Browse communities
Browse communities
Presenting a webinar?

IT Security

Community information
The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
  • Organisations are becoming increasingly dependent in their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions.

    However, while these services can be implemented quickly and easily, with increased legislation around data privacy, the rising threat of cyber theft and the requirement to access your data when you need it, organisations will need to have a clearer understanding of where their information is stored and how reliant these services are.

    During this webcast, Steve Durbin, Managing Director of ISF Ltd, will provide insights into how you can manage the risks associated with cloud computing to ensure maximum benefit.
  • Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.

    Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.
  • If you’re busy protecting your organisation from IT threats, then it’s natural to focus on the here and now. However, the world of security is changing fast. Symantec’s annual report provides analysis from our team of experts. The report describes the security trends we observed in 2014 to help you be better prepared going forward.

    Our Internet Security Threat Report Webcast distils the key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for executive leaders.
  • Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
  • L’évolution permanente des besoins informatiques et la complexité des infrastructures impose le choix de solutions dynamiques et flexibles.
    La nouvelle version de Symantec™ Backup Exec 15 arrive à point nommé. Il est peut-être temps de revoir votre infrastructure de sauvegarde/restauration. Que vous soyez ou non un utilisateur de Backup Exec, il est temps d’envisager un choix fiable et reconnu : le choix d’une solution performante et adaptée à tous les environnements, virtuels, physiques et basés sur le cloud.

    Découvrez vite comment Backup Exec 15 peut vous fournir la flexibilité nécessaire pour protéger vos données, quels que soient vos besoins en matière de plate-forme, de technologie ou d’application. Protégez vos informations plus vite, restaurez ce dont vous avez besoin, quand vous en avez besoin, de la manière la plus simple qui soit.
  • Unlike hacktivists and cyberterrorists, who are motivated by promoting a cause or punishing an organization for some perceived wrong doing, cyber gangs’ motivations are more old-fashioned — money. While hacktivists and cyberterrorists use sophisticated, targeted attacks, cyber gangs target the path of least resistance and look for widespread vulnerabilities so they can breach more enterprises with less effort.

    Listen to the Get Inside the Minds of Cyber Gangs webinar to find out:

    -Why cyber gangs are so successful despite their unsophisticated methods

    -What enterprises can do to protect themselves from these damaging cyber gangs
  • Campus data breaches are on the rise, and education IT professionals like you face a wide array of threats on a daily basis. Join us May 5 for the Secure Your Campus with VIPRE webinar to learn how VIPRE provides the comprehensive protection you need to keep your network secure, and your staff and students focused on learning. Jerry Smith, VIPRE Senior Systems Engineer, will explore the biggest threats facing your institution and how you can overcome them with robust malware defense that won’t consume your budget.
  • Learn how to leverage AWS capabilities better to operate more securely and safely in the cloud.

    In a recent talk at AWS Pop-up Loft in San Francisco, John Martinez highlights the top 10 security best practices compiled from both AWS and Security practitioners over several years protecting large-scale AWS deployments.

    You will come away with actionable steps that you can implement right away to help ensure your success on AWS… and discover most of these controls are very easy to implement.
  • The CyberTECH Cyber+IoT eWeek Roundtable features top industry experts sharing critical updates and information regarding IoT Security. The roundtable will be moderated by eWeek Editor, Chris Preimesberger and includes top cyber, IoT and InfoSec professionals. Special guest speakers include Michael Daniel, Special Assistant to the President and US Cybersecurity Coordinator for the White House, Mark Weatherford, Principal at the Chertoff Group, Enrique Salem, former CEO at Symantec.
  • Cyber criminals continue to steal data and interrupt business at alarming rates. The average annualized cost of cyber crime is $7.6 million per company per year, with a range of $500K to a staggering $61 million, according to a global study by the Ponemon Institute. That’s an increase in cost of 9 percent over last year’s global results. The most costly criminal activities come from malicious insiders, denial-of-service and web-based attacks – and no industry is immune. It’s not a matter of if you will be attacked, but when. Fortunately, there are ways to fight back.

    Watch this short video to learn:

    - How proactive security measures can save millions of dollars
    - What seven security technologies are key to winning the cyber crime war
    - Where to get more information and guidance
  • What makes a firewall a next generation firewall? How can next gen capabilities help you and what are the gotchas you should know before you turn it all on? Get your basic education on NGFW and some tips you should know before you get started.
  • Richard Stiennon, Chief Research Officer at IT Harvest, sits down with Tim Prendergast, CEO and co-founder of Evident.io, to talk public cloud security and compliance and why an automated DevOps style approach is now required to keep up with the velocity of change in public cloud deployments.
  • Hot Topics and Key Takeaways from HIMSS15

    If you didn't make it to the HIMSS15 healthcare IT conference, but want to hear about the hot topics and key takeaways from this year's many informative sessions, mark this webinar on your calendar to get up to speed! This year's event was full of new and innovative technology solutions for the healthcare industry.

    Naveen Sarabu, Product Manager for Liaison Healthcare, was there and will be sharing some of the new trends and technologies he saw for the following hot topics:

    Data interoperability
    Population health
    Provider & patient engagement
    Health Information Exchange
    Clinical & business intelligence
    Changing payment models
    Mobile, connected health & telehealth
  • Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
    Johan and Cliff will answer your cloud security questions including:
    •What are key challenges that IT leaders face when planning for a cloud migration?
    •What security factors should you consider when considering a hosted vs. on-premises solution?
    •As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
    •How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
    Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
  • Join Gene Kim, CTO, researcher and author of the best-selling book “The Phoenix Project” and Josh Corman, Sonatype CTO and co-founder of Rugged Software as they discuss how high performing organizations are applying proven supply chain principles to accelerate software delivery.
  • The recent Verizon 2015 PCI Compliance Report states "Of all the data breaches that our forensics team has investigated over the last 10 years, not a single company has been found to be compliant at the time of the breach—this underscores the importance of PCI DSS compliance.".

