Hi [[ session.user.profile.firstName ]]

IT Security

  • Quantifying Cyber Risk to Board Members and C-Suite
    Quantifying Cyber Risk to Board Members and C-Suite
    Gaurav Banga, Founder and CEO, Balbix Live 60 mins
    Today, most C-suite and boardroom discussions on cybersecurity are based on gut feelings and incomplete data. Many CIOs and CISOs are quite uncomfortable in these meetings, mainly because they know that they only have a vague idea about the enterprise’s overall cybersecurity picture and are forced to pretend they know what’s going on.

    If a major cybersecurity incident happens, some senior executive becomes the scapegoat. Everyone agrees to increase cybersecurity spending and tighten things up. Then the cycle continues, but nothing really changes. How can we all do better?

    Join Gaurav Banga, Founder and CEO of Balbix as he discusses:
    - Behind-the-scenes deliberations in the board room
    - Challenges in understanding and measuring the enterprise security posture
    - What a mature and cyber-resilient security posture looks like
    - How you can get there

    Gaurav Banga, PhD is the founder and CEO of Balbix, and he also serves on the boards of several companies. Before founding Balbix, Gaurav was the co-founder and CEO of Bromium and led the company from its inception for more than five years.
    Earlier in his career, Gaurav served in various executive roles at Phoenix Technologies and Intellisync Corporation. He was also co-founder and CEO of PDAapps, which was acquired by Intellisync in 2005. Gaurav started his industry career at NetApp. He has a doctoral degree in computer science from Rice University. He is a prolific inventor with
    more than 60 patents.
  • End-User Experience Monitoring: Nothing Else Matters
    End-User Experience Monitoring: Nothing Else Matters
    Alex Duncan, Senior Director of Microsoft Solutions Recorded: Mar 20 2019 42 mins
    Monitoring is critical to any IT organization and most organizations have advanced monitoring of their core IT infrastructure. While this is important, the need to bring monitoring closer to the end-user is becoming of greater importance. With the proliferation of SaaS applications and more complex integrations of applications and datasets, end-user experience monitoring will help close the visibility gap to IT organizations, reducing help desk calls and increasing productivity.

    Riverbed’s SteelCentral Aternity tool can assist organizations with making this vision a reality.
  • The Round the Clock Third Party Advantage
    The Round the Clock Third Party Advantage
    Brandon Dobrec, LookingGlass Cyber Solutions and Paul Roberts, Security Ledger Recorded: Mar 20 2019 61 mins
    Vendors, suppliers, and independent subsidiaries are gaining more and more access to your network and sensitive data because today’s business models include outsourcing of non-mission critical programs and tasks, which brings a whole new world of risk to your organization. These not so new cyber risks make traditional perimeter defense no longer enough. Companies need continuous visibility and monitoring of their external partners threat landscapes. Use a cyber situational awareness platform that provides you with a map of your cyber risks you can identify vulnerabilities before the adversary does.

    In this webinar, LookingGlass Product Manager, Brandon Dobrec and Security Ledger Editor-in-Chief, Paul Roberts will discuss what you need to assess vendors in the modern cyber environment, providing you with the right map to assess your external risk.

    This webinar will answer:

    - Why point-in-time scorecards are a necessary component of third party risk management, but are woefully inadequate for proactively defending against future attacks

    - How a cyber situational platform delivers an outside-in view of your network, allowing you to see gaps in your network

    - Tools, capabilities, features, and functionalities are needed to assess vendor risk – continuous monitoring, alerting, reporting, and dynamic collection & scoring, among others

    - Common attack vectors, why these vectors remain open, and what attack vectors are emerging regularly
  • Don’t Get Jacked: 4 Steps to Protect Your Xaas in the Cloud
    Don’t Get Jacked: 4 Steps to Protect Your Xaas in the Cloud
    Speaker: Matt Chiodi, CSO, Palo Alto Networks Recorded: Mar 20 2019 50 mins
    The good news is that AWS, GCP and Azure provide better core security than your data center could ever provide. The bad news is that your users can also provision a complete stack with only a few clicks... without any security oversight. This session will dissect the latest cloud-based high-profile breaches and highlight four critical steps organizations of all sizes can take to prevent them.
  • 2019 FINRA and SEC Exam Priorities
    2019 FINRA and SEC Exam Priorities
    Raymond Mcgrath, Services, Supervision Policy Consultant; Roman Tobe, Manager, Product Marketing Recorded: Mar 20 2019 57 mins
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2019 and beyond.

