Hi [[ session.user.profile.firstName ]]

IT Security

  • Demanding More Out of Your SIEM Demanding More Out of Your SIEM Eric Sun Recorded: Jan 24 2017 59 mins
    Security Information and Event Management (SIEM) tools have come a long way since their inception, but are they doing enough for your organization today?

    If you work with a SIEM, or are looking at purchasing one, check out this webcast that covers:

    Today's top challenges with SIEM tools
    Things to consider when expanding your deployment
    Why incident investigations are both challenging & tedious
    [Demo] How Rapid7 InsightIDR combines SIEM, UBA, and EDR to leave attackers with nowhere to hide
    If you're suffering from too many vague, un-prioritized incident alerts as well as ballooning data and deployment costs, you're not alone. Learn how organizations are accelerating insight from their mountains of operational data here.
  • Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM Platform Speed and Scalability Matter: SANS Review of LogRhythm 7 SIEM Platform Dave Shackleford, Sr.. SANS Analyst, and Seth Goldhammer, Director of Product Management Recorded: Jan 24 2017 61 mins
    Enterprise-level security is no easy task. To detect, respond, and remediate advanced threats (and the vulnerabilities that cause them) security teams must get the most out of each security tool they use. For those with immense and complicated IT environments, your security intelligence platform should scale—incorporating cutting-edge security analytics to support everything from incident response case management and automated workflow. All of this should utilize automation to maximize the use of hunters and responders through more efficient searching, reporting, quantifying and visualization processes.

    In this webcast, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioral analytics, rapid forensic search and automated response.

    Learn about:

    • LogRhythm platform’s overall platform performance
    • LogRhythm 7’s streamlined administration capabilities for reduced operating costs
    • Accuracy of LogRhythm’s event prioritization
    • LogRhythm’s automation of security orchestration capabilities, with granular risk ratings and built-in case management
  • Why you need to adopt an open architecture to secure your business Why you need to adopt an open architecture to secure your business Paul Brettle, ArcSight Architect, HPE Security Recorded: Jan 24 2017 45 mins
    With more security threats than ever before, organizations are looking to new ways to secure, manage and monitor their environments. The cost and scope associated with this issue are huge. Security environments have traditionally been closed, sealed and ‘secured’ by nature; but as organizations look to solve problems, they are embracing the idea of adopting open standards and architectures.

    By embracing new, innovative and open standards, security organizations can look to solve complex problems in a modern new way. Explore how you can expand and grow your capabilities with simplicity, and more importantly in a predictable and cost-effective way.

    This webinar will cover the evolving approach to help you solve security issues with modern open architecture solutions. Using the right approach and the right technologies are important to addressing requirements of log data storage, analysis, analytics and advanced security monitoring. Learn why integration is key and where ArcSight comes in.
  • Advancing Business Performance: Align IT Vendor Risk to ERM Advancing Business Performance: Align IT Vendor Risk to ERM Scott Roller 3WP; Yo Delmar, MetricStream, Albert Biketi, HPE Security -Data Security, Russell McGuire, Riskonnect Recorded: Jan 24 2017 61 mins
    Growing exposure to IT risks has made organizations across industries volatile. Recent IT vendor incidents like data and security beaches, violation of privacy guidelines, which caused substantial fines, penalties, brand value, highlight that IT vendor risks are business risks and require focus from the leadership. An immature ITVRM programs limits the insights which are necessary for strengthening vendor relationships and building a robust ERM program. Rather than treating each risk in isolation, organizations need to have an integrated approach to manage risks holistically and in line with their business operations and objectives. With the growing dependency on IT and IT vendors, organizations need to align enterprise and IT VRM objectives to build a resilient framework suitable for today’s environment.

    During the session, panelists will discuss how organizations can strengthen vendor management in the current landscape and improve business performance.

    - Causes of Vendor Risks incidents and the impact on the enterprise
    - Best approach to align IT vendor risk to enterprise risk
    - Building mature VRM Program
    - Role of technology in integrating Vendor risk to Enterprise risk management
  • How to Prepare for Cyber Threats in 2017 How to Prepare for Cyber Threats in 2017 Patrick Wheeler Director,Threat Intelligence, Proofpoint Recorded: Jan 24 2017 54 mins
    Despite increased investment in the enterprise security landscape, cyber threats in the coming year will continue to evolve and adapt to even the most sophisticated defenses.

