Hi [[ session.user.profile.firstName ]]

IT Security

  • Get Enterprise Provisioning Right Finally
    Get Enterprise Provisioning Right Finally
    Alex Binotto - Sr. Product Manager, One Identity Recorded: Apr 25 2019 46 mins
    Discover how to take the risk out of enterprise identity and access management by managing the challenges of distributed applications and an ever-changing workforce.

    This webinar discusses what to look for in an IAM / IAG solution, and shows best practice examples of:

    - How to react to business changes within the user lifecycle
    - How to ensure people's permissions and access are appropriate to the business function they perform
  • Advanced Threat Mitigation | Solving the Major Enterprise Challenges
    Advanced Threat Mitigation | Solving the Major Enterprise Challenges
    Jibril Hassan | Executive Pre-Sales Manager | Kaspersky Lab Recorded: Apr 25 2019 47 mins
    KTMD - A Corporate Cybersecurity Strategy to meet digital disruption challenges

    Join our technical team in our first session to explore the dedicated features that gives Kaspersky Threat Management and Defense an edge.
    Learn:
    - how KTMD exposes advanced attacks with precision machine learning and behavioral analytics, plus how it minimizes false positives to help ensure high levels of productivity for security teams, powered by the Kaspersky Security Network (KSN).
    - discover what the Threats Landscape actually looks like
    - what challenges Enterprises have today and explore how to mitigate against Advanced Threats whilst protecting against Complex Threats

    At the end of the session you'll learn how to effectively PREVENT the threats, Rapidly DETECT the breach and RESPOND to incidents with our Multi-dimensional Advanced Threat Detection with Machine Learning.
  • Cybersecurity in Financial Services: No one can afford a cyber attack
    Cybersecurity in Financial Services: No one can afford a cyber attack
    Dan Pitman, Principal Security Architect Recorded: Apr 25 2019 53 mins
    Financial organisations fall victim to cyber-attacks more frequently than any other industries. The growth in volume and sophistication of cyber-threats, combined with regulatory changes, mean that financial institutions are having to improve their IT security postures notably.

    Facing modern cyber-threats head-on requires organisations to follow well-defined processes and mature IT security tools that need to be closely monitored and managed. Additionally, financial businesses handle highly confidential data that must be stored in a compliant manner and managed securely. A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives financial organisations the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman, to learn more about this more effective approach to cybersecurity and threat management in the financial world.

    Highlights Include:
    • The state of cybersecurity at financial institutions
    • Integrating security and compliance within Financial Services
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment
  • The changing face of Privileged Access Management
    The changing face of Privileged Access Management
    Tyler Reese, One Identity Recorded: Apr 25 2019 41 mins
    Discover how a next-generation PAM solution can help your organisation address common challenges such as:

    - How to secure solutions that protect privileged accounts
    - How to satisfy both auditors and admins with frictionless security
    - How to leverage the cloud without sacrificing security
  • Live Demo: Email Fraud Defense
    Live Demo: Email Fraud Defense
    Ash Valeski, Director Product Management, Proofpoint Recorded: Apr 25 2019 30 mins
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Taking the Oh out of IoT
    Taking the Oh out of IoT
    Richard Leadbetter, Technical Sales Specialist, EMEA Recorded: Apr 25 2019 39 mins
    By 2019, 92% of industrial organizations will have adopted Internet of Things (IoT) technology and 77% believe it will transform manufacturing. But, how are business executives using IoT today and what do they expect from it in the future? Join us and find out
  • SonicWall Secure SD-WAN und vollautomatische Implementierung
    SonicWall Secure SD-WAN und vollautomatische Implementierung
    On-Demand Video Recorded: Apr 25 2019 3 mins
    Mit der einfachen, vollautomatischen Implementierung nutzt SonicWall Secure SD-WAN einen Low-Cost-Internetzugriff, um Remote-Standorte miteinander zu verbinden. Dies ermöglicht Einsparungen von bis zu 60 Prozent im Vergleich zu veralteten WAN-Technologien wie MPLS oder Frame-Relay.
  • SonicWall Secure SD-WAN e Zero-Touch Deployment
    SonicWall Secure SD-WAN e Zero-Touch Deployment
    On-Demand Video Recorded: Apr 25 2019 3 mins
    Con una semplice implementazione zero-touch, SonicWall Secure SD-WAN utilizza l'accesso Internet a basso costo per connettere le sedi remote e consente di risparmiare fino al 60% rispetto a tecnologie WAN tradizionali come MPLS o frame relay
  • SonicWall Secure SD-WAN et Zero-Touch Deployment
    SonicWall Secure SD-WAN et Zero-Touch Deployment
    On-Demand Video Recorded: Apr 25 2019 3 mins
    Grâce à la simplicité du déploiement sans intervention, SonicWall Secure SD-WAN utilise un accès Internet peu onéreux pour la connexion des sites distants et permet d'économiser jusqu'à 60 % par rapport aux technologies WAN existantes comme le MPLS ou le relais de trames.
  • SonicWall Secure SD-WAN and Zero-Touch Deployment
    SonicWall Secure SD-WAN and Zero-Touch Deployment
    On-Demand Video Recorded: Apr 25 2019 3 mins
    With Simple, Zero-Touch deployment, SonicWall Secure SD-WAN uses low-cost Internet access to connect remote locations, and saves up to 60%, compared to legacy WAN technologies like MPLS or frame relay
  • 「ゼロトラスト」のホントのところ~騙される前に全容を知っておく~
    「ゼロトラスト」のホントのところ~騙される前に全容を知っておく~
    髙岡 隆佳, エバンジェリスト 株式会社シマンテック Recorded: Apr 25 2019 56 mins
    騙される前に全容を理解しておこ

