applications and their connectivity flows – and why it’s important
    • Securely migrate business application connectivity and security devices to a new data center
    •Get a single pane of glass that aligns application connectivity with your security device estate
    • Identify risk and vulnerabilities and prioritize them based on business criticality
  • CEO Fraud and the $2.3 Billion Mistake You Can’t Afford to Make CEO Fraud and the $2.3 Billion Mistake You Can’t Afford to Make Randy Luskey, Stu Sjouwerman, Dr. Christopher Pierson, Sam Masiello Recorded: Jul 26 2016 109 mins
    The FBI just issued a warning about a “dramatic” increase in CEO Email Scams. The Bureau estimates these scams have cost businesses more than $2.3 Billion in losses over the past three years. No matter how extensive your Security Awareness Training Program is, your company is vulnerable to these attacks. Employees are quick to act when a financial request comes from the CEO. What protocols do you have in place to make sure your team knows when an email is really coming from the C-Level? Join our panel to learn how to avoid falling victim to these phishing scams.
  • Fidye Yazılıma HAYIR! Fidye Yazılıma HAYIR! Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü Recorded: Jul 26 2016 63 mins
    Trend Micro Akdeniz Ülkeleri Kanal Müdürü Mehmet Dağdevirentürk, kendinizi ve firmanızı fidye yazılımlara karşı nasıl koruyacağınızı ve fidye yazılımlarla ilgili son gelişmelerin neler olduğunu sizlerle paylaşıyor. Fidye yazılıma karşı savunmanın sihirli bir formulü yok, ancak en yaygın saldırı yöntemlerini bilmeniz, en iyi korumayı sağlamak için atacağınız öncelikli adımları bilmenizi sağlar. Bu webinarda Trend Micro olarak sizlerle tecrübelerimizi paylaşarak karşılaşabileceğiniz olası risklere karşı planınızı şimdiden oluşturmanız için bir yol haritası sunuyoruz.
  • Next-Generation Security for Amazon Web Services Next-Generation Security for Amazon Web Services Dharminder Debisarun Recorded: Jul 26 2016 29 mins
    Public cloud computing resources such as Amazon Web Services (AWS) are helping organizations like yours develop and deploy new applications rapidly; expand into geographic regions seamlessly and extend competitive advantages.

    Cyber criminals are well aware of the rapid expansion into the public cloud and are looking for weaknesses in your security posture. Don’t let them find one. The VM-Series for AWS, allows you to securely extend your corporate datacenter into AWS, using our next-generation firewall and advanced features to protect your data while native management features ensures policies keep pace with the changing to your applications.

    In this webinar, attendees will learn:
    - Common customer use cases for AWS
    - Key security challenges and considerations
    - How the VM-Series can protect your AWS environments
  • Recognise your Threats, Regulate your Risks Recognise your Threats, Regulate your Risks Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India Recorded: Jul 26 2016 53 mins
    Cyberattacks against Banking and Financial Institutions have evolved from annoying pop-ups and machine crashes to denial-of-business events. CxO resignations and losses/damages running into crores of Rupees have heightened the awareness around cyber security, and shifted it from an IT problem to a business priority risk.
    Recently, Asia has been a hotspot for such cyberattacks, with many high-profile attacks being the subject of headlines across the region, including the most recent Bangladesh Bank breach.
    In its latest annexure to banks titled “Cyber Security Framework in Banks”, RBI has outlined a number of proactive measures that Banks in India need to take to ensure a robust cyber security/resilience framework, and to ensure adequate cyber security preparedness on a continuous basis.

    Here are just a few requirements:
    -Board approved cyber security policy
    -Continuous surveillance
    -Cyber crisis management plan
    -Cyber resilience framework
    -Cyber security awareness among stakeholders / top management / board
    FireEye invites all banks and financial institutions to join this exclusive webinar where the speakers will review the RBI guidelines and suggest ideas to bolster your response strategy and limit the consequences of a breach.

    Date: 26th July, Tuesday
    Time: 11:00 am
    Duration: 40 mins. With Q&A
    Speakers:
    Vipul Kumra, Consulting Engineer, FireEye India
    Shantanu Mahajan, Consulting Engineer, FireEye India
  • Cyber Risk Conversation: Security Trends & Best Practices Cyber Risk Conversation: Security Trends & Best Practices Ron Bushar, Managing Director, Mandiant (a FireEye company) Recorded: Jul 26 2016 54 mins
    Over the last decade, cyber security has evolved from a niche concern confined to IT professionals to a major priority for CEOs and boards of directors. Company leaders are now charged with managing cyber risk with the same urgency that they have managed traditional business risk.
    The emergence of cyber risk as a centerpiece of risk management is being fueled by new and increasingly complex threats. Organizations must deal with a quickly evolving set of threats to their information systems and data. Many of these threats were unimaginable just a few years ago.

