Hi [[ session.user.profile.firstName ]]

IT Security

  • Get a Credible, Comprehensive Asset Inventory
    Get a Credible, Comprehensive Asset Inventory
    Nathan Burke, CMO @ Axonius Recorded: Jul 19 2019 4 mins
    By connecting to the management and security tools that customers already use and the network infrastructure, Axonius gives customers a credible, comprehensive asset inventory. From laptops & desktops, servers and VMs, cloud instances and mobile devices, to IoT and OT, if an asset is part of your environment it can be discovered.

    Providing customers with a true, always up-to-date inventory of assets is the first step in uncovering security gaps and enforcing policies to take automated actions like enriching CMBD data and creating incidents when any asset is not in line with the overall security policy.
  • How AppsFlyer Automates Security Policy Validation with Axonius
    How AppsFlyer Automates Security Policy Validation with Axonius
    Guy Fletcher, CISO @ AppsFlyer Recorded: Jul 19 2019 2 mins
    With a comprehensive inventory of all assets, users, and security solutions, AppsFlyer was able to get clear visibility into the deployment of the different security solutions and automate ongoing security policy adherence.

    “Asset management and what Axonius provides is a core element. You can’t build a house without having a solid foundation. Asset management and understanding what you have is basic.” -- Guy Fletcher, CISO @ AppsFlyer
  • Highlighting the Asset Management Problem in Cybersecurity in 3 Minutes
    Highlighting the Asset Management Problem in Cybersecurity in 3 Minutes
    Dean Sysman, CEO & Co-Founder @ Axonius Recorded: Jul 19 2019 4 mins
    A security teams job is so difficult today - but they’re still spending time figuring out where things are and what they are. The more solutions you have the harder it is to understand where something is, who owns it, and does it actually fit your security policy.

    Asset management isn’t sexy - but at the end of the day, everything you’re doing in your security program relies on a foundation of knowing what your assets are and if they’re fitting that security policy.
  • Hybrid Cloud Monitoring on AWS and Red Hat OpenShift
    Hybrid Cloud Monitoring on AWS and Red Hat OpenShift
    Red Hat & Helevetia Recorded: Jul 19 2019 32 mins
    Learn how a Swiss insurance company designed its hybrid cloud monitoring solution around Amazon Web Services (AWS) and Red Hat OpenShift using best-of-their-kind metrics and monitoring tools.

    In this session, a technical solution architect from Helvetia, together with senior consultants from Red Hat, who worked on the project, will show you how to use:

    • Prometheus to gather the metrics for the platform.
    • AWS CloudWatch to gather metrics for additional components/services.
    • Grafana to centralize from multiple sources and visualize all of the cluster metrics.
    • Prometheus Alert Manager to report on the health of Red Hat OpenShift Container Platform.
    • Slack to notify the operations team.
    • Dynatrace for application and end-to-end monitoring.
  • TNS Special Podcast with Tom Gillis & Sylvain Cazard
    TNS Special Podcast with Tom Gillis & Sylvain Cazard
    Tom Gillis and Sylvain Cazard, VMware Recorded: Jul 19 2019 26 mins
    Hear from Industry veteran, Tom Gillis, Senior Vice-President and General Manager of VMware’s Network and Security Business Unit during his recent visit to London for a fascinating and wide-ranging conversation: his extensive background in the industry, and his views on how digital transformation is driving a fundamental shift in the way we architect networks and conceptually approach IT security.

    You’ll also hear from the horse’s mouth about VMware’s latest star launches in the Networking and Security space: NSX-T 2.4, the Service -Defined Firewall and how we confidentially expect that these will revolutionise the market.

    Taking part to give the perspective from this side of the Atlantic is Sylvain Cazard, Vice-President of VMware’s Software-Defined Datacenter business in EMEA.
  • The (virtualised) network, providing a new approach to security podcast
    The (virtualised) network, providing a new approach to security podcast
    VMware’s Scott McKinnon, Business Solutions Architect and Garry Owen, Networking & Security Solutions Marketing Recorded: Jul 19 2019 27 mins
    The second fastest growing cost in IT is security. The fastest? The financial impact of breaches. Something isn’t working, which means a new approach is needed.