    Join Qualys for a webcast to hear more about some practical steps to steer your company into compliance and create a solid defense against the latest threats to cardholder data. Register now and get yourself up to speed with:

    - Clear review of PCI Requirements — including changes in the newly released PCI DSS v3.1

    - Programmatic guidance — on how to implement a phased approach to the highest priority PCI security controls and processes

    - Practical advice — on how Qualys PCI solutions can help you achieve high-grade PCI security, including the #1 challenge of PCI compliance (Requirement 11)
  • Data breaches of all sorts, affecting credit card providers, retailers and health care providers, suggest that such breaches will continue and grow as a major risk to all organizations and their IT, security, and compliance departments. At the same time, Big Data solutions are gradually becoming more prevalent, connecting many new sources of data and thus potentially increasing both the vulnerability and the magnitude of a data breach. It is no wonder that Stratecast survey data suggest that one of IT managers’ primary concerns with Big Data is security, yet the advantages of Big Data in enabling revenue creation make it very attractive to the business. This panel discussion will explore the security issues around Big Data.

    In particular, the panel will discuss:
    •Whether Big Data necessarily increases the risk of a security breach
    •How to assess the risks associated with different types of Big Data solutions
    •How to avoid data breaches in a Big Data environment
  • “I just write the code and throw it over the wall. It’s up to Ops to make it work” -- when Devs care only about coding, Ops and customers suffer.

    “It’s not my job to test code. If there’s a problem, talk to QA.” -- when Ops care only about stability, innovation and customers suffer.

    DevOps represents cultural change. Whether it’s the change of resistant engineers that don’t want to be on-call or the change of Operations teams to have more empathy towards their counterparts writing code, to the willingness of executives to embrace a culture of automation, measurement and sharing. Organizations must overcome the culture war to be able to approach the agility and productivity that organizations following a DevOps model gain. The faster they can get there, the faster these organizations can take the competitive edge away from traditional enterprises.

    In this webinar, featuring guest Forrester Research principal analyst Kurt Bittner, we will look at:
    - The current state of organizations - a separation of Devs and Ops
    - The how of DevOps - DevOps is a culture, not a product
    - The benefits of DevOps - happier customers

    As part of our panel discussion, we will answer the following questions to help you get started building a DevOps culture within your organization:
    - Why change the status quo?
    - How do I align two disparate groups?
    - How do I remove the obstacles that separate Dev and Ops teams?
    - Will customers see a difference if devs are on call?
    - Can IT start to think differently?
  • Every two years, (ISC)2 surveys infosecurity practitioners from around the world about the profile of the global information security workforce. This year, over 12,000 professionals from 135+ countries responded to the survey to provide invaluable insight about their careers, positions and organizations. Join Julie Peeler, (ISC)2 Foundation Director and other industry experts on April 30, 2015 at 1:00pm Eastern for an examination and discussion of the survey results, gain insight into what hiring managers and looking for in job candidates, the areas of expertise in demand and the challenges facing infosec pros around the world.
  • Do you know how to calculate how your network downtime costs and the financial impact it has per location?

    Every hour of network downtime can cost companies between $250,000 and $1 million. How many hours of network downtime do you experience each month?

    When network connections fail, there is a loss of productivity, brand credibility and revenue – revenue that is likely lost to competitors. Whether your unplanned downtime is due to wired line outages or hardware failure, the cost of that downtime multiplied by expensive troubleshooting is simply too high.

    Many put off business continuity planning until a problem occurs, which tends to be more expensive than investing in a solution now. If your business cannot afford network downtime, join this webinar to learn about failover solutions and the benchmarking formula to calculate your cost of downtime.

    We are all guilty of procrastinating – and we all know the costs associated with procrastinating. Let us provide you with the solutions and tools to calculate the cost of downtime for your organization and the ROI a failover solution will provide.

    Attendees will learn how to:
    •Integrate wireless failover into existing network environments
    •Reduce the high costs of staying connected
    •Limit expensive truck rolls
    •Calculate your network downtime costs
  • Junos Pulse is now Pulse Secure. Our name has changed but not our commitment to delivering secure, seamless mobility. Join our webinar to discover how we are rethinking the future of secure enterprise mobility access.

    Learn more about the commitment we’ve made to our customers and the future offerings we have in store for you.
  • Most of us rely on mobile apps for everything from banking to buying and messaging to mapping our route. Mobile devices are the go-to source to do work, watch videos, play games and—oh yes—even speak with another person.

    But every time we download or use a new app to simplify our lives, we run the risk of a hacker accessing our data. A recent FireEye Special Report, Out of Pocket: A Comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps – is a revealing look at today’s top mobile app threats on two of the most widely used platforms. The report outlines the real risks associated with mobile apps and their implications to privacy, corporate data and security.

    Join our industry experts for this interactive session to learn:
    -Key Android and iOS threats based on the analysis of 7 million
    mobile apps
    -Trends in mobile app behaviors
    -The impact of targeted malware and vulnerabilities
    -Takeaways security leaders can implement to make devices more
    secure in the workplace

    Be prepared for the next wave of mobile cyberattacks. Register today to gain insight from FireEye’s latest report and our mobile subject matter experts!

    The FireEye Team