    In this discussion, we explain the different forms of cyber risk and show how the threat level has risen in recent years. We also provide a basic framework for managing cyber risk, and finally, we pose five key questions business leaders should ask themselves to ensure their security posture is sufficiently robust and resilient to meet evolving threats.

    Register for this webinar today. As usual, we’ll leave time for Q&A.
  • The Foundation of Data Quality The Foundation of Data Quality Charlie Piper - CEO and Dan Ortega - VP of Marketing Recorded: Jul 22 2016 5 mins
    Blazent's CEO, Charlie Piper and Dan Ortega introduce the company strategy, vision and it's value to customer's and MSP partners. Together, Charlie and Dan describe how Blazent's platform finds the the most accurate data to improve decision manking in IT and beyond.
  • Ransomware - an Educated Response Ransomware - an Educated Response Stu Sjouwerman, Founder and CEO of KnowBe4 Recorded: Jul 21 2016 12 mins
    Stu Sjouwerman, CEO of KnowBe4, has seen first-hand the devastating impact of ransomware on healthcare entities. And he knows traditional defenses aren't enough to ward off attackers. What's needed is a whole new approach to user education.
  • Break the Silo: Transform Logs and Metrics Into Real-time Insights Break the Silo: Transform Logs and Metrics Into Real-time Insights Ben Newton, Principal Product Manager Sumo Logic, Inc. Recorded: Jul 21 2016 48 mins
    You know the feeling – it’s 4:00AM, your app is down, and you’re on the hook to fix it. The last thing your tired eyes need are multiple tools to sift through for insights to get you answers. Wouldn’t it be great if you could have all your machine data – your logs and metrics – correlated in a single tool?

    We all know the world is changing – as businesses make the move to the digital world, software is now the primary source of innovation and engine for business growth. This increasing rate of innovation comes with a laser focus on agility on modern applications to drive the business. It’s clear today’s app ain’t your daddy’s app. Teams have become cross-functional and collaborative, but the tools available for monitoring and troubleshooting apps simply can’t keep up – and that’s where we come in.

    Sumo Logic recently announced the industry’s first cloud-native machine data analytics platform powered by machine learning technology, that can natively ingest and analyze both structured metrics data and unstructured log data together in real-time. What does this mean? Now, you can have instant access to the full analytics breadth for modern applications – from code to end-user behaviors to move with the speed and agility necessary to compete in today’s digital business world.

    Don’t believe it’s possible? Listen in on our on-demand webinar as we take a closer look into this breakthrough platform and discuss:

    How the rise of the modern application is changing the way we all work
    Why you can’t afford to use siloed tools for monitoring and troubleshooting
    How integrating logs and metrics data can lead to real-time continuous intelligence for richer operational, business and customer insights
    A live demonstration of the first ever unified logs and metrics platform
  • CA Live API Creator: una manera increíblemente rápida de crear API's CA Live API Creator: una manera increíblemente rápida de crear API's Cesar Triana Recorded: Jul 21 2016 45 mins
    La empresa de la actualidad, a medida que adopta la transformación digital, necesita abordar una série de retos para avanzar.
    En esto webinar los especialistas de CA muestran como el CA Live API Creator es una manera increíblemente rápida de crear API's.
  • Making sense of Microsoft security tools Making sense of Microsoft security tools Artom Harchenko Jul 27 2016 5:30 pm UTC 60 mins
    Let our experienced Avaleris consultants paint a picture of the Microsoft Security solutions from end to end. See the mosaic of Microsoft security tools in this webinar, and we will help you wrap your head around the many solutions available to you and your organization.
  • Do You Really Know Your Users? How Security Analytics Can Detect User Threats Do You Really Know Your Users? How Security Analytics Can Detect User Threats David Gorton, Senior Product Manager, LogRhythm & Mark Settle Product Marketing Manager, LogRhythm Jul 27 2016 6:00 pm UTC 60 mins
    As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.