    Hear from VMware’s Scott McKinnon and Garry Owen as they talk about the end of castle walls, the beginning of app defence, and what you need to do to secure your business in the era of ever-evolving threats.
  • Developing and Deploying Applications in a Multisite Hybrid Cloud
    Developing and Deploying Applications in a Multisite Hybrid Cloud
    Ben Pritchett, Principal Systems Eng, IT and PaaS Ivan Atanasov, Principal Systems Eng, IT Application Delivery Service Recorded: Jul 19 2019 46 mins
    You have access to clouds. You can build containers. How do you make them useful? Trying to build scalable and resilient services and deploying them across multiple sites and cloud providers can be tricky. Find out how Red Hat IT does it.

    In this session recorded from Red Hat Summit, Tom Benninger, Red Hat, Ben Pritchett, and Ivan Atanasov, Red Hat Inc, review the patterns, processes, and tools Red Hat IT uses to deliver business critical application services across multiple sites, with Red Hat OpenShift Container platform.

    We’ll cover:

    •The Red Hat IT standard development and deployment pattern.
    •How to automate your CI/CD delivery pipeline, from merge request to release.
    •How to implement basic supply chain security to support application integrity.
    •How we deal with security and change management requirements.
    •The tools and processes needed to implement this model.

    This recorded Red Hat Summit session shows how Red Hat and open source tools are used today to for fast, high-quality, more secure, and efficient digital delivery.
  • How is Security Transforming?
    How is Security Transforming?
    Featuring Sylvain Cazard, VP EMEA, Networking & Security Recorded: Jul 19 2019 4 mins
    Is your business struggling to secure its IT as it goes through digital transformation?

    Sylvain Cazard, VP EMEA, Software Defined Datacenter, Networking & Security at VMware EMEA explains how the current security model is broken, with businesses managing too many security vendors and focusing too heavily on a reactive approach.
    With intrinsic built-in security, VMware’s infrastructure means you’re better protected, so you can focus more on innovation and performance.

    Find out how VMware could transform your businesses’ security:
    https://blogs.vmware.com/emea/en/priority/security/
  • Know Your Assets, Identify Gaps, and Automate Security Policy Enforcement
    Know Your Assets, Identify Gaps, and Automate Security Policy Enforcement
    Nathan Burke, CMO Recorded: Jul 19 2019 2 mins
    How many assets are in your environment? Most security teams don’t know. Asset management is a huge, nagging problem that is only getting worse. With the increase in the number and types of devices in today’s corporate environment, compounded by trends like BYOD, Cloud and IoT, it’s nearly impossible to understand how many devices are on our networks, what’s on them and whether they comply with the overall security policy. Until now.

    Enter Axonius, a simple solution with a unique approach. By aggregating existing business data from over 130 management and security solutions, the Axonius Cybersecurity Asset Management Platform provides actionable visibility and automated security policy enforcement for every asset and user.

    Let us prove it - check out our 2 minute demo.
  • Ask an Expert: Ansible Network Automation
    Ask an Expert: Ansible Network Automation
    Ajay Chenampara, Senior Specialist Solutions Architect, Ansible Network Automation, Red Hat & Andrius Benokraitis, Principal Recorded: Jul 19 2019 54 mins
    Check out this webinar if you're interested in the latest questions around network automation. Want more? Visit our Github Community for Network Automation (https://github.com/network-automation). Want to join the Github Community? Have a question? Email us at ansible-network@redhat.com. Register for an upcoming Ask an Expert webinar. Any question - from beginner to advanced - is welcome, and will be addressed in an open forum with Ansible staff.
  • Keylight: Cloud-Based IT Risk Solutions for Every Business
    Keylight: Cloud-Based IT Risk Solutions for Every Business
    Lockpath Recorded: Jul 19 2019 2 mins
    Lockpath’s Keylight platform enhances an organization’s IT Risk Management and it's ability to manage, measure and report IT risks.
  • App and Network Attacks
    App and Network Attacks
    Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat Citrix Recorded: Jul 19 2019 46 mins
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
  • Optimizing for Success in the Cloud
    Optimizing for Success in the Cloud
    Meg Ramsey, Vice President Cloud Services - Sungard AS & Bill Martorelli, Principal Analyst - Forrester Recorded: Jul 19 2019 28 mins
    This 30-minute webinar, Optimizing for Success in the Cloud, features guest speaker Forrester Principal Analyst, Bill Martorelli, talking about the latest trends in digital transformation and how accomplishing success doesn’t have to disrupt ongoing operations. Sungard AS’ Meg Ramsey discusses the Sungard AS solutions that deliver innovative digital services your business needs with the quality your customers demand.
  • Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud
    Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud
    Dirk Thelen und Dirk Schüler Recorded: Jul 19 2019 49 mins
    Der Wechsel in die Cloud wird stark von den Geschäftsbereichen bestimmt und die Geschwindigkeit ist so hoch, dass in einigen Fällen die Sicherheit in den Hintergrund tritt. Ihre Anwendungen und Daten müssen aber in Public Cloud Umgebungen genauso sorgfältig geschützt werden, wie lokale Anwendungen und Daten. Deshalb gilt: Zero Trust Security Modell must be everywhere!