    Our industry experts will discuss some of the risks spotlighted for 2019:
    •Supervision of Digital Assets Business
    •Regulatory Technology
    •Adequacy of firms’ cybersecurity programs to protect sensitive information

    Learn how Proofpoint can help you and your firm meet these and other regulatory challenges in the year ahead. Live Q & A will follow.
  • Kubernetes & Zero Trust Security: Supporting a CARTA with Anomaly Detection
    Kubernetes & Zero Trust Security: Supporting a CARTA with Anomaly Detection
    Christopher Liljenstolpe, CTO, Solutions, Tigera Recorded: Mar 20 2019 35 mins
    Learn how Anomaly Detection supports, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Anomaly Detection expands the zero trust network security model and continuously assess the application and network risk that enables adaptive policy adjustments. Anomaly Detection identifies outliers in Kubernetes clusters by building profiles of typical workloads and components to know when they start to deviate from the norm. It also manages network risk by continuously monitoring for activities such as reconnaissance scan, service connections anomaly, service bytes anomaly, and pod outlier activity detection.
  • ISSA Thought Leadership Series: Your Hygiene is Showing-Improving Risk Posture
    ISSA Thought Leadership Series: Your Hygiene is Showing-Improving Risk Posture
    ISSA International Recorded: Mar 20 2019 58 mins
    Cyber hygiene is the flossing of cybersecurity — something we all know we should do, but regularly ignore. While it may be more exciting to get the latest silver bullet to solve a zero-day problem, improving processes to better leverage what you already have will go further in protecting against the next cyberattack.

    In this webinar, a panel of industry experts and thought leaders will discuss:

    * Why establishing a single source of truth across your organization’s entire infrastructure is crucial managing hygiene processes

    * What’s needed to bridge the gap between technologies and teams and to get full value from security investments

    * How prevention strategies should be balanced and aligned with detection and response

    * The importance of cyber resilience in the era of continuous compromise

    Moderator:
    Ken Dunham, Senior Director of Technical Cyber Threat Intelligence, Optiv

    Speaker:
    Amrit Williams, Vice President, Products, Skybox Security
    Kelly Roberston, CEO, SEC Consult America, Inc.
  • 10 Tips Every Job Seeker Should Know
    10 Tips Every Job Seeker Should Know
    Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com Recorded: Mar 20 2019 49 mins
    In a recent CyberSecJobs.Com survey, only 54% of the community said that they knew how to find a job. Of those 54% the top tool for finding a job was asking friends. Finding a job is a full time job. Do you have all of the tools available to you to find your next job? Spend a few moments with Kathleen Smith a Recruiting Marketing expert and hear about the top tips you want to make sure you always have at your fingertips to find your next opportunity.
  • Rethinking Enterprise Security Models
    Rethinking Enterprise Security Models
    Lee Fisher, Head of Security Business EMEA, Juniper Networks Recorded: Mar 20 2019 22 mins
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Configuration Compliance Management for 2020 and Beyond
    Configuration Compliance Management for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Mar 20 2019 40 mins
    Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:

    •What configuration compliance management encompasses
    •Who should care about secure configuration management
    •Why organizations are not doing this today and how this impacts the business beyond IT


    Discover the future for configuration compliance management by attending this educational webinar. Register now!
  • Expert Q&A 5 Steps to Implementing Security Automation
    Expert Q&A 5 Steps to Implementing Security Automation
    Joe Schreiber, Technical Director, Business Development, Tufin & Karen Crowley, Sr. Product Marketing Manager, Tufin Recorded: Mar 20 2019 46 mins
    Join automation expert Joe Schreiber on March 20th as he shares his experiences automating himself out of a job (in a good way), and discusses where to start and how to avoid risk.

    Joe will present his five steps and answer questions from the audience on how to:

    Collaborate with the rest of your team on automation
    Organize your multi-vendor toolbox and use APIs to ensure success
    Empower your teams to write reusable, value-driven code
    Leverage modern applications in containers, microservices, and serverless environments
    Got questions? Send them to Joe ahead of time to be included in the discussion.
  • Micro-segmentation is achievable. What's stopping you?
    Micro-segmentation is achievable. What's stopping you?
    Joe Onisick, CTO, Xentaurs Recorded: Mar 20 2019 20 mins
    Yes, micro-segmentation (uSeg) is complex and seems expensive. But, the barriers are finally breaking down. True uSeg is now achievable, and we’ll tell you how. In 30 minutes, we’ll define:

    1. The scope of uSeg
    2. uSeg models that really work
    3. Requirements for successful implementation
    4. Why this approach is defining modern cybersecurity strategies

    Join us Wednesday, March 20, at 11 a.m. for our webinar, Micro-segmentation is achievable. What's stopping you?
  • Behavioral Economics and the Savings Crisis
    Behavioral Economics and the Savings Crisis
    Kristen Tyrrell, COO, Catch Recorded: Mar 20 2019 54 mins
    Managing your safety net has gotten harder. Having enough money set aside for emergencies, saving for retirement, and even getting the right insurance is confusing and expensive. Why is that? How can we build solutions that help provide stability in the face of increasing income volatility, short-circuited reward systems, and systemic challenges? In this webinar our guest Kristen Tyrrell will highlight the challenges of the current savings crisis and dive deep into framing behavioral economic solutions for new ways to build financial security and grow wealth.

