Browse communities
Browse communities
Presenting a webinar?

IT Security

Community information
The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
  • Simplifying Compliance and Forensic Requirements with HP ArcSight Logger

    The ever-increasing amount of logging output that IT organizations need to retain to have an accurate picture of what happened in their systems-and when-is a classic "big data" problem. Data categorization and normalization are imperative when sifting through a mass of data that can exceed a petabyte, while eliminating false negatives can aid a forensic investigation. This webcast focuses on HP ArcSight Logger 6, featuring a review of the product by SANS senior analyst Dave Shackleford.

    Sign up for this webcast and be among the first to receive an advance copy of a SANS whitepaper discussing Dave's review of HP ArcSight Logger 6.
  • Toutes les entreprises sont d’accord pour dire qu’avoir une bonne infrastructure de sauvegarde est essentiel. En réalité, la plupart de ces infrastructures ont du mal à évoluer et à s’adapter à des environnements de plus en plus difficiles à gérer et complexifiés par les architectures virtualisées et le cloud hybride.
    Ne rien faire est impossible !
    Découvrez comment exploiter la puissance de vos informations avec les solutions de sauvegarde et de restauration Symantec :
    -en rendant votre entreprise conforme aux futures demandes de la réglementation Européenne sur la Protection des Données ;
    -en standardisant votre information au sein d’une plateforme de sauvegarde unique, pour casser les silos ;
    -en s’adaptant à la taille de votre environnement, avec une performance prédictible ;
    -en offrant à vos utilisateurs des possibilités de self-service ;
    -en modernisant votre infrastructure grâce aux appliances.
  • This panel of security experts will discuss the internet of things and what's keeping them up at night when they think about security in 2015. After an in-depth discussion, there will be live Q&A from the audience.

    This week's panelists include:
    Darin Andersen, Chairman and Founder, CyberTECH
    Ron Gula, CEO and Founder, Tenable Network Security
    Grant Jordan, President, Somerset Recon
  • Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an organization recognize these threats more quickly as they emerge? How does the organization ensure that information about the latest threats is available to drive fast response at the points of vulnerability? In this program, Gartner Research Director Craig Lawson and Webroot Chief Technology Officer Hal Lonas discuss how integrating machine-readable threat intelligence into your security infrastructure can help your organization block active attacks, and even predict where future attacks are likely to come from.
  • Part 2 of 2: Join Dave Simpson, 451 Research Sr. Storage Analyst, and Sean Derrington, Exablox Sr. Director of Product Management in a follow-up session about:
    1) Data protection trends and pain points
    2) How virtualization changes the game
    3) Array-based snapshots and replication for data protection
    4) Backup targets shift
    5) Cloud-based backup and recovery
    6) Why object-based storage?

    Did you miss Part 1: The Future of Enterprise Storage with Simon Robinson, VP of Storage at 451 Research? https://www.brighttalk.com/r/R5t
  • Not having the right security as you migrate to virtual and cloud environments can lead to security gaps, lost ROI, performance lag, and difficulty proving compliance. Working together, Trend Micro and VMware have partnered to deliver the first agentless security platform architected for VMware virtualized data centers (including NSX), virtual desktops, and cloud deployments. A&W Food Services is Canada’s original—and fastest growing— burger chain and they have trusted in VMware and Trend Micro to ensure their modern data center is secure. In this session, A&W will share their story and you will learn how they…
    • Shield vulnerabilities before they can be exploited, saving the cost of emergency patching
    • Deliver automated security across environments
    • Ease security deployment and management for lower cost of ownership
    • Automate security deployments while increasing protection for virtual environments.
  • Your organization is constantly under cyber attack that could - if unchecked - damage your business, customers, employees and reputation. To date, the ad-hoc sharing of cyber-threat information across industries is not well defined nor well structured and in many instances, sharing threat information relevant to your organization is not allowed due to privacy, workload constraints, outdated policies or legal concerns.

    Join Jon Oltsik, Sr. Principal Analyst with Enterprise Strategy Group, and Rich Reybok, CTO Vorstack Corporation, to understand the challenges that organizations face today with sharing threat intelligence and how to navigate them both internally and externally. Come to understand what’s changed in the last few years and the historical negative stigma of information sharing. This webinar can help answer the question “What does sharing threat intelligence really mean?” Following the overview and strategy, a brief discussion on the different approaches to sharing threat information and how secure sharing within your “trusted circle” can create a simple Cyber neighborhood-watch environment. This event is designed to help you overcome the hurdles that organizations have today – that of being able to receive the available collective knowledge, validate impending cyber-threats and access remediation solutions – all within the framework of stringent data access and privacy controls.