    Wir zeigen Ihnen in dieser Ausgabe von „Die Zwei um Zwölf“, wie mit Automatisierungstools Public Cloud Umgebungen auf Knopfdruck mit virtuellen Firewalls (Prisma VM-Series) eingerichtet, verwaltet und abgesichert und wie Workloads und Sicherheitsmaßnahmen in wenigen Minuten bereitgestellt werden können.
  • Keylight: Cloud-Based Compliance and Policy Solutions for Every Business
    Keylight: Cloud-Based Compliance and Policy Solutions for Every Business
    Lockpath Recorded: Jul 18 2019 2 mins
    Learn how the Keylight Platform provides and end-to-end solution for Compliance and Policy Management.
  • 7 common web application security attacks & what you can do to prevent them
    7 common web application security attacks & what you can do to prevent them
    Jon Wallace, Technologist at Instart Recorded: Jul 18 2019 63 mins
    Join Instart Technologist, Jon Wallace, to learn about the 7 most common website and web application attacks and how you can prevent them with the right preparation.

    Anyone who operates a website should be concerned about security, especially the security of your sensitive customer information - this much should be obvious to you by now. However, unless you keep an ear to the ground about security news, it is often only the most high profile or sophisticated attacks that you actually hear about. The reality is that common, low level attacks are executed every single day against websites and web applications. There is a reason the OWASP top 10 hasn’t changed in years. The good news is these types of attacks are preventable with the right preparation.


    In this webinar, you will learn:

    -What motivates hackers
    -What makes an application a target
    -What are the 7 most common website and web application attacks
    -How you should protect your assets
  • Identity Verification: A Reset for Password Resets
    Identity Verification: A Reset for Password Resets
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident Recorded: Jul 18 2019 48 mins
    Every use case differs in the way it defines and executes password resets, but ultimately it’s imperative for many platforms to verify users’ identities for each password reset request – from enterprise employees to government applications and even with e-commerce and other human-centric sites.

    Platforms that integrate a secure identity verification method into their password reset process will benefit from having a greater level of assurance that the person initiating the reset is in fact who they say they are, and furthermore, will ensure that the user isn’t a bot or a bad actor impersonating an active user.

    For industries like finance, insurance, and healthcare that deal with a lot of personally identifiable information (PII) and other highly sensitive data, leveraging more rigorous verification standards for password resets becomes especially critical.

    In this webinar, we’ll discuss a range of identity verification methods with various assurance levels so that organizations of all sizes and industries can better understand how to build a password reset program that meets their specific security needs.

    Key Takeaways
    - Level set on why identity verification is important for account security and password reset interactions and how it affects every type of organization.
    - In-depth review of the most effective identity verification methods for successful (and secure) password resets.
    - Explore how identity verification works with multi-factor authentication for password resets.
  • Choosing the Right Cloud HSM
    Choosing the Right Cloud HSM
    Gary Marsden, Senior Director of Data Protection Services at Thales Recorded: Jul 18 2019 44 mins
    Although most major cloud providers now offer native cloud Hardware Security Module (HSM) services, how do you choose the right cloud HSM? According to 451 Research, 69% of enterprises now have a hybrid, multi-cloud strategy. With hybrid, multi-cloud environments likely to be the norm as we move into 2020, managing multiple cloud HSMs will increase complexity, cost of ownership and operational overhead.

    Join us as we discuss the complexities of managing native cloud HSMs separately, leading to islands of security with different features and rules for each. We’ll show you how the smarter and simpler route is to use a cloud HSM provider that can centrally manage and secure your entire cryptographic operations across all cloud environments.