    In this webinar, you’ll learn:
    oWhat is a financial safety net?
    oWhat is the savings crisis?
    oWhy is it so hard to save?
    oWhat can we do to make it easier?
  • OpenShift 4 and Black Duck: New Runtime, Same Secure Containers
    OpenShift 4 and Black Duck: New Runtime, Same Secure Containers
    Jay Dobies, Red Hat & Dave Meurer, Synopsys Recorded: Mar 20 2019 60 mins
    OpenShift 4 represents the culmination of a number of new technologies. One key feature of this release is CRI-O, the new container runtime that is optimized for OpenShift. But a new runtime doesn’t have to be scary. Black Duck OpsSight for OpenShift still provides the same security intelligence and visibility into all the third-party open source software that composes your containers.

    Join experts from Synopsys and Red Hat as we explore the following topics:
    • Upcoming features in Red Hat OpenShift 4, including the drivers and benefits of the Operator Framework
    • How Black Duck and Clair complement each other
    • The Synopsys application security portfolio
    • Black Duck OpsSight for OpenShift architecture
    • OpenShift 4 Black Duck OpsSight demonstration on a CRI-O container
  • Live global security roundtable: perspectives, threats and risks per region
    Live global security roundtable: perspectives, threats and risks per region
    BT's Security experts: Steve Benton, Hila Meller, Juni Yan, and Gary Symes Recorded: Mar 20 2019 30 mins
    Join four of our top security experts to hear their point of view and their vision for security across the globe. Our vice presidents from Asia, Middle East, Australia and Africa, America, Europe and the UK will share their frontline experience of dealing with some of the security challenges in their region.

    Cybersecurity is a truly global concern with attacks and threats emanating from all over the world. The way each region tackles the cyber threat is subtly different. Our experts will take you through some effective security strategies and programmes that you can put in place to protect your "crown jewels" against the evolving global threats.

    Whether you're a multinational organisation with worldwide operations, or based in one particular region, our webinar will give you a local and global view on how to find your way around the security minefield.

    Speakers:
    - Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes
    - Hila Meller, Vice President, Security, Europe
    - Juni Yan, Vice President, Security, Asia Middle East, Australia and Africa
    - Gary Symes, Vice President, Security, Americas
  • Creating a Cybersecurity Culture
    Creating a Cybersecurity Culture
    Heather Stratford, CEO of Stronger.tech Recorded: Mar 20 2019 44 mins
    For the last 2 decades, technology security was delegated to the IT team. It was role specific and designated for one small subsection of the IT team. That mentality and way of thinking must change.

    A paradigm shift is required for the whole organization. Every part of the organization contributes to the success or failure of the organization. Creating a security culture is not a one-time event, it is a new way of talking and acting.

    Join this webinar with Heather Stratford, CEO of Stronger.tech to:
    - Understand the steps that need to happen to create this culture
    - See where your organization is on the scale of creating a Strong Security Culture
    - Learn why creating a security-minded culture is an essential part of the "new" requirements for a CIO.
  • Safe, Secure, Convenient: The 30-Minute Enterprise File Sharing Buyer’s Guide
    Safe, Secure, Convenient: The 30-Minute Enterprise File Sharing Buyer’s Guide
    Nick Scholz, Robin Redgrave and Devadas Kovilakath, Micro Focus Recorded: Mar 20 2019 48 mins
    As companies undergo digital transformations—with a laser focus on simplifying operations and boosting productivity—users are being asked to get more done faster and with fewer resources.

    In this climate, it’s not surprising that employees independently turn to cloud file sharing services they may already be using at home to help them sync and share their files and get their work done.

    But these consumer-grade services lack the security, control, and management features that many organizations need to protect themselves from data loss, breaches, and business continuity failures, so many IT leaders are stuck: how do they enable productivity and ease the sharing of critical files without compromising their security and compliance needs?

    Join Nick Scholz, Robin Redgrave and Devadas Kovilakath to see what experts are saying about what to look for in an EFSS solution, and how to figure out which one fits your needs.