    最近よく耳にする「ゼロトラスト」。トラスト(信用)=0(存在しない)、では一体何を信じればいいのでしょう?信用のない前提のセキュリティとは?ユーザ側の混乱を無視し、セキュリティ業界はゼロトラスト推しで持論を展開しています。
    当ウェビナーでは、今ここでゼロトラストの歴史を振り返り、ゼロトラストの本来の意味やフレームワークを理解し、今なぜゼロトラストが必要なのかを解説します。ぜひご参加ください。
  • Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring
    Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring
    Anand Visvanathan, Director of Product Management, Symantec and Linda Park, Sr. Manager IaaS, Security & Compliance, Symantec Recorded: Apr 25 2019 45 mins
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:

    • Why traditional security monitoring tools cannot provide visibility into cloud compliance risks

    • Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks

    • How to migrate your legacy infrastructure to the cloud without compromising security and compliance

    Please Join Us, Register Today
  • Protect Financial Customers From Fraud and Fakes
    Protect Financial Customers From Fraud and Fakes
    Zack Allen, Director of Threat Operations, ZeroFOX and Ryan Trost, Chief Technology Officer, ThreatQuotient Recorded: Apr 24 2019 41 mins
    How to identify and mitigate social media and digital risk

    Financial service organizations have a massive footprint and attack surface on social media & external digital platforms — all of which is ungoverned, unmonitored and unprotected by the existing security perimeter. Understanding the threats on these platforms is critical, from financial fraud, phishing and malware spread on social media, customer scams, impersonating accounts and mobile apps, and more. Join ZeroFOX and ThreatQuotient to learn the top risks facing financial institutions on social and digital channels and key tactics for addressing those risks.

    Key Takeaways:

    -Understand top trends and threats facing financial institutions on social and digital channels
    -Gain knowledge of key tactics for addressing social and digital threats
    -Learn about the tools available to your organization for mitigating risk
  • See What Phishing Threats You’re Missing--Live Demo
    See What Phishing Threats You’re Missing--Live Demo
    Mark McDaniel, Senior Director of Technical Services at SlashNext, Inc. Recorded: Apr 24 2019 29 mins
    SlashNext Real-Time Phishing Threat Intelligence Live Demo

    Threat intelligence that covers new types of phishing threats is essential for understanding and defending against previously unknown zero-hour threats.

    During this 30-minute demo you’ll see:

    Slashnext’s behavioral analysis approach that leverages our Session Emulation and Environment Reconnaissance™ (SEER) threat detection technology.

    Real-time threat intelligence covering five major phishing categories: credential stealing, scareware, rogue software, phishing exploits, social engineering scams, phishing callback C2s

    Real-Time Phishing Threat Intelligence that is more automated by evaluating many more characteristics of the site, so it’s able to render a definitive verdict, malicious or benign.

    A continuously updated list of zero-hour phishing URLs, Domains, IPs that can be used for blocking purposes
  • How to Enable Secure Access to Cloud Apps with DNS Visibility and Single Sign on
    How to Enable Secure Access to Cloud Apps with DNS Visibility and Single Sign on
    Omar Zarabi - CEO and founder of Port53 Technologies, Nathan Chan - Sr SE at OneLogin Recorded: Apr 24 2019 39 mins
    Companies are moving to the cloud to compete more effectively and employees are using an increasing number of SaaS cloud applications. Unfortunately, these apps come with hidden risks and vulnerabilities when IT is not involved in securing and managing them. This issue is known as Shadow IT.

    The good news is that, as serious as the Shadow IT is, it’s a solvable problem. By joining this webinar, you will learn:
    - Measure the scope and risk of the Shadow IT within your business
    - Gain back full control of your cybersecurity
    - Bring visibility into corporate cloud application usage
    - Get data driven recommendations no matter if your IT team is big or small

    We will be showing a live demo of Cloud Risk Assessment Tool and walk you through a real customer case study.

    So, join our two cloud security experts, Omar Zarabi CEO & Founder of Port53 Technologies, and Nathan Chan Sr SE at OneLogin on April 24th 10am PT for this webinar.

