Hi [[ session.user.profile.firstName ]]

IT Security

  • Part I: New Hands-On Cloud/Cyber Security Certification
    Part I: New Hands-On Cloud/Cyber Security Certification
    Dr. V. N. Berlin, CEO Mission Critical Institute Recorded: Nov 17 2018 26 mins
    New Hands-On Cloud Cyber Security Certification: Learn how to qualify and fast-track your cyber career in this 3 part series

    Includes Free CISSP Adaptive Exam Prep

    In this three part webinar series you will learn about the new Certified Cloud Risk Management Professional (CCRMP) certification—
    • How the CCRMP helps you fast-track your cloud security career
    • Employers who hire CCRMPs
    • Cybersecurity jobs CCRMPs are getting
    • How veterans have benefited
    • How to qualify for the CCRMP
    • Why the free CISSP Adaptive Exam Prep is offered to CCRMPs

    CCRMP Rationale
    Employers seek cloud risk management professionals who are job-ready to utilize the NIST Risk Management Framework (RMF) and FedRAMP– the de facto U.S. standards for cloud security risk management. FedRAMP employs the NIST RMF as the tool of choice and requires all Cloud Service Providers for the federal government to comply with FedRAMP, and thus the NIST RMF. Similarly, cloud risk management professionals seek a certification which validates they are job-ready to implement the NIST RMF and FedRAMP. To meet the needs of employers and candidates Mission Critical Institute (MCI) has launched the only performance-based NIST RMF certification, the Certified Cloud Risk Management Professional (CCRMP) to address:
    • Accelerating cybersecurity staffing shortages
    • Scarcity of “job-ready” NIST RMF/FedRAMP specialists
    • Need for performance-based certifications, as opposed to exam-based certifications

    Benefits of the CCRMP
    The benefits of earning the CCRMP include:
    • 100% hands-on—no exam
    • NIST RMF/FedRAMP virtual internship
    • Earn 15 graduate credits for your accredited cloud security MSIS or MBA
    • Validation you are NIST RMF/FedRAMP job-ready
    • Cyber career development support to help you find a top cyber job
    • NIST RMF/FedRAMP project experience employers seek
    • Recognition of curriculum by Department of Homeland Security
    • Pay increase potential even while earning your CCRMP
  • Customer Panel: Building a Modern Security Program
    Customer Panel: Building a Modern Security Program
    Maranda Cigna, Director of Product Marketing, Rapid7 Recorded: Nov 16 2018 47 mins
    Wondering how your peers are solving some of today’s most common incident detection and response challenges? Struggling to implement a security orchestration and automation strategy that can complement your SIEM?

    Join a group of Rapid7 customers as they discuss how they have built their incident detection and response programs to combat today’s most prevalent cybersecurity threats. No matter where you are in your cybersecurity journey, our panel of experts will be able to guide you to security success.

    Our experts will cover a variety of today’s hottest security topics, including:

    1. How they have built their incident detection and response programs with Rapid7
    2. Today’s modern threat landscape and the most common threats they are facing
    3. Metrics from detection and response programs that are most important to share with executive staff
  • Setting Your SOC up for Success
    Setting Your SOC up for Success
    Wade Woolwine, Director of Managed Services, Rapid7 Recorded: Nov 16 2018 58 mins
    Considering adding 24/7 SOC coverage to your incident detection and response programs? Experiencing challenges with operating your existing SOC? Simply adding a SOC to your portfolio without adequate preparation is going to result in poor performance in threat detection, high turnover in valuable resources, and a general underperformance of a heavy financial investment.

    In order to get the most from your investment, SOC analysts require full visibility through the right technology, a well-defined mission, team structure, and leadership, and most importantly the SOC must augment existing high-performance security programs.

    Join Wade Woolwine, Director of Rapid7’s MDR service and SOC, to learn some of the key considerations that should be in place before hiring your first SOC analyst.
  • Is Your Organization Ready for Automation?
    Is Your Organization Ready for Automation?
    Scott King, Senior Director, Advisory Services Recorded: Nov 16 2018 56 mins
    Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout.

    Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?

