The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
How much visibility do you have via Secure Access end-points – from the Data Center, to the Cloud, to Devices and Applications hitting your network?
Join Pulse Secure for a compelling Webinar Centered on Pulse One – its’ leading edge Monitoring-Visibility Solution. Configured correctly, Pulse One also enhances compliance alliance, segmentation and pro-active management and consolidation for Secure Access at the front-edge of your network.
Join ecommerce and cybersecurity experts from BigCommerce, Coalition Technologies and Signifyd for an in-depth discussion on the opportunities and pitfalls associated with various methods of growing your business.
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
This session will discuss Identity and Data Protection solutions for enterprise security, organizations can take a data-centric approach to their security posture, all while controlling access to the infrastructure and applications they rely upon — both on-premises, and in public and private clouds.
The modern science of securing applications to a broad range of devices.
Do you want people accessing your data from that device? Do you know where that device has been? Would you trust that device to protect your personal data? While cloud applications offer tremendous benefits over traditional on-premise, IT Executives face many challenges involving data security and compliance. Unmanaged devices, unauthorized access, and unsanctioned apps are all significant threats, increasing the risk of data leakage and being the next organization in the headlines. Cloud access security brokers, or “CASBs” are the tools technology leaders have turned to, protecting data across applications, and mitigating other malicious threats.
In this webinar, Benjamin Massin, CEO of The SCE Group, and Gleb EvfaresTov, Solutions Engineer at Bitglass, will discuss how to balance the benefits of moving to the cloud, while implementing a security solution, protecting identities and data end-to-end.
SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.
AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:
Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series
The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?
This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:
• Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.
• Improvements: Planning and processes are improved by incorporating lessons learned.
• Communications: Restoration activities are coordinated with internal and external parties.
To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.
In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
Abstract: Can you afford not knowing how bad your provider's IP reputation is? How likely are IP addresses adjacent to you of being infected with malware or participating in botnets?
NSFOCUS has been tracking the reputation of IP addresses globally by ASN for over a year and recently released the August 2017 Global IP Reputation report. Some interesting patterns have emerged worldwide as the number of IP addresses added to reputation lists continues to increase due to Mirai, WannaCry and other malware infecting the Internet of Things.
NSFOCUS SecLab is tracking IP reputation across 9 categories, including SPAM, DDoS, botnets, and web attackers. This talk will present global IP reputation trends and rank the countries with the worst IP reputation…and it may not be China.
Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:
•Learn about the key capabilities introduced by 8.0
•See the value of the update to security deployments
•Receive a voucher for 8.0 training course - $500 value
The rapid adoption of cloud applications and services has fueled the need for new security solutions, such as Cloud Access Security Brokers (CASBs). But how do these systems weave into your overall security infrastructure? There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security into their environment. This talk will explore this next frontier of CASB solutions.
Learn how Pulse Secure’s latest Secure Access solutions are protecting the latest information architecture transformation and investment.
Our latest Secure Access software release includes stronger portfolio integration, expanded ecosystem interoperability, and revamped admin UX.
Along with these highlights, we will show you the tech in action with live demos of Pulse Cloud Secure and Profiler. We are excited about securing your digital footprint with this exciting release. Don't miss out!
The move to digital business is exposing the limits of existing trust infrastructures. Rapid growth in the number of deployed certificate authorities (CAs). Increased burden on multiple PKI point solutions deployed to address specific problems. And while IT grapples to support tactical implementations of PKI, the demands of digital business overwhelmingly require a more strategic and holistic approach.
What's required is a centralized yet agile overarching trust framework that can easily accommodate multiple use cases today and in the future.
This webinar looks at the steps you can take to build an agile trust infrastructure with a centralized PKI deployment.
* Digital Trust at Scale Learn how to build a PKI that supports endpoint diversity, evolving and multiple use cases and integration with complimentary solutions.
* Streamline PKI Deployment Discover how a trust infrastructure can be deployed and managed across your organization to mete the requirements of today's dynamic and distributed business models
* Simplify 3rd Party CA Key Migration Find out how you can migrate certificates from other vendor systems without having to distribute a new trust anchor and without the need to generate new keys and certificates.
In this webinar, join Cisco and CSPi as they discuss how automated breach notification takes Cisco’s incident response services to a whole new level. With FirePOWER and nVoy the incident response process can start immediately after a breach is verified and therefore be completed faster, in some cases the full impact of a breach can be determined in minutes.