    Can’t make it to the webinar? Register anyway, and we’ll send you a link to the on-demand recording once available.
  • IT Security Community Update
    IT Security Community Update
    Wesley Simpson, (ISC)²; Christopher Pierson, BLACKCLOAK & Marija Atanasova, BrightTALK Recorded: Apr 24 2019 63 mins
    Find out what's trending in BrightTALK's IT Security community and the challenges keeping security professionals up at night.

    Join Wesley Simpson, COO of (ISC)², Dr. Christopher Pierson, Founder & CEO of BLACKCLOAK and Marija Atanasova, Sr. Content Strategist from BrightTALK for an interactive Q&A session to learn more about:
    - Topic trends & key insights
    - What security professionals care about
    - Events in the community
    - What to expect in Q2 2019 and beyond
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Brandon Cooper, Sales Support Engineer Recorded: Apr 24 2019 25 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
  • Fight the good fight against the bad bots!
    Fight the good fight against the bad bots!
    Brian McHenry and Graham Alderson Recorded: Apr 24 2019 35 mins
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:
    - How bots infect, propagate, and attack applications
    - What types of application attacks are commonly performed by bots
    - How you can defend against bad bots without disrupting the good ones
  • Strategic Cybersecurity Transformation: Why Now, Why People-Centric
    Strategic Cybersecurity Transformation: Why Now, Why People-Centric
    Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint Recorded: Apr 24 2019 66 mins
    Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?

    Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.

    You'll learn:
    · How business transformation like the rise of Office 365 has driven cybersecurity transformation
    · Why you should pivot your transformation around people and culture, rather than infrastructure
    · 6 principles for successful cybersecurity transformation
  • Why Container Security Has Become a Top Challenge for Enterprises
    Why Container Security Has Become a Top Challenge for Enterprises
    Rani Osnat, Aqua Security and Mark Bouchard, CyberEdge Recorded: Apr 24 2019 53 mins
    A joint presentation by Aqua Security and CyberEdge

    Based on findings published in CyberEdge’s 6th annual 2019 Cyberthreat Defense Report*, containers are highlighted as one of this year’s “weakest links” in IT security given the lowest overall security posture score.

    Mostly this can be attributed to the challenges enterprises face as they transition their containerized applications from the Dev/Test environment into production. Containers require a new approach to security as the traditional security infrastructure is not applicable to cloud native and serverless deployments. Rather they must leverage the cloud-native principles of immutability, microservices and portability using machine-learned behavioral whitelisting, integrity controls and nano-segmentation.

    We will discuss :
    •Key findings from the 2019 Cyberthreat Defense Report
    •The unique security challenges (and benefits) of containers
    •What leading enterprises are doing to automate their container security
    •What you should look for in a container security solution
  • Emerging Threats in Your Call Center- Chatbots, Synthetic Voice and Leaky IVRs
    Emerging Threats in Your Call Center- Chatbots, Synthetic Voice and Leaky IVRs
    Elie Khoury, Principal Research Scientist and Manager, Ph.D Recorded: Apr 24 2019 20 mins
    AI presents exciting but uncharted territory. And as AI forges its way into organizations’ voice interface, like any disruptive technology, benefits for your organization exist alongside new opportunities for criminals to use this technology against you and your customer:.

    This webinar will explore potential pitfalls to your voice channels such as :

    - Synthetic voice -- the arrival of synthetic voice introduces a whole new realm of fraud possibilities and ethical debates
    - Chatbots and the new hacks fraudsters use to attack this channel
    - The leaky IVR and the newest brute force attack trends you may be overlooking
  • Comparing Private LTE vs. WiFi as a Wireless LAN
    Comparing Private LTE vs. WiFi as a Wireless LAN
    Cradlepoint’s Roger Billings, Chief Architect, and Matt Thueson, Solutions Engineer Recorded: Apr 24 2019 58 mins
    Wireless LAN isn’t just for offices and coffee shops. Today, IoT is everywhere, making the mobility and flexibility of wireless crucial even across large, sprawling areas such as warehouses, mines, airports, manufacturing facilities, hospitals, and even entire cities.

    The need for large-scale wireless LAN is immense, but the ability of WiFi to meet that need is limited. Many organizations are instead deploying Private LTE, which can use a range of spectrums — including CBRS — to reduce congestion, enhance traffic flow, improve information security, and dramatically drive down costs.

    In a live webinar on April 24, Cradlepoint’s Roger Billings, chief architect, and Matt Thueson, solutions engineer, will explore the benefits of Private LTE vs. WiFi for wireless LAN, and the potential ramifications within various commercial and public sector use cases.
  • Understanding the Importance of Trust
    Understanding the Importance of Trust
    Duncan Brown, Dr. Margaret Cunningham & Dr. Richard Ford Recorded: Apr 24 2019 40 mins
    Trust forms the foundations of any relationship. For businesses, trust provides a platform for building strategic partnerships, establishing a reputation, and embracing innovation and change. But large-scale data breaches and privacy abuses are undermining trust - 63% of senior executives at large enterprises say that trust has eroded over the past two years*.

    What can be done to reverse this trend? In this webcast, our panel discuss:

    - The factors and relationships that influence trust.
    - How to foster a culture of trust within the organization.
    - How technology can play a part in facilitating trust.