    If you’re focused on addressing user threats, User Behavior Analytics (UBA) can be a powerful tool in your kit. In this webcast David Gorton and Mark Settle from LogRhythm, discuss the elements of an effective user threat detection program. You’ll learn:

    - Why detecting user threats is so important—and so difficult
    - Different approaches to UBA
    - The value of data from across your enterprise
    - How to maximize the efficiency of your security analysts

    Watch the webcast to learn how UBA can help you discover hidden user threats, reduce false-positives, and properly prioritize the most concerning threats.
  • Fighting Claim Fraud with InsurTech Fighting Claim Fraud with InsurTech Ina Yulo (BrightTALK), John Erik Setsaas (Signicat), John Egan (Anthemis Group), Jason Peto (360global net) Jul 28 2016 2:00 pm UTC 60 mins
    When it comes to analysing and managing insurance claims, the market still runs in a very old school manner — human intervention, lots of paperwork and phone calls. This unfortunately also poses a real threat when it comes to fraudulent claims and applications. With digital advances and the rise of InsurTech, these risks can be minimised and fraudulent applications detected way before they can do any harm.

    Join this panel where we’ll discuss:
    -How predictive analytics can help spot fraudulent applications before they can do proper damage
    -How new technologies can help investigate and monitor specific claims
    -The need for more transparency throughout the claiming process and the importance of identity validation
    -Improving the customer journey by empowering the individual to report and settle claims online or through mobile devices
  • Five Steps to Protect Your Data Center Against Cyber Threats Five Steps to Protect Your Data Center Against Cyber Threats Christina Hausman (Product Manager, Cisco Data Center Security) Jul 28 2016 3:00 pm UTC 60 mins
    Data centers are under unprecedented threat from hackers, malware, and insider threats. Yet modern data centers require security that doesn't compromise speed, performance or functionality.

    Join the data center security webinar "Five Steps to Protect Your Data Center Against Cyber Threats" and learn how to secure your data center and achieve consistent security across physical, virtual, and cloud environments.

    In this webinar, data center security expert Christina Hausman (Product Marketing Manager, Cisco Data Center Security) will share with you how to:

    - Identify gaps in your data center security posture
    - Gain visibility and control over custom data center applications
    - Address the full attack continuum before, during, and after an attack
    - Manage traffic flows securely between devices and data centers
    - Adapt fluidly as data centers and threat landscapes evolve
    - Reduce risk and accelerate business outcomes
  • Connecting Network and Application Operations for Optimal ADC Health Connecting Network and Application Operations for Optimal ADC Health Milan Bundalo, Product Manager, Comtrade Software Jul 28 2016 3:30 pm UTC 45 mins
    Lightning-fast and impeccable application delivery performance has nowadays became a modern standard in digitalized world, therefore a daily struggle to deal with increasing network loads has been undertaken into a large amount of attention and work to enable consistent flow in the delivery chain. Applications have become the new gold and protecting application delivery is the most important task for your business.

    Application performance and availability is impacted by a wide variety of factors, therefore Comtrade’s SCOM Management Pack for F5 BIG-IP identifies specific nodes affecting applications and enables complete approach for resolving and maintaining operational functionality.

    In this webinar, you will:
    - Learn how to identify application servers which are unavailable or under heavy load
    - See how to track selected load balancing algorithm performance for the specific application delivery
    - See how repetitive issues can impact overall application delivery
  • From Signal to Action: Security Metrics that Drive Business Decisions From Signal to Action: Security Metrics that Drive Business Decisions Stephen Boyer, Jay Jacobs Jul 28 2016 4:00 pm UTC 60 mins
    How can companies effectively measure their company’s risk of a data breach? Which security metrics are most important when it comes to determining cyber risk? How do different types of security compromises, whether botnet infections or brand name SSL vulnerabilities, contribute to an organization’s risk profile?

    In this presentation, BitSight’s Chief Technology Officer Stephen Boyer and Senior Data Scientist Jay Jacobs answer these questions and more. This data-driven webinar will highlight the extensive analysis that the BitSight Data Science team undertakes to make security signals into concrete risk mitigation actions. Perhaps most importantly, the speakers will give guidance on how security and risk professionals at every level - from the board room to the server room - can drive positive change throughout their organizations.
  • GDPR - Brexit Means More Changes GDPR - Brexit Means More Changes Darrin Reynolds, Reynolds Privacy; Graham Jackson, General Counsel, (ISC)2; Harvey Nusz, CISO, 4IT Security Jul 28 2016 5:00 pm UTC 75 mins
    The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.
  • A Look Through the CISO’s Eyes A Look Through the CISO’s Eyes Michael Schiebel, Hortonworks Jul 28 2016 5:00 pm UTC 60 mins
    CISOs are often asked to justify a growing budget by showing ROI. But at the end of the day the security organization spends a lot of money and the answer to what is the ROI is that nothing happened. Because when the security leader is doing their job they are invisible. That is a very difficult conversation to have when you are trying to justify growing budget. The challenge is to change the perception as a cost center and become visible. This webinar will explore how to overcome these challenges by influencing the larger company’s budget to eliminate security concerns.