    To help you and your company prepare, we've put together our top cybersecurity recommendations for 2017.

    Join Patrick Wheeler, Proofpoint's Director of Threat Intelligence, for "How to Prepare for Cyber Threats in 2017" and learn:


    - What we predict for the threat landscape in 2017

    - Key actions you can take to prepare

    - What top resources will help support your security efforts
  • 2016 Malware Review and Top Threat Predictions for 2017 2016 Malware Review and Top Threat Predictions for 2017 Tyler Moffitt | Senior Threat Research Analyst Recorded: Jan 24 2017 48 mins
    This presentation provides an overview of the threats against a wide range of organizations and individuals during 2016. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of top ransomware variants, details on the changes to exploit kits, phishing detection statistics, insights into file reputation and encounter rates with malware and new information on the IoT environment. All data presented comes from Webroot’s Intelligence Network and was observed during 2016. We will also be looking forward into 2017 and making our predictions regarding the evolving threat landscape.
  • Assembling a Container Security Program Assembling a Container Security Program Securosis and Aqua Security Recorded: Jan 24 2017 61 mins
    Webinar with Securosis: Containers are scaring security pros because of their lack of transparency. The burden of securing containers falls across Development, Operations, and Security teams — but these groups are not always certain how to tackle the issues.
    Join our webinar to:

    -Understand what are the primary threats to container environments
    -Learn how to set up a security program for virtual containers, from development to runtime
    -Hear why dynamic behavior detection should be part of your ongoing security monitoring
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Scott Simkin, Sr. Group Manager for Threat Intelligence Cloud, Palo Alto Networks Recorded: Jan 24 2017 48 mins
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Getting the Sec into DevSecOps Getting the Sec into DevSecOps Scott Crawford and Anna Chiang Recorded: Jan 24 2017 45 mins
    Getting app development, DevOps and security teams all on the same page when it comes to implementing AppSec testing in development workflows is often a difficult task. Developers need to do frequent code releases to meet continuous integration (CI) process requirements. Adding security testing into this process is often met with resistance and poor adoption, unless it’s done correctly with the right security training, developer and CI tools integrations, and corporate security buy in by all involved.

    Join us as 451’s Scott Crawford and WhiteHat Security’s Anna Chiang discuss what’s needed to truly integrate security into a DevOps environment.
  • Ataques de Inteligencia Artificial: Cómo Protegerse Usando 'Machine Learning' Ataques de Inteligencia Artificial: Cómo Protegerse Usando 'Machine Learning' Neil Goldfarb, Gerente Regional de Darktrace, y Victor Ibañez, Gerente del País de Cast Info Recorded: Jan 24 2017 77 mins
    Los avances de inteligencia artificial siguen aumentando y estos avances nos están llevando a un desarrollo impresionante y peligroso en la tecnología de ciberataques, los cuales causan que las amenazas sean más rápidas y más sofisticadas. Desde el ransomware inteligente hasta malware sofisticadas y personalizadas que se integran a la red, los equipos de seguridad están luchando para seguir el ritmo de la nueva generación de amenazas.

    Dentro de la carrera de ciberarmas, una nueva estrategia es esencial para identificar y responder a los ataques de IA y a otros adversarios sutiles y avanzados. Durante el webinar, el Gerente Regional de Darktrace, Neil Goldfarb, y el Gerente Regional de CastInfo, Victor Ibañez, examinarán este desafío y explicarán por qué la ‘tecnología del sistema inmune’, propulsada por machine learning no-supervisado, será crítica en el futuro de la ciberdefensa.
  • 2017 Trends in Cloud 2017 Trends in Cloud William Fellows, Founder and Research Vice President - Cloud and Melanie Posey, Research Vice President for VotE- Cloud Recorded: Jan 24 2017 60 mins
    Digital transformation is a business imperative, not an option. Cloud is powering this change: It provides the new style of IT that supports the information, process and platform transformations required to link technology and information assets with marketing and customer experience to deliver new or enhanced digital processes.

