Browse communities
Browse communities
Presenting a webinar?

IT Security

Community information
The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
  • Richard Stiennon, Chief Research Officer at IT Harvest, sits down with Tim Prendergast, CEO and co-founder of, to talk public cloud security and compliance and why an automated DevOps style approach is now required to keep up with the velocity of change in public cloud deployments.
  • Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
    Johan and Cliff will answer your cloud security questions including:
    •What are key challenges that IT leaders face when planning for a cloud migration?
    •What security factors should you consider when considering a hosted vs. on-premises solution?
    •As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
    •How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
    Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
  • Data breaches of all sorts, affecting credit card providers, retailers and health care providers, suggest that such breaches will continue and grow as a major risk to all organizations and their IT, security, and compliance departments. At the same time, Big Data solutions are gradually becoming more prevalent, connecting many new sources of data and thus potentially increasing both the vulnerability and the magnitude of a data breach. It is no wonder that Stratecast survey data suggest that one of IT managers’ primary concerns with Big Data is security, yet the advantages of Big Data in enabling revenue creation make it very attractive to the business. This panel discussion will explore the security issues around Big Data.

    In particular, the panel will discuss:
    •Whether Big Data necessarily increases the risk of a security breach
    •How to assess the risks associated with different types of Big Data solutions
    •How to avoid data breaches in a Big Data environment
  • The recent Verizon 2015 PCI Compliance Report states "Of all the data breaches that our forensics team has investigated over the last 10 years, not a single company has been found to be compliant at the time of the breach—this underscores the importance of PCI DSS compliance.".

    Join Qualys for a webcast to hear more about some practical steps to steer your company into compliance and create a solid defense against the latest threats to cardholder data. Register now and get yourself up to speed with:

    - Clear review of PCI Requirements — including changes in the newly released PCI DSS v3.1

    - Programmatic guidance — on how to implement a phased approach to the highest priority PCI security controls and processes

    - Practical advice — on how Qualys PCI solutions can help you achieve high-grade PCI security, including the #1 challenge of PCI compliance (Requirement 11)
  • “I just write the code and throw it over the wall. It’s up to Ops to make it work” -- when Devs care only about coding, Ops and customers suffer.

    “It’s not my job to test code. If there’s a problem, talk to QA.” -- when Ops care only about stability, innovation and customers suffer.

    DevOps represents cultural change. Whether it’s the change of resistant engineers that don’t want to be on-call or the change of Operations teams to have more empathy towards their counterparts writing code, to the willingness of executives to embrace a culture of automation, measurement and sharing. Organizations must overcome the culture war to be able to approach the agility and productivity that organizations following a DevOps model gain. The faster they can get there, the faster these organizations can take the competitive edge away from traditional enterprises.

    In this webinar, featuring guest Forrester Research principal analyst Kurt Bittner, we will look at:
    - The current state of organizations - a separation of Devs and Ops
    - The how of DevOps - DevOps is a culture, not a product
    - The benefits of DevOps - happier customers

    As part of our panel discussion, we will answer the following questions to help you get started building a DevOps culture within your organization:
    - Why change the status quo?
    - How do I align two disparate groups?
    - How do I remove the obstacles that separate Dev and Ops teams?
    - Will customers see a difference if devs are on call?
    - Can IT start to think differently?
  • Every two years, (ISC)2 surveys infosecurity practitioners from around the world about the profile of the global information security workforce. This year, over 12,000 professionals from 135+ countries responded to the survey to provide invaluable insight about their careers, positions and organizations. Join Julie Peeler, (ISC)2 Foundation Director and other industry experts on April 30, 2015 at 1:00pm Eastern for an examination and discussion of the survey results, gain insight into what hiring managers and looking for in job candidates, the areas of expertise in demand and the challenges facing infosec pros around the world.
  • Join Gene Kim, CTO, researcher and author of the best-selling book “The Phoenix Project” and Josh Corman, Sonatype CTO and co-founder of Rugged Software as they discuss how high performing organizations are applying proven supply chain principles to accelerate software delivery.
  • Do you know how to calculate how your network downtime costs and the financial impact it has per location?

    Every hour of network downtime can cost companies between $250,000 and $1 million. How many hours of network downtime do you experience each month?

    When network connections fail, there is a loss of productivity, brand credibility and revenue – revenue that is likely lost to competitors. Whether your unplanned downtime is due to wired line outages or hardware failure, the cost of that downtime multiplied by expensive troubleshooting is simply too high.

    Many put off business continuity planning until a problem occurs, which tends to be more expensive than investing in a solution now. If your business cannot afford network downtime, join this webinar to learn about failover solutions and the benchmarking formula to calculate your cost of downtime.

    We are all guilty of procrastinating – and we all know the costs associated with procrastinating. Let us provide you with the solutions and tools to calculate the cost of downtime for your organization and the ROI a failover solution will provide.

    Attendees will learn how to:
    •Integrate wireless failover into existing network environments
    •Reduce the high costs of staying connected
    •Limit expensive truck rolls
    •Calculate your network downtime costs
  • Junos Pulse is now Pulse Secure. Our name has changed but not our commitment to delivering secure, seamless mobility. Join our webinar to discover how we are rethinking the future of secure enterprise mobility access.

    Learn more about the commitment we’ve made to our customers and the future offerings we have in store for you.
  • Most of us rely on mobile apps for everything from banking to buying and messaging to mapping our route. Mobile devices are the go-to source to do work, watch videos, play games and—oh yes—even speak with another person.

    But every time we download or use a new app to simplify our lives, we run the risk of a hacker accessing our data. A recent FireEye Special Report, Out of Pocket: A Comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps – is a revealing look at today’s top mobile app threats on two of the most widely used platforms. The report outlines the real risks associated with mobile apps and their implications to privacy, corporate data and security.