    •Thinking Differently about ROI as companies build IoT businesses and move into cloud-based environments where there are no walls
    •Mind Mapping the Business: The ROI Mind-Set of Security
    •How Threat Detection and Incident Management Becomes a Competitive Advantage
    •The Vision for Next Gen Automated Cybersecurity

    Speaker: Michael Schiebel

    45 Minutes Presentation/15 Minutes for Q & A/Crowdchat
  • Connected Health Devices – Biomed Benefit or Biohazard? Connected Health Devices – Biomed Benefit or Biohazard? Dan McWhorter, Chief Intelligence Strategist, FireEye, John Klassen, Sr. Director, Solutions Marketing, FireEye Jul 28 2016 5:00 pm UTC 60 mins
    Medical devices (biomed) introduce many cybersecurity challenges into healthcare delivery organizations, but what can you do? Connecting medical devices to your network and in turn to your physicians and EMR system increases clinical workflow while opening security holes. Much is out of your control. Device manufacturers control patch cycles and vulnerabilities persist so you segment your network which introduces administration overhead and increases the possibility of breaches due to misconfigurations. As you try harder to improve efficiency, is your environment becoming less secure due to improved connectivity? And what about patient safety when medical devices are connected directly to patients?

    Join Dan McWhorter, Chief Intelligence Strategist at FireEye, and John Klassen, Sr Director Solutions Marketing, on this webinar to learn:

    •The impact on Healthcare cybersecurity from complex medical device ecosystems
    •What kind of attacks connected medical devices are vulnerable to
    •Strategies and tools to lower your risk from compromised devices

    Register today to understand this emerging threat landscape.

    The FireEye Healthcare Team
  • How To View Real-Time Web Application Security Data in Datadog How To View Real-Time Web Application Security Data in Datadog Ilan Rabinovitch, Director, Technical Community and Evangelism at Datadog and Mike Milner, CTO and cofounder of IMMUNIO Jul 28 2016 5:00 pm UTC 60 mins
    With Datadog’s cloud-scale performance monitoring capabilities, users obtain invaluable operational data about their cloud environment and applications. IMMUNIO is the latest addition to the list of more than 100 turnkey Datadog integrations (a group that also includes Amazon Web Services, Docker, and Slack). The IMMUNIO integration makes your existing Datadog monitoring even more powerful. By using IMMUNIO with Datadog, you gain critical insights into how attacks are affecting your system -- and you get the tools you need to stop the attacks immediately.

    The data provided by your IMMUNIO integration with Datadog helps you determine what’s normal for your system and your apps -- so you can quickly zero in on abnormal activity, determine whether it’s malicious, and immediately safeguard your apps.

    Join IMMUNIO and Datadog for this informative webinar and get the scoop on all the benefits of the IMMUNIO integration, including the ability to:

    - Correlate CPU usage spikes with a brute force login attack
    - Diagnose database query latency by matching to a blind SQL Injection attack
    - Use IMMUNIO to stop bots by automatically serving CAPTCHAs, and set a Datadog alert based on number of CAPTCHAs served.
    - Harden your application against Cross-Site Scripting, SQL Injection, Remote Command Execution, and other vulnerabilities -- even many zero-day attacks
  • Microsoft Cloud App Security Microsoft Cloud App Security Artom Harchenko Jul 28 2016 5:30 pm UTC 60 mins
    Attend this session to discover Microsoft's Cloud App Security (CAS) as we take you through an in depth demo of this cloud technology . We will explore how Microsoft's CAS allows you to benefit from using cloud applications within your organization, without compromising the security of your organization's data.
  • Applying the Scientific Method to Threat Intelligence Applying the Scientific Method to Threat Intelligence Tim Helming, Director of Product Management, DomainTools Jul 28 2016 6:00 pm UTC 75 mins
    It has been said that there are two types of companies: those who have discovered they have been breached, and those who have not discovered it yet. Although unsettling, this rationale is conducive to constructing a healthy attitude towards your organization’s’ security practices. This hour long webinar will help guide your security process to protect your organization’s most valuable assets by applying the scientific method—specifically, forming and testing hypotheses about potential incursions, and then acting upon the results.
    In this webinar, you will learn:

    1. How to apply a hypothesis-driven approach to security activities
    2. Applying this mindset across time past, present and future—to enhance defenses
    3. How DomainTools data and tools enable you to apply this strategy to your own organization
  • Information Protection, DLP, Encryption Demo Information Protection, DLP, Encryption Demo Proofpoint Jul 28 2016 6:00 pm UTC 60 mins
    No security posture is 100% effective against attackers. That is why IT teams must proactively identify and protect sensitive and regulated data whether “at rest” in file stores or “in motion” as it is sent or received.