    Watch this webcast and learn how you can help your organization become a trust leader.

    Our Panel:
    Duncan Brown, Sr. Director Security Strategist, Forcepoint
    Dr. Margaret Cunningham, Principal Research Scientist for Human Behavior, Forcepoint X-Labs
    Dr. Richard Ford, Chief Scientist, Forcepoint

    *Cultivating Trust To Gain Competitive Advantage, by Harvard Business Review Analytic Services, March 2019
  • Solutions that Hit the Bullseye
    Solutions that Hit the Bullseye
    Jeff Merck, NetApp Sr Account Executive & John Lavelle, Palo Alto District Manager Public Cloud Security Sales Recorded: Apr 24 2019 59 mins
    Join us to hear how NetApp and Palo Alto Networks can securely accelerate your cloud deployment with advanced security for workloads, infrastructure, hosts, apps and data.
  • Four Steps to Transform Your IT Monitoring Mission
    Four Steps to Transform Your IT Monitoring Mission
    Andi Mann, Chief Technology Advocate, Splunk, Inc. and Pankaj Prasad, Sr Principal Analyst, Gartner Recorded: Apr 24 2019 75 mins
    IT Ops teams are now critical to an organization’s success and require a strategy that aligns with the organization’s objectives and its external stakeholders. Most infrastructure monitoring solutions haven’t caught up to meet these new requirements, forcing IT teams to resort to traditional monitoring strategies that don’t allow for innovation and growth.

    Join Gartner analyst Pankaj Prasad and Splunk’s Chief Technology Advocate, Andi Mann, as we discuss new trends in IT monitoring strategy, best practices, and new IT models to implement in your organization.

    Here’s what you’ll learn:
    •How to effectively approach your IT monitoring strategy in this new world of IT
    •Build a successful IT infrastructure operating model to get to market faster, innovate, and respond in real-time
    •Best practices for integrating LOB owners, application developers and external stakeholders into your strategy
  • New Attack Vectors: How Threats Have Changed and How to Combat Them
    New Attack Vectors: How Threats Have Changed and How to Combat Them
    Tom McNash, Senior Solutions Engineer, Cyren Apr 25 2019 2:00 pm UTC 60 mins
    In this webinar, Senior Solutions Engineer Tom McNash will review how new threat attack vectors are working, how cyber criminals are building threats in new ways today—whether for malware, phishing or denial-of-service attacks--and what security approach businesses need to be adapting to defend against these attacks. He will also explain how the profile of attackers targeting businesses is changing, and how one traditional form of defence against sophisticated attacks—the appliance sandbox—has itself become the object of attacks.
  • DigiCert Monthly Threat Briefing - April 2019
    DigiCert Monthly Threat Briefing - April 2019
    Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Apr 25 2019 3:00 pm UTC 60 mins
    Stay updated on April 2019’s news regarding the trends and threats in digital certificates including TLS, SSL and code signing, plus PKI, IoT, encryption, identity and trust.

    This month's briefing covers EV Extended Validation and OV Organization Validated certificates, Tumblr, HTTPS, eCommerce, code-signed malware-infected software updates, ACME and the IETF, US Senate bills Corporate Executive Accountability Act and Cyber Resiliency Act, the Weather Channel's ransomware attack, GDPR compliance, blockchain, cryptocurrency, Ethereum, weak passwords, weak private keys, AES, PQC post quantum cryptography, QKD quantum key distribution, IE Internet Explorer, zero day vulnerability with MHT files, Apache and nginx web servers, a suspicious uninvited Chinese guest at Mar-a-Lago, hacked Wi-Fi, Starz vs TorrentFreak, APT34 and OilRig, the Read My Lips and Lab Dookhtegan channel on Telegram, CryptoPokemon ransomware decrypter, charities, and free internet security training for citizens in Aurora, Illinois.
  • Transforming creative workflows: Making great content in the cloud
    Transforming creative workflows: Making great content in the cloud
    IBC365 | Jellyfish Pictures | LCTV | TechXMedia Apr 25 2019 3:00 pm UTC 75 mins
    Join IBC365 on Thursday 25 April at 4pm BST to explore why creators are turning to cloud to transform the way they make great content and how virtualised workflows are unlocking the ability to work in new ways: faster, more collaborative, more efficient and more creative.

    This webinar goes inside some of the world's leading content creators, production and post-production operations to hear how they are embracing cloud technology to transform the creative processes used to make, produce and deliver video.

    We'll get hands-on with practical lessons on how cloud is enabling more collaboration, access to more talent, round-the-clock working, more content security, and slicker workflows. There's also a dose of reality, as we understand the human and technology challenges and the potential pitfalls of virtualising creative workflows.

    Case studies focus on using cloud for:
    •Streamlining content creation in the field
    •Transforming production and post-production processes
    •Efficient content delivery and backhaul
  • [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEA Apr 25 2019 3:00 pm UTC 60 mins
    As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.

    So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.

    From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.

