Hi [[ session.user.profile.firstName ]]

IT Security

  • Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law
    Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law Mary Chaney, Expert in Cybersecurity Law and WSC VP Jessica Gulick Recorded: Feb 16 2018 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guests: Mary Chaney, Attorney At Law, The Law Offices of Mary N. Chaney, P.L.L.C.
    Threat Intelligence and Forensics Expert, Founder of Horton Technologies, LLC

    Hosted by Jessica Gulick, VP of the Women's Society of Cyberjutsu

    About the Speaker:
    Mary N. Chaney, Esq., CISSP, has 20+ years of experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law. She spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve by becoming a Special Agent for the FBI where she investigated cybercrime as their Information Systems Security Officer.
    Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. She has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital. As an adjunct professor with the University of Cincinnati, she assisted with the establishment of their Cybersecurity Certificate program.
    Currently, Ms. Chaney practices cyber security law for her own firm, The Law Offices of Mary N. Chaney, P.L.L.C. where she specializes in helping the CIO, CISO and General Counsel understand each other to legally protect the enterprise from cyber security risk.
  • The public cloud is here - use it wisely w/hybrid cloud strategy lessons learned
    The public cloud is here - use it wisely w/hybrid cloud strategy lessons learned Gordon Haff, Red Hat and Lauren Nelson, principal analyst serving infrastructure & operations professionals, Forrester Recorded: Feb 15 2018 56 mins
    For many firms, the migration to public cloud is well underway. Understanding what motivates these migrators and the challenges they face along the way can help you in your own journey.
    Join this webinar for a rare look into an emerging group and a glimpse into the future of public cloud. You'll hear about the results of a Forrester Consulting study, commissioned by Red Hat, that looks at these aspects of firms migrating to the cloud:
    > Their motivations and challenges.
    > The strategies they're adopting for migration.
    > What cloud migration in practice looks like.
  • Big data scaling with syslog-ng
    Big data scaling with syslog-ng Istvan Molnar, Peter Soproni Recorded: Feb 15 2018 54 mins
    Many big data projects run into the 80/20 rule. 80% of resources is spent getting data into their analytic tools and only 20% on analyzing the data. Syslog-ng functions as an universal log ingestion tool which can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others.
  • Accounting for the Endpoint in Your GDPR Strategy
    Accounting for the Endpoint in Your GDPR Strategy Josh Evans, product manager, Code42; Abhik Mitra, product marketing manager, Code42 Recorded: Feb 15 2018 45 mins
    The EU General Data Protection Regulation (GDPR) deadline of May 2018 is fast approaching! In the midst of preparing for the new regulation, it is equally important to understand how to provide visibility into endpoint data generated by your knowledge workers, and how to protect it.

    In this live webinar, Code42’s Josh Evans, product manager, and Abhik Mitra, product marketing manager, will discuss how Code42 addresses the endpoint gap and enables your GDPR strategy.
  • Preparing Your Data Center for a Digital Makeover
    Preparing Your Data Center for a Digital Makeover Cindy Borovick, Business Intelligence Director, F5 and Lori Mac Vittie, Principal Technical Evangelist, F5 Recorded: Feb 15 2018 38 mins
    Our discussion will explore the forcing functions of digital transformation on today’s traditional data center as it expands into cloud environments and the security challenges that result. A key to digital transformation success is having IT at the digital table. We’ll discuss technologies such as automation, API and IoT gateways, and the security services you’ll need to be successful.
  • Will Artificial Intelligence Strengthen Your Security Stance?
    Will Artificial Intelligence Strengthen Your Security Stance? Chris Roberts, Acalvio | Chris Morales, Vectra | Vikram Kapoor, Lacework | Willy Leichter, Virsec Recorded: Feb 15 2018 59 mins
    The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.

    Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.

    Join this Q&A panel on how AI can help improve your organization's overall security.