    You’ll learn:
    • What features help users adopt
    • The state of the EFSS landscape
    • The benefits and shortfalls of Cloud vs. On Premises solutions
    • How to maximize security AND collaboration
    • And more!
  • IRP and SIEMs: How to beat the volume vs. visibility
    IRP and SIEMs: How to beat the volume vs. visibility
    Andy Yeates, Solutions Architect, IBM Resilient Recorded: Mar 20 2019 47 mins
    Combining an IRP solution with a SIEM makes security operations more mature in order to triage, reduce the time to respond, improve SOC efficiencies, and gain overall a significantly improved accuracy.
  • Cyber Security Brief: DE data leak, dodgy IoT devices, and PewDiePie hackers
    Cyber Security Brief: DE data leak, dodgy IoT devices, and PewDiePie hackers
    Cyber Security Brief Podcast Recorded: Mar 20 2019 22 mins
    We discuss the fact that most people don’t trust their internet of things devices, but also aren’t that willing to pay extra for improved security. We also chat about the major leak of personal data of high-profile politicians and others in Germany, and developments in the campaign of the hackers taking over printers and Chromecasts to express their support for PewDiePie (and highlight security issues). Finally, we take a look at some research highlighting the fact that facial recognition on smartphones still isn’t foolproof.
  • Panel: Network Security and Compliance best practices for Financial Institutions
    Panel: Network Security and Compliance best practices for Financial Institutions
    Asher Benbenisty, Director Product Marketing; Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) Recorded: Mar 20 2019 24 mins
    Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.

    There’s a better way to manage your network security!

    Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.

    Topics include:

    •How to overcome security management complexities with automation
    •How to pass compliance audits in the face of demanding regulations
    •Key industry metrics that compare security environments within and beyond the finance industry
    •Real financial customers case studies
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Recorded: Mar 20 2019 85 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Verizon Insider Threat Report and the current cybersecurity threat landscape.

    We'll cover:
    •The time it takes to discover a breach after the first action
    •5 insider threat types identified by our caseload
    •Top 3 insider threat motivations
    •Top industries suffering sensitive data breaches

    Our Verizon Threat Research Advisory Center presenters will be:
    •John Grim, Senior Manager, Investigative Response - America
    •Domingo Jesus Alvarez-Fernandez, Senior Dark Web Hunter, Threat Intelligence
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • ICS threats in H2 2018: deep dive into attack statistics and security weaknesses
    ICS threats in H2 2018: deep dive into attack statistics and security weaknesses
    Kirill Kruglov, senior security researcher at Kaspersky Lab ICS CERT Recorded: Mar 20 2019 61 mins
    The webinar will be helpful for those who wish to know more about current ICS cyberthreats.

    The webinar’s speaker Kirill Kruglov, senior security researcher at Kaspersky Lab ICS CERT, will talk about major threats relevant to industrial control systems that Kaspersky Lab ICS CERT identified in H2 2018. In addition to discussing general statistics on malicious attacks that were detected and prevented by Kaspersky Lab products on industrial computers globally, he will offer a deeper dive into the attacks we saw, TTPs used by attackers, and root cause analysis of major security weaknesses we discovered. In addition, Kirill will discuss the methodology used to collect and analyze the data, which will help the webinar participants to better understand what these figures mean.
  • Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
    Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
    Flavio Di Cosmo, Pre-Sales Engineer SEEMEA Recorded: Mar 20 2019 28 mins
    Una rete segmentata rende operativa le policy di sicurezza, consente uno stato di compliance continua con il minimo sforzo e offre opzioni di mitigazione per gli attacchi informatici. Ma la segmentazione della rete non è un compito facile!

    Unisciti agli esperti di Tufin il 20 Marzo 14:30 mentre condividono consigli utili per la segmentazione della rete, tra cui:

    •Insidie da evitare durante la creazione di una strategia di
    segmentazione
    •Framework per la segmentazione
    •Linee guida per l'applicazione e il mantenimento di una rete
    segmentata
  • Cybercrime: The Rise Of Information Theft And Its Cost
    Cybercrime: The Rise Of Information Theft And Its Cost
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Mar 20 2019 46 mins
    Cybercriminals have never been so interested in the theft, trading and monetisation of data before. Information stealing malware is rapidly increasing, and the design of this malware and the way stolen data is used are both seeing great criminal innovation.

    Join Webroot’s Threat expert as he discusses topics such as:

    · Top reasons data is stolen from businesses
    · Direct and indirect costs of a breach and steps to mitigate this threat
    · The shifting of targets in phishing and other data theft in recent times
    · The rise of banking trojans, modular malware and other info stealers
    · Darkweb trading
    · GDPR and legal repercussions of a breach
  • Rethinking Enterprise Security Models
    Rethinking Enterprise Security Models
    Lee Fisher, Head of Security Business EMEA, Juniper Networks Mar 21 2019 3:00 am UTC 22 mins
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Mitigating Security Risks on Your Cloud Journey
    Mitigating Security Risks on Your Cloud Journey
    Tim Fong, Product Marketing Lead, Security Solutions & Derek Yee, Product Marketing Lead, Performance Solutions @ Cloudflare Mar 21 2019 4:00 am UTC 43 mins
    Whether you are just exploring moving workloads to the cloud, or are fully cloud-enabled, one thing is certain: security has changed from a purely on-premise environment.

    As cybersecurity risks continue to grow with more advanced attackers and more digital surface area, how you think about staying secure without compromising user experience must adapt.