    Proofpoint Information Protection is the only cloud-based suite of solutions designed from the ground up to provide visibility and control of sensitive data across cloud-based email such as Microsoft Office 365, on-premises email, file shares, storage area networks (SAN), network attached storage (NAS), and SharePoint — all with out-of-the-box policies that provide insight to your attack surface in just 24 hours.

    - Proofpoint Data Discover: Quickly discover exposed sensitive and confidential information in shared drives, NAS, SAN and SharePoint sites
    - Proofpoint Email DLP: Prevent accidental negligence by employees with greater accuracy and control
    - Proofpoint Email Encryption: Communicate securely with policy-based encryption of messages and attachments
  • Keep mobile employees and data safe with SonicWALL's Secure Mobile Access Keep mobile employees and data safe with SonicWALL's Secure Mobile Access Steven Sanderson Jul 28 2016 6:00 pm UTC 60 mins
    Companies used to know where their data was at all times: It was in the data center, surrounded by physical walls. But today, your data is everywhere your employees and customers are — on phones, on tablets, on laptops, in the cloud. Anywhere, anytime access provides more work-life balance and helps employees stay productive, but it also puts data security at considerable risk. The challenge companies consequently face is how to provide fast, simple access to enterprise applications, data and resources without compromising security.

    Join Mark Hewett, senior product manager for Dell SonicWALL Secure Mobile Access, and Steven Sanderson, senior product marketing manager for Dell SonicWALL Secure Mobile Access, for a webcast on how to manage and provision mobile devices to protect company data and networks from cyber attacks, viruses, malware and other threats.

    •Ensure that only authorized users have access to appropriate data and through approved devices
    •Quickly and easily provision secure mobile access and role-based privileges
    •Keep company data secure in-flight and at-rest on devices
  • Optimiser votre architecture de données avec Hadoop Optimiser votre architecture de données avec Hadoop Abdelkrim Hadjidj, Solution Engineer, Hortonworks Aug 2 2016 9:00 am UTC 60 mins
    Comment les entreprises gèrent la croissance des volumes et la variété des données sans augmenter les coûts ? Est-ce que votre architecture de données est capable de gérer les nouveaux défis du Big Data ? rejoignez-nous pour ce webinar pour apprendre comment optimiser votre architecture de données et réduire considérablement ses coûts avec Hadoop. Particulièrement, nous allons traiter les sujets suivants :

    - Réduire les coûts de stockage en déplaçant les données vers Hadoop
    - Optimiser les traitements type ETL et les faire sur Hadoop
    - Collecter et traiter de nouvelles sources de données
  • Joining the Cloud Cyber Intelligence Exchange Joining the Cloud Cyber Intelligence Exchange Patrick Coughlin, TruSTAR Aug 2 2016 4:00 pm UTC 60 mins
    CSA, along with support from key corporate members like Rackspace and Intel, has been incubating a new intelligence exchange within the CloudCISC Working Group. Join CSA and technology partner TruSTAR to discuss:
    - The challenges of building effective intelligence exchange
    - How the CloudCISC exchange is designed differently
    - How you can get involved in the growing collection of vetted CSA members exchanging intelligence everyday!
  • IDaaS: Modernize Your IAM in the Cloud IDaaS: Modernize Your IAM in the Cloud Nathan Chan, Solutions Architect at OneLogin and Al Sargent, Senior Director of Product Marketing at OneLogin Aug 2 2016 5:00 pm UTC 60 mins
    IT, Security, and IT infrastructure teams are faced with a complex set of challenges, and identity and access management (IAM) done the old way tends to compound things. Companies who haven’t modernized their IAM infrastructure can spend months dedicated to setting up each new business application, both on premises and in the cloud, and another several months launching it to their users. It doesn’t have to be this way, with cloud-based solutions such as OneLogin reducing the time, effort, and risk of IAM modernization.