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Chris Morales, Head of Security Analytics, Vectra
    - Vikram Kapoor, Co-Founder and CTO, Lacework
    - Willy Leichter, Vice President of Marketing, Virsec
  • Discover the SIEMple Life with a Managed SOC
    Discover the SIEMple Life with a Managed SOC Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks Recorded: Feb 15 2018 59 mins
    Most security information and event management (SIEM) customers are struggling to achieve meaningful success a year or more after initial deployment. This is especially true with mid-market companies, where shrinking IT security budgets and shortage of skilled cyber security resources have forced them to reconsider investing in a SIEM, and seriously look at managed security services options.

    Before CIOs/CISOs take a leap of faith into any kind of managed security service, they want to be able to measure ROI with an outsourced managed solution, as opposed to managing their own SIEM. In this webinar, hear from security experts on:
    - What does it take to build and manage your own SIEM in-house?
    - What security SIEM blind spots can you avoid with a managed security service?
    - How do you determine ROI of a managed service as compared to a SIEM?
  • Attributes of a Modern Storage Infrastructure: Perspectives from ESG & Dell EMC
    Attributes of a Modern Storage Infrastructure: Perspectives from ESG & Dell EMC Scott Sinclair, Sr. Analyst, Enterprise Strategy Group, Inc. Varun Chhabra, Sr. Director - Product Marketing, Dell EMC Recorded: Feb 15 2018 63 mins
    In the era of digital business, IT managers are increasingly responsible for delivering results that drive the success of their business. To achieve this, it is imperative that IT organizations implement a modern storage infrastructure that enables them to increase agility and thereby gain a competitive advantage. In this webcast, experts from Enterprise Strategy Group and Dell EMC will describe the key attributes and benefits of a modern storage infrastructure.
  • How to Implement Trusted Platforms and EcoSystems
    How to Implement Trusted Platforms and EcoSystems Phil Tricca, Intel, and Lee Wilson, OnBoard Security Recorded: Feb 15 2018 56 mins
    Daily reports of attacks and breaches, from servers, PCs and data centers to IoT systems, mean that developers and OEMs must embed security at the foundation of their systems and ecosystem. This new webcast with long-time TPM and Trusted Software Stack expert Lee Wilson, OnBoard Security, and Philip Tricca, Intel Corporation, will review the key attributes of the TPM and how the new TCG TSS can be used for bottoms-up defense using a trust chain and improving overall platform security.

    Attendees will learn about the changes to TSS to make use much easier and more efficient, how to start developing applications and resources. Use cases including key storage and software measurement will be addressed along with strong device identity and authentication. Using the TPM and TSS for health monitoring also will be discussed.

    Wilson is business development engineer at OnBoard Security, where he is responsible for technical support and business development of OnBoard Security's TCG Software Stack 2.0 (TrustSentry 2.0) and OnBoard Security's post-quantum cryptography (NTRU and pqNTRUsign).

    Prior to joining OnBoard Security, Lee had a 35 year career with IBM. He currently chairs the Trusted Software Stack and Virtualized Platform Work Groups for Trusted Computing Group. Lee earned his BSEE work at Northwestern University and his MSEE work at Syracuse University and has been awarded TCG’s Key Contributor Award.

    Tricca is a software architect and engineer working in Intel’s platform security division. His career began with a 7-year stint in a U.S. Air Force research lab working with open source Linux security technology including mandatory access control systems like SELinux and measured boot using the TPM 1.2 devices. Most recently Philip has found his way to Intel where his current responsibilities include transforming Intel’s open source implementation of the TPM2 Software Stack (TSS2) from proof of concept to a vibrant and sustainable OSS project.
  • Data Breach Survival Tactics: Building Actionable Incident Response Plans
    Data Breach Survival Tactics: Building Actionable Incident Response Plans Stephanie Ewing, Solutions Expert, and Ryan Clancy, Senior Consultant Recorded: Feb 15 2018 55 mins
    In today’s threat landscape, it isn’t a question of if you’ll experience an incident, but when. When a security incident strikes, you’ll need a well-prepared staff and with a battle-tested plan. A mature incident response plan keeps everyone on the same page. It can clearly outline who’s in charge, what resources are available, and what options there are for detection and containment. Having a documented, tested process brings order to chaotic situations and keeps everyone focused on solving urgent issues.