    This informative webinar will cover:
    • A current view of the cloud’s impact on IT business models
    • Why HSMs are critical to data security on premise or in the cloud
    • How creating centralized key management and security strategy will make your cloud life a whole lot easier
    • Building blocks for an HSM strategy for security across all cloud and hybrid IT environments
  • A DevOps Journey, Episode 2: Migrating Virtualized Workloads to OpenShift
    A DevOps Journey, Episode 2: Migrating Virtualized Workloads to OpenShift
    Ales Raszka, Software Engineer, Red Hat and Stanislav Ochotnicky, Principal Software Engineer, Red Hat Recorded: Jul 18 2019 44 mins
    The journey to DevOps will revolutionize how you manage your business and shorten delivery time for a variety of IT resources. It’s about not only the tools, but also the change in culture to accept this new style of work. But how do you get from here to there?

    Join us for this webinar to learn how Red Hat's DevOps team moved applications deployed in Red Hat® Virtualization and managed with Ansible® to a full-fledged containerized format using OpenShift®.

    In this webinar, we’ll cover:

    •Challenges of brownfield migrations.
    •Common pitfalls.
    •Things to consider before, during, and after migration.
    •Phases of the example migration.
  • Coming Soon: Android Q & iOS 13 Privacy Enhancements
    Coming Soon: Android Q & iOS 13 Privacy Enhancements
    Tony Ramirez, Mobile Security Analyst / Brian Reed, Chief Mobility Officer Recorded: Jul 18 2019 64 mins
    Are you ready for Android Q and iOS 13? Apple and Google’s forthcoming mobile operating systems boast a bevy of privacy features that enable users to seize more control of their personal data.

    NowSecure Mobile Security Analyst Tony Ramirez will share a deep dive into Android and iOS application security and privacy enhancements and what they mean for mobile DevSecOps teams. Join us to learn about:
    + Increased transparency and granularity over location tracking
    + New protections for sensitive information
    + Safer data exchanges in Android Q through TLS 1.3 encryption
  • Building a Culture of Secure Programming in your Organisation
    Building a Culture of Secure Programming in your Organisation
    Amanvir Sangha, Consultant, Synopsys Recorded: Jul 18 2019 69 mins
    We all know that fixing defects early in the SDLC is the right approach to building secure software. Security needs to be in every part of the pipeline but it’s often hard to get everybody onboard with software security initiatives.

    Come join us on this webinar to explore how to build a culture of proactive secure programming in your technical organization and how to implement security as an enabler without disrupting the velocity of projects in modern development teams. See how Synopsys tools and services can allow you to build secure, reliable and quality software.
  • How to Prevent Breaches with Phishing Threat Intelligence
    How to Prevent Breaches with Phishing Threat Intelligence
    Joshua Bartolomie, Director, Research and Development and KJ Jagtap, Product Marketing Manager, Cofense Recorded: Jul 18 2019 47 mins
    Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognize phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.

    This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, organizations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.

    Join this webinar to learn about:

    - The constantly changing threat landscape
    - Turning active, real threats into learning moments for your users
    - Speeding up response with timely, actionable intelligence
  • Hybrid Identity and What it Means to You
    Hybrid Identity and What it Means to You
    Rich Gibsen, CTO at SecureAuth and Robert Humphrey, CMO at SecureAuth Recorded: Jul 18 2019 42 mins
    Digital experiences (portals, commerce sites, communities, etc.) are strategic resources for most organizations. Providing secure access to these experiences is a challenge for both security and business teams alike. While nearly all organizations are developing these digital experiences in the cloud, the typical IT infrastructure includes systems that are cloud based, on-prem or hybrid. Your identity access management systems should mirror your organization’s infrastructure and enable you to deploy on-prem, in the cloud or hybrid.

    Hybrid Identity enables you to choose the deployment approach that fits your business, rather than fitting the approach of the vendor. Don’t compromise on experience and security, and don’t compromise on choice. Hybrid Identity gives you choice.

    Join us to learn what Hybrid Identity is, and how it can help better secure all your workforce and consumer identities. You’ll see Hybrid Identity in action, and how it results in minimal impact to users with maximum visibility to administrators. You’ll also hear about SecureAuth’s latest offerings and get a sneak peek into the future of identity.