    Moderator: Daniel Blander, Virtual Clarity
    Panelists:
    Joseph Feiman, Chief Strategy Officer, WhiteHat Security
    Paul Farrington, CTO, Veracode EMEA
  • Top Cybersecurity Practices (HICP) to Mitigate Cyber Threats in Healthcare
    Top Cybersecurity Practices (HICP) to Mitigate Cyber Threats in Healthcare
    Erik Decker, CISO & CPO, University of Chicago Medicine & Ellen Sundra, VP of Engineering at Forescout Apr 25 2019 3:00 pm UTC 60 mins
    Join Erik Decker, Chief Information Security Officer and Chief Privacy Officer of the University of Chicago Medicine and Ellen Sundra, VP of Engineering at Forescout, to learn how to protect patients by applying the recommended principles and practices from Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP).

    Over the past decade, threats to the health care industry has increased dramatically along with the sophistication of cyber-attacks. As a result, the Healthcare Sector Coordinating Council and the US Department of Health and Human Services collaborated to establish cybersecurity practices that can be used across the healthcare industry. Our guest, Erik Decker, serves as the industry lead on the development of, “Health Industry Cybersecurity Practices (HICP)”, which resulted from insights of the task group and over 150 health IT professionals.

    Ellen Sundra leads this discussion to gain insights into actionable steps that health industry IT and HTM security professionals can establish, implement and maintain in their organizations to thwart cyber-attacks before they occur.

    What you will learn in this webinar:
    - How to reduce risk to the business by implementing solid security practices
    - Which are top security practices to consider when facing some of healthcare’s top issues
    - How using policy-based controls can simplify processes and protect the organization
  • How to Classify and Protect Your Data in One Easy Step
    How to Classify and Protect Your Data in One Easy Step
    Bill Belcher, Amit Kharat, Kristina Scott Apr 25 2019 3:00 pm UTC 45 mins
    Recent innovations have made data security achievable for organizations of all sizes and industries. It’s now possible to quickly and effectively reduce the risk of data breaches and leaks.
    Get up to speed with the 5 innovations every Security and IT professional should be aware of – to gain the confidence that their organization’s most sensitive information stays secure, these include:

    1. Classification-driven protection
    2. DLP-driven protection
    3. Email auto-protection
    4. Automated protection with enterprise applications
    5. Orchestrated policy management, identity federation, and data tracking for compliance

    Join this webinar to learn how integrated data classification and data protection from two industry leaders, Boldon James and Seclore, makes data security as straightforward as 1-2-3.
  • Cherwell-Everbridge Integrated Solution to Restore IT Services Faster Than Ever
    Cherwell-Everbridge Integrated Solution to Restore IT Services Faster Than Ever
    Vincent Geffray, Sr. Director, Product Marketing, Everbridge; Chuck Darst, Sr. Product Marketing Manager, Cherwell Software Apr 25 2019 3:00 pm UTC 60 mins
    IT incidents happen all the time, from outages, application slowdowns to cyber-attacks and some more critical than others. For IT incidents which require immediate attention, IT experts must be engaged in a timely manner and different groups need to be informed and/or updated. The challenge most organizations are facing is around the coordination of IT incident response when time is of essence. For instance, how to:
    - Aggregate and manage all the relevant information centrally
    - Identify the appropriate information share with different roles
    - Ensure timely and effective response across teams
    - Enable efficient collaboration regardless of people's location

    In this webinar, Chuck Darst from Cherwell and Vincent Geffray from Everbridge will explain how the integrated Cherwell-Everbridge solution helps organizations manage, control and automate their response to IT incidents to minimize the impact on their IT professionals and on their business.
  • Email Security.cloud: A walkthrough of the latest product enhancements
    Email Security.cloud: A walkthrough of the latest product enhancements
    Jimmy Lin, Sr. Product Manager, Symantec Apr 25 2019 3:00 pm UTC 60 mins
    On 29 March 2019, we further extended the capabilities of Symantec Email Security.cloud. As a SaaS security service, it undergoes many upgrades throughout the year, allowing us to make improvements and add new capabilities. We have always understood the importance of ensuring our products are designed around the user’s needs. This is critical as our customers rely on Symantec to provide a highly practical solution.

    In this webinar, we’ll do a deep dive into some of the recent enhancements of our Email Security.cloud solution:

    Indicators of Compromise Blacklisting
    Service Configuration Health
    Symantec Email Security.cloud App for QRadar
    And more
  • Playing to Your CyberStrengths: Overcome complexity by evaluating expertise
    Playing to Your CyberStrengths: Overcome complexity by evaluating expertise
    Rob Cataldo Vice President of Enterprise Sales USA, Kaspersky Lab; Chris Sherman Senior analyst serving security, Forrester Apr 25 2019 3:30 pm UTC 75 mins
    To get ahead of endpoint cyberthreat complexity and protect their organizations, enterprise security and risk professionals must prioritize threat prevention and detection technologies that don’t require constant maintenance and overly manual workflows. In this webinar, attendees will learn how to identify the right combination of automatic and manual technologies commensurate with their security team’s level of expertise. This will put them in the best position to combat modern threats while also decreasing the amount of friction within their own security organization.
  • IA para la ciberdefensa: La maquina contraataca
    IA para la ciberdefensa: La maquina contraataca
    Eloy Avila, CTO Americas Darktrace; Gerald M. Segura Zúñiga, Gerente de Seguridad Informática, Banco Davivienda Costa Rica Apr 25 2019 3:30 pm UTC 30 mins
    Los ciberataques se han convertido en el riesgo más grande que enfrentan las empresas de hoy, las ciudades inteligentes y la infraestructura crítica. Con un total de perdidas proyectado en un trillón de dólares en el 2019, debido al cibercrimen. En el centro de esta crisis esta el enfoque tradicional para la ciberdefensa, el cual se basa en reglas y firmas para detectar amenazas ya conocidas en un momento donde los cibercriminales lanzan ataques nunca vistas diario.

    Para ponerse al día con un ambiente en evolución, Darktrace emplea un enfoque fundamentalmente distinto: basado en la inteligencia artificial. Impulsado por los recientes avances en inteligencia artificial. En lugar de predefinir las amenazas cibernéticas basadas en ataques del pasado, el Enterprise Immune System aprende un "patrón de vida" único para cada usuario, dispositivo y red que resguarda. Con esta compresión del “yo,” Darktrace puede detectar de manera sutil comportamiento anómalo e indicativo para amenazas conocidas y desconocidas, dándole la capacidad a los defensores de al fin poder luchar contra los adversarios en línea.

    En este webinar, aprenderás:
    -Donde los ciberdelincuentes han encontrado debilidades en los enfoques tradicionales de la seguridad.
    -Por qué solo las herramientas de seguridad de autoaprendizaje pueden detener los ataques nunca vistos
    -Cómo proteger su red de ataques de velocidad de máquina con Darktrace Antigena
    - Lo que 100% de visibilidad puede revelar en su infraestructura digital, sobre vulnerabilidades latentes a los cuales atacantes avanzados están apuntando el día de hoy
  • Managing Colo to Cloud and Beyond in the TierPoint Portal
    Managing Colo to Cloud and Beyond in the TierPoint Portal
    Dale Levesque, Director – Product Management | TierPoint Apr 25 2019 4:00 pm UTC 60 mins
    More organizations are adopting a hybrid approach to IT and are seeking a partner to help integrate both outsourced and in-house IT services, ideally managed through a single interface.

    Designed to meet the needs of our customers, the TierPoint Portal is a streamlined console that provides a comprehensive user-friendly dashboard of critical information immediately upon logging in.

    From data center and managed services performance dashboards to trouble ticketing support, the TierPoint Portal is your dependable, always-on visibility tool to help manage your TierPoint IT infrastructure environment.

    Join us to learn how the TierPoint Portal makes it easy to view, protect and access management tools for all facets of your environment.
  • Optimize Your Third-Party Protection Program
    Optimize Your Third-Party Protection Program
    Bob Maley, Normshield; Tony Rock, Lockpath Apr 25 2019 4:00 pm UTC 60 mins
    Interaction between the financial industry and third-parties has become more complicated due to the combined risk of the financial industry's rapid growth and an increase in third-party relationships.

    In this exclusive webinar, Bob Maley, Chief Security Officer of Normshield, Inc., who designed information security programs from the ground up for major financial services organizations, will share his perspective of third-party risk in the financial services industry. He’ll discuss common financial third-party risk challenges and trends in the market, best practices and challenging scenarios from his career and how he resolved them.

    As an attendee you’ll learn how his real-world third-party risk examples, best practices and recommendations can apply to your organization’s unique needs. Discover how to build and mature a successful third-party risk program in financial services by attending this educational webinar.

    Register now!
  • It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    George Johnson, Vice President of Cyber Solutions, NC4 and Thanh Nguyen, Vice President of Technology, NC4 Apr 25 2019 4:00 pm UTC 43 mins
    We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?

    NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
  • Top 10 Application Security Vulnerabilities for Developers
    Top 10 Application Security Vulnerabilities for Developers
    Mark Rogan, DAST Manager, WhiteHat Security & Calvin Nguyen, Director of Product Management, WhiteHat Security Apr 25 2019 4:00 pm UTC 60 mins
    Today’s applications touch millions if not billions of people on a daily basis. With virtually every business using applications to grow, they are critical to companies’ success—yet the vulnerabilities and risks associated with them continue to increase exponentially.

    To help educate the market on avoiding breaches of this nature, the experts at the WhiteHat Security Threat Research Center (TRC) have compiled a Top 10 Application Security Vulnerabilities for Developers, detailing the most common web exploits used by malicious attackers during the past 12 months.