    So, how can you test your incident response plan and ensure your team is ready to handle the next breach?

    Join our incident response experts for a 45-minute presentation plus Q&A to learn how you can quickly contain the impact of a breach, resolve an incident, and get back to business as quickly as possible.

    What you’ll learn:
    • Proper taxonomy for writing an incident response plan
    • Recommendations for developing and building in cyber exercises
    • How to use your knowledge management system to keep plans agile
    • Avoiding scope creep and identifying likely scenarios to test

    About the Speakers:
    Stephanie Ewing is a Solutions Expert with Delta Risk. She has 17 years of experience in information technology and information security leadership. Prior to joining Delta Risk, she spent several years working with leaders of critical infrastructure organizations across the nation to improve their security programs. Through workshops, training classes, and tabletop exercises, Stephanie has worked to educate executive level leadership and elected officials on security threats and risk management strategies.

    Ryan Clancy is a Senior Associate for Security Operations Services with Delta Risk. He has more than 15 years of experience in the IT and cyber security domain providing consulting services, hunt operations, threat intelligence, cyber exercises, enterprise defense assessments, and training in defensive and offensive network security operations.
  • T-72 Hours to Report a Breach: Are you GDPR Ready?
    T-72 Hours to Report a Breach: Are you GDPR Ready? Paul-Johan Jean, GDPR Legal Consultant at Sphaerist Advisory and Hank Schless, Product Marketing Manager at Threat Stack Recorded: Feb 15 2018 44 mins
    May 25th, 2018, the day that Europe’s General Data Protection Regulations (GDPR) comes into effect, is fast approaching. Many US companies are behind the curve in determining whether and how GDPR applies to them and figuring out what to do about it.

    Paul-Johan Jean, a GDPR legal consultant at Sphaerist Advisory, works with US companies to cut through the ambiguity and paralysis and get ready. Tune in on 2/15 at 1 PM EST to learn from this GDPR expert on how to:

    -Dispel myths around the new regulation
    -Take a practical, manageable and cost-effective approach to dealing with GDPR
    -Identify resources that can help you comply with various requirements, such as record keeping or data breach notification
  • Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance
    Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance CA Technologies: Clayton Donley, SVP Software Engineering, Security & Rob Lindberg, Sr Principal Product Mngr, CA Directory Recorded: Feb 15 2018 38 mins
    The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:

    • How are potential risks being monitored and secured?
    • How are users and devices being managed?
    • How are directory services being configured?

    Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.

    Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
  • Plan the Work & Work the Plan – Continuing the Move to the Cloud
    Plan the Work & Work the Plan – Continuing the Move to the Cloud Tom Thomas, Director of Enterprise Architecture, F5; Ryan Goode, Sr Mgr, Tech Ops, (ISC)2; Brandon Dunlap, Moderator Recorded: Feb 15 2018 58 mins
    Chances are, your organization has made a move to the cloud. In fact, most enterprises run approx. 45% of their applications and infrastructure in the cloud with that number sure to increase in the next 12 months. But as you relocate more into the cloud, what’s your strategy? What are you moving? What benefit are you seeking? Different businesses have different goals and objectives. Join F5 and (ISC)2 on February 15, 2018 at 1:00PM Eastern for a discussion on the continuing evolution of cloud migration and how organizations should prepare, strategize and execute their cloud journey while addressing operational needs, security concerns and the options that cloud-based services can bring.
  • The GDPR Deadline Readiness and Impact to Global Organizations Outside the EU
    The GDPR Deadline Readiness and Impact to Global Organizations Outside the EU Tim White, Director of Product Management, Qualys Recorded: Feb 15 2018 46 mins
    Learn how Qualys helps customers worldwide comply with the European Union General Data Protection Regulation (GDPR).
  • Creating Modern Business Foundations upon Hybrid IT Infrastructures
    Creating Modern Business Foundations upon Hybrid IT Infrastructures Todd Traver, Vice President, IT Optimization and Strategy, Uptime Institute Recorded: Feb 15 2018 50 mins
    Modern businesses are being transformed into digital businesses. To do so, IT is being re-imagined to span hybrid infrastructures; including multiple data centers, co-location facilities and cloud service providers. This hybrid approach has many benefits including cost savings, but can increase the overall difficulty in supporting such environments to deliver a predictable level of IT services. We’ll discuss one methodology designed to assess your current risk profile and spot vulnerabilities.
  • Shadow Data Report: Top 5 Risks of Employee Cloud App Use and Abuse
    Shadow Data Report: Top 5 Risks of Employee Cloud App Use and Abuse Martin Johnson, Sr. Director of Outbound Product Management, Cloud from Symantec Recorded: Feb 15 2018 54 mins
    It’s not an illusion. The increase in cloud app adoption has increased the exposure to your most sensitive data. Our Shadow Data Report covers the key trends and challenges to consider so you can deal with the risks head-on and still maintain the benefits of moving to the cloud.