    Join William Fellows, Founder and Research Vice President for Cloud, as he discusses what’s coming this year in cloud, and how the industry’s major battleground in 2017 will be how, from where and at what price cloud transformation services are delivered to customers.
  • Hortonworks Partner Demo Kit Hortonworks Partner Demo Kit Sean Roberts, Mark Lochbihler & Ajay Singh; Hortonworks Recorded: Jan 24 2017 72 mins
    Demonstrate the capabilities of Hortonworks Connected Data Platform using the Partner Demo Kit. In this session, we will provide an overview of the Partner Demo Kit including:

    1) Cloud and On-Prem Setup
    2) IOT application to monitor and prevent traffic violations
    3) Data Science application to analyze earthquake patterns and predict its intensity
    4) Social Media monitoring to gain insight into trending topics and real-time discussions
  • Demanding More Out of Your SIEM - EMEA Demanding More Out of Your SIEM - EMEA Eric Sun Recorded: Jan 24 2017 58 mins
    Security Information and Event Management (SIEM) tools have come a long way since their inception, but are they doing enough for your organization today?

    If you work with a SIEM, or are looking at purchasing one, check out this webcast that covers:

    Today's top challenges with SIEM tools
    Things to consider when expanding your deployment
    Why incident investigations are both challenging & tedious
    [Demo] How Rapid7 InsightIDR combines SIEM, UBA, and EDR to leave attackers with nowhere to hide
    If you're suffering from too many vague, un-prioritized incident alerts as well as ballooning data and deployment costs, you're not alone. Learn how organizations are accelerating insight from their mountains of operational data here.
  • Doing the right thing: Privacy beyond GDPR Doing the right thing: Privacy beyond GDPR Jorge Carillo, President of the (ISC)² Czech Chapter, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Jan 24 2017 60 mins
    With the large possibility amount of personal data availably, Data protection impact assessments are crucial to identify, understand and address any privacy issues that might arise when developing new products and services or undertaking any other new activities that involve the processing of personal data.

    The objective of this webinar is to provide a pragmatic approach to such type of assessments in the context of the GDPR and IoT.
  • Combatir las amenazas con soluciones SonicWall de seguridad de red adaptativas Combatir las amenazas con soluciones SonicWall de seguridad de red adaptativas Nicasio De Tomas Recorded: Jan 24 2017 61 mins
    El ransomware es una forma de malware que impide el acceso a los datos/a la red hasta que la víctima pague un rescate. En 2016, el ransomware se está propagando a un ritmo sin precedentes. Los cibercriminales lo utilizan de forma activa para tomar empresas, instituciones e incluso individuos como rehenes. Los expertos en seguridad definen el ransomware como la nueva crisis del crimen cibernético.
    Participe en nuestro webcast en directo con un experto en seguridad de red y descubra:

    •Cómo los cibercriminales pueden explotar las vulnerabilidades de su red
    •Las acciones que puede emprender para prevenir y detener esta amenaza peligrosa y potencialmente costosa
    •Los tipos de empresas con mayor riesgo de sufrir ataques de ransomware
    •Cómo proteger sus datos allá donde vayan
  • The Critical Infrastructure Attack Surface: Assessing Its Threats and Defences The Critical Infrastructure Attack Surface: Assessing Its Threats and Defences Sameer Bhalotra, frm. cybersecurity director at the White House, Kennet Westby, president of Coalfire, James Carder, CISO Recorded: Jan 24 2017 59 mins
    The recent DDoS attack on Dyn did much more than simply disrupt service to websites of some of the biggest online brands. It caused many to question our definition of critical infrastructure and the best way to ensure crucial functions are protected.

    In this webcast, a panel of experts discuss a number of questions around critical infrastructure and the challenges of protecting it against advanced cyber threats. The panelist also highlight the issues and risks the Internet of Things (IoT) pose to securing critical infrastructure.