This can be extremely powerful for companies which rely on managed services providers for their cyber breach incident response strategy. With FirePOWER and nVoy Cisco’s IR professional services team will proactively monitor the solution for you and will receive email notifications when a potential incident is occurring against your organizations critical assets to trigger IR activity as per services contract.
Shortening the breach identification and investigation phase provides several benefits:
- Meet stringent data privacy compliance regulations, like GDPR
- Focus efforts on effective forensic analysis and remediation
- Limit breach exposure and the expenses related to handling breaches
The complexity of vendor risk management increases every day, as does its importance to organizations that rely on third parties. Regulators are increasing their focus on potential third-party risk. Risks assessments for business processes and vendor management are being integrated, mapped to organizational risks, and mined for patterns and trends. Some organizations are even extending vendor risk management to assess the vendors of vendors.
Assessing and monitoring vendors and third parties is an arduous task if conducted manually. A manual process of inputting data, assigning risk levels, and following up requires multiple employees dedicating numerous hours. A manual process also makes it difficult to ensure harmony between an organization’s policies, regulatory requirements and those of the vendor or supplier.
On the other hand, a robust governance, risk management, and compliance system like the Keylight Platform can help organizations identify, classify, monitor, and recommend risk mitigation to support business operations and regulatory requirements.
In this webinar, LockPath’s vendor risk management experts provide an overview of the challenges to efficient and effective vendor risk management, and they demonstrate how GRC can bring order to the chaos of vendor risk management.
We invite you to join Frost & Sullivan and our panel of experts as they discuss the growing threat of ransomware, and provide practical advice on raising your cybersecurity defences using a predictive cybersecurity approach to ransomware protection.
Panel of speakers
Charles Lim: Industry Principal - Cybersecurity Practice, Frost & Sullivan
Zhanwei Chan: Group Security Senior Product Manager, Dimension Data
Kevin Leahy: Senior Vice President, Data Centre, Dimension Data
Al Huger: VP Engineering - Security, Cisco
Fortinet's Enterprise Firewall is an industry leader in completeness of vision on how to protect your network from the edge to the core to the cloud. Attend this webinar to understand how the Fortinet Enterprise Firewall.
- Leverages FortiGate, FortiGuard, FortiManager and the recently released FortiOS 5.6 to provide the highest performing and most flexible protection of your network
- Is deployed by enterprises like the Pittsburgh Steelers to ensure the toughest defense against threats; and
- How and why the solution has been recognized as a leader by top analyst firms in the industry
Whether you are an individual or an organisation, it is useful to understand the inner workings of the cybercriminal world and to be aware of the threats targeting you, your money and your information.
One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.
Join the Counter Threat Units E-Crime lead Alex Tilley as he talks through the undergorund like never before.
This webinar will cover:
* Key findings from our visibility into criminal forums and technical monitoring of global criminal activity
* Cybercrime categories and the significant risk to individuals ad organisations
* The complexity of the criminal landscape and diverse capabilities of threat actors
* The continuation of online crime as a market economy
Many teams throughout the enterprise—security, network, IT operations—lack the insights needed to make confident, data-driven decisions. People cannot access the data they need quickly, resulting in waste, slow response times, and expensive incidents.
With the announcement of version 7.0, ExtraHop provides real-time and empirical data all teams can benefit from through complete visibility, faster incident resolution, and stronger security.
In this webinar, we will cover the new ways we are helping our customers reveal the shape and context of their digital enterprise by demonstrating:
• Live activity maps that allow for unprecedented visual environment exploration
• Automated anomaly workflows—including new security anomalies
• Scheduled reports that share real-time views of the information that matters most to each user
In today’s era of ‘Bring your own device’ (BYOD) mobility and ‘Internet of Things’ (IoT) devices proliferating networks as unknown or unmanaged connections, the cyberattack surface for most any organization continues to grow at an alarming rate. No longer can organizations rely on guarding their perimeter and trusting they know everyone and everything that is accessing their network. Proactive threat prevention in today’s BYOD and IoT era requires continuous network access visibility and intelligence as well as being able to automatically apply context-aware security policies such as segmenting devices and users without having to re-build networks or knowing the devices upfront.
Webinar topics include:
- Network security trends and challenges, including the more destructive ransomware, cryptoransomware, wipers, etc.
- Risk prevention architecture considerations
- Best practices based on real world experiences
BAI will share some of its key learnings based on extensive experience implementing successful solutions that target attacks while creating more highly available, responsive, and automated networks. BAI is a team of Security Architects who have provided Automated Detection, Prevention, and Orchestration to protect Government Agencies, Higher Education and Fortune 1000 commercial accounts.