    Register for this webcast for insights on the top 5 threats from the report to consider as well as:

    •The hidden signs of looming data breaches and where to look for them

    •What kind of risky employee activity could expose your most sensitive data

    •Whether file sharing, email and social or a combination change your exploitation risks

    Register Today
  • Bare Metal Restore: How does it work and how can I use it?
    Bare Metal Restore: How does it work and how can I use it? Niall Fahy Recorded: Feb 15 2018 39 mins
    MozyPro now supports bare metal restores (BMR) for Windows physical servers. BMR is a super-fast way to get a bare metal server back up and running should a disaster occur. The Mozy BMR feature should be part of your business continuity plan.

    Join us for an hour-long webinar about BMR—Mozy’s newest feature.
  • Achieving Compliance Agility with a Harmonized Controls Framework
    Achieving Compliance Agility with a Harmonized Controls Framework Lynn Heiberger - Unified Compliance; Sam Abadir - Lockpath Recorded: Feb 15 2018 60 mins
    In our uncertain regulatory climate, it’s essential for compliance to remain flexible. One way to achieve this is by implementing a harmonized controls framework. In this webinar, Lockpath and Unified Compliance will explore the growing need for harmonized controls and how this type of controls framework can bring agility to compliance--a necessity in a time of regulatory uncertainty.

    Attendees will learn:
    • The concept and reasons for using a single controls framework
    • How one organization quickly addressed updated regulatory guidance using a harmonized controls framework
    • How to achieve compliance agility with harmonized controls and an integrated risk management platform
  • LIVE demo - Safely Enable SaaS Applications with Aperture
    LIVE demo - Safely Enable SaaS Applications with Aperture Omar Amarin, Systems Engineer Feb 19 2018 2:00 pm UTC 45 mins
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • How to recognise malicious DNS with free network monitoring tools
    How to recognise malicious DNS with free network monitoring tools Randy Franklin Smith | UWS, Rob McGovern | LogRhythm, Erika Noerenberg | LogRhythm Feb 20 2018 10:00 am UTC 90 mins
    DNS is woven into the fabric of both the Internet and corporate intranets. It works so well that you might even forget it exists—until it is used against you.

    Hackers are using DNS to find command and control (C2) servers, control compromised systems, and exfiltrate your data.

    In this webinar, a group of security experts from LogRhythm and Ultimate Windows Security team up to show you how to spot threatening DNS activity with LogRhythm NetMon Freemium.

    You’ll learn about the malicious use of DNS and how to detect:

    - Domain-generation-algorithm (DGA) queries
    - C2 data tunneled through DNS
    - Data exfiltration via tunneled DNS

    Register now to learn how to stop hackers from exploiting DNS to infiltrate your network.
  • 3 Tips for Selling to the Senior level Execs
    3 Tips for Selling to the Senior level Execs Tim Robertson Feb 20 2018 11:00 am UTC 60 mins
    Most of us want to have better meetings with senior executives. Meetings that feel like conversations, not pitches. Meetings that build deeper relationships. Meetings that uncover more ways in which they can help their customers. Behind closed doors, when I ask what's holding people back, many will tell me things like, "I don't feel comfortable," "I have nothing to offer to them,"" or "I'm not at their level." Selling to Senior level executives can be difficult, and getting a first meeting can be a real challenge. But, in our experience, the most difficult part is not getting the first meeting. It's getting the second one. Or the third one. This webinar explores the ways that you can get to that second and third meeting
  • Remind me WHAT This GDPR Thing is all About Again?
    Remind me WHAT This GDPR Thing is all About Again? Patrick Grillo, Senior Director, Security Solutions, Fortinet Feb 20 2018 11:00 am UTC 45 mins
    Are you Prepared, Blissfully Unaware or in Full Panic Mode?

    It’s 2018 and May 25th, aka G-Day (GDPR day), is rapidly approaching. Hopefully your organization is well on its way to completing the necessary steps to bring itself into line with the new regulations. However we all know that the best laid plans always have a way of falling behind.

    This session will focus on the data breach prevention aspect of GDPR and will identify the key areas where you should have the right technology in place. Remember, no network can be made 100% hacker proof but with the right preparations, processes and technology in place, you can be well equipped to deal with any intrusion and minimize or even eliminate the possibility of data breach related fine from your local Data Protection authorities.
  • 2018 Phishing Trends: New year. New threats. Same dark intentions.
    2018 Phishing Trends: New year. New threats. Same dark intentions. Adrian Davis, Managing Director (ISC)² EMEA, Mollie Holleman, Senior Intelligence Specialist, Phishme Feb 20 2018 12:00 pm UTC 60 mins
    Join (ISC)² EMEA and PhishMe for a look back at 2017’s threats and a look ahead. We’ll provide an overview of what PhishMe's Intelligence team uncovered, discuss trends in phishing-delivered malware, and analyse how various delivery vectors evolved.

    Some of the trends we’ll discuss:
    •The implications of last year’s major global cyber-events, such as WannaCry and NotPetya
    •The emergence of new ransomware families
    •The abuse of legitimate functions built into business-critical software platforms to deliver malware
    •The favouring of modularity and plug-in accompaniments to lightweight botnet and stealer malwares
    •New ways cyber-criminals are obtaining cryptocurrency

    Cyber-crime won’t slow down. Take this opportunity to learn from the recent past as you deal with current threats and prepare for whatever’s next.
  • Kaspersky Lab workshop: where next for businesses facing complex threats?
    Kaspersky Lab workshop: where next for businesses facing complex threats? Kaspersky Lab and guests Feb 20 2018 1:35 pm UTC 120 mins
    Next generation threats are already here: advanced and hard to detect, they can exploit supply chains and legitimate software and hide in your systems for months, causing immense damage. They demand a radically different approach to protection. Join us to discuss these emerging trends and the action security leaders can take to protect their organizations and customers.

    David Emm, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab will present the main threat predictions for 2018 and their potential business impact; while Alessio Aceti, Head of Enterprise Business at Kaspersky Lab will consider the critical success factors for cybersecurity teams in the rapidly evolving threat landscape.

    An expert panel, including Thom Langford, CISO, Publicis Groupe; Gareth Wharton, cyber CEO, Hiscox Insurance; Mike Buck, Head of Delivery, BJSS; Adam Maskatiya, General Manager UK and Ireland, Kaspersky Lab; and Dan Raywood, Contributing Editor, Infosecurity Magazine will debate and answer audience questions on whether there is ever an acceptable level of risk for enterprises facing next generation cyberthreats.

    Attendees will come away with an understanding of emerging threats facing their sector, which they can use to develop robust security strategies capable of withstanding such sophisticated attacks.
  • Tomorrow’s platform today: The integration of everything
    Tomorrow’s platform today: The integration of everything Danesh Hussain Zaki, Lead Architect, Wipro Limited; Gourisankar Mukherjee, Practice Manager, Wipro Limited Feb 20 2018 3:30 pm UTC 60 mins
    A smart, hybrid and elastic platform for integration of everything, from businesses and applications to Cloud and Things. Such a platform will be built on a Cloud-first , API-first and Microservices based architecture to ensure digital readiness.
  • You've Got Your GDPR Policy, Now What?
    You've Got Your GDPR Policy, Now What? Tom Mighell, Esq., VP of Delivery Services, Contoural Feb 20 2018 4:00 pm UTC 60 mins
    In many ways, having your Data Protection Policy in place is not necessarily the last mile, but the first. In order to be fully GDPR-compliant, you need to understand where all of your information is, where your privacy data lives and how it’s being secured.

    Join Tom Mighell, VP of Delivery Services at Contoural as he discusses the roadmap you need to follow to achieve full compliance before the May 25th deadline.

    Topics will include:
    • Strategies to execute your policy
    • How to train everyone in your organization to be aware of privacy requirements
    • Appointing a Data Protection Officer to manage your privacy program for your organization
    • Steps your organization needs to take now to be ready
  • Demystifying the Dark Web: Why Threat Intel from Anonymous Networks is Critical
    Demystifying the Dark Web: Why Threat Intel from Anonymous Networks is Critical Josh Zelonis, Senior Analyst Serving Security & Risk Professionals , Forrester; Avi Kasztan, CEO and Co-Founder, Sixgill Feb 20 2018 6:00 pm UTC 60 mins
    Threat intelligence is a critical factor in defending increasingly complex environments from sophisticated attacks. Join Sixgill and Forrester guest speaker Josh Zelonis for a fireside chat where we’ll explore how attackers are leveraging the deep and dark web, and how your organization can benefit from this type of intelligence.
  • Behind Every Ticket is a Patient
    Behind Every Ticket is a Patient Rick Bradley - APCON, Ryan Davis - ExtraHop Feb 20 2018 6:00 pm UTC 60 mins
    Many network operation teams struggle to address data friction issues by failing to leverage their network. Using a network as a real-time data source allows you to confidently maximize the value of IT data. Sign up to learn about an analytical approach to healthcare and how to leverage a network as a data source.
  • How Hackers Sneak Past Defenses, and Ways to Evade Them
    How Hackers Sneak Past Defenses, and Ways to Evade Them Brook Chelmo, Product Manager, SonicWall and Andy Norton, Director, Threat Research, Lastline Feb 20 2018 6:00 pm UTC 60 mins
    The rise of ransomware forced companies to improve their defenses against malware and intrusions. As a result, malware developers seek new ways to evade network security defenses.

    In this webinar, experts from SonicWall and Lastline will show you 6 core evasion tactics, why they work, and how to stop them by using advanced malware analysis tools.

    - Learn about modern hacking, and how it affects companies today
    - Discover how and why hackers break into networks
    - Learn how to apply advanced network sandboxing to discover and stop new threats
  • Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack
    Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack Bob Adams, Mimecast Cybersecurity Expert; David Hood, Mimecast Director of Product Marketing Feb 20 2018 7:00 pm UTC 75 mins
    Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Join us for Anatomy of an Email-Borne Attack where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live “hack.”
  • How to Detect ACH Fraud with Machine Learning and Behavioral Analytics: Part One
    How to Detect ACH Fraud with Machine Learning and Behavioral Analytics: Part One Chris Ferrer, Product Manager, Guardian Analytics Feb 20 2018 7:00 pm UTC 45 mins
    In this webinar, Guardian Analytics Fraud experts will describe Same Day ACH BEC fraud scheme and explain how Guardian Analytics' machine learning and behavioral analytics patented technology can help you combat ACH social engineered fraud scheme.

    The Same Day ACH Fraud detection is part of a four-part ACH webinar series that includes:
    - ACH Kiting Fraud
    - ACH Small Transactions Fraud
    - ACH Payroll Fraud
    - Same Day ACH BEC Fraud
  • Simplify and Accelerate your GDPR Compliance Efforts
    Simplify and Accelerate your GDPR Compliance Efforts Tim Hill, Director of Product Management and Strategy Feb 20 2018 7:00 pm UTC 60 mins
    As we’re all aware, GDPR will be enforced starting May 25th, 2018 and organizations should understand which aspects of its preparations will be in place before the deadline.

    Much like other technological shifts of the last decade —GDPR will change the way our organization handles personal data. GDPR will require organizations to implement specific, defined controls over the handling of collected personal data, with the primary objective of streamlining data security regulations and bolstering data protection in the face of a fast-evolving technology landscape.

    Join this webinar with guest speaker Tim Hill, Director of Product Management and Strategy from Centrify, as he discusses best practices around frameworks and architectures needed to ensure better business process and data management.

    Tim will also cover how organizations with a strong IAM strategy in place are more likely to provide better notification and more openness if and when data has been compromised.

    Register for this webinar and learn:

    - Key elements to consider as the deadline for GDPR approaches
    - How a strong IAM strategy enables organizations to quickly identify whose data they are responsible for and where its stored.
    - How Centrify’s Zero Trust approach to IAM can help you prepare for GDPR’s underlying policy goals.
  • Are You Ready for GDPR? The Top 10 Things to Know for GDPR Compliance
    Are You Ready for GDPR? The Top 10 Things to Know for GDPR Compliance Cameron D'Ambrosi, Director, OWI Client Services & David Thomas, CEO & Founder, Evident Feb 20 2018 8:00 pm UTC 45 mins
    Just three months remain before companies that process the personal data of those within the EU must be in compliance with the General Data Protection Regulation (GDPR). Yet, there are often still outstanding questions around some of the key changes that will go into place and their impact on various parts of an organization. This webinar will highlight 10 key considerations that need to be made for controlling how data is accessed, stored, kept up to date, transferred and deleted. It will also breakdown four key steps to take to assure that you are on your way to meeting the necessary requirements.

    Join the GDPR Dream Team as they discuss:
    - What GDPR is and who it applies to
    - How to assess the level of exposure your company has to this regulation
    - Understanding the new rights of data owners and what you need to be prepared for
    - How to ensure you put the right processes and technology in place to stay compliant
  • GDPR: Headache or Opportunity?
    GDPR: Headache or Opportunity? Phil Richards, CSO and Simon Townsend, EMEA Field, CTO Feb 20 2018 9:00 pm UTC 60 mins
    Join Phil Richards and Simon Townsend to get both an EMEA and Americas perspective on how technology solutions such as Discovery, Patching, Application Control, Privilege Management and Service Management can help you minimize the headaches around GDPR.

    Attendees will learn:
    • How to navigate GDPR without a silver bullet
    • The importance of identifying PII data, protecting users, and securing endpoints
    • How to integrate, unify, orchestrate, and automate with service management
    • Ways to implement solutions that reduce the pain associated with GDPR

    It can be hard to see GDPR as anything more than a massive on-going headache. However, while GDPR requires companies to adjust how they handle data in many ways, it also helps organizations ensure overall compliance, protect against cybersecurity threats, manage their IT assets, and more. Register today and discover solutions to help you prepare for GDPR and accelerate your organization with fewer headaches.
  • Threat Hunting Series: Rethinking Persistency
    Threat Hunting Series: Rethinking Persistency Adi Ashkenazy, VP Product for XM Cyber Feb 20 2018 10:00 pm UTC 45 mins
    In this episode of the Threat Hunting series, Adi Ashkenazy will follow some of the approaches hackers use to counter the methods of defenders trying to remove them from their target networks. Adi Ashkenazy will also discuss the evolution of persistency in cyber-attacks, and focus on modern and predicted trends.

    About the Speaker:
    Adi Ashkenazy is the VP Product for XM Cyber, an innovative cyber security start-up developing a revolutionary breach and attack simulation solution, capable of identifying critical attack paths towards key organizational assets, while providing actionable prioritized remediation. Prior to XM Cyber, Adi served as deputy director of an elite cyber technology department in the prime minister's office in Israel, leading Israel's finest engineers and security professionals through some of the most complex cyber security challenges in the world today.
  • GDPR - Security at the Service of Privacy
    GDPR - Security at the Service of Privacy Michelle Dennedy (Cisco) | Ariel Silverstone (Data Protectors) | Paul Rosenzweig (Red Branch Consulting) Feb 20 2018 10:00 pm UTC 60 mins
    The General Data Protection Regulation (GDPR), a key legislation covering privacy rights, data security, data control, and governance, is going into effect in May 2018. As organizations are scrambling to achieve GDPR compliance before the May 25th deadline, some are still not clear on the exact GDPR requirements.

    Join this panel of experts as they discuss:
    - The regulatory landscape in 2018
    - What GDPR means for you and your organization
    - GDPR requirements around data collection and governance, exposure and breach disclosure, identity and privacy
    - Evaluating your cyber risk
    - Last minute changes your organization needs to make
    - Failure to comply & fines
    - Recommendations for achieving compliance and other regulation on the horizon.

    Speakers:
    - Michelle Dennedy, VP & Chief Privacy Officer at Cisco
    - Ariel Silverstone, Managing Partner, Data Protectors
    - Paul Rosenzweig, Principal at Red Branch Consulting
  • Learn: SANS CyberTalent Women's Immersion Academy (Cybersecurity Training)
    Learn: SANS CyberTalent Women's Immersion Academy (Cybersecurity Training) Max Shuftan, SANS Institute and Jessica Gulick, WSC Feb 20 2018 11:00 pm UTC 60 mins
    Join the SANS Institute and WSC for an insightful presentation about the SANS CyberTalent Women’s Immersion Academy. This academy is designed to help qualified women in Maryland and Chicago - area receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in six to eight months, depending upon program selected. The program is at NO COST to the selected women who attend and includes training and certification.

    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • Hear from a recent graduate who will share her experience
    • How this training academy and related certifications can help your career

    Speaker Bio:
    Maxwell Shuftan
    CyberTalent Program Director, SANS Institute
    mshuftan@sans.org

    Max leads the CyberTalent division of the SANS Institute, the most trusted and the largest provider of information security training and certification in the world. In this role, he directs business development and stakeholder engagement to support the various SANS CyberTalent programs and develop strategic partnerships. He also oversees CyberTalent program operations and staff management. SANS CyberTalent helps organizations address their cybersecurity workforce development needs through initiatives such as the VetSuccess and Women's Immersion Academies as well as the Assessment tools. Max has worked in the public affairs and stakeholder engagement arena of cybersecurity for the past eight years, working with Government, corporate, and not-for-profit organizations, most recently as a Vice President at Cambridge Global Advisors, a homeland security strategic advisory services firm.
  • GDPR Is Coming - Is Your Organization Ready? Key Steps to Help You Prepare
    GDPR Is Coming - Is Your Organization Ready? Key Steps to Help You Prepare Amar Singh (Cyber Management Alliance) | Guy Cohen (Privitar) | Punit Bhatia (Author) Feb 21 2018 1:00 pm UTC 60 mins
    On May 25 the long-awaited General Data Protection Regulation (GDPR) will go into effect across Europe. GDPR is the biggest overhaul of data protection laws in more than two decades. How prepared is your organization for GDPR?

    Join this interactive panel of experts as they discuss:
    - What is GDPR?
    - Why should you be GDPR-compliant?
    - How to achieve compliance?
    - Steps your organization should take today to prepare for GDPR
    - Other GDPR considerations

    Speakers:
    - Amar Singh, Founder, Cyber Management Alliance
    - Guy Cohen, Strategy and Policy Lead, Privitar
    - Punit Bhatia, Author of "Be Ready for GDPR"