    You’ll learn:

    • The definition of critical infrastructure
    • The responsibility the private sector plays in protecting the nation’s critical infrastructure
    • How IoT is amplifying the scope of critical infrastructure
    • Where organisations should focus to best mitigate the growing and shifting cyberthreats
  • ATM Threats to the Financial Sector ATM Threats to the Financial Sector Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Recorded: Jan 24 2017 54 mins
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
  • Top 5 Benefits of Doing IoT Right Top 5 Benefits of Doing IoT Right Dan Ortega - VP of Marketing at Blazent Recorded: Jan 23 2017 4 mins
    In this episode we will review some of the Top 5 reasons why IoT is fast becoming mainstream. The benefits came from a November 2016, Hewlett-Packard Enterprise survey of approximately 80 IT professionals to understand how IoT was working for them.
  • Accelerate threat detection and incident response through a managed SOC service Accelerate threat detection and incident response through a managed SOC service Sridhar Karnam, Director, Product Marketing @ Arctic Wolf Networks Recorded: Jan 23 2017 31 mins
    A SIEM is costly and complex, IDS/ IPS are not enough, threat intelligence is overwhelming, and a SOC takes years to build and an army of security staff to manage. So where do I start with security? How should I prioritize? How can I integrate all the tools? How many security staff will I need? How do I integrate a SOC and a NOC?

    Managed Detection and Response is the answer to all these questions. With a focus on detecting and responding to threats, the service configures the right combination of tools and provides the people and process to help you quickly implement the best security within your budget. With a simple subscription-based model, you will pay a fixed price that is not dependent on your data volume. It is time to throw your SIEM, IPS, and other point solutions out and move forward with MDR.

    This webinar covers how you can implement three years worth of work on your security roadmap in just 60 min.
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Recorded: Jan 23 2017 61 mins
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • What To Ask Your Vendor on Enterprise SD-WAN Capabilities What To Ask Your Vendor on Enterprise SD-WAN Capabilities Ramesh Prabagaran, VP Product Management, Viptela Recorded: Jan 20 2017 46 mins
    What are the absolute essential requirements in an SD-WAN solution? Although Gartner has defined the four key requirements for SD-WAN (see below), there are some more critical features required to meet the enterprise-grade capabilities. For example, network segmentation for different kinds of applications is a widely deployed feature across all major industries, primarily to isolate critical applications and to reduce the attack surface during vulnerabilities.

    This webinar will more broadly cover the essential enterprise SD-WAN features and how they translate to common deployment scenarios in different industries. These features include:

    - Overlay capability over MPLS, Broadband and LTE
    - Unified and centralized management of all WAN infrastructure
    - Network segmentation with per-segment topologies
    - Predictable Application SLA with centralized policies and real-time traffic steering
    - Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
    - Unified and centralized management of all WAN infrastructure
    - Robust-zero trust WAN security including authentication, encryptions, segmentation and service chaining

    As a background, here are Gartner’s four key requirements for SD-WAN:
    - SD-WAN solutions provide a lightweight replacement for traditional WAN routers, and are agnostic to WAN transport technologies (that is, they support MPLS, Internet, Long Term Evolution [LTE], etc.).
    - Based on business and/or application policies, SD-WAN solutions allow for load sharing of traffic across multiple WAN connections in an efficient and dynamic fashion.
    - SD-WAN solutions dramatically simplify the complexity associated with management, configuration and orchestration of WANs.
    - SD-WAN solutions must provide secure VPNs, and have the ability to integrate additional network services and offload Internet-destined traffic closer to the edge of the network.
  • Top 5 Cloud and Mobile Cybersecurity Threats in 2017 Top 5 Cloud and Mobile Cybersecurity Threats in 2017 Doug Splinter & PJ Johnson, Technical Solutions Professionals, Microsoft Recorded: Jan 20 2017 41 mins
    Connected cloud and mobile technologies present immense business opportunity, but there is potential for increased risk as organizations increase their exposure to cybersecurity threats. The digital world requires new approaches to protect against, detect and respond to security threats.

    Join this webcast to learn more about:
    - Protecting against identity compromise and identity breaches before they cause damage
    - Ensuring device security while enabling mobile work for your users
    - The unique perspective Microsoft brings to cybersecurity
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Jan 25 2017 1:00 am UTC 60 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • Demanding More Out of Your SIEM - APAC Demanding More Out of Your SIEM - APAC Eric Sun Jan 25 2017 3:00 am UTC 60 mins
    Security Information and Event Management (SIEM) tools have come a long way since their inception, but are they doing enough for your organization today?