    During this talk, you will:

    -Hear how global consistency, agile controls, and predictable costs are goals and principles that matter in this new environment
    -Be able to evaluate your current plans against a "customer security model"
  • Luttez efficacement contre les bots malveillants
    Luttez efficacement contre les bots malveillants
    Gregory Rabin - Systems Engineer, F5 Networks Mar 21 2019 9:00 am UTC 66 mins
    Pour les entreprises à la recherche d’une stratégie de sécurité durable, il est primordial de savoir identifier les bots malveillants et de s’en prémunir. Participez à ce webinar pour découvrir :

    • Comment les bots infectent et attaquent les applications et se propagent
    • Les types d’attaques généralement réalisées par les bots ciblant les applications
    • Comment vous défendre contre ces bots malveillants sans affecter ceux qui sont inoffensifs

    En regardant ce webinar, vos données personnelles seront partagées avec F5 et traitées conformément à la politique de confidentialité F5 (https://f5.com/about-us/policies/privacy-policy). Vous recevrez également des communications liés aux produits et services F5, vous pourrez vous désabonner à tout moment.
  • Mjukvara i hjärtat av alla fordon
    Mjukvara i hjärtat av alla fordon
    Per-Olof Persson, Security Advisor, Synpsys | Dennis Kengo Oka, Application Engineer, Synopsys Mar 21 2019 10:00 am UTC 90 mins
    När fordon blir smartare blir även säkerheten inom bilindustrin allt viktigare. Bilar förvandlas till Wi-Fi-hotspots och innehåller många miljoner kodlinjer för autonom körning. Som ett resultat är fordonen mer sårbara än någonsin för buggar, hackare och dataintrång.

    Kärnan i morgondagens fordon är programvara med artificiell intelligens och kraftfulla kiselchips som alla arbetar tillsammans. Lär dig hur dessa tekniker kommer att förvandla den traditionella underleverantörskedjan från en mekanisk driven värld till en digital.
  • Strengthen your security posture with SonicWall virtual firewalls
    Strengthen your security posture with SonicWall virtual firewalls
    Bob Honour & John Aarsen Mar 21 2019 10:00 am UTC 60 mins
    With cloud adoption growing each day, next-generation firewall capabilities are essential to protect workloads in the cloud from advanced threats via automated real-time detection and protection.

    Join SonicWall experts for an interactive webinar to learn how SonicWall Network Security virtual (NSv) firewall series can help strengthen the security posture of your hybrid and multi-cloud environments. In this webinar you’ll learn about:

    •Key industry trends and threats
    •NSv’s ability to effectively shield all critical components of your private or public cloud environments
    •Ensuring lateral movement protection and consistent security posture
    •Stopping advanced threats
    •See a live demonstration
  • Wired Security -Don`t go breaking my Network!
    Wired Security -Don`t go breaking my Network!
    Richard Leadbetter, Technical Sales Specialist, EMEA & Derin Mellor, ClearPass Specialist, EMEA Mar 21 2019 10:00 am UTC 45 mins
    We’re all waking up to the fact that we need to start securing our wired edge networks. In theory this should be no different from securing wireless; and covered by the same access policies. The trouble is that the wire has always worked, instantly – and understandably we don’t like to mess with that! How do we recommend that wired security is approached to ensure a successful deployment? Join us to find out!
  • Measure and Mature: Security Operations under the spotlight
    Measure and Mature: Security Operations under the spotlight
    Andrew Hollister, Chief Architect and Product Manager, LogRhythm Labs Mar 21 2019 10:00 am UTC 45 mins
    Effective security operations are the first line of defence when it comes to preventing cyberattacks. In order to accomplish this, organisations need a mature security program that leverages people, process, and technology to enable rapid detection and response.

    Yet some organisations struggle with the overall effectiveness of their security operations. They lack a model for maturing their capabilities. A mature security operation enables threats to be detected earlier in the cyberattack lifecycle which is critical.

    Join this webinar to discover LogRhythm's Security Operations Maturity Model (SOMM) which was developed to help organisations assess their level of maturity and plan for making improvements over time.

    Organisations can use this model to evaluate their current security operations and develop a roadmap to achieve the level that is appropriate in the light of their resources, budget, and risk tolerance. You will also hear about the critical measures of security operations effectiveness.
  • UK supermarkets - the longest cold war?
    UK supermarkets - the longest cold war?
    ISM Fellow - Andrew Grant Mar 21 2019 11:00 am UTC 30 mins
    Why you should attend:

    An up to date analysis of the UK supermarket sector - mergers, acquisitions, consolidation, relentless pressure - but why no all-out price war for the past 15 plus years - would Amazon's entry be the final straw?