The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.
The December 31, 2017 deadline for protecting Controlled Unclassified Information (CUI) and complying with the NIST Special Publication 800-171 standard is fast approaching.
Join PKH Enterprises and TITUS for a discussion on strategies to help federal agencies and contractors meet the main CUI requirements as established by NIST 800-171 and DFARS 252.204-7012. These experts will provide an analysis of the most challenging compliance areas, and offer insights to help organizations prioritize their next steps.
Building a culture of cybersecurity is critical to every organization no matter the size. Join Aaron Cohen, Director of Cyber Security Services, to learn more about how to strengthen your organization’s cyber resiliency.
Register for this webinar to:
Hear about the biggest threats and challenges facing organizations
Learn about the stages of the attack lifecycle and how to prepare for each stage
Understand how to increase your resiliency and train your team
Learn why organizations must ensure they understand what personal data they hold and where it exists across the organization. In this session, we will discuss data-centric technologies like DLP and examine how they help organizations to find personal data and understand risk.
This is the first in a two-part series on governance, risk and automation.
In Part I, we will explore concepts central to IT governance and risk. The presenters will use a conversational style to describe IT governance, how it works, and then go deeper into one central aspect, risk.
Part II will build on the foundation presented in part one and describe how these issues are managed in an automated solution.
Join our guest, Dr. Ted Marra as he introduces his new strategic leadership course in Global Risk Academy.
During the webinar we will cover:
How does a truly strategic organization think? What is strategic thinking versus strategic planning? What are the vital few factors that will determine your organisation’s long-term success or failure and are they on your radar screen?
Who should attend.
People with 10 years management experience minimum up to and including C-Level in all disciplines responsible for strategic decisions or large scale operational issues - so they have large budget and many people reporting to them.
Managers and senior management from all areas of the organisation having responsibility for planning and achievement of key business objectives.
Why you should attend.
- Reflect on how you got where you are as an organisation;
- What factors were critical to your success? What factors were the basis for your success?
- What held you back – prevented you from being even more successful?
- What could you have done differently
Understand what are the most critical factors that will better ensure your organisation is a “winner” in the future (e.g., next 3-5 years).
Find out which ones you may be missing and what to do about it before it’s too late and you become just an “average or good” organisation when, with a little effort and the right strategic thinking and creativity, you could take the organisation to the next level of performance and move toward “greatness”.
How to build exceptional stakeholder relationships and why doing this is critical in especially in turbulent times.
Enterprises are seeking ways to reduce the scope and complexity of securing their Network’s Edge. Data breaches can cost companies millions of dollars in reduced revenue, shareholder value, fines, and diminished brand loyalty.
IT managers concerned about their connected-network systems have turned to Parallel Networking to create application-specific networks to protect cardholder data while enabling customer engagement and improving operations.
Parallel Networking enables organizations with hundreds or thousands of distributed locations to enhance security and PCI Compliance at the Network’s Edge.
Join Cradlepoint for a webinar to learn about the benefits of Parallel Networking, real customer success examples, and best practices for greater security at the Elastic EdgeSM.
Join Jack Hamm and Simon Gibson from the Gigamon SecOps as they demonstrate how to use automation and visibility to take the boredom out of repetitive tasks. One of the featured use case will be how to automate tasks to find and block Kaspersky in government organizations.
Security practitioners use a variety of tools and information sources to spot potential threats, evaluate each event and then act to mitigate. They are challenged by little interoperability between security tools, plus the cost of these tools across the network and cloud can be prohibitive.
During this lively webinar, hosted by Security Solutions leader, Graham Melville, you will see how Gigamon and the Phantom security automation and orchestration platform can help you reduce mean time to resolution. The team will show how you can provide wider visibility and automate the tasks your security staff repeats on a frequent basis.
Simon and Jack will demonstrate:
•How to generate indicators of compromise to trigger Phantom to execute customized playbooks with specific actions.
•How to automate tasks to find and block the use of Kaspersky in government organizations.
•How to streamline dozens of sources to gain insight into security events.
•How to gain visibility to the necessary traffic from all segments of your networks without buying more security tools.
•How you can reduce the load and turn on more features on your security tools such as Next Gen Firewalls.