    If you work with a SIEM, or are looking at purchasing one, check out this webcast that covers:

    Today's top challenges with SIEM tools
    Things to consider when expanding your deployment
    Why incident investigations are both challenging & tedious
    [Demo] How Rapid7 InsightIDR combines SIEM, UBA, and EDR to leave attackers with nowhere to hide
    If you're suffering from too many vague, un-prioritized incident alerts as well as ballooning data and deployment costs, you're not alone. Learn how organizations are accelerating insight from their mountains of operational data here.
  • Exploit kits: getting in by any means necessary Exploit kits: getting in by any means necessary Scott Simkin, Senior Threat Intelligence Manager, Palo Alto Networks Jan 25 2017 9:00 am UTC 60 mins
    By understanding the inner workings of exploit kits, you’ll be better equipped to protect your organization from them. Join Scott Simkin from Unit 42 as he breaks down how today’s attackers are automatically exploiting vulnerabilities in common systems.

    You’ll learn about:

    - Why exploit kits are increasing in popularity
    - The process for launching exploit kit campaigns
    - How to defend your organization from exploits
  • 7 Questions To Consider When Looking For An Effective Endpoint Solution 7 Questions To Consider When Looking For An Effective Endpoint Solution Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye, Inc. Jan 25 2017 2:00 pm UTC 45 mins
    The endpoint market is one that everyone seems to be talking about these days. With all that hype and buzz comes a confusing vendor landscape filled with nearly identical marketing speak from each and every vendor. How can the security professional make sense of all this noise? While certainly not an exhaustive list, here are seven questions to get you started.
  • Preparing for a 1Tbps DDoS attack with Cogeco Peer 1 and Zenedge Preparing for a 1Tbps DDoS attack with Cogeco Peer 1 and Zenedge Nelson Chen Jan 25 2017 2:00 pm UTC 30 mins
    Join Cogeco Peer 1 and our partners ZENEDGE for a 30 minute webinar on DDoS attacks and how to protect yourself against them.
  • Pay TV, Video on Demand, and IPTV Growth Opportunities in Africa Pay TV, Video on Demand, and IPTV Growth Opportunities in Africa Deepti Dhinakaran, Naila Govan-Vassen and Oluchi Enuha, General Manager, iROKOX Jan 25 2017 2:00 pm UTC 60 mins
    The pay TV, VOD, and IPTV market is still evolving in terms of content and pricing models, but the demographics of Africa and its large population are highly attractive to existing and new market participants. Internet penetration, supplemented by a significant uptake in smartphone adoption, has altered the manner in which Africa consumes video content. This growth will be further augmented by the availability of cheaper DTT services, data-saving video consumption options, and attractively packaged triple-play services. It is critical for market participants to gauge market trends, price sensitivity and growth opportunities while offering their services. Along with pricing and richness of content, strategic partnerships will play a key role in defining the market leader in the next five years.
  • Ready for GDPR? Learn about challenges and ways to comply Ready for GDPR? Learn about challenges and ways to comply CEO Richard Hibbert & Head of Products, Oliver Vistisen Jan 25 2017 3:00 pm UTC 45 mins
    The GDPR comes into force 25 May 2018 and this will have a significant impact on the way in which organisations collect, process and share data. Companies that fail to prepare for the GDPR risk incurring hefty fines of 20m euros or 4% of world-wide revenues, whichever is greatest. As such all organisations need a strategy for GDPR. By implementing a structured approach through the use of cloud-based applications, organisations will be able to effectively achieve and maintain compliance.

    In this webinar we will: explore the key provisions of GDPR, examine the challenges organisations are facing with the new rules, provide guidance for Risk Managers, Compliance Leaders and other IT Professionals on how to approach these challenges, then demonstrate how our cloud-based GDPR Applications Suite can provide effective solutions that ensure your business can achieve and maintain compliance
  • Seeing the Forest and the Trees – Unique Security Challenges of Financial Data Seeing the Forest and the Trees – Unique Security Challenges of Financial Data Kim Ellery, Director, Product Marketing, Absolute Jan 25 2017 4:00 pm UTC 60 mins
    Financial organizations are entrusted with the some of the most sensitive data and face a constant onslaught of attempts by insiders and hackers to steal incredibly valuable and easily monetized data. In this informative webinar, Kim Ellery, Director Product Marketing at Absolute, will discuss the increasing risk from both advanced attacks and insider threats. Attendees will gain actionable insights on how to balance the emphasis between detecting threats and preventing them in the first place, starting with visibility and actionable intelligence, to gain complete visibility and control of every endpoint device … no matter if they’re on or off the network.

