Hi [[ session.user.profile.firstName ]]

IT Security

  • Gartner names Palo Alto Networks a Magic Quadrant Leader - for the fifth year. Gartner names Palo Alto Networks a Magic Quadrant Leader - for the fifth year. Navneet Singh, Product Marketing Director, Palo Alto Networks Recorded: Jul 27 2016 46 mins
    Gartner has just released its 2016 report. For the fifth time, we’ve been named a Magic Quadrant Leader for Enterprise Network Firewalls.

    Webinar highlights:

    • Compare next-generation firewalls with legacy products
    • Evaluate top industry leaders
    • Considerations when making purchasing decisions
  • Upgrade to new supported LG PCoIP zero clients, get 5 free and trade-in value Upgrade to new supported LG PCoIP zero clients, get 5 free and trade-in value David Bernstein - Anything IT, Phillip Johnson - LGE Solutions & Pat Greig - Teradici Recorded: Jul 26 2016 51 mins
    Join us for this informative webinar to learn how to upgrade your Tera1 PCoIP zero clients to new LG devices, receive 5 free zero clients with money back and feel good about recycling not only your zero clients but laptops, desktops, printers and hard drives.
    • Earlier this year, LG Electronics USA, was recognized by the EPA on their dedication to increasing consumer awareness about the importance of third-party certified recycling through nationwide education and outreach efforts.
    • According to the EPA, the positive environmental impact of LG’s responsible recycling is equal to taking 12,300 passenger cars off the road for a year or saving enough energy to power more than 8,000 U.S. homes for a year.
    Guest speaker David Bernstein with Anything IT will explain the process to receive rebates on Tera1 zero clients and dispose of them in accordance with industry’s highest e-waste standards
    Anything IT and LG will explain a simple, fast and easy approach to upgrade:
    • Assess the value of your current obsolete devices (any brand and any quantity)
    • Claim your rebate
    • Get 5 free zero clients
    • Logistics and Process to upgrade and replace

    Q&A will follow at the end of the session.
  • Fast and Effective IT Security Analytics Use Cases Fast and Effective IT Security Analytics Use Cases Mike Paquette, VP Products Prelert Recorded: Jul 26 2016 53 mins
    Security professiona​​ls realize that analytics are becoming an increasingly important part of the IT Security technology arsenal. However, most security analytics solutions are complex, requiring the movement of data to the analytics platform, custom use case development involving professional services, and sometimes weeks of personnel and model training before useful results can be obtained. In this webinar, see how security use cases can be quickly and effectively deployed using analytics recipes pulled from Prelert’s “Hot Sheet” security use case library. This webinar will highlight examples of the use cases being deployed in an Elasticsearch environment.
  • Five Requirements for Securely Adopting Cloud Applications Five Requirements for Securely Adopting Cloud Applications Mark D. Campbell and Brandon Whichard of IBM Security Recorded: Jul 26 2016 62 mins
    The business benefits of cloud applications are undeniable, however security concerns can still slow their adoption. While many mainstream cloud applications offer secure platforms and excellent security capabilities, much of the security burden is still on you. You still need a strategy and the technology tools to ensure your organization can safely and efficiently utilize these cloud apps.

    Join IBM Security as we discuss five essential requirements for ensuring safe and efficient adoption of cloud applications.
  • Learn how an app-centric approach will improve security & operational efficiency Learn how an app-centric approach will improve security & operational efficiency Joe DiPietro, SE Director at AlgoSec Recorded: Jul 26 2016 51 mins
    The constant barrage of application connectivity and security policy change requests, not to mention the relentless battle against cyber-attacks have made the traditional approach to managing security untenable. In order keep your business both agile and secure – across today’s highly complex and diverse enterprise networks – you must focus your security management efforts on what matters most – the applications that power your business.