    The Hybrid Identity journey is about to begin – sign up to find out how it can help better secure all your workforce and consumer identities.
  • The Transformative Effect of Data Science and Machine Learning
    The Transformative Effect of Data Science and Machine Learning
    Tim Vidas - Senior Distinguished Engineer, Nash Borges PhD - Sr Director of Engineering and Data Science Jul 22 2019 1:00 pm UTC 60 mins
    The combination of big data and machine learning is making it possible for defenders with limited resources and expertise to detect and respond to unknown threats faster than ever before.

    In an industry forever locked in an adversarial battle with increasingly sophisticated actors, Tim Vidas, Distinguished Senior Engineer, and Nash Borges PhD, Sr Director of Engineering and Data Science at Secureworks explain how the power of machine learning combined with human intelligence have become fundamental to defending the digital economy.

    You will learn:

    - What the threat looks like on a global scale, as observed through Secureworks' Incident Response engagements
    - Data Science 101, including definitions of Data Science (DS), Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL)
    - How our detectors work, including Domain Generation Algorithm (DGA) Detection
  • A Hacker's Perspective: Where Do We Go From Here?
    A Hacker's Perspective: Where Do We Go From Here?
    Chris Roberts, Chief Security Strategist and Hacker, and Tony Cole, CTO Jul 22 2019 5:00 pm UTC 60 mins
    For 25 years or more we have fought the battle of passwords and patches while all around us, the world has developed, data has exponentially increased, attack surfaces are everywhere and technology had quite simply forced the human race to consider the evolution cycle in single lifespans as opposed to millennia. During the last 25 years we have done little to protect the charges we are responsible for, we have failed to secure systems, allowed financial attacks, infrastructure attacks, and now attacks directly against humans. At what point will we be able to stem the bleeding and actually take charge of our realm? Have we left it too late, or are we still able to claw back out of the abyss and face our adversary in a more asymmetrical defensive manner? Can we actually provide safety and security to our charges or will we continue to fail? And, critically, how do we communicate this, and educate a population that is content to watch from the sidelines, while they are being digitally eviscerated.
  • Modernize Your Network Operations with Network Functions Virtualization
    Modernize Your Network Operations with Network Functions Virtualization
    Pano Xinos, Global Telco Marketing Lead, Red Hat Jul 22 2019 6:00 pm UTC 15 mins
    This webinar on Network Functions Virtualization (NFV) educates the audience on the benefits of NFV.

    In today’s day and age, NFV is the newest way to define, create and manage networks by replacing hardware with software and automation. Companies are leaving behind hardware to move into a future of cloud computing. With Red Hat OpenStack Platform, customers have a solid foundation for the NFV architecture.

    OpenStack provides NFV with features to be modular, high performance and open source. The foundation of Red Hat OpenStack has given NFV the foundation it needs to transform the telecommunications industry.
  • Symantec - Comprehensive about Security
    Symantec - Comprehensive about Security
    Darren Thomson, EMEA CTO Symantec Jul 22 2019 9:00 pm UTC 11 mins
    As a leading vendor in the security landscape, Symantec takes pride in providing clients with products that offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.

    Join Darren Thomson, EMEA CTO discusses how Symantec is transforming itself to be worthy of this title.
  • Fix your Leaky Onboarding Funnel with Online Identity Verification
    Fix your Leaky Onboarding Funnel with Online Identity Verification
    Dean Nicolls, VP of Marketing, Jumio Corp. Jul 23 2019 7:00 am UTC 26 mins
    Customer acquisition is top of mind for most financial service organizations and their boards. Normally, when banks and other financial service institutions think customer acquisition, they think about launching a new advertising campaign with the hope of driving more online or in-branch traffic -- but these campaigns are iffy at best.

    Instead, why not rethink your online account opening process where FSIs lose about 20% of their prospects through abandonment. If you can plug that leaky funnel, you will see an immediate improvement in customer acquisition.