    Join the Absolute team on January 25th for an informative webinar on improving your visibility, get actionable insights and strategies to help you detect threats faster or prevent them entirely
  • What's New in Coverity 8.7 What's New in Coverity 8.7 Yan Huang, Sr. Product Manager, Coverity Jan 25 2017 4:00 pm UTC 75 mins
    Synopsys, Inc. recently released Coverity 8.7, the latest version of the company's industry-leading static analysis tool and one of the core components of its Software Integrity Platform.

    This webinar presents several imporant updates to enhance its security analysis and extend its utility to a broader audience, including organizations developing web and mobile applications and software systems for vehicles and other safety-critical systems.

    Highlights:
    - Enhances Android security analysis to detect critical vulnerabilities and weaknesses on the OWASP Top 10
    - Improves security analysis and accuracy for JavaScript, Java and C# web applications
    - Expands desktop analysis with Integrated Development Environment (IDE) plugins for mobile and web application security testing
  • The New 'Interprise' With SD-WAN The New 'Interprise' With SD-WAN Ken Hosac, Cradlepoint Jan 25 2017 5:00 pm UTC 60 mins
    Today the Internet is becoming the new corporate network — the Internet enterprise, or the “Interprise.” This new paradigm is gaining traction because of three major technology shifts: cloud, workforce mobility, and the Internet of Things (IoT).
     
    With so many organizations looking to partially or even fully put their network architecture in the cloud, the less complex you can make the move, the better. The “Interprise” is now an essential tool for network administrators, IT professionals, and corporate employees.
     
    At 9 a.m. PT / 12 p.m. ET on Jan. 25, 2017, join Cradlepoint’s Todd Krautkremer for a presentation and discussion about leveraging the Internet and virtual technologies to securely extend the traditional enterprise network — and how Cradlepoint NetCloud can help.
  • Don't 'Guesstimate' Your Cyber Risk, Use Financial Impact to Prioritize & Decide Don't 'Guesstimate' Your Cyber Risk, Use Financial Impact to Prioritize & Decide Rob Sloan, Director of Cybersecurity Research at Dow Jones & Ryan Stolte, Co-founder and CTO at Bay Dynamics Jan 25 2017 5:00 pm UTC 60 mins
    Enterprises use value at risk metrics to drive most strategic decisions, except when it comes to cyber risk. Prioritizing cyber risk response and remediation is typically a guessing game that requires experts to work with the cyber and business teams to try to guesstimate probabilities of particular events and their ability to compromise each application's confidentiality, integrity and availability. Without calculating a dollar amount impact to which the business is exposed, stakeholders enterprise-wide have no way of knowing the most potentially damaging vulnerabilities and threats within their environment.

    This webinar will discuss why enterprises must embrace quantifying cyber risk as they do in all other parts of the business and how they can calculate the financial impact metrics needed to drive faster and more effective decision making.
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Jan 25 2017 6:00 pm UTC 60 mins
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Key Findings from the 2017 State of Security Operations Report Key Findings from the 2017 State of Security Operations Report Kerry Matre, Director, Security Portfolio Marketing, HPE Jan 25 2017 6:00 pm UTC 60 mins
    Taking your Security Operations Center (SOC) to the next level has never been more critical. Organizations around the globe are investing heavily in cyber defense capabilities to protect their most critical assets. Don’t miss this webinar to explore key findings from the 2017 State of Security Operations report on cyber defense organizations’ capabilities and maturity.