    Join Rapid7 experts for an engaging discussion where you’ll learn:

    1. Key considerations that should be in place before implementing automation
    2. When is the right time to add automation (and when it isn’t)
    3. Which common security tasks are ideal to automate
    4. How to prepare your organization for SOAR
  • Unleashing the Power of Self Service
    Unleashing the Power of Self Service
    Mark Smiley and Matt Walton Recorded: Nov 16 2018 36 mins
    There is a great amount of focus (rightly so) that goes into managing contact centers. Driving down the cost per contact is one of the primary objectives of a support organization, and our associates at Cask work closely with our clients to maximize efficiency while maintaining exceptional levels of customer service. Working with the ServiceNow platform, contact center costs can be decreased substantially by enabling a world-class self-service support channel. Our expertise at Cask helps to maximize the potential of self-service by designing the support portal and fortifying it with a top-notch knowledge management process, ensuring that your customers have easy access to relevant and timely information when they need it.

    HERE'S WHAT WE DID WITH BECTON DICKINSON:
    Becton Dickinson was in a position where their consumers had no automated mechanism to seek guidance or submit requests for a specific set of services that a division offered.

    Cask used our capabilities in portal design, knowledge management, and case workflow design to enable consumers to skip the need to email or call a contact center to submit these orders manually. The result was a significant increase in BD’s abilities to fulfill orders, while at the same time decreasing the number of customer contacts via email and phone calls.

    Tune in to find out more.


    ABOUT THE SPEAKERS:

    MARK SMILEY, Principal Advisor, Customer Service Management at Cask
    With over 15 years of operational and consulting experience, Mark works closely with clients to enhance their support organization's capabilities to provide world class customer service in an efficient and empowering way.

    MATT WALTON, Principal Consultant at Cask
    Matt is a global IT leader who's worked various roles within this space over the past 17 years. He has worked in both consulting and industry positions and has focused primarily on the ServiceNow platform and strategic process improvement over the past several years.
  • Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
    Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
    Dan Maier, VP of Marketing at Cyren Recorded: Nov 16 2018 44 mins
    Ransomware such as Petya and WannaCry are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defences. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    Download this webinar to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Come proteggere le caselle di posta quando si passa a G Suite
    Come proteggere le caselle di posta quando si passa a G Suite
    Antonio Cancellara Recorded: Nov 16 2018 64 mins
    Guarda questo webinar con una demo live per scoprire come difendere G Suite in modo efficace tramite:

    •Protezione contro minacce avanzate come frodi via e-mail, business email compromise (BEC) e attacchi di phishing mirati
    •Prevenzione della perdita dei dati (DLP)
    •Continuità della posta elettronica
  • Career Conversations w/ Amelie Koran, Department of Health and Human Services
    Career Conversations w/ Amelie Koran, Department of Health and Human Services
    Jessica Gulick, MBA | PMP | CISSP Recorded: Nov 16 2018 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Amélie E. Koran serves as the Deputy Chief Information Officer for the U.S. Department of Health and Human Services, Office of the Inspector General. Amélie comes to DHHS OIG via a rather circuitous route through multiple industry sectors, academia, and the public sector
    including The Walt Disney Company, Carnegie Mellon University CERT/CC, Mandiant, The World Bank and The American Chemical Society. Her public sector experience started as Lead Enterprise Security Architect for the U.S. Department of the Interior, the U.S. Treasury Department leading the Continuous Diagnostics and Mitigation implementation across the entire agency and a leadership development rotation as part of the President’s Management Council
    Fellowship serving the Federal CIO in supporting cybersecurity policy analysis and legislative review, including stewardship of the Open Data Initiative and help in giving “birth” to the United States Digital Service (USDS). She’s an ardent advocate for new approaches to hiring talent into and rational applications of security strategy and technologies for the Federal government space.

    Twitter: @webjedi
  • Actionable Steps to Elevating your IT Service Management
    Actionable Steps to Elevating your IT Service Management
    Kevin J Smith, Senior Vice President at Ivanti & David Martinez, Sr. Product Marketing Manager at Ivanti Recorded: Nov 15 2018 60 mins
    Every organization goes through a process of improving its operation. Despite this, many ITSM projects fail to deliver the level of effectiveness and the value promised. You have to ask why do so many ITSM projects fail to deliver the value IT teams know they can realize?

    Join this session to learn:

    • The approach and organizational capabilities required to continually increase ITSM efficiency and effectiveness
    • The building blocks to create institutional processes and a culture of shared learning and accountability needed to deliver optimized ITSM that delivers more value to the business
  • Don't Get Guillotined: A Practical Approach to Privacy Risk and Compliance
    Don't Get Guillotined: A Practical Approach to Privacy Risk and Compliance
    Phil Richards, CISO and Leslie Bonsