The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
VIPRE Sales Engineer Jerry Smith discusses the top threat vectors you must address every day to keep your network secure. We’ll discuss malware entry points, how malware is spreading, exploit kits, mobile threats and more. Register now to learn why a layered defense is critical in today’s environment.
Attend and Win!
If only building a layered security strategy was as easy (or as AWESOME) as playing with those tiny plastic blocks. Attend this VIPREcast, and you could win 1 of 10 Build-On Bricks Mugs. Start your mornings right with some fun and a reminder to ensure you’re always building a strong, layered defense against today’s threats.
The new reality is that we will suffer Data Breaches. This means we must shift our thinking, understand our exposure points, and then act to minimise the impact and consequences.
This webinar looks at this growing challenge and how Informatica is helping clients to build a new Data Centric Security model, which identifies sensitive data assets, the exposure and risk levels across the data landscape, and how to use masking techniques to protect high risk data in both production and non-production environments.
Our expert panel will discuss upcoming trends and best practices in infosec policy management for the IOT. The panel will include:
Jennifer Bisceglie, CEO, Interos Solutions
Robert Brese, Executive Partner, Gartner
Ryan Gillis, VP of Cybersecurity and Global Policy, Palo Alto Networks
Gary Hayslip, CISO, City of San Diego, Co-Chair, CyberTECH
Paul Rosenzweig, Principal, Red Branch Consulting
This animated video shows how you can protect the inevitable vulnerabilities in your production applications. Eliminate guessing and simplify application security by using App Defender to monitor and protect vulnerabilities from within the application.
Runtime Application Self-Protection provides context from inside the application, monitoring data and logic flow to distinguish between an actual attack and a legitimate request. See how this added context helps you defend production applications.
Watch this on-demand webinar featuring Forrester Research for a sneak peek into how this study found independent software suppliers benefited from Veracode's cloud-based service, and how you can use this analysis to develop your own business case.
Join Jason and Michael Ansel, from Box, as they explain what ChatOps is and how it can help different teams in your organization. You'll learn tips to get started, tools needed and emerging best practices around the topic.
Spurred along by a massive push from Microsoft, Office 365 has quickly become the de facto standard cloud-based productivity suite in the enterprise, leaving prior leader Google Apps in the dust. Outsourcing your email and file sharing to Microsoft doesn't mean that you've outsourced responsibility for your company's data security. You can achieve Office 365 data security... but only through a partnership that involves, at its core, a comprehensive in-house security plan, together with Office 365’s built-in security functionality.
In this webinar, Rich Campagna, VP of Products and Marketing and Chris Hines, Product Manager at Bitglass, will teach you about the 4 keys security gaps within O365 and will give you the tools you need to go cloud AND stay secure. Gain the power to…
Join Forrester Vice President, Principal Analyst, John Kindervag and Fortinet to learn about how next generation firewalls (NGFW) are changing the way organizations protect themselves. Get a look at the latest research on how IT professionals are using NGFWs to combat today’s threat environment and the requirements for an effective NGFW.
System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications and server platforms?
Introducing the only enterprise-class 3rd party patching solutions designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions.
Join us for a discussion of practical methods to improve and automate the patch process for your most targeted 3rd party desktop applications and non-Windows server platforms, reduce the time you spend building updates, and improve audit readiness in your Windows environment.
It’s not if, it’s when you will expand your enterprise footprint into Amazon Web Services (AWS). When organizations shift to a public cloud environment, security and compliance must remain top of mind. While AWS provides robust infrastructure-level protections, today’s attackers target the applications themselves.
This webinar will:
· Discuss inherent AWS security capabilities
· Review attack types that target the applications and why traditional security approaches can’t stop them
· Illustrate how Imperva SecureSphere for AWS stops these attacks and enables you to use the security infrastructure on-prem and in the cloud
Join Storage Switzerland and Accelerite for a live webinar “How To Prepare for the Disasters that Will Actually Happen”. In this webinar we will discuss how these types of man-made disasters differ from natural disasters, why they’re more costly than natural disasters and what steps IT professionals must take, right now, to make sure their businesses can recover from them.
All registrants attending the live webinar will also be entered into a drawing to win an Apple Watch given away after the webinar.
While the economics of moving workloads to the cloud is well understood by small and medium sized businesses (SMBs), they often struggle with corresponding economics associated with these changes in security challenges. These SMBs often rely on service providers and suppliers for security, but how can they take control or have more of a hand in the security of the cloud services they are using? Join (ISC)2 and our sponsor Sophos on June 25, 2015 for our next From the Trenches where we’ll discuss cloud security and challenges SMBs face when leveraging cloud services.