    Join our industry experts for this interactive session to learn:
    -Key Android and iOS threats based on the analysis of 7 million
    mobile apps
    -Trends in mobile app behaviors
    -The impact of targeted malware and vulnerabilities
    -Takeaways security leaders can implement to make devices more
    secure in the workplace

    Be prepared for the next wave of mobile cyberattacks. Register today to gain insight from FireEye’s latest report and our mobile subject matter experts!

    The FireEye Team
  • If your data, services and processes become compromised, your business can suffer irreparable damage in minutes. The clock is ticking, and how fast you communicate to your major incident resolution team is everything.

    Join Scott Bowler, Manager of IT Delivery Management Services, NBN Co, and Abbas Haider Ali, CTO of xMatters and learn how NBN Co identifies major incidents and uses best practices for automating their communication processes to resolve major IT incidents quickly and effectively.

    During the event you will learn how to:
    - Immediately Identify a major incident
    - Instantly locate available major incident managers and target notifications to them
    - Get the right resolution team on the job fast based on the required expertise
    - Utilize one-click conference bridge technology to get key stakeholders together instantly
    - Conduct reviews to identify improvements and prevent similar incidents from reoccurring
  • Join Paul Roberts, editor of The Security Ledger, for this end-of-year discussion on how to create a culture of security within your security and development teams.
    •Veracode’s Chris Eng and Greg Nicastro each bring a unique point of view from their respective leadership roles – Security Research and DevOps.
    •Hear how their points of view come together to drive a culture of security into the product development and delivery cycle at Veracode.
    •Learn how you can forge your own path by adopting secure agile methodologies for product development.
  • As bad actors relentlessly continue to take advantage of the many innovations and trends in our current world, network security professionals are realizing that the passive mode of checking for threats is no longer adequate. As BYOD is now the norm rather than the exception in the corporate world and most organizations have a significant presence in the cloud, bad actors are more than happy to take advantage of the new conduits into the corporate network. Therefore, the need to catch, repair and eliminate security threats as early as possible has never been greater. With this in mind, VSS Monitoring has been helping various enterprise customers to deploy an inline layered security infrastructure that provides multiple lines of defense against the bad actors.

    This webinar will present some of the use cases we have been involved in, what were the motivations that led to the deployment of layered security and how a layered security architecture, anchored by VSS Monitoring, allowed enterprises to become more nimble in their never ending fight against bad actors. Join us for a safari tour of an exciting and evolving space!
  • Despite huge investments in breach prevention technology, data breaches have not slowed down. In just about every major breach, hackers exfiltrated data undetected over many months. Understanding the mindset and approach of cyber criminals can help you and your organization shrink the window between infection and discovery.

    In this webinar, Nat Kausik, CEO at Bitglass and Rich Campagna, VP Products at Bitglass will discuss the three major types of breaches, and the techniques used by today’s hackers to execute these breaches. You’ll learn how to identify the clues that they leave behind so that can help you identify a breach early, - limiting breach damage in the process.
  • Webcast highlights include learning how to:

    - Understand advantages of agent-based scanning—by leveraging lightweight agents that are extensible, centrally managed and self-updating. Traditional vulnerability scanning methods present a number of challenges for IT security teams who either don’t have the proper credentials, or are scanning assets that aren't always connected to the local network. See how agent-based scanning resolves this problem

    - Integrate Cloud Agent with existing Qualys solutions—using installed Qualys Cloud Agents to extend capabilities to Qualys Vulnerability Management (VM), Qualys Policy Compliance (PC), and Qualys Continuous Monitoring (CM)
  • Faster, less-expensive backups using in-the-wire deduplication is not only possible, but easier than you might expect. Our live webcast shows you how it’s possible — without disrupting mission-critical operations.

    Join storage analyst and vendor watchdog, Jon Toigo, along with Marc Mombourquette, a Dell data protection subject matter expert, for a hype-free examination of appliance-based data deduplication, and how it can benefit your production storage and backup environments immediately
  • Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • Almost every organization is challenged by the increasing need for more bandwidth. Cloud-based services, content-rich applications, and access to internet sites is putting more and more strain on the limited pipes coming in to your data centers. WAN Optimization had been the tool of choice to connect and manage branch office traffic. It's now more and more being used to bridge multiple Internet connections for organizations large and small to create more bandwidth in and out of their data centers. Traditional WAN Link Load Balancing has evolved from simple back up and VPN connectivity to a robust traffic management tool that seamlessly adds bandwidth using virtually any ISP technology. In this webinar you’ll learn the basics of Hybrid WANs, what they and Link Load Balancing can do for your organization, and discover more about Fortinet’s Hybrid WAN solutions.
  • Set aside 30 minutes on Wednesday, April 29th as we explain in more detail how your data is vulnerable as it moves across data networks. During our session, "Surveillance: You ARE being watched" we’ll uncover security issues and risks, as well as new features and affordable solutions.
  • As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictable, flexible, user- and service-friendly and lower cost to operate. These virtualized, software-controlled networking environments, however, do not yet benefit from the range and sophistication of DDoS protections and security available for traditional networks. This presentation focuses on how the delivery of traffic intelligence, threat detection and attack blocking is evolving, regardless of whether BGP and flow or future SDN/NFV-based techniques are in use.

    Attend this session to learn how Arbor Networks is adopting its DDoS solution suite to advance protections in SDN- and NFV-based networks.
  • Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.

    In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.

    Join this session to learn:
    •Some of the different methods of deploying Flowspec
    •How Flowspec compares with alternative filtering methods
    •Best practices for secure traffic routing