    Join Joe DiPietro, SE Director at AlgoSec on Tuesday, July 26 at 11am EDT for a technical webinar, where he will discuss an application-centric, lifecycle approach to security policy management – from automatically discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning – that will help you improve your security maturity and business agility. During the webinar, Joe will explain how to:
    • Understand the security policy management lifecycle and its impact on application availability, security and compliance
    • Auto-discover and map business applications and their connectivity flows – and why it’s important
    • Securely migrate business application connectivity and security devices to a new data center
    •Get a single pane of glass that aligns application connectivity with your security device estate
    • Identify risk and vulnerabilities and prioritize them based on business criticality
  • CEO Fraud and the $2.3 Billion Mistake You Can’t Afford to Make CEO Fraud and the $2.3 Billion Mistake You Can’t Afford to Make Randy Luskey, Stu Sjouwerman, Dr. Christopher Pierson, Sam Masiello Recorded: Jul 26 2016 109 mins
    The FBI just issued a warning about a “dramatic” increase in CEO Email Scams. The Bureau estimates these scams have cost businesses more than $2.3 Billion in losses over the past three years. No matter how extensive your Security Awareness Training Program is, your company is vulnerable to these attacks. Employees are quick to act when a financial request comes from the CEO. What protocols do you have in place to make sure your team knows when an email is really coming from the C-Level? Join our panel to learn how to avoid falling victim to these phishing scams.
  • Next-Generation Security for Amazon Web Services Next-Generation Security for Amazon Web Services Dharminder Debisarun Recorded: Jul 26 2016 29 mins
    Public cloud computing resources such as Amazon Web Services (AWS) are helping organizations like yours develop and deploy new applications rapidly; expand into geographic regions seamlessly and extend competitive advantages.

    Cyber criminals are well aware of the rapid expansion into the public cloud and are looking for weaknesses in your security posture. Don’t let them find one. The VM-Series for AWS, allows you to securely extend your corporate datacenter into AWS, using our next-generation firewall and advanced features to protect your data while native management features ensures policies keep pace with the changing to your applications.

    In this webinar, attendees will learn:
    - Common customer use cases for AWS
    - Key security challenges and considerations
    - How the VM-Series can protect your AWS environments
  • Fidye Yazılıma HAYIR! Fidye Yazılıma HAYIR! Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü Recorded: Jul 26 2016 63 mins
    Trend Micro Akdeniz Ülkeleri Kanal Müdürü Mehmet Dağdevirentürk, kendinizi ve firmanızı fidye yazılımlara karşı nasıl koruyacağınızı ve fidye yazılımlarla ilgili son gelişmelerin neler olduğunu sizlerle paylaşıyor. Fidye yazılıma karşı savunmanın sihirli bir formulü yok, ancak en yaygın saldırı yöntemlerini bilmeniz, en iyi korumayı sağlamak için atacağınız öncelikli adımları bilmenizi sağlar. Bu webinarda Trend Micro olarak sizlerle tecrübelerimizi paylaşarak karşılaşabileceğiniz olası risklere karşı planınızı şimdiden oluşturmanız için bir yol haritası sunuyoruz.
  • Recognise your Threats, Regulate your Risks Recognise your Threats, Regulate your Risks Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India Recorded: Jul 26 2016 53 mins
    Cyberattacks against Banking and Financial Institutions have evolved from annoying pop-ups and machine crashes to denial-of-business events. CxO resignations and losses/damages running into crores of Rupees have heightened the awareness around cyber security, and shifted it from an IT problem to a business priority risk.
    Recently, Asia has been a hotspot for such cyberattacks, with many high-profile attacks being the subject of headlines across the region, including the most recent Bangladesh Bank breach.
    In its latest annexure to banks titled “Cyber Security Framework in Banks”, RBI has outlined a number of proactive measures that Banks in India need to take to ensure a robust cyber security/resilience framework, and to ensure adequate cyber security preparedness on a continuous basis.

    Here are just a few requirements:
    -Board approved cyber security policy
    -Continuous surveillance
    -Cyber crisis management plan
    -Cyber resilience framework
    -Cyber security awareness among stakeholders / top management / board
    FireEye invites all banks and financial institutions to join this exclusive webinar where the speakers will review the RBI guidelines and suggest ideas to bolster your response strategy and limit the consequences of a breach.