    What you will learn

    •Unmissable for anyone selling into the UK supermarkets
    •Get yourself fully up to date with the latest changes that could impact your business
    •Delivered by an acknowledged industry expert
  • Avoiding Commodity Cybercrime
    Avoiding Commodity Cybercrime
    David Carroll, CEO, XQ Cyber & Andy Webb, Head of Products, UKCloud Mar 21 2019 11:00 am UTC 60 mins
    Join us for our upcoming webinar: Avoiding Commodity Cybercrime with David Carroll, CEO at XQ Cyber and Andy Webb, Head of Products at UKCloud.

    This webinar will explore the cyber risks faced by organisations with a particular focus on commodity cybercrime. Over the course of the webinar, XQ Cyber CEO David Carroll will delve into some infamous incidents of cybercrime, the possible implications organisations face from having poor cybersecurity. He will also discuss why it's going to get worse, why should we care and what we can do about it.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • IT-Sicherheit 2019: Ausgeklügelte Phishing und Malware Attacken wie Emotet, Ryuk
    IT-Sicherheit 2019: Ausgeklügelte Phishing und Malware Attacken wie Emotet, Ryuk
    Marcel Leitel, Sales Engineer DACH Cyren Mar 21 2019 1:00 pm UTC 58 mins
    Die Flut an Cyberattacken ist im vergangenen Jahr deutlich angestiegen und werden in 2019 immer intelligenter und raffinierter. Attacken wie Emotet und TrickBot machten im Januar und Februar ein großer Anteil der Phishing-Angriffe aus. Die Eindringlinge haben es nicht nur auf die IT-Spezialisten in Unternehmen, sondern auch auf Ihre Mitarbeiter abgesehen.

    Unternehmen begegnen dieser Herausforderung häufig mit einer Vielzahl von Sicherheitslösungen nach dem Best-of-Breed-Ansatz. Ein aufwendiges Management, mangelnde Integration und nicht erkannte Sicherheitslücken sind die Folge.
  • Cyber Security Assurance
    Cyber Security Assurance
    Ian Glover, President, Council of Registered Ethical Security Testers (CREST) Mar 21 2019 1:00 pm UTC 37 mins
    There is an increasing need to provide evidence of cyber capability to provide confidence to regulators, boards, shareholder and other interested parties. In addition to providing confidence, there is also a requirement to provide evidence following a cyber security breach.

    In order to provide this evidence we must develop international standards to allow business to provide the it in a consistent manner. The supplier industry must help to promote these standards with the support from governments and regulators.

    No all of the requirements for security are the same, there is therefore a need to create a process providing this evidence from basic cyber hygiene through to Critical National Infrastructure. The companies must be suitably accredited and the individuals must have appropriate credentials and experience.

    Importantly the cyber security industry must move from simply being providers of advice to providing opinions. This will mean the industry must move to being accountable. This will in turn help to professionalise the industry.

    Key takeaways:
    *Need to provide evidence of cyber capability to regulators, boards, shareholder and other interested parties.
    *Evidence following a cyber security breach is essential, but unstructured
    *International standards developed by supplier industry with support from governments and regulators.
    *Evidence required from basic cyber hygiene through to Critical National Infrastructure is different.
    *Cyber security industry must move from advisory to accountability, this is a massive change!
  • Bojujte za dobro proti zlým botům
    Bojujte za dobro proti zlým botům
    Radovan Gibala - Senior Systems Engineer, F5 Networks Mar 21 2019 2:00 pm UTC 54 mins
    Hlavní prioritou pro organizace, které podporují strategii udržitelného zabezpečení, je identifikovat škodlivé boty a vytvořit proti nim ochranu. Zúčastněte se tohoto webináře a dozvíte se:

    • jak boti infikují systémy, šíří se a napadají aplikace,
    • jaké typy útoků na aplikace boti obvykle provádějí,
    • jak se můžete bránit proti zlým botům, aniž byste zničili ty hodné.

    Sledováním tohoto webináře souhlasíte, že Vaše osobní údaje budou sdíleny s F5 a zpracovávány v souladu se Zásadami o ochraně osobních údajů společnosti F5 (https://f5.com/about-us/policies/privacy-policy). Také souhlasíte, že Vás F5 může kontaktovat ohledně produktů, služeb a budoucích akcí F5, ale s možností se kdykoli odhlásit.
  • Cyber Security Brief: Ukrainians indicted, Tesla hacks, and crypto breach
    Cyber Security Brief: Ukrainians indicted, Tesla hacks, and crypto breach
    Cyber Security Brief Podcast Mar 21 2019 2:00 pm UTC 24 mins
    We discuss the indictment of two Ukrainian nationals for their role in a conspiracy to hack into the Securities and Exchange Commission’s (SEC) computer systems. We also chat about the recent controversy about GoDaddy quietly injecting scripts onto websites without the website owners knowing, and recent attacks on cryptocurrency exchanges. We also cover the Pwn2Own contest offering cash prizes for hacks on a Tesla vehicle for the first time, and how credit card scammers are using smartcard technology to their advantage.
  • Demystifying blockchain: a guide for digital retailers
    Demystifying blockchain: a guide for digital retailers
    Moderator - Caroline Baldwin, Speaker - Richard Stockley, Samantha Livesey Mar 21 2019 3:00 pm UTC 75 mins
    The technology industry claims it will fundamentally change how companies do business. It will provide much-needed visibility in the supply chain as well as enable trust between organisations sharing information.