    Learn what the most successful SOCs in the world are doing right, regional trends in the maturity of cyber defense capabilities and best practices to apply within your organization. Get the latest information on:

    • Opportunities in automation
    • Threat hunt teams and whether they are working
    • New compliance regulations impacting SOCs

    Register now and gain insight on the next steps your business can take to mature security operations in 2017.
  • Are You Vulnerability Blind? 3 Reasons to Reconsider a Bug Bounty Are You Vulnerability Blind? 3 Reasons to Reconsider a Bug Bounty Johnathan Hunt, VP Information Security at Invision; Paul Ross, SVP Marketing at Bugcrowd Jan 25 2017 6:00 pm UTC 60 mins
    Bug Bounty programs are critical to the security programs of thousands of organizations, but many still have not embraced them. Join security leader Johnathan Hunt, VP Information Security at InVision, Paul Ross, SVP of Marketing at Bugcrowd to discuss why that situation must change, through topics including:

    - How a security expert changed his mind about bug bounties
    - Why no bug bounty means missed vulnerabilities
    - How Bugcrowd finds a P1 bug every 27 hours

    We will explore InVision’s bug bounty experience from conception to being critical to their customers’ confidence in their security.

    *Register for the webinar now*

    “Whether or not you’re going to have the good guys working for you or not, doesn’t mean the bad guys are going to stop working”

    - Johnathan Hunt, Invision
  • Presenting Cybersecurity to the Board: Your How-to for Success Presenting Cybersecurity to the Board: Your How-to for Success Richard Clarke, Jasper Osstenjuk, Jake Olcott Jan 25 2017 6:00 pm UTC 60 mins
    Today, cybersecurity is a #1 concern for board members. But what do they need to know? And how should it be presented?

    Richard Clarke has a pretty good idea. As a senior White House advisor to four U.S. Presidents, a member of three corporate boards, and CEO of Good Harbor Security Risk Management, he’s talked cybersecurity in both the Situation Room and the boardroom.

    Jasper Ossentjuk also knows how to present cybersecurity in the boardroom. As SVP and CISO for TransUnion, Jasper regularly presents information to his Board about his organization's security posture.

    On January 25th at 1:00PM ET, join Richard and Jasper for a discussion of:

    - What cybersecurity metrics and measurements are most important for the board
    - Methods for security leaders to communicate security issues across the enterprise
    - How to graphically represent your cybersecurity program
  • Is a Cloud-Managed Network right for your Schools? Is a Cloud-Managed Network right for your Schools? Dan Rivera, Product Marketing Manager - K12 Jan 25 2017 6:00 pm UTC 30 mins
    Cloud networking solutions offer a great way to manage the growing demand of high-bandwidth campus Wi-Fi when resources and funds are scarce. However, not all cloud-based solutions are equal.

    Join us for a live webinar to learn what to expect from a cloud-managed network, how to avoid common pitfalls, and how to get E-rate-ready 5-year network management licensing. We will also show the benefits of Aruba’s cloud solution for K-12, along with a live demo!
  • 攻撃者の動向を踏まえた2017年のセキュリティ予測 攻撃者の動向を踏まえた2017年のセキュリティ予測 岩間 優仁 (いわま まさとみ)執行役副社長 ファイア・アイ株式会社 Jan 26 2017 8:00 am UTC 90 mins
    セキュリティご担当者様

    昨年2016年は、ランサムウェアが猛威をふるい、またクラウド・サービスを積極的に悪用する攻撃も目立ちました。IoTデバイスがハッキングを受け、大規模なDDoS攻撃により多くの企業が被害を受けたのは予測された通りでした。2016年は多くの企業の経営層にとってサイバー攻撃の脅威を強く感じた年になり、サイバーセキュリティがよりいっそうビジネス上の課題となった年でした。

    2017年は、引き続きランサムウェアが横行するだけでなく、拡大するIoTと、ICS等のサイバーを活用した社会インフラ・サービスへの攻撃が増加するとみられています。また検知が困難なスクリプト型マルウェアへの移行が続くことも予想されます。間違いなく、攻撃者は企業や組織を侵害するために新たな手口を模索し続けてくるでしょう。

    ファイア・アイでは、国家レベルの支援を受ける脅威グループの監視や、様々な業種におけるインシデント・レスポンスの豊富な経験をもとに、2017年のサイバーセキュリティ環境の変化について解説するWebセミナーを実施いたします。本Webセミナーでは、新しい手口による攻撃に対して強化すべきセキュリティ対策や対応策について、独自の視点と脅威解析情報をベースに解説いたします。是非この機会にご聴講ください。

    また本Webセミナーへのお問い合わせは、 marketing-jp@fireeye.comまでお願いいたします。

    当日、皆様とオンラインでお会いできることを楽しみにしております。