    Date: 26th July, Tuesday
    Time: 11:00 am
    Duration: 40 mins. With Q&A
    Speakers:
    Vipul Kumra, Consulting Engineer, FireEye India
    Shantanu Mahajan, Consulting Engineer, FireEye India
  • Cyber Risk Conversation: Security Trends & Best Practices Cyber Risk Conversation: Security Trends & Best Practices Ron Bushar, Managing Director, Mandiant (a FireEye company) Recorded: Jul 26 2016 54 mins
    Over the last decade, cyber security has evolved from a niche concern confined to IT professionals to a major priority for CEOs and boards of directors. Company leaders are now charged with managing cyber risk with the same urgency that they have managed traditional business risk.
    The emergence of cyber risk as a centerpiece of risk management is being fueled by new and increasingly complex threats. Organizations must deal with a quickly evolving set of threats to their information systems and data. Many of these threats were unimaginable just a few years ago.

    In this discussion, we explain the different forms of cyber risk and show how the threat level has risen in recent years. We also provide a basic framework for managing cyber risk, and finally, we pose five key questions business leaders should ask themselves to ensure their security posture is sufficiently robust and resilient to meet evolving threats.

    Register for this webinar today. As usual, we’ll leave time for Q&A.
  • The Foundation of Data Quality The Foundation of Data Quality Charlie Piper - CEO and Dan Ortega - VP of Marketing Recorded: Jul 22 2016 5 mins
    Blazent's CEO, Charlie Piper and Dan Ortega introduce the company strategy, vision and it's value to customer's and MSP partners. Together, Charlie and Dan describe how Blazent's platform finds the the most accurate data to improve decision manking in IT and beyond.
  • Ransomware - an Educated Response Ransomware - an Educated Response Stu Sjouwerman, Founder and CEO of KnowBe4 Recorded: Jul 21 2016 12 mins
    Stu Sjouwerman, CEO of KnowBe4, has seen first-hand the devastating impact of ransomware on healthcare entities. And he knows traditional defenses aren't enough to ward off attackers. What's needed is a whole new approach to user education.
  • CA Live API Creator: una manera increíblemente rápida de crear API's CA Live API Creator: una manera increíblemente rápida de crear API's Cesar Triana Recorded: Jul 21 2016 45 mins
    La empresa de la actualidad, a medida que adopta la transformación digital, necesita abordar una série de retos para avanzar.
    En esto webinar los especialistas de CA muestran como el CA Live API Creator es una manera increíblemente rápida de crear API's.
  • Security in the Boardroom Series: Earning and Using Your Seat at the Table Security in the Boardroom Series: Earning and Using Your Seat at the Table Ashley Ferguson, Director, SecureWorks Governance, Risk & Compliance Recorded: Jul 21 2016 60 mins
    This webinar will provide tips for successfully navigating the expanding role of the Chief Information Security Officer as an essential business leader. Explore leading practices for managing cybersecurity risk as a people, process and IT leader. Get tips for building a working relationship with other executive stakeholders in audit, compliance and enterprise risk. And hear how other CISOs are establishing more productive reporting relationships with the board of directors. Whether you’d like to expand your role as a risk and security professional, gain more executive support for key initiatives, or improve your relationship with the board, you’ll take away actionable insights to apply to your own journey as an essential business leader.
  • Prevention Week Part 4: Prevent Ransomware with the Right Architecture Prevention Week Part 4: Prevent Ransomware with the Right Architecture Scott Simkin, Palo Alto Networks Cybersecurity Team Recorded: Jul 21 2016 61 mins
    Thanks to advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data, ransomware is on a tear. To protect your organization from having to pay attackers to free your data, you need to evolve beyond a layered security approach to a prevention-oriented architecture – or face threats of Jurassic proportions.
    Learn more about the right architectural approach for effectively preventing ransomware infections and other sophisticated threats, even across distributed IT environments.
  • The Agile Supply Chain: API-led Connectivity and B2B/EDI The Agile Supply Chain: API-led Connectivity and B2B/EDI Kent Brown, CTO, ModusBox David Chao, Industry Marketing, MuleSoft Recorded: Jul 21 2016 46 mins
    Today's supply chains are faced with an increasing number of distribution channels, a broader set of suppliers and ever decreasing product cycles. A new approach is required that delivers a step change in agility. MuleSoft's API-led approach delivers up to 200% faster development cycles through leveraging re-usable assets. Join us for a walkthrough of this approach, including a demo of Anypoint Platform and Anypoint B2B.
  • A Comprehensive Approach to Next-Generation Endpoint Security A Comprehensive Approach to Next-Generation Endpoint Security Jon Oltsik, ESG; Grant McDonald, Intel Security; and Eyal Dotan, Bufferzone Recorded: Jul 21 2016 59 mins
    Many enterprise organizations are moving beyond antivirus software, adding new types of controls and monitoring tools to improve incident prevention, detection, and response on their endpoints. Unfortunately, some of these firms are doing so by adding tactical technologies that offering incremental benefits only.
    So what’s needed?
    A strategic approach that covers the entire ESG endpoint security continuum from threat prevention to incident response. A truly comprehensive solution will also include advanced endpoint security controls that reduce the attack surface and tight integration with network security, SIEM, and threat intelligence to improve threat detection and response processes.
    Join ESG senior principal analyst Jon Oltsik, Intel Security, and Bufferzone on a webinar on July 21 at 10am PT/1pm ET to learn more about next-generation endpoint security requirements and strategies.
  • Briefings Part 1: Anatomy of a Ransomware Attack Briefings Part 1: Anatomy of a Ransomware Attack Barry Shteiman, Director, Threat Research, Exabeam; Brandon Dunlap, Brightfly Recorded: Jul 21 2016 60 mins
    Ransomware is currently one of the most disruptive security challenges for enterprises. As it moves from an individual employee's PC to the corporate network, the impact can be significant. Despite research and analysis by security firms and analysts, most don't have a good idea of how a piece of ransomware actually operates, i.e. what is affected and when, what signals to look for, etc. Exabeam researchers have detonated nearly 100 strains of ransomware in the labs and produced a detailed analysis of how a ransomware attack actually unfolds, and how an organization might respond to shut it down. Join Exabeam and (ISC)2 on July 21, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms of ransomware, how to detect it and shut down an attack.
  • Effective Monitoring and Defense in Financial Services Effective Monitoring and Defense in Financial Services Dave Hoelzer (SANS) and Lawrence Chin (Palo Alto Networks) Recorded: Jul 21 2016 47 mins
    Cybersecurity Webcast co-hosted by SANS and Palo Alto Networks