    What you will learn:

    -Issues organizations face when sharing threat information.
    -What’s changed that has created this “need” to share threat intelligence.
    -Definition of what sharing Threat Intelligence means in today’s world of cyber crime and attacks.
    -The new approaches available for successful and secure collaboration.
    -How to participate in a Cyber Neighborhood watch with trusted industry peers.
    -The benefits organizations can recognize from collaboration.
  • Have you already made your move to the AWS cloud, but wonder about keeping your applications secure? Heard about the increased risk of cyber attack, but not sure what to do to protect yourself? Want to learn more about the responsibility you have for the security of your web apps? Join Cloudreach and Alert Logic for a live cloud security webinar, where you’ll learn about the AWS shared security model, discover best practices for protecting your cloud environment and hear how customers have already been successful in securing their applications on AWS. If you care about standing up to the risk of compromise, this webinar is essential listening.
  • After July 14, 2015, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute to protect your infrastructure. The end of support means two things: newly discovered vulnerabilities in Windows Server 2003 will not be patched anymore, nor will they be documented and acknowledged by Microsoft. This represents an increase in the risk of using Windows Server 2003. However, many organizations still count on Windows Server 2003 for critical business operations. It’s important for organizations to understand the risks of running out-of-support platforms against the costs and effort of migrating to a new one.

    In this webinar, we will cover 2 important topics to help you secure, migrate and protect your legacy environment:
    * What risks you are facing for Windows Server 2003 end-of-support
    * How to shield vulnerabilities when the platforms are no longer be patched

    Join the webinar to know the most comprehensive protection to help manage the risks of out- of-support platforms like Windows Server 2003!
  • Tech blogs are overflowing with examples of password hacks, data destruction, and data leakage. It’s time for a new approach. Imation’s recently-announced Secure Data Movement Architecture (SDMA) will safeguard your organization’s most valuable data against tampering, leakage, or loss - throughout its entire lifecycle including when it’s in the cloud or mobile devices, or anywhere in between. Join us as we give you a sneak peek into our new concept for painless data protection, and the rapidly evolving types of threats its meant to address.
  • Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
  • This webinar will demonstrate how Sequence Package Analysis (SPA), a new natural language method that utilizes a corpus of annotated training data comprised of a unique set of feature extractions, may detect early signs of terrorism and sedition. Using an SPA-designed BNF table consisting of sequentially-implicative (as opposed to syntactic) parsing structures, this natural language tool searches social media content and recordings of conversations of suspected terrorists to identify (and measure) collusion, collaboration, affinity with other terror or sedition suspects. Whereas conventional text mining methods are hindered by the speech system’s failure to identify keywords (most suspects intentionally refrain from the use of keywords that pinpoint location, names, dates and time), SPA is designed to work around these obstacles in which users refrain from referring to named entities that are likely to flag their communications as suspicious.
  • The maturity of Hadoop as a technology framework suitable for organizations, large and small, to economically store and process vast amounts of data is no longer a prediction, but rather a reality every IT leader understands. But that doesn’t mean Hadoop is done disrupting the data and analytics landscape.

    Self-service analytics solutions capable of leveraging the massive processing and data discovery potential of distributed Hadoop clusters are ushering in a new era of data freedom for business users who are hungry to put data at the heart of their decision making process. With programming and query languages no longer a prerequisite skill for exploring Hadoop environments, organizations everywhere are waking up to the reality that even non-technical users can quickly and easily find insights in even the biggest of Hadoop data sets.

    Attend this webinar to hear how IT groups are adjusting to this new breed of bold and curious data user and learn:
    - How IT is shifting from data protector to data mentor
    - Why business users are so data hungry and so un-afraid of Big Data
    - What true self-service analytics can look like when paired with Hadoop
  • Wi-Fi security attacks, hacking, stolen mobile devices – are these keeping you awake at nights? Are you surprised that Wi-Fi networks can be more secure than your wired networks? Wireless LAN has come a long way from the days of its inception with inadequate security.

    Contrary to common belief, security is not a single protocol or an appliance or an encryption. It is a system of different components working together to ensure your Wi-Fi network is secure and your confidential information is protected.

    Join this webinar to learn about

    - Advances in Wi-Fi security
    - Multi-layers approach to holistic protection
    - Controlling user and device access
    - Controlling applications
    -Xirrus security solutions
  • Whether you are evaluating your move to the public cloud or have started the journey and are already hosting DevTest or production workloads, security and compliance should be high on your list of priorities.