    Join Mark Rogan from the WhiteHat Security Threat Research Center and Calvin Nguyen, Director of Product Management, as they discuss the top vulnerabilities and give valuable prevention tips for enterprises to implement.
  • How to Get Hired for Top Cyber Security Job with No Degree – Part 2
    How to Get Hired for Top Cyber Security Job with No Degree – Part 2
    Dr. V. N. Berlin, CEO, Mission Critical Institute, Rob Chubbuck, Information Assurance Systems Engineer, CACI International Apr 25 2019 4:30 pm UTC 60 mins
    Hear from a top cyber security employer exactly how you can get hired for a cyber breach prevention job without a degree in this four-part webinar series.

    Let Rob Chubbuck, senior cyber security expert at CACI International, tell you how he decides to hire candidates without degrees to cyber security teams.

    This webinar series will take you inside the recruiting process and you will learn the answers to these questions:

    1. How big is the opportunity for cyber breach prevention?
    2. How fast is that opportunity growing?
    3. Why will he consider candidates without a degree?
    4. What skills does he look for in a candidate?
    5. What tools does he want a candidate to have experience using?
    6. What experience should a candidate have for him to consider without a degree?
    7. What personal characteristics are essential to him?
    8. What academic credentials does he want a candidate to have?
    9. What additional academic credentials does he want a candidate to earn?
    10. What certifications does he want a candidate to have?
    11. What additional certifications does he want a candidate to earn?
    12. What does he look for in a resume to schedule a phone screen?
    13. What must a candidate do in a phone screen to get the interview?
    14. What kinds of questions are asked in the interview?
    15. What answers does he look for?
    16. What professional development plans does he want candidates to have?

    This unique webinar series will tell you exactly what motivates an employer to hire a candidate without a degree into a top cyber breach prevention position.

    Seating is limited to 75, so register now to reserve your spot!

    ADDED WEBINAR BENEFITS: Register for the webinar and download the attachments to prepare for the interview. Download the CCRMP Career Readiness Assessment and schedule an interview with an MCI Cybersecurity Education Specialist to fast-track your cyber security career today.

    Also included are complimentary $500 CISSP Exam Vouchers and $1995 CISSP Exam Prep Course Vouchers.
  • OneLogin Accelerate Quarterly Partner Webinar - Spring Edition
    OneLogin Accelerate Quarterly Partner Webinar - Spring Edition
    Matt Hurley - VP of Channels and Alliances at OneLogin Apr 25 2019 5:00 pm UTC 30 mins
    This webinar is to give our partners quarterly updates about OneLogin Accelerate, partner program including active incentive programs, new sales plays and other program updates.
    Presenter : Matt Hurley - VP of Channels and Alliances at OneLogin
  • Buying Down Risk in the New World of App Development - Imperva Part 2
    Buying Down Risk in the New World of App Development - Imperva Part 2
    Kim Lambert, Senior Product Marketing Manager, Imperva; Tim Garon (Moderator) Apr 25 2019 5:00 pm UTC 60 mins
    In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities that will allow them to establish a silent foothold into your environment. Join Imperva and (ISC)2 on April 25, 2019 at 1:00PM Eastern and discover a defense in depth security strategy to protect your most valuable web applications and your business from damaging cyber-attacks.
  • Kubernetes, Istio, Kafka, and Camel: The glue to your cloud-native strategy
    Kubernetes, Istio, Kafka, and Camel: The glue to your cloud-native strategy
    David Cohn Middleware Solutions Sales Specialist, Red Hat Apr 25 2019 5:00 pm UTC 59 mins
    Powerful tools are needed to design scalable, distributed systems that can take advantage of the agility and organizational efficiencies promised by microservices. Tools like Istio, and service mesh in general, solve some difficult problems like observability, security, and resilience, and are highly encouraged for cloud-native application deployments.

    Join this webinar for:

    An overview on the current cloud-native landscape from a technology perspective including technologies like Kubernetes, Istio, Kafka, and Apache Camel.
    A discussion on how to "glue" your heterogenous environments, tools, and approaches together in a cohesive cloud-ready strategy.
    Red Hat's approach to agile integration, including some government case studies.
    Reference architecture for an open hybrid cloud, supporting both current and cloud-native strategies.
  • Detecting Malicious Traffic on Your Network
    Detecting Malicious Traffic on Your Network
    Luis Rico (LogRhythm) and Randy Franklin Smith (UWS) Apr 25 2019 5:00 pm UTC 91 mins
    Too often, when looking for malicious network traffic you either search for known bad or investigate anomalous traffic that doesn’t look normal. That reactive approach is time consuming, and potentially over-reliant on searching for larger concerns. Fortunately, new solutions use advanced analytics to proactively identify, enrich and alert on malicious traffic.

    Why is this important?

    Detecting known bad traffic is great when it works, but it’s a lot like signature-based AV (which is rigid and unable to detect unknown threats):
    **Only really effective for widespread, generalized attacks – not so great for unique targeted attacks
    **There’s an indefinite amount of time before the malicious traffic signature, domain name or IP makes it into the pattern updates and threat intel feeds from your vendors
    **Detecting anomalous traffic can address the aforementioned weaknesses, but in practice it depends heavily on how – and how well – you define anomalous traffic, and how quickly (accurately) you can spot it.