Enterprise data centers are evolving to deliver higher performance and agility, driven by rapid adoption of mobility/BYOD, big data, cloud and SaaS. At the same time, data center security needs to guard against ever more sophisticated attacks, while keeping up with rapidly increasing bandwidth requirements.
In this session Jose Grandmougin, Fortinet Director of System Engineering, will focus on the absolute need for high performance, hardware based firewalls in today’s data center and why yesterday’s data center firewalls cannot meet today’s challenges.
Sesión sobre la protección de sus sistemas Windows Server 2003 después de la finalización del soporte.
•¿Sabía que el 14 de julio finalizará el soporte del producto Windows Server 2003?
oDespués de esta fecha , Microsoft dejará de emitir parches de seguridad , dejando a estos sistemas en un estado de vulnerabilidad alto frente a los ataques de día cero y otras formas de código malicioso.
•Conozca a que riesgos se expone si no hace frente a esta situación y como Symantec le ayuda a proteger sus sistemas ante la finalización del soporte para estos sistemas.
Securing change in employee behaviour, to ensure compliance with organisational policy and to reduce risk to an organisation, relies on employees making a discretionary effort with a positive security outcome. How can security leaders secure not just employee awareness but most importantly positive security behaviours to support embedding security into corporate culture?
Adrian Davis, MD (ISC)2 EMEA
Bruce Hallas, Founder, Analogies Project
Craig Goodwin, Deputy CISO, Wolseley
Lee Barney, Head of Information Security, Home Retail Group
Cloud computing will not reach its full potential without fully developed and stable management and context standards. Customers indeed expect freedom of choice, increased control and interoperability, as a tool for fair competition and unfettered innovation. Effective interoperability demands common technical and legal parameters, which are related to open standards and governance.
While part one of the CloudWATCH webinar focused on technical aspects of existing and widely deployed Cloud-related standards, this part two will highlight governance and governmental issues around Cloud standardisation:
- Which combination of standards suits best your specific use case, and what is the status and position of governmental standards adoption such as expressed in ISO and IEC bodies?
- If you are using a cloud standard or would like to, we want to hear why, if the benefits as you expected, and what pitfalls or moments of enlightenment have you had.
Michel Drescher, Technical Manager, EGI & CloudWATCH
- John Messina, NIST Cloud Computing Program, Chair of the IEEE P2301 CPIP Working Group Chair
IEEE - P2301 - Guide for Cloud Portability and Interoperability Profiles (CPIP).
- Peter Deussen, Fraunhofer FOKUS
ISO/IEC JTC 1/SC 38 Distributed Application Platforms and Services.
If your organization cannot afford downtime from DDoS attacks, join this timely discussion from Neustar, with special guest perspective from IDC’s Christina Richmond. Explore the complexity and purpose behind today’s attacks and what you can do to defend your Internet presence. You will learn:
· What the DDoS threat environment looks like today
· Why “smokescreening” is a particular danger
· Where attacks can have impact across your organization
· How you can take steps to thwart DDoS threats
Cyber insurance is becoming an increasingly competitive market. In order to differentiate their offerings, underwriters are beginning to offer unique risk mitigation services to their insureds. But with all the noise in this space, how do risk managers find and choose the policy that is best for them?
In this webinar hosted by Advisen, Tracie Grella, Global Head of Professional Liability at the world's largest insurer, AIG, Neeraj Sahni, Vice President, FINEX North America—Cyber and Technology Risks at Willis, and Ira Scharf, General Manager of Cyber Insurance at BitSight Technologies, to learn how underwriters, brokers and technology firms are working together to bring risk mitigation services to their clients
Join this webinar to learn:
- How cyber coverage has evolved
- How the insurance market is bringing value related to cyber risks
- How risk mitigation services lower expected costs and help insurers do a better job of underwriting
- Why risk mitigation services and cyber insurance create a safer cyber ecosystem
Before tackling a SIEM project to improve detection and response, learn from these case studies as their scenario likely matches yours. To firebreak your network brings together technologies, processes and people in the right balance across four phases. More than a security point solution or another box, you need to turn craft into a discipline to improve detection and response.
Learn from your peers about the following:
- Before environment and issues
- Transition effort, cost and impact
- After environment and benefits
- Best practices for managed SIEM
- Your network and next steps
IT professionals are facing an explosion of data and an avalanche of devices to protect. So how do you do more with less?
Learn how the technology associated with next generation all-in-one backup appliances – physical and virtual – can help you solve the core problems of protecting more IT infrastructure and data with less effort and more confidence.
New business collaboration tools provide users with access to a range of rich functionality from a single interface. These tools complement and displace existing collaboration apps. Despite strong value propositions, the many choices with similar functionality may cause uncertainty and hesitation among buyers.
A panel of industry experts will discuss the dos and don'ts that organizations should consider when investigating or deploying these solutions.