Alongside an expanding attack surface resulting from the growth of cloud, mobile and IoT, organizations are now increasingly faced by internal threats. Insider threats, compromised accounts, administrator abuse and other user-based threats are some of the most damaging vulnerabilities and the hardest to detect. This has led to the evolution of user and entity-based analytics (UEBA) solutions, designed to address user based threats, and through the use of artificial intelligence (AI) and machine learning these solutions are advancing threat detection capabilities in modern security operation centers.
In this webinar, Mark Settle, LogRhythm Product Marketing Manager, and Samir Jain, Senior Product Manager, UEBA, will discuss the evolving UEBA market, and advancements in the technology fueling these solutions.
Webinar attendees will learn:
•How advancements in AI and machine learning technology are enabling security analytics and in particular UEBA.
•Why security analytics solutions are moving to cloud infrastructure, and the security implications compared to on premise platforms.
•What security mature organizations are asking for versus what is being delivered
•Whether UEBA solutions are better delivered via security analytics/SIEM platforms, or via stand alone solutions
Large corporations aren’t the only targets for sophisticated advanced attacks. In fact, cyber criminals find that small and midsize enterprise (SME) companies are easier targets because their security is not as advanced and they don’t have proper cyber defenses.
FireEye SME customers are more prepared to defend their company’s digital assets. Join us for a live problem-solving webinar based on real-world examples from your peers and learn:
•What best practices will increase cyber awareness
•How to conduct a security assessment to identify gaps and a
•How to align security needs and reduce vulnerabilities
Register today to gain insights into SME cyber warfare and more effectively protect your business from advanced attacks.
Join Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
As today’s businesses come under attack from increasingly malicious cyber threats, a traditional “defense in depth” strategy may become insufficient to effectively fend off attackers and prevent business disruptions and downtime. As mobility, IoT, and BYOD open new attack vectors and attacks become more sophisticated, the situation only worsens. While 100% prevention is impossible, rapid identification and containment is not.
In this live webinar, TierPoint Director of Security Product Management, Brian Anderson will discuss why we need to redefine defense in depth approaches to safeguard data from emerging threats.
Join Brian as he shares insight into the following key considerations when developing a better, more comprehensive security strategy:
• The implications of the disappearing network edge.
• Why a traditional “defense in depth” approach, while still a good start, is no longer sufficient
• Keys to rapid identification and containment
• How visibility, detection, escalation, and automated response help close the loop
The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
1.How containers make it easy to migrate and move applications between clouds
2.What architectural considerations and tooling you need to achieve portability
3.How to ensure consistency of control, security, and compliance across container cloud deployments
Security operations center (SOC) teams are continually faced with new alerts and events. Security information and event management (SIEM) solutions such as Splunk help by making it easier to collect and analyze data generated by your technology infrastructure, security systems, and business applications. However, working with this volume of data risks SOCs being overloaded and rapidly available and readable information is vital to prioritize how you respond.
See how a pre-integrated solution between Recorded Future and Splunk gives you full context of emerging threats from the widest breadth of open, technical, and dark web sources. Join this webinar to:
• Alleviate alert fatigue and speed decision making with machine and human-analyzed threat context.
• Identify threats already in your system by correlating network traffic with known bad from outside your network.
• Get a live walkthrough of how to utilize real-time threat intelligence in Splunk Enterprise.
By now, the majority of us have likely been inundated with stories about third party data breaches and how one vendor’s vulnerability can cost your organization millions. But how do you know if you’re doing enough to stop third party risk?
As we enter 2018, new U.S. and European cyber regulations are going into effect, and organizations can no longer check the box when it comes to their vendors’ cybersecurity. You are not only liable for knowing where you are most at-risk, but now you must also understand how that risk affects your organization and identify a solution for mitigating that risk.
This webinar features guest speaker Nick Hayes, Senior Analyst at Forrester and LookingGlass VP of Intelligence Operations Eric Olson. They will delve into the third party risk landscape: our current state of affairs, and where the industry is moving, as well as how you can take a different approach to third party risk prevention, including:
• How to see where your vendors are already compromised
• The importance of actionable intelligence for real-time mitigation
• Why a continuous monitoring solution is the future of third party risk
With so many users and devices on the network at any given time, universities and colleges struggle to keep up with the demand for always-on connectivity. What can you do to optimize your network infrastructure to tackle these challenges?