    Applications hosted in the public cloud are your responsibility, and not AWS. The biggest challenge you have is that web applications are also the most targeted from cyber attacks, and you need to ensure that you have a solid security foundation to be able to continuously monitor and protect your workloads from compromise.

    Join James Brown, Director of Cloud Computing & Security Architecture, Alert Logic for this live webinar which will cover:
    • The shared security model: what security you are responsible for to protect your content, applications, systems and networks v AWS
    • Overview of the OWASP Top 10 most critical web application security risks (such as SQL injections)
    • Best practices for how to protect your environment from the latest threats

    This webinar is essential for anyone who wants to understand how to build a plan for security and compliance in the cloud.
  • Please join us for a live Q&A session on Monday April 27th at 3:30pm AEST / 5:30pm NZST, with Steve Durbin, Managing Director of the Information Security Forum, on the ISF's Threat Horizon 2017 Report.

    Threat Horizon Report, released last month, is a detailed examination of potential current and future security threats facing organisations.

    Meticulously researched by the ISF, the report:
    •covers nine threats poised to overwhelm defences
    •identifies potentially significant business impacts
    •proposes actions that organisations can take to safeguard their reputation and wider business value

    Before the Q&A:

    •Read about the Threat Horizon Report in CIO Magazine: (http://www.cio.com/article/2898037/security0/9-biggest-information-security-threats-for-the-next-two-years.html#slide1)

    •Or view the BrightTalk Webinar: https://www.brighttalk.com/webcast/9923/140635

    •If you'd like, please send any questions you want to ask to Vicky Taylor, by Thursday April 23rd (vtaylor@shelde.com)

    Q&A Details:

    During the Q&A Session Steve will take any questions you have on the report and its findings.

    Date: Monday April 27th

    Time: 3:30pm to 4:15pm AEST / 5:30 - 6:15pm NZST
  • Decision making criteria for strong authentication solutions are increasingly being driven by the need to apply cost efficiency, manageability, and technological flexibility.

    Join this webinar on April 28th to gain insights into how IT professionals can reduce up to 60% of the time and resources needed to implement and manage strong authentication within their organizations, while taking advantage of a technological edge that will allow you to adapt to new technologies in a rapidly changing IT environment.
  • Decision making criteria for strong authentication solutions are increasingly being driven by the need to apply cost efficiency, manageability, and technological flexibility.

    Join this webinar on April 28th to gain insights into how IT professionals can reduce up to 60% of the time and resources needed to implement and manage strong authentication within their organizations, while taking advantage of a technological edge that will allow you to adapt to new technologies in a rapidly changing IT environment.
  • Please join AvePoint and Rackspace at 11:30 a.m. – 12:30 p.m. EST on Tuesday, April 28, 2015 as we discuss how the cloud affects governance and management strategies in the final webinar in the three-part series.

    In this 60-minute webinar, Dux Raymond Sy, Chief Technology Officer for AvePoint Public Sector, Jeff DeVerter, Chief Technology Officer - Microsoft Technologies for Rackspace, John Peluso, Vice President of Product Management for AvePoint, Todd Klindt, SharePoint Consultant for Rackspace, and Shyam Oza, Senior Product Manager for AvePoint, will address strategies and tools for ensuring your cloud-hosted SharePoint content remains properly managed and protected.

    Panelists will cover best practices, strategies, and tools for managing and protecting cloud-hosted users and content, ensuring you remain in compliance with your governance policies – no matter where your content resides. Whether you’re an IT manager, developer, administrator, or someone that wants to learn logistics behind moving to the cloud, please join us for what promises to be a lively and informative discussion!
  • Please join AvePoint and Rackspace at 11:30 a.m. – 12:30 p.m. EST on Tuesday, April 28, 2015 as we discuss how the cloud affects governance and management strategies in the final webinar in the three-part series.

    In this 60-minute webinar, Dux Raymond Sy, Chief Technology Officer for AvePoint Public Sector, Jeff DeVerter, Chief Technology Officer - Microsoft Technologies for Rackspace, John Peluso, Vice President of Product Management for AvePoint, Todd Klindt, SharePoint Consultant for Rackspace, and Shyam Oza, Senior Product Manager for AvePoint, will address strategies and tools for ensuring your cloud-hosted SharePoint content remains properly managed and protected.

