The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Realistic planning assumptions are an important element in a business continuity program. Why? They enable the planning team to identify the parameters they’re expecting to encounter following a disaster. They aren’t “pie-in-the-sky” wish lists but rather they’re the planner’s best guess about the conditions that will exist. Smart assumptions are usually unfavorable conditions, such as the lack of electric power or the unavailability of key people. Not-so-smart planning assumptions rely on best-case conditions that are probably not realistic.
Is your network ready for the increasing enterprise secure access needs to enable BYOD, Internet of Things (IoT), and beyond? The new Pulse Secure Appliance (PSA) Series will enable next generation security access services to support the continuous evolving networking complexities for mobile, cloud, and datacenter. Our new platform is faster, easier to scale, and more efficient than ever before.
Join us on Thursday, July 23 at 11:00 AM PDT for a webinar where you’ll learn how this new platform will change the dynamics of secure access for your company.
In this webinar you will learn about:
-Pulse Secure’s enabling solutions for mobile, cloud, and datacenter
-Next-Gen tools to address secure access challenges for today and tomorrow including the Pulse Secure Appliance Series, Pulse One and new support offerings
Considering moving to the cloud or already there and considering the best ways for how to secure it? Join this webinar for a panel discussion on what you as a customer are on the hook for when it comes to security in the cloud, how do you go about selecting a public cloud provider and what factors should be considered? Alert Logic's experts will be joined by guests as we dive into these questions and many more.
The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.
How to Align Identity Management and Access Control with Content and Collaboration
The impetuses for cloud app adoption are still in full force: greater accessibility, elastic licensing, reduced infrastructure and improved business agility, among others, are creating new and exciting ways to reduce IT costs and complexity and meanwhile improve productivity and profitability. While the benefits are clear, technology leadership are still apprehensive due to key considerations around security and access control. Business-critical information now lives outside the traditional corporate perimeter while IT has little visibility and control over the apps and devices being used. Technology leaders and end users alike are seeking simple and secure application access.
Join us in this session where we explore key trends, challenges and solutions from OneLogin and Dropbox, and how real estate management company Bigos Management has delivered secure and convenient access to their cloud applications to their workforce.In this session, you will learn:
- Why Identity and Access Management is important today
- How IAM fits into a broader cloud security program
- How IAM aligns with File Storage and Collaboration
- How Bigos Management has successfully leveraged OneLogin and Dropbox in their business
As corporate information technology infrastructure increases in size and complexity, corporations are recognizing the need for a better mechanism for assessing IT's role and alignment to the key corporate initiatives. What began as a series of best practices has evolved into the field known as IT governance.
IT governance is no longer just a theoretical concept, it is a fundamental business necessity, and an iterative process which requires senior management commitment over the long term in order to see results. By implementing a business risk approach to IT governance corporations can deliver immediate benefits to the entire organization.
Join Eric Kavanagh, the Bloor Group; Paul Quanrud, TCS; Keith Breidt, BAH; and Yo Delmar, MetricStream; for this educational session as they address some of the key concepts and challenges with IT governance. They will answer as many questions as we can fit in to the 45 minute Q&A, and will provide research materials for you to takeaway.
If you would like to attend please confirm your position below.
Cloud computing and DevOps are letting enterprises deploy new software faster than ever. But with development organizations focused on speed, are you achieving time to market at the expense of cyber security?
Run time application self-protection (RASP) is a new approach to application security that enables production applications to spot and block cyber attacks from within the application itself—without recompiling and without sacrificing performance. Join the webinar to learn:
How to enable new and legacy applications to protect themselves in as little as 10 minutes
The four situations where RASP is the best solution
Why Gartner says RASP is a must-have technology for bi-modal IT
When a popular product is launched, a high-stakes race begins between the offense and defense markets to find software vulnerabilities. More and more organizations are seeing that incenting security research with programs like bug bounties are an effective way to find vulnerabilities. Katie Moussouris, Chief Policy Officer of HackerOne, will reveal what the latest research shows and what it means for companies today.
About the presenter:
Katie Moussouris is the Chief Policy Officer for HackerOne, a platform provider for coordinated vulnerability response & structured bounty programs. She is a noted authority on vuln disclosure & advises lawmakers, customers, & researchers to legitimize & promote security research & help make the internet safer for everyone. Katie's earlier Microsoft work encompassed industry leading initiatives such as Microsoft's bounty programs & Microsoft Vulnerability Research. She is also a subject matter expert for the US National Body of the International Standards Organization (ISO) in vuln disclosure (29147), vuln handling processes (30111), and secure development (27034). Katie is a visiting scholar with MIT Sloan School, doing research on the vulnerability economy and exploit market. She is a New America Foundation Fellow. Katie is an ex-hacker, ex-Linux developer, and persistent disruptor. Follow her and HackerOne on Twitter http://twitter.com/k8em0 and http://twitter.com/hacker0x01
If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.
Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:
• Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
• Derive intelligent insights and meaningful data for fast corrective action
• Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
• Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation
Suffering a major breach is a near-certainty. Research from a variety of sources show that the average firm will suffer one major breach each year. The consequences of a major breach include loss of IP, availability, customer service, revenue and reputation. The fines for data protection non-compliance are set to soar under the upcoming GDPR and NISD regulations, with mandatory breach reporting due to be introduced from 2017. Responding to an incident quickly and effectively is a complex process, involving technical, communications & management staff.
In this webinar, FireEye and Pierre Audoin Consultants will reveal the results of a study of 200 decision makers in large companies in the UK, France and Germany, to understand their motivations and drivers with regard to Incident Response. The study looks at the extent to which firms are experiencing cyber breaches, and if so how organisations are prepared for this eventuality. As well as how firms cope with the skills shortage, and if they use technology and/or outsourced services to deliver Incident Response. Do firms seek to offset cyber breach risk, through a combination of IR planning and Cyber Risk insurance?
How confident are you that your business will bounce back and be resilient in case of a major outage? This can be even more challenging today with dispersed data centers that are a mix of physical, virtual, and cloud based.
Join Fernando as he explains how you can confidently meet IT business continuity compliance requirements, ensure business agility while maintaining existing IT investment, and predictably meet service level agreements (SLAs) at all times.
Ensuring Business continuity and managing risks is becoming more and more crucial for companies heavily relying on technical infrastructure to run their business such as CRM, ERP, CMS, accounting, big data and more.
Todays's economy cannot be conceived without the use of such systems, more and more connected and presumably accessible from everywhere.
Data is now the key asset of any company, and needs to be protected the same way as everyone protects their assets.
But the reality is far from this. So many companies are "saving" money by using non-redundant infrastructures, networks or servers, and often have to experience the worst scenario to start digging into Disaster Recovery, but it's already too late.
So join Eric Sansonny as he looks at Disaster Recovery as a Service and Cloud Backups to see if the solution lies there.
At the heart of any effective risk process are two common qualities of strong team work and open communication. This, supported by strong action and solution orientation enable the Risk Management function to carry out its mandate effectively. Risk Champions are central to this, and used well, they become the glue that can hold risk activities together.
Fully secure your network by learning how to protect against cybersecurity’s weakest link: humans. 95% of all attacks on networks were the result of “spear phishing”: attempts to steal data by masquerading as a trustworthy entity. They send an email from the “CEO” or “building manager" but once you click… it’s GAME OVER!
We will cover:
•How a phishing attack happens
•Stories from real life attacks and the lessons learned from them
•Steps you can take to protect your company
With major data breaches on the rise, it’s hard to deny that they've become a common occurrence in the security threat landscape. Large companies such as Target, Nieman Marcus and Sony (among others), have suffered major data breaches in the past year.
As security professional, it is important to understand why and how these organizations were breached so you can learn from what was done right, what worked and what didn’t.
In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, will discuss lessons learned from recent breaches. By analyzing the available information about recent data breach incidents from the perspective of detection, Smith and Ingleby have assembled a list of security monitoring lessons and ideas.
You’ll get tips on how to eliminate double false positives, a number of generalized monitoring scenarios and guidelines on how to monitor for new executables running for the first time on your environment.
Recent studies have shown that 50-70% of all attacks on information security are coming from within the organization, and often the length of time that the breach existed is unknown. There are many issues involved in closing the gaps that cause such insider incidents and strengthen the protection of data. Using the "need to know" principal, organizations can limit who has access to data. Controls that adjust given access rights to actual needs exist and should be utilized. This session will focus on how to adjust data access rights, implementing the "least privilege principal", and the use of detective and proactive risk-oriented controls.
The risk of experiencing a security breach is now higher than ever. Over the last 12 months, some of the highest profile companies have been compromised including Anthem, Sony, Home Depot, JPMorgan Chase, Target and more.
2015 is turning out to be no different. Clearly no organization is immune to a breach and human error continues to play a primary role.
This webcast will address:
- Key trends and traits common to high profile security breaches
- Critical takeaways and lessons learned for a comprehensive security strategy
- Best practices to reduce the risk of a security breach
By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.
AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
How AlienVault USM detects communications with the command and control server
How the behavior is correlated with other signs of trouble to alert you of the threat
Immediate steps you need to take to stop the threat and limit the damage
No complexo ambiente de negócios de hoje, a sua organização se depara com dificuldades de segurança cada vez maiores e exigências legais que fazem com que seja essencial controlar e monitorar seus usuários privilegiados.
O gerenciamento senhas de contas privilegiadas é um ponto de partida para proteger o seu ambiente de TI, mas ainda há muito a ser feito.
Nesta sessão, descubra como o CA Privileged Identity Manager pode ajudar sua organização a gerenciar identidades privilegiadas (PIM) e controlar de maneira completa seus usuários privilegiados a fim de reduzir o risco de falhas de conformidade ou de violações de segurança com alto custo.
Cybersecurity is a top concern for IT professionals. Gartner expert Lawrence Orans leads an important discussion of the current cybersecurity landscape. He analyzes recent cybersecurity events, emerging threats, and how new technologies are affecting the security calculus.