    Join us for this informative “how-to” webinar and discover how to…

    - Dissect the abandonment problem
    - Reduce the number of identity verification screens & clicks
    - Cast a wider net with omni-channel verification
    - To say “no” to verification “maybes”
  • Going cloud? It's where Citrix ADC has a role!
    Going cloud? It's where Citrix ADC has a role!
    Thorsten Rood Jul 23 2019 8:00 am UTC 46 mins
    Moving towards a cloud play in your given environment? Thinking that AzureAD will be your future authentication strategy? It’s likely you’ll still need access to some on-premises resources that won’t make it over that quickly or others that are running outside of a pure Microsoft feature set, such as Amazon (AWS) or Google Cloud Platform (GCP). In this session, you’ll learn how Citrix ADC bridges the gap between clouds, and how to integrate remaining datacenter resources into a common offering while maintaining user experience. Plus, explore the elements that constitute a true hybrid cloud infrastructure, which will likely be the longest migration episode in many IT lives.
  • Cyber Security Brief: Elfin research, ASUS attack, insider threats & mobile sec
    Cyber Security Brief: Elfin research, ASUS attack, insider threats & mobile sec
    Cyber Security Brief Podcast Jul 23 2019 8:00 am UTC 22 mins
    On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We also talk about one of the big stories of the last week – ASUS’ software update system being hijacked to send out malicious updates, as well as discussing the ongoing issue of insider threats, and some new research into how mobile apps could be compromising your privacy and online security.
  • How to get more ROI on your Workspace Investment using Citrix Analytics
    How to get more ROI on your Workspace Investment using Citrix Analytics
    Amandeep Nagra, Blake Connell Jul 23 2019 9:00 am UTC 42 mins
    What separates workspace pretenders from leaders? Apart from having a complete portfolio of integrated services spanning devices, apps, desktops, networks and files, Citrix has a unique advantage in Citrix Analytics. Citrix Workspace is the only workspace with a machine learning–based analytics platform that delivers intelligence around user behavior. This helps customers reduce the risk of insider attacks based on user risk profiles and provide a range of remediation actions at every step of the user journey to stop the attack in its path. Citrix Workspace also integrates with SIEM vendors and connects with Microsoft Graph, blending Microsoft data sources with Citrix risk indicators to provide an even more comprehensive user security profile. Join us in this session to learn how you can unlock even more value in Citrix Workspace with improved security via ML and Citrix Analytics.
  • SD-WAN Confessions: My 3-month Onboarding Experience
    SD-WAN Confessions: My 3-month Onboarding Experience
    Lars Norling, ADB SAFEGAT; Joost van der Struijk, Videns; Eyal Webber-Zvik, Cato Networks Jul 23 2019 9:00 am UTC 31 mins
    Learn how ADB SAFEGATE, together with Videns IT Services, had successfully migrated 24 global sites from MPLS to SD-WAN. Join us as we uncover the challenges, and offer a walkthrough for a successful global SD-WAN project - sharing insights and tips on how to avoid common pitfalls.
  • Gain Control of Complex Applications Central to Your Digital Transformation
    Gain Control of Complex Applications Central to Your Digital Transformation
    John Gudmundson, Sr. Product Marketing Manager Gigamon Jul 23 2019 12:00 pm UTC 53 mins
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    • Identify and extract traffic from over 3,000 applications
    • Detect and manage shadow IT and rogue apps
    • Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • How to Prevent Breaches with Phishing Threat Intelligence
    How to Prevent Breaches with Phishing Threat Intelligence
    Darrel Rendell, Principal Intelligence Analyst, Cofense, Brandon Dunlap, Moderator, (ISC)² Jul 23 2019 12:00 pm UTC 60 mins
    Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognise phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.

    This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, organisations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.

    Join this webinar to learn about:
    -The constantly changing threat landscape
    -Turning active, real threats into learning moments for your users
    -Speeding up response with timely, actionable intelligence
  • Cybersecurity Insights: Security in the Digital Era
    Cybersecurity Insights: Security in the Digital Era
    John Pescatore - Director, SANS Institute Jul 23 2019 1:00 pm UTC 10 mins
    Infrastructure and security have always been linked, but not particularly successful. Why has it failed in the past and what needs to happen now? Learn how organizations can make major advances without adding more complexity
  • The perfect storm: the impact of fragmentation and complexity
    The perfect storm: the impact of fragmentation and complexity
    Darren Thomson, EMEA CTO, Symantec and Dr Chris Brauer Goldsmiths University Jul 23 2019 1:00 pm UTC 32 mins
    Complexity, technological change, and regulations are increasing the pressure on security professionals. Over half feel paralysed by the overwhelming volume of threat alerts, with a quarter saying the sheer volume of alerts makes it more difficult to keep their business safe. Over a quarter say they are vulnerable to avoidable incidents.