    Panelists will cover best practices, strategies, and tools for managing and protecting cloud-hosted users and content, ensuring you remain in compliance with your governance policies – no matter where your content resides. Whether you’re an IT manager, developer, administrator, or someone that wants to learn logistics behind moving to the cloud, please join us for what promises to be a lively and informative discussion!
  • A 2015 PwC survey found that 96% of CEO’s in the US have indicated rising concern about data breaches - and rightly so. With the record-breaking breaches of 2014 barely behind us, organizations want to take steps to avoid becoming the next victim and are looking for signs that can indicate troubling performance. BitSight Technologies may have found one such indicator. Using their Security Ratings data, recent research shows a solid correlation between a company’s botnet grade and their likelihood of experiencing a publicly disclosed breach, demonstrating that Security Ratings are a powerful metric for communicating cyber risk across the enterprise.

    Join BitSight CTO and Cofounder Stephen Boyer to discuss this research and to learn why continuous security performance monitoring should be an essential part of your enterprise risk management strategy.

    Attendees will learn:
    -What is the correlation between botnet grades and publicly disclosed breaches
    -Why botnet grades vary across key industries and what the top infections are by sector
    -How Security Ratings are generated and the impact botnets and other risk vectors have on these security performance metrics
  • Sharing network access and sensitive information with your business
    partners could be putting you at risk of third-party breach. These
    breaches can be very damaging and may account for major losses in
    data, time, and resources. If you’re looking for a better risk
    management method, you’re not alone.

    Watch this webinar to will learn more about:

    - Security risks that could be facing your corporation today.
    - How you can utilize selection criteria to build the best solution.
    - Methods you can use to assess partner security risk.
    - How to make better risk-based decisions by factoring in the security
    posture of your organization.
  • This webinar will provide strategies and best practices to secure your network and apps against threats while optimizing availability and performance.

    Computing has extended beyond the exclusive domain of the IT department - a fact that has significantly complicated security, privacy and has put tremendous pressure on today’s networks. IT managers are tasked to automate networking polices, protect against an ever growing and changing number of attacks and keep users happy with the highest level of performance.

    Attend this webinar to learn:

    - How to protect web applications with an integrated Web Application Firewall solution
    - Defend against DDoS and specific application layer attacks
    - Simplify access with SSO and securely authenticate to external applications
    - Encrypt all traffic while ensuring compliance visibility
  • Keeping Compliance in Check & Controlling Access Risk:

    Learn how one of the nation's largest health insurers provides access to users efficiently and effectively while also assuring that private constituent data is protected in compliance with HIPAA, HITECH and other federal and state privacy and security regulations. Join (ISC)2, Courion and Harvard Pilgrim Health Care on April 28, 2015 at 1:00pm Eastern to learn how the information security team is able to identify and remediate user access risks such as unnecessary privileged access, orphaned and abandoned accounts, and system or non-human accounts that call for administrative oversight.
  • Cybersecurity has become more than a technical problem. A data breach can have a major impact on your business – loss of jobs and customers, reduced brand reputation, stock price drops and more – with recent research placing the average cost of a breach at $2.7 million dollars. Yet too many organizations continue to drown in low-level threat data and individual response tactics, with security teams pouring through hay stacks that may or may not contain that “needle”.

    Join this webcast to learn how to improve the resiliency of your organization’s strategic risk management and business operation. Our panel of expert speakers include a former intelligence analyst, a CISO and a CEO, who will examine the business impact of cyber threats, why the traditional cybersecurity approach no longer applies, and offer tips for:

    · Taking a data-driven approach to cybersecurity – through evaluated intelligence
    · Continuously measuring cybersecurity key performance indicators
    · Facilitating collaboration across key stakeholders for an improved security strategy and cyber defense
  • Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • After July 14, 2015, Microsoft will no longer issue security updates for any version of Windows Server 2003. If you are still running Windows Server 2003 in your datacenter, you need to take steps now to plan and execute to protect your infrastructure. The end of support means two things: newly discovered vulnerabilities in Windows Server 2003 will not be patched anymore, nor will they be documented and acknowledged by Microsoft. This represents an increase in the risk of using Windows Server 2003. However, many organizations still count on Windows Server 2003 for critical business operations. It’s important for organizations to understand the risks of running out-of-support platforms against the costs and effort of migrating to a new one.