    In financial institutions, investments in cybersecurity may occur in fits and starts due to actual incidents, media coverage, or perceived risk. This presents challenges in maintaining a consistent security posture, especially as the threats and the attack surfaces evolve continuously.

    In this webcast you will learn about the value of constant monitoring and awareness of your network traffic, the role and relevance of anomalies, and the benefits of an overall security architecture for financial institutions.
  • Protecting Application Delivery without Network Security Blind Spots Protecting Application Delivery without Network Security Blind Spots Don Laursen, Sr. Product Manager, F5 & Juan Asenjo, Sr. Partner Manager, Thales e-Security Recorded: Jul 21 2016 55 mins
    SSL/TLS is extensively used to protect web traffic, but the technology can also be exploited to create security blind spots. SSL/TLS encrypted tunnels can be used to hide malicious codes and other threats from network security and performance monitoring tools. To prevent possible malware propagation across networks requires decrypt/encrypt capabilities that enable careful traffic monitoring and inspection.
    Join Don Laursen, Sr. Product Manager from F5 and Juan Asenjo, Sr. Partner Manager at Thales e-Security, to learn how a security architecture using application delivery controllers (ADCs) and hardware security modules (HSMs) can ensure you can optimizes web services with traffic inspection, while safeguarding and managing the critical cryptographic keys that underpin security.
  • Cybersecurity Challenges, Risks, Trends and Impacts:  Key Survey Insights Cybersecurity Challenges, Risks, Trends and Impacts: Key Survey Insights Julian Dana (Director, Latin America, Mandiant), Chris Leach (Chief Technologist, HPE) Recorded: Jul 21 2016 59 mins
    No question about it: Information security—or, more precisely, the lack of it—is firmly on the radar for business and information-technology leaders in organizations of all sizes and in every sector. Many executives and managers fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyber attacks, and a shortage of in-house security expertise remains of widespread concern.

    Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review Custom in February 2016. Commissioned by Hewlett Packard Enterprises Security Services and FireEye, join our experts as they discuss this industry survey to uncover:

    •Implications of breach impacts for organizations
    •Benefits of a risk management strategies
    •Current trends in information-security threats

    Register for this webinar today!
  • Up and Running in AWS, Now What About Security? Up and Running in AWS, Now What About Security? Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Jul 21 2016 54 mins
    For many businesses, security, compliance and data protection in the cloud have been a major challenge due to the shared responsibility model and automation of public cloud infrastructure. Trying to force fit traditional security tools into an agile infrastructure like AWS can be time consuming and clumsy, and ensuring consistent security controls requires new practices for security and auditing teams.

    Register for this impactful webinar presented by Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic, as he walks through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Tradition is out: where traditional security does and doesn’t fit
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
  • Gartner names Palo Alto Networks a Magic Quadrant Leader - for the fifth year. Gartner names Palo Alto Networks a Magic Quadrant Leader - for the fifth year. Navneet Singh, Product Marketing Director, Palo Alto Networks Jul 27 2016 9:00 am UTC 45 mins
    Gartner has just released its 2016 report. For the fifth time, we’ve been named a Magic Quadrant Leader for Enterprise Network Firewalls.

    Webinar highlights:

    • Compare next-generation firewalls with legacy products
    • Evaluate top industry leaders
    • Considerations when making purchasing decisions
  • Passive Detection Doesn’t Work: Non-Reactive Approaches To Incident Response Passive Detection Doesn’t Work: Non-Reactive Approaches To Incident Response Devon Kerr, Incident Response Manager, Professional Services, Mandiant Jul 27 2016 3:00 pm UTC 60 mins
    Intrusion investigations are a response to the detection of a threat in the environment. Organizations are investing heavily in technology, training, and personnel who can quickly detect and respond to threats after they’ve gained some amount of access to their environments. It’s this process that leads to containment and gives businesses back control.

    Companies are getting better at detecting threats as a result, but actors may still have been in the environment for several months before that critical moment when tools and personnel finally detect the bump in the night and the investigative process can begin.

    During this conversation, we’ll look at the security ecosystem and some of the reasons why technologies that react to threat activity may not be adequate in this golden age of cyber threats. We’ll also discuss a few of the most important skillsets necessary to cultivate and why personnel and expertise are your secret weapons. Lastly, we’ll suggest some of the most effective sources of evidence to examine as well as some of the analysis techniques you should be using to filter through the noise.

    Register today!
  • Ransomware: The Darker Side of Bitcoin Ransomware: The Darker Side of Bitcoin JP Vergne (Scotiabank Lab, Ivey B-School), Alexander Hinchliffe (Palo Alto), Samee Zafar (Edgar Dunn) Mark Lavender (BT) Jul 27 2016 4:00 pm UTC 60 mins
    Bitcoin has been making remarkable breakthroughs in the currency world. Its ability to allow users to be fully in control of their transactions along with its no-borders transfer policy have made it attractive to both investors and consumers alike.

    However, recent reports have revealed a darker side to Bitcoin. The cryptocurrency is being hoarded by financial institutions as ransom money to pay off potential cyber attackers. Has Bitcoin officially crossed the line and now become a black market currency? Has its untraceable nature inspired the new generation of cyber criminals to initiate unprecedented levels of targeted Ransomware attacks?
    Join this panel of industry-leading speakers, who'll be discussing the following:

    -Why has Bitcoin-related ransomware become more popular in recent years?