    But what is blockchain, exactly…? “Distributed ledgers than create an unchangeable and shared record of transactions”. OK, sounds interesting, but how does it really work? And most importantly, what does it mean for retail?

    Join this Essential Retail webinar as we demystify blockchain with IBM, retailer and analyst.

    Key takeaways:

    - Demystifying blockchain – IBM talks us through the buzzword, explaining its an "engine of trust"
    - Learn about IBM Food Trust, how its use of blockchain increases transparency within the complex food supply chain, and the pay off for all the participants exchanging data
    - Retailer talks through its experience of rolling out blockchain within the organisation
    - Analyst/lawyer takes a deep dive look at how blockchain could have a serious impact on businesses all over the world
  • This is Security: Nothing is what it SIEMs
    This is Security: Nothing is what it SIEMs
    Dan Pitman, Principal Security Architect, Alert Logic Mar 21 2019 3:00 pm UTC 60 mins
    Companies of every size and across every industry need to have a solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming.

    Organisations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.

    A seamless combination of platform, threat intelligence, and expert services can provide a simpler, most cost-effective approach to security for all infrastructure and workloads across physical, virtual and cloud environments.

    Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Join our Principal Security Architect, Dan Pitman to learn more about this more effective approach to cybersecurity and threat management.

    Highlights Include:
    • Insights from Alert Logic's 2018 Critical Watch Report
    • Realities for scaling threat detection & response across on-prem to cloud environments
    • Understand how today’s vulnerabilities are being exploited
    • Find out how to achieve the right level of leverage for the optimal level of investment
  • Best Cyber Breach Prevention: Certified NIST RMF/FedRAMP Professionals
    Best Cyber Breach Prevention: Certified NIST RMF/FedRAMP Professionals
    Dr. V. N. Berlin, CEO, Mission Critical Institute, Mr. Rob Chubbuck, Information Assurance Systems Engineer Mar 21 2019 3:00 pm UTC 60 mins
    Learn why employer’s find that certified NIST RMF/FedRAMP professionals provide the best breach prevention strategy.

    You will learn exactly what are the NIST RMF/FedRAMP tools and how they work. Then you will learn how certified professionals employ these tools to ensure enterprises establish the best breach prevention strategy.

    You will then discover what makes a certified NIST RMF/FedRAMP professional and why they are critical to helping enterprises create the strongest breach prevention strategy.

    Next, you will examine the strategies enterprises follow to build teams of effective, certified NIST RMF/FedRAMP professionals.

    Last, you will see how to become a certified NIST RMF/FedRAMP professional. The webinar covers the key certifications including the CISSP, CEH and Certified Cloud Risk Management Professional (CCRMP) certification.

    To help motivate interested candidates to pursue this career path, MCI offers qualified attendees access to complimentary $500 CISSP Exam Vouchers and $1995 CISSP Exam Prep Course Vouchers.
  • Top Considerations for Software Audits in M&A Due Diligence
    Top Considerations for Software Audits in M&A Due Diligence
    Phil Odence, Synopsys Mar 21 2019 4:00 pm UTC 60 mins
    There is risk in any M&A transaction but having the right tech due diligence approach can help mitigate that risk. If software is a large part of the deal valuation, you need to understand any potential legal and security risks in the target’s codebase that could affect the value of the IP, and the remediation required to address those risks.

    Join Phil Odence, General Manager of Black Duck On-Demand with Synopsys, to take a closer look at how you can identify and reduce risks in M&A tech due diligence. He’ll cover the following points and more:

    • Uncovering application risks: What’s in the code
    • Taking a comprehensive approach to security audits
    • Choosing the right partner for audits

    Don’t miss this informational webinar. Register today!
  • Building a Cybersecurity Architecture to Combat Today’s Risks
    Building a Cybersecurity Architecture to Combat Today’s Risks
    Erik Bartholomy (LogRhythm) and Eric Parent (Sonepar) Mar 21 2019 4:00 pm UTC 47 mins
    Building a Cybersecurity Architecture to Combat Today’s Risks:
    Foundations, Visions, Testing and the Role of SIEM

    The rapid development and adoption of cloud infrastructure, mobile workforces, IoT and other susceptible environments has mandated a reappraisal of security architecture. Modern organizations are recognizing their security posture may not be keeping up with the threat landscape, and this leads to frightening discoveries around the safety of their data and networks.