Join our networking experts for a webinar that will discuss how Aruba solutions:
* Provide always-on connectivity with features including RF optimization and controller hitless failover
* Secure the network and identify risk with with IoT devices pre-authentication and user and entity behavior analytics (UEBA)
* Provide deeper and predictive network insights
* Address campus wired pain points with a unified wired AND wireless solution
Michael Dickman, VP of Global PLM Campus Networking
Peter Lane, Aruba WLAN PLM
Danny Jump, Aruba ClearPass PLM
Dan Comfort, Aruba Cloud PLM
You've heard about the many ways CloudCheckr can keep your cloud in check! Now you can see CloudCheckr in action, including demos of our 500+ Best Practice Checks, our Cost Savings Reports and Right Sizing tools, and our Security & Compliance features.
In this webinar, you can view and ask questions as Tim Twarog demonstrates popular features of this award-winning platform.
Introduced in 2016, the General Data Protection Regulation (2016/679)—or GDPR—was created for the purpose of strengthening the European Union’s (EU) procedures and practices related to data protection. GDPR will impact organisations worldwide and implement maximum fines of up to €20,000,000 (or 4% of global turnover) if they fail to ensure compliance. Join BitSight’s Philip East and Metro Bank’s Julian Parkin as they discuss:
- The checklist organisations should review to align their business with GDPR.
- Noteworthy articles within GDPR and how they affect data governance/usage.
- BitSight’s recommendations for monitoring the GDPR alignment of third parties.
The February 2018 deadline for complying with PCI DSS 3.2 is fast looming. Most of the new requirements in the latest PCI DSS guidelines are focused on the need to extend multi-factor authentication (MFA) to additional use cases and user groups within organisations who handle Credit Card Data. From February 2018 onwards, all individuals who access systems such as databases, network modules and email servers which hold credit card data will be required to authenticate themselves with MFA.
Join (ISC)² EMEA and Gemalto to learn:
- What’s new in PCI DSS 3.2
- How to effectively map PCI DSS MFA requirements to business use cases and user groups in your organisations
- Best practices for organisations that need to extend their MFA footprints to additional use cases, and for those that are starting to think about how to comply with PCI DSS’s authentication requirements.
The care and handling of personal information is a top concern for consumers and governments alike. Unlike many issues which gain public attention and struggle to keep it, an endless stream of publicised data breaches serves to keep data privacy in the public eye. As a result we’re seeing increasingly onerous regulation coming into effect in an effort to improve the data management practices of organisations and protect the confidential information of citizens. Major Internet players are also weighing in in an effort to make the user experience more secure.
For organisations with a large digital presence, identifying all the places that personal information, or in the case of GDPR, personally identifiable information, is collected can be a daunting task. Are those forms collecting data securely? Are they accompanied by compliant statements and controls? Research carried out by RiskIQ suggests that there is much more to do in this area.
Join us for a closer look at the security and compliance issues surrounding the collection of personal information on the Internet and learn how you can automatically discover and assess all forms and persistent cookies across your web presence.
With the greatest shake-up of data protection regulation in a generation looming, CISOs, DPOs and IT Administrators are busy planning for the changes needed for their organisations to be compliant. But with 60% of IT executives suggesting staff as their biggest threat to adherence (Bluesource, 2017) and 90% of staff admitting to violating policies designed to prevent security incidents (BSI, 2017), have they really addressed the issue of friendly fire?
In this live, informative and interactive webinar led by Amar Singh, Global CISO & CEO of Cyber Management Alliance. A panel of data security and policy experts will discuss, why staff remain such an active threat to GDPR compliance, why policies are being ignored and how to ensure that your staff are on-board with the GDPR before May 2018.
Amar Singh, Global CISO & CEO, Cyber Management Alliance
Chris Payne, Data Privacy Expert & Managing Director, Advanced Cyber Solutions
Dominic Saunders, CTO and Co-Founder, NETconsent
Joe Lee – UK and Ireland Commercial Manager, NETconsent
The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.
In this joint webinar with 451 Research, we will cover topics including:
-Building a multi-cloud security strategy for encryption and key management
-Best practices, benefits and pitfalls of managing your own security
-Impact of regulations on data protection in the next few years
-Understanding the different CSP requirements for key management:
oCustomer-Supplied Encryption Key (CSEK)
oBring Your Own Key (BYOK)
oHold Your own Key (HYOK)
oGeneral cloud service provider key management services overview
Brought to you by Entrust Datacard and IDG Research
As organizations expand on legacy infrastructures and build new digital business models, what is the role of trusted identity? This webinar will illustrate how trusted identity technologies — including authentication and PKI — are essential as organizations capitalize on the full potential of cloud and mobile technologies. We will also discuss how to avoid the pitfalls of misaligned identity strategies.