    -How can you prevent a Ransomware outbreak in your organisation?

    -Is it possible to catch and subsequently prosecute blockchain criminals?

    -How can authorities and financial institutions adopt and adapt in the face of rising levels of Ransomware threats?
  • From Ransomware to Alert Fatigue: Fighting Cyber Threats with Automation From Ransomware to Alert Fatigue: Fighting Cyber Threats with Automation Nathan Burke Jul 27 2016 5:00 pm UTC 45 mins
    With the rising tide of ransomware and 37% of cyber security professionals seeing over 10,000 alerts per month, it's becoming impossible for organizations to keep up with cyber threats manually. See how innovative security teams are using automation to defend against today's adversaries.
  • Virtualization Unwrapped – How to Scale While Remaining Secure Virtualization Unwrapped – How to Scale While Remaining Secure Chris Olive, Vormetric & Adam Sekora, SimpliVity Jul 27 2016 5:00 pm UTC 60 mins
    There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/compliance issues. Join us for the insightful webcast where we will show how many organizations are tackling these concerns faster and easier than they thought possible. Come away from the webcast with your action plan on how you can start or continue your journey to the cloud without the challenges that may have been holding you back.
  • Webcast:  Mid-Year Threat Review Webcast: Mid-Year Threat Review Stephen Cobb, Senior Security Researcher, ESET Jul 27 2016 5:00 pm UTC 60 mins
    ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
    •Ransomware
    •Regulatory risk
    •PoS malware
    •PCI and two-factor authentication
    •PUAs and scamware
    •IoT vulnerabilities
    •Privacy by design
    •General Data Protection Regulation (GDPR)
  • Making sense of Microsoft security tools Making sense of Microsoft security tools Artom Harchenko Jul 27 2016 5:30 pm UTC 60 mins
    Let our experienced Avaleris consultants paint a picture of the Microsoft Security solutions from end to end. See the mosaic of Microsoft security tools in this webinar, and we will help you wrap your head around the many solutions available to you and your organization.
  • Do You Really Know Your Users? How Security Analytics Can Detect User Threats Do You Really Know Your Users? How Security Analytics Can Detect User Threats David Gorton, Senior Product Manager, LogRhythm & Mark Settle Product Marketing Manager, LogRhythm Jul 27 2016 6:00 pm UTC 60 mins
    As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.

    If you’re focused on addressing user threats, User Behavior Analytics (UBA) can be a powerful tool in your kit. In this webcast David Gorton and Mark Settle from LogRhythm, discuss the elements of an effective user threat detection program. You’ll learn:

    - Why detecting user threats is so important—and so difficult
    - Different approaches to UBA
    - The value of data from across your enterprise
    - How to maximize the efficiency of your security analysts

    Watch the webcast to learn how UBA can help you discover hidden user threats, reduce false-positives, and properly prioritize the most concerning threats.
  • Fighting Claim Fraud with InsurTech Fighting Claim Fraud with InsurTech Ina Yulo (BrightTALK), John Erik Setsaas (Signicat), John Egan (Anthemis Group), Jason Peto (360global net) Jul 28 2016 2:00 pm UTC 60 mins
    When it comes to analysing and managing insurance claims, the market still runs in a very old school manner — human intervention, lots of paperwork and phone calls. This unfortunately also poses a real threat when it comes to fraudulent claims and applications. With digital advances and the rise of InsurTech, these risks can be minimised and fraudulent applications detected way before they can do any harm.

    Join this panel where we’ll discuss:
    -How predictive analytics can help spot fraudulent applications before they can do proper damage
    -How new technologies can help investigate and monitor specific claims
    -The need for more transparency throughout the claiming process and the importance of identity validation
    -Improving the customer journey by empowering the individual to report and settle claims online or through mobile devices
  • Five Steps to Protect Your Data Center Against Cyber Threats Five Steps to Protect Your Data Center Against Cyber Threats Christina Hausman (Product Manager, Cisco Data Center Security) Jul 28 2016 3:00 pm UTC 60 mins
    Data centers are under unprecedented threat from hackers, malware, and insider threats. Yet modern data centers require security that doesn't compromise speed, performance or functionality.

    Join the data center security webinar "Five Steps to Protect Your Data Center Against Cyber Threats" and learn how to secure your data center and achieve consistent security across physical, virtual, and cloud environments.

    In this webinar, data center security expert Christina Hausman (Product Marketing Manager, Cisco Data Center Security) will share with you how to:

    - Identify gaps in your data center security posture
    - Gain visibility and control over custom data center applications
    - Address the full attack continuum before, during, and after an attack
    - Manage traffic flows securely between devices and data centers
    - Adapt fluidly as data centers and threat landscapes evolve
    - Reduce risk and accelerate business outcomes
  • Connecting Network and Application Operations for Optimal ADC Health Connecting Network and Application Operations for Optimal ADC Health Milan Bundalo, Product Manager, Comtrade Software Jul 28 2016 3:30 pm UTC 45 mins
    Lightning-fast and impeccable application delivery performance has nowadays became a modern standard in digitalized world, therefore a daily struggle to deal with increasing network loads has been undertaken into a large amount of attention and work to enable consistent flow in the delivery chain. Applications have become the new gold and protecting application delivery is the most important task for your business.

    Application performance and availability is impacted by a wide variety of factors, therefore Comtrade’s SCOM Management Pack for F5 BIG-IP identifies specific nodes affecting applications and enables complete approach for resolving and maintaining operational functionality.

    In this webinar, you will:
    - Learn how to identify application servers which are unavailable or under heavy load
    - See how to track selected load balancing algorithm performance for the specific application delivery
    - See how repetitive issues can impact overall application delivery
  • From Signal to Action: Security Metrics that Drive Business Decisions From Signal to Action: Security Metrics that Drive Business Decisions Stephen Boyer, Jay Jacobs Jul 28 2016 4:00 pm UTC 60 mins
    How can companies effectively measure their company’s risk of a data breach? Which security metrics are most important when it comes to determining cyber risk? How do different types of security compromises, whether botnet infections or brand name SSL vulnerabilities, contribute to an organization’s risk profile?

    In this presentation, BitSight’s Chief Technology Officer Stephen Boyer and Senior Data Scientist Jay Jacobs answer these questions and more. This data-driven webinar will highlight the extensive analysis that the BitSight Data Science team undertakes to make security signals into concrete risk mitigation actions. Perhaps most importantly, the speakers will give guidance on how security and risk professionals at every level - from the board room to the server room - can drive positive change throughout their organizations.
  • How To View Real-Time Web Application Security Data in Datadog How To View Real-Time Web Application Security Data in Datadog Ilan Rabinovitch, Director, Technical Community and Evangelism at Datadog and Mike Milner, CTO and cofounder of IMMUNIO Jul 28 2016 5:00 pm UTC 60 mins
    With Datadog’s cloud-scale performance monitoring capabilities, users obtain invaluable operational data about their cloud environment and applications. IMMUNIO is the latest addition to the list of more than 100 turnkey Datadog integrations (a group that also includes Amazon Web Services, Docker, and Slack). The IMMUNIO integration makes your existing Datadog monitoring even more powerful. By using IMMUNIO with Datadog, you gain critical insights into how attacks are affecting your system -- and you get the tools you need to stop the attacks immediately.

    The data provided by your IMMUNIO integration with Datadog helps you determine what’s normal for your system and your apps -- so you can quickly zero in on abnormal activity, determine whether it’s malicious, and immediately safeguard your apps.