    A brand new survey of over 3,000 cyber security professionals reveals that intense pressure is affecting decision making and increasing the risk of critical mistakes. Put simply, today’s constant state of high alert is unsustainable.

    Join leading psychologist Dr Chris Brauer from Goldsmith’s College, University of London, and Symantec EMEA CTO Darren Thompson, as they present the survey findings, and analyse what they mean for organisations like yours, including:

    -What cyber security leaders and professionals really feel about their roles in 2019
    -How to build a plan to reduce stress and improve cyber security effectiveness
    -Why the Symantec Integrated Cyber Defense Platform can help put your plan into action.
  • Flow-aware load balancing for monitoring 100G+ networks with your existing tools
    Flow-aware load balancing for monitoring 100G+ networks with your existing tools
    Mike Fecher, Technical Account Manager, Marshall England, VP Marketing Jul 23 2019 3:00 pm UTC 60 mins
    How to Manage Network Growth, Complexity & Speed: Flow-Aware Load Balancing

    As data volume and speeds of networks increase with more devices, applications and endpoints connecting to corporate, telecom and carrier networks, network engineers and operators are being overwhelmed with increasingly complex protocols and growing network traffic.

    Complicating matters are overly encapsulated and messy packet headers that can degrade performance and efficiency of network operations. Network engineers and operators are challenged to manage this infrastructure with a mix of new and old tools designed for lower speeds.

    Join Mike Fecher, Technical Account Manager and Marshall England, VP Marketing, MantisNet, for this 45-minute, webinar as they discuss how implementing flow-aware load balancing can help manage the growth, complexity and speed of networks, at scale, without sacrificing quality and accuracy needed to monitor and manage critical network traffic. We’ll illustrate how we make complex traffic types and overly encapsulated packets more efficient for processing.

    As network speeds will continue to grow (200G / 400G is coming), engineers will want to know more about flow-aware load balancing.

    Attendees of the webinar will learn:
    •Fundamentals of flow-aware load balancing, compared to other load balancing methods
    •Why flow-aware load balancing should be employed and where it should be deployed
    •How flow-aware load balancing can extend the utility of network tools
    •How flow aware load balancing reduces congestion and improves performance
  • Exploring Petabyte-scale Storage for Unstructured Data
    Exploring Petabyte-scale Storage for Unstructured Data
    Chris Edwards, Enterprise Architect at City of Plano, Laura Jordana, Nutnaix TME & Dave Kresse, GM Jul 23 2019 4:00 pm UTC 47 mins
    Storage capacity requirements are always increasing as more users and workloads create data. However, traditional storage solutions don't scale. Wouldn't it be great if you could enable storage services on demand without learning a new set of tools?

    Learn how to consolidate files and objects on easy to use, petabyte-scalable platform. Join Nutanix experts in this fast-paced session and walk away learning how your applications can quickly take advantage of these two software-defined storage solutions.
  • ISSA International Series: Security Standards Organizations
    ISSA International Series: Security Standards Organizations
    ISSA International Jul 23 2019 4:00 pm UTC 120 mins
    Security Standards Organizations - The good, the bad, and the ugly? This session covers the evolution of a number of technologies to address the evolving threat models. Changes to the SOC and response technologies will be included.
  • Scale-Out, Not Up: Introducing Commvault HyperScale Technology
    Scale-Out, Not Up: Introducing Commvault HyperScale Technology
    Greg Page, Senior Product Specialist, Hyperscale Solutions, Commvault Jul 23 2019 4:00 pm UTC 60 mins
    Is your organization struggling with inefficiencies from an outdated, scale-up approach to managing and protecting data? The need for a fully integrated data protection appliance to deliver greater availability and scalable services for on-premises applications and data is becoming a necessity.

    Join us as we discuss the benefits of a scale-out infrastructure and how the launch of Commvault HyperScale™ Appliance and Commvault HyperScale™ Software address the shift enterprises are making towards secondary storage as a means to drive key business and IT transformation initiatives.