    In this webinar, Erik Bartholomy – a Security Architect at LogRhythm – will be joined by Eric Parent – CISO at Sonepar – to discuss how security architecture is developing to face the current threat landscape. Failures in past layered approaches are frequent, and serve as valuable learning lessons on the importance of proactive monitoring and response.

    During the webinar our speakers will discuss:

    •How LogRhythm’s POC enabled Sonepar’s team to efficiently expedite threat detection, and improve their SOC and analyst efficiency

    •The guiding principles and technology behind modern security frameworks and architecture, including the rise in popularity and value of the Zero Trust Framework

    •How security architecture helps align IT security with business strategy and current threats

    •Adapting architecture to accommodate different environments, including on-premises, cloud, and hybrid cloud
  • After the Attack—Surviving and Thriving Post-Breach
    After the Attack—Surviving and Thriving Post-Breach
    Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly Mar 21 2019 4:00 pm UTC 60 mins
    More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:

    • Understand responsibilities and ramifications of ever-tightening data privacy rules
    • Minimize damages and mitigate risk exposure with rapid response strategies
    • Identify various breach threats and common network vulnerabilities
    • Analyze key learnings from prominent breach events
    • See how technology can help you investigate, automate and document key processes
  • Cloud Security Top Threats:How to Secure the Future While Learning from the Past
    Cloud Security Top Threats:How to Secure the Future While Learning from the Past
    Dan Hubbard, Chief Product Officer, Lacework & John Yeoh, Director of Research, CSA Mar 21 2019 5:00 pm UTC 60 mins
    IaaS/PaaS providers like AWS, Azure, and GCP are increasing the productivity of our developers-- making our organizations extraordinarily agile. That same agility must be matched with security and compliance measures of the same speed and scale.

    The vast majority of cloud security threats are from misconfigured IaaS instances, compromised accounts, and insider threats but there's emerging threats on the rise as well. And you’ll need deep visibility into your workloads and containers to fight back.

    Join us for a live webinar with Dan Hubbard, inaugural CSA Research Fellow, co-inventor of the CSA top threats, and Lacework CPO on the current and emerging threats to public cloud and how best to automate security and compliance across AWS, Azure, and GCP, including:

    - Current and emerging threats to AWS, Azure, and Google Cloud environments
    - Recommendations on how to prevent, detect, analyze, and respond to cloud cyber attacks
    - How to move away from a network-centric mindset and adopt a cloud approach
    - How to automate security and compliance across AWS, Azure, GCP, and private clouds
  • Close the gap in your ransomware defense
    Close the gap in your ransomware defense
    Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro Focus Mar 21 2019 5:00 pm UTC 60 mins
    Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.

    Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.

    Join this webinar to learn about:

    • Ransomware challenges and impact
    • Why malware detection alone is not enough
    • How to close the gap with holistic endpoint data and device management
  • DX Takes Businesses By Storm, Security a Top Concern Per New CISO Study
    DX Takes Businesses By Storm, Security a Top Concern Per New CISO Study
    Patrick Spencer, Content Marketing; Stephan Tallent, MSSP & Service Enablement; John Jacobs, CP, Systems Engineering Mar 21 2019 5:00 pm UTC 44 mins
    Join us to hear from two security leaders, and their interpretation of the takeaways taken from the findings of a new global survey of 300 enterprise CISOs on topics such as security traits and best practices of top-tier security organizations and much more.
  • [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, Lynx TP; David McNeely, Centrify Mar 21 2019 5:00 pm UTC 75 mins
    In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.

    Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

    - Getting a clear picture of the current health of your organizations' defenses
    - Defining your security road map using NIST CSF as a framework
    - Conducting gap analysis and executing remediation actions
    - Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
  • Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. Dunlap Mar 21 2019 5:00 pm UTC 60 mins
    Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
  • NETSCOUT Worldwide Infrastructure Security Update
    NETSCOUT Worldwide Infrastructure Security Update
    Gary Sockrider, Director – Security Technologist, NETSCOUT Mar 21 2019 5:00 pm UTC 45 mins
    NETSCOUT’s 14th Annual Worldwide Infrastructure Security Report (WISR) offers a unique view into the most critical security challenges facing today's network operators. The report covers a wide variety of topics, from attack vectors to DNS pitfalls, to key organizational issues such as incident response training and staffing challenges.

    This year, the survey is further enhanced by regional break downs of the Enterprise respondents, thanks to our partners at Intelliclear. Attack types, targets, techniques, motivations, impacts, and costs are all broken out for US and Canada, Brazil, UK, Germany, France, and Japan.

    Join this webcast to learn:

    The challenges ahead for those involved in day-to-day network and security operations.

    How your network infrastructure may be impacted by the rapidly changing threat landscape.

    What your peers are doing to address the threats, as well as persistent staffing challenges.

    Register today, space is limited.