    In this webinar, we will cover 2 important topics to help you secure, migrate and protect your legacy environment:
    * What risks you are facing for Windows Server 2003 end-of-support
    * How to shield vulnerabilities when the platforms are no longer be patched

    Join the webinar to know the most comprehensive protection to help manage the risks of out- of-support platforms like Windows Server 2003!
  • Businesses are struggling to keep up with unpredictable demands, extreme data growth, and aggressive service-level agreements related to application and data availability. IT management is changing, and there is need for greater application administrator control over backup and recovery. Research shows that most enterprises have not significantly updated their data protection processes in the last 5-7 years. This has resulted in highly fragmented environments with multiple copies of information owned and protected in silos—in turn elevating cost and complexity. The need is there, and customers are aware of current data protection shortcomings

    Join Tim Nolte for this webinar to understand how software and hardware can come together to deliver a joint backup, recovery and archiving solution
  • DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconceptions about DDoS attacks and DDoS defense that leave too many organizations vulnerable today. One misconception is that a DDoS attack is all about size. While certainly true, modern DDoS attacks can enormous, DDoS today is more frequently targeting your applications and security infrastructure, such as your firewall and IPS. Another misconception is that DDoS defense is an either-or proposition. You handle it in the cloud through a provider, or you have DDoS defense on premise. In fact, one layer of protection is not protection at all.

    Join us for a session that will cover:
    • An overview of the current attack landscape and implications
    • Best practice defense against modern DDoS attacks
    • Lessons learned by global enterprises struck by attacks
  • Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.

    In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.

    Join this session to learn:
    •Some of the different methods of deploying Flowspec
    •How Flowspec compares with alternative filtering methods
    •Best practices for secure traffic routing
  • As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictable, flexible, user- and service-friendly and lower cost to operate. These virtualized, software-controlled networking environments, however, do not yet benefit from the range and sophistication of DDoS protections and security available for traditional networks. This presentation focuses on how the delivery of traffic intelligence, threat detection and attack blocking is evolving, regardless of whether BGP and flow or future SDN/NFV-based techniques are in use.

    Attend this session to learn how Arbor Networks is adopting its DDoS solution suite to advance protections in SDN- and NFV-based networks.
  • Set aside 30 minutes on Wednesday, April 29th as we explain in more detail how your data is vulnerable as it moves across data networks. During our session, "Surveillance: You ARE being watched" we’ll uncover security issues and risks, as well as new features and affordable solutions.
  • Almost every organization is challenged by the increasing need for more bandwidth. Cloud-based services, content-rich applications, and access to internet sites is putting more and more strain on the limited pipes coming in to your data centers. WAN Optimization had been the tool of choice to connect and manage branch office traffic. It's now more and more being used to bridge multiple Internet connections for organizations large and small to create more bandwidth in and out of their data centers. Traditional WAN Link Load Balancing has evolved from simple back up and VPN connectivity to a robust traffic management tool that seamlessly adds bandwidth using virtually any ISP technology. In this webinar you’ll learn the basics of Hybrid WANs, what they and Link Load Balancing can do for your organization, and discover more about Fortinet’s Hybrid WAN solutions.
  • Thales e-Security the market leader globally for payment HSMs continues to evolve its solutions to meet the latest security requirements. Host card emulation (HCE) is a particular focus for 2015 with comprehensive support for the various proprietary HCE specifications released by the major card schemes. Today, HCE enables contactless mobile payments on Android phones to take place at an NFC-capable POS terminal without the need for a Secure Element (SE) inside the phone. It is evident that HCE support is an important consideration for any issuer wanting to launch payment support on Android phones since the current rollouts of Apple Pay are restricted to Apple iOS devices.

    Thales would like to invite you to attend a webinar covering how Thales can help you generate new revenue by getting your HCE solution to market quickly and securely.

    Ian Hermon, Product Marketing Manager for Payment Security Solutions at Thales e-Security is the presenter and will be covering the following topics:
    •How HCE apps deliver new transactions and new revenue
    •What you need to support the new security and risk models required by HCE
    •How to maximize use of your existing back office security infrastructure
    •The flexibility of the Thales HSM offerings
  • Mobility is the new frontier that is ‘still arriving’ and enterprises are grappling with how best to enable it, keeping enterprise security and employee satisfaction front and center of mind. Inherent in that balance is a careful trade-off as security is paramount but it should not come at the expense of productivity. On one hand is the Wild West with no security whatsoever and happy employees bringing in devices and apps of their choosing. On the other hand are happy enterprises with strict security controls but dissatisfied and disappearing employees! This webcast will help strike a balance that works for both entities - the User and the Enterprise. No utopia promised but you will come away with an understanding of:

    1) What the challenges around Mobility in the Enterprise are
    2) Why you should look into tacking them
    3) How one approach works for both the employees and the enterprises