    In this webinar, you will learn:
    •Scale-out vs. scale-up infrastructures
    •How to leverage a scale–out infrastructure
    •How you can save time and drive greater value with an integrated data protection appliance or reference design architecture
    •How Commvault HyperScale™ Appliance tightly integrates compute, storage, full lifecycle data protection and analytics into a single platform

    It’s time for a fresh approach to solving data management challenges. Register today and learn how you can achieve IT agility through a scale-out infrastructure.
  • 2019 Security Congress Preview – Cloud Security
    2019 Security Congress Preview – Cloud Security
    Richard Tychansky, Travis Jeppson, Brandon Dunlap (Moderator) Jul 23 2019 5:00 pm UTC 60 mins
    (ISC)² will hold its Security Congress 2019 in Orlando, FL October 28th – 30th. This conference will bring together 3000+ attendees and over 180 educational sessions. One of the 18 tracks that are being offered with focus on Cloud Security and the challenges practitioners face when dealing with all things cloud related. On July 23, 2019 at 1:00PM Eastern, join (ISC)² and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
  • Top 10 Security Best Practices for Azure
    Top 10 Security Best Practices for Azure
    Jigar Shah Jul 23 2019 5:00 pm UTC 60 mins
    As organizations migrate to the cloud, they often start by replicating their existing network architecture. This approach can be costlier and more difficult to manage than an architecture that leverages cloud-native capabilities that are not available in the data center. Microsoft Azure enables development teams to rapidly build and deploy global-scale applications, but with this ease and speed comes increased risk.

    In this webinar, you will learn more about the best practices for deploying network virtual appliances in Microsoft Azure, including:
    Designing network security for high availability and auto-scaling with Virtual Machine Scale Sets (VMSS) and Azure Load Balancer
    Implement Accelerated Networking and deploy VM-Series virtualized firewalls with multiple NICs to increase throughput and performance
    Automate virtualized firewall deployment configuration to ensure best practices are consistently implemented

    Rise above the noise and confusion by using VM-Series virtualized firewall on Microsoft Azure that provides complete visibility across all of your workloads in Azure, and helps you automate security controls.
  • Why You Should Have Zero Trust in the Web
    Why You Should Have Zero Trust in the Web
    Menlo Security Jul 23 2019 5:00 pm UTC 38 mins
    "Trusted” Websites Are Not as Safe as First Thought!

    Phishing and spear-phishing campaigns drive the majority of today’s most significant data breaches, fooling users into clicking on apparently legitimate links. They force victims to expose themselves or their businesses to credential theft, malware infections, and possibly ransomware.

    Whether accessed for business or pleasure, the modern Internet is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, company-wide cyberattack.

    Discover:

    - Why the Internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • Proofpoint Demo: Security Awareness Training
    Proofpoint Demo: Security Awareness Training
    Sean Walker, Enterprise Account Executive Jul 23 2019 5:00 pm UTC 36 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Data Forensics: What is it?
    Data Forensics: What is it?
    David Morris, Lance James and Mark Rasch Jul 23 2019 5:00 pm UTC 75 mins
    This session will delve into the area of Data Forensics specifically addressing when and why a Data Forensic investigation would occur and how to conduct a Data Forensic investigation.
  • Ansible Best Practices: Roles and Modules
    Ansible Best Practices: Roles and Modules
    Tim Appnel, Ansible Senior Product Manager, Red Hat Jul 23 2019 5:00 pm UTC 64 mins
    This webinar is based on Tim Appnel's talk from AnsibleFest Austin 2018, which was a followup to Ansible Best Practices: The Essentials. It delves into the topic of developing roles and modules to extend the power of Ansible automation while maintaining readability and simplicity. Based on actual experiences helping Ansible users, we show you what to do (and what not to do) to create the most reliable, resilient, and easy-to-manage automation solutions.
  • Making Apache Kafka Dead Easy With StreamSets
    Making Apache Kafka Dead Easy With StreamSets
    Clarke Patterson - Head of Product Marketing Jul 23 2019 5:00 pm UTC 58 mins
    Apache Kafka has become a popular choice for stream processing due to its throughput, availability guarantees and open source distribution. However, it also comes with complexity, and many enterprises struggle to get productive quickly as they attempt to connect Kafka to a diversity of data sources and destination platforms.

    In this webinar, expert Clarke Patterson will discuss and demonstrate best practices that will help make your Kafka deployment successful, including:

    -How to design any-to-any batch and streaming pipelines into and out of Kafka.
    -How to monitor end-to-end dataflows through Kafka.
    -How to operate continuous data movement with agility as data sources and architecture evolve.