    Join us for an informative webinar with OneLogin presenters Nathan Chan, Solutions Architect, and Al Sargent, Sr. Director of Product Marketing.
  • HIPAA Compliance as a Service: Powered by Chef Compliance & AWS HIPAA Compliance as a Service: Powered by Chef Compliance & AWS Gerry Miller, Cloudticity & Joseph Fontes Amazon Web Services Aug 2 2016 5:00 pm UTC 60 mins
    Healthcare organizations face increasing regulatory pressure to maintain compliance with HIPAA regulations, while also needing to significantly modernize their technology to comply with ACA, Meaningful Use, and other federal, state, and local requirements. At the same time, the Healthcare field has never had a better opportunity to increase personalized care, lower costs, and leverage technology for measurably better outcomes. Cloud computing offers nearly unlimited computing and storage capacity - but with great power comes great responsibility. The agility Healthcare is enjoying in the cloud comes with increased risk and exposure to security breaches due to lack of compliance with Healthcare regulations and industry best practices.

    Cloudticity's HIPAA Compliance as a Service, powered by Chef Compliance, is a fully automated software-as-a-service solution. In this webinar, you will see firsthand how Cloudticity has mapped Chef Compliance's CIS profiles directly to HIPAA CFR regulations, providing a powerful automated solution to leverage the cloud's agility while minimizing risk. Governance + agility = powerful outcomes at reduced costs.
  • Building Modern Business Applications in a Mobile First, Cloud First Universe Building Modern Business Applications in a Mobile First, Cloud First Universe John Wilson, Sales and Business Process Executive Aug 2 2016 6:00 pm UTC 60 mins
    An overview of a secure, fast solution to building user apps that takes advantage of existing Microsoft collaboration tools like Office 365 in a mobile first, cloud first universe.
  • A New Approach to Data Security A New Approach to Data Security Ted Hendriks, Data Security Pre-Sales Architect, APJ, HP Enterprise Security Aug 3 2016 6:00 am UTC 60 mins
    With the phenomenal growth of data and the IT trends toward cloud and mobility adoption, enterprises are facing rising threats to sensitive data from both inside and outside the organization. They need to be able to protect data end to end without introducing complexities to users, while lowering the implementation and management costs of security solutions.

    Join Hewlett Packard Enterprise and (ISC)2 on Aug 03 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to protect data from end to end.
  • Open Source Security Management with Black Duck Hub: Best Practices Open Source Security Management with Black Duck Hub: Best Practices Pat Durante, Senior Director Education Services; John Beaudoin, Sr. Instructional Designer; Dave Gruber, VP of Products Aug 3 2016 3:00 pm UTC 60 mins
    Join us for our next customer webinar where we’ll share expert tips and best practices on how to extract maximum value from your Black Duck Hub implementation through automation.
     
    Even before you scan your first line of code, Black Duck Hub brings value to your organization. This includes the ability to define strategies around users and user roles, project and policy management in order to simplify and streamline your organization’s open source security management. You’ll also learn how to integrate Hub and its security features more tightly into your continuous code development and DevOps ecosystem to bring you from a simple, reactive scanning approach to a more mature, automated one for managing open source use across your organization.
     
    You Will Learn
    • How to architect the right user, project, and policy management for maximum impact.
    • Ways to incorporate Hub scanning into your continuous code development and DevOps lifecycle.
    •Leveraging Black Duck Hub integrations with DAST/SAST security testing tools for enhanced application security.
    • Best practices for interpreting your Hub scanning results and establishing a triage policy to deal with open source issues that need remediation.
    • Ways to leverage the built-in and third-party resources to speed up the remediation process.
    • How Black Duck Hub can help you move from a reactive approach to open source management to an automated one.

    Following the demonstration, we’ll leave plenty of time for you to ask our product experts questions. 
  • The Intersection of IoT and Payments: An Emerging Commerce Opportunity The Intersection of IoT and Payments: An Emerging Commerce Opportunity Jordan McKee, Christian Renaud Aug 3 2016 4:00 pm UTC 60 mins
    Join 451 Research to learn how IoT and connectivity are shifting user behavior and payment vendors' offerings, and will ultimately make transactions far more integrated while far less visible to consumers and enterprises. In this webinar we’ll examine previous attempts at integrated commerce, discuss what worked and what didn't, and detail the drivers underpinning the next frontier of commerce. Throughout the discussion, 451 will leverage recent insights from its Voice of the Connected User Landscape and Voice of the Enterprise: IoT surveys to paint a 360 degree picture of the key opportunities rapidly emerging at the intersection of IoT and payments.