    Join IMMUNIO and Datadog for this informative webinar and get the scoop on all the benefits of the IMMUNIO integration, including the ability to:

    - Correlate CPU usage spikes with a brute force login attack
    - Diagnose database query latency by matching to a blind SQL Injection attack
    - Use IMMUNIO to stop bots by automatically serving CAPTCHAs, and set a Datadog alert based on number of CAPTCHAs served.
    - Harden your application against Cross-Site Scripting, SQL Injection, Remote Command Execution, and other vulnerabilities -- even many zero-day attacks
  • GDPR - Brexit Means More Changes GDPR - Brexit Means More Changes Darrin Reynolds, Reynolds Privacy; Graham Jackson, General Counsel, (ISC)2; Harvey Nusz, CISO, 4IT Security Jul 28 2016 5:00 pm UTC 75 mins
    The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.
  • A Look Through the CISO’s Eyes A Look Through the CISO’s Eyes Michael Schiebel, Hortonworks Jul 28 2016 5:00 pm UTC 60 mins
    CISOs are often asked to justify a growing budget by showing ROI. But at the end of the day the security organization spends a lot of money and the answer to what is the ROI is that nothing happened. Because when the security leader is doing their job they are invisible. That is a very difficult conversation to have when you are trying to justify growing budget. The challenge is to change the perception as a cost center and become visible. This webinar will explore how to overcome these challenges by influencing the larger company’s budget to eliminate security concerns.

    •Thinking Differently about ROI as companies build IoT businesses and move into cloud-based environments where there are no walls
    •Mind Mapping the Business: The ROI Mind-Set of Security
    •How Threat Detection and Incident Management Becomes a Competitive Advantage
    •The Vision for Next Gen Automated Cybersecurity

    Speaker: Michael Schiebel

    45 Minutes Presentation/15 Minutes for Q & A/Crowdchat
  • Connected Health Devices – Biomed Benefit or Biohazard? Connected Health Devices – Biomed Benefit or Biohazard? Dan McWhorter, Chief Intelligence Strategist, FireEye, John Klassen, Sr. Director, Solutions Marketing, FireEye Jul 28 2016 5:00 pm UTC 60 mins
    Medical devices (biomed) introduce many cybersecurity challenges into healthcare delivery organizations, but what can you do? Connecting medical devices to your network and in turn to your physicians and EMR system increases clinical workflow while opening security holes. Much is out of your control. Device manufacturers control patch cycles and vulnerabilities persist so you segment your network which introduces administration overhead and increases the possibility of breaches due to misconfigurations. As you try harder to improve efficiency, is your environment becoming less secure due to improved connectivity? And what about patient safety when medical devices are connected directly to patients?

    Join Dan McWhorter, Chief Intelligence Strategist at FireEye, and John Klassen, Sr Director Solutions Marketing, on this webinar to learn:

    •The impact on Healthcare cybersecurity from complex medical device ecosystems
    •What kind of attacks connected medical devices are vulnerable to
    •Strategies and tools to lower your risk from compromised devices

    Register today to understand this emerging threat landscape.

    The FireEye Healthcare Team
  • Microsoft Cloud App Security Microsoft Cloud App Security Artom Harchenko Jul 28 2016 5:30 pm UTC 60 mins
    Attend this session to discover Microsoft's Cloud App Security (CAS) as we take you through an in depth demo of this cloud technology . We will explore how Microsoft's CAS allows you to benefit from using cloud applications within your organization, without compromising the security of your organization's data.
  • Information Protection, DLP, Encryption Demo Information Protection, DLP, Encryption Demo Proofpoint Jul 28 2016 6:00 pm UTC 60 mins
    No security posture is 100% effective against attackers. That is why IT teams must proactively identify and protect sensitive and regulated data whether “at rest” in file stores or “in motion” as it is sent or received.

    Proofpoint Information Protection is the only cloud-based suite of solutions designed from the ground up to provide visibility and control of sensitive data across cloud-based email such as Microsoft Office 365, on-premises email, file shares, storage area networks (SAN), network attached storage (NAS), and SharePoint — all with out-of-the-box policies that provide insight to your attack surface in just 24 hours.

    - Proofpoint Data Discover: Quickly discover exposed sensitive and confidential information in shared drives, NAS, SAN and SharePoint sites
    - Proofpoint Email DLP: Prevent accidental negligence by employees with greater accuracy and control
    - Proofpoint Email Encryption: Communicate securely with policy-based encryption of messages and attachments