    Security practitioners are getting better by the day at looking for anomalies. Here’s just a few:

    **Protocols
    **Unrecognized port protocol numbers
    **Malformed/non-compliant traffic compared to protocol expected on known port
    **Protocols you don’t want or at least don’t expect to see in the given context
    **High bandwidth usage for that protocol
    **Traffic patterns
    **Disproportionate inbound/outbound bandwidth usage for a given endpoint
    **Suspicious Destination/Source IP combinations

    In this real training for free event, we will explore how to analyze your network so that you can learn and understand its traffic patterns and get a handle for what’s normal. You’ll then be able to take this information and look for anomalous traffic, build known-bad detections and make your network detection and response (NDR) technologies and efforts smarter.
  • The Rise of Privacy in the Cloud Era
    The Rise of Privacy in the Cloud Era
    Neil Thacker, CISO, Netskope Apr 25 2019 5:00 pm UTC 60 mins
    In a globally connected world where the number of cloud applications consumed by organisations rises daily, the challenges associated with protecting data and individual’s privacy are therefore also on the rise.

    In this webcast we will look at some of the challenges associated with privacy including:
    - Understanding contractual obligations
    - Managing the geolocation of data
    - Applying data transfers mechanisms and controls
  • Raising the bar on content moderation for social & gaming platforms
    Raising the bar on content moderation for social & gaming platforms
    Two Hat Security Apr 25 2019 5:00 pm UTC 60 mins
    Social networks today are undergoing a massive paradigm shift when it comes to content moderation. From tragic shootings broadcast live on Facebook, to YouTube removing comments on children's videos due to child predator concerns, social platforms are under fire from users, governments, and law enforcement to adopt better technology and strengthen their content moderation practices.

    It’s not all bad news. Business leaders have also realized that accurate, efficient moderation, coupled with positive reinforcement, can increase user retention and encourage growth.

    But who is responsible for enforcing these policies and practices? How did hate speech, abuse, and extremism become the "cost of being online"? And how can like-minded businesses band together to raise the bar and make their social platforms engaging, safe for all users, and ultimately, more profitable?

    Join Two Hat CEO and founder Chris Priebe and veteran analyst and market influencer Brian Solis for an insightful talk about the changing landscape of online conversations and the role of content moderation. Social abuse and objectionable materials need no longer be the price of admission.

    Register today for this free event!

    You’ll learn:

    * How to start a dialogue in your organization around protecting your audience without imposing on free speech
    * The business benefits of joining the growing movement to "raise the bar"
    * Practical tips and content moderation strategies from industry veterans
    * Why Two Hat’s blend of AI+HI (artificial intelligence + human interaction) is the first step towards solving today’s content moderation challenges

    Speakers:

    * Brian Solis, Principal Digital Analyst at Altimeter, author of "Lifescale"
    * Chris Priebe, CEO & founder of Two Hat Security
    * Stewart Rogers, VentureBeat
  • Your modern website needs a modern CDN
    Your modern website needs a modern CDN
    Andy Wyatt, Senior Product Marketing Manager, Instart Apr 25 2019 5:00 pm UTC 45 mins
    Delivering exceptional web experiences today requires a CDN that can go beyond the edge, and actually give you control and optimizations in the browser.

    As the web quickly changes, your customers expect more secure and performant web experiences. It’s crucial that your CDN does more than just cache static files and be available all around the world.

    The truth is, almost 50% of the requests an average website makes comes from a third party, which means a traditional CDN is only delivering half of your web experience. On top of that, the browser, not the edge, is becoming the point where optimizations and control need to be applied to give every user a great experience with your website.

    In this webinar, we’ll cover:

    - What makes up a modern website: public cloud, third-party tags, and dynamic content all coming together in the browser
    - Why modern websites need more than just caching and delivery to enable exceptional customer experiences
    - What optimizations and controls you should be looking for in a modern CDN
  • 2019: How Your Network Can Help Build Better Customer Relationships
    2019: How Your Network Can Help Build Better Customer Relationships
    Cherie Martin, Sr. Solutions Marketing Mgr (Aruba), Josh Jaster, Systems Engineer (Aruba) Apr 25 2019 5:00 pm UTC 35 mins
    Is attracting new customers and increasing sales at the top of your business’s priority list for 2019? You’re not alone. In fact, roughly 70% of SMBs are investing or planning to invest over the next 1-2 years in technology to personalize and improve customer experience.

    Join us as Cherie Martin, Sr. Solutions Marketing Manager, and Josh Jaster, System Engineer, review two core features your network must have to gain insight to your customer base and take engagement to the next level.

    Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
  • Your Browser Betrays You
    Your Browser Betrays You
    Mark Sarbiewski and John Klassen Apr 25 2019 5:00 pm UTC 45 mins
    Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can IT take control of the off-the-shelf unmanageable non-secure app that comes with our computers? Join this webinar to learn how IT can take control using a more secure, anonymous, disposable, productive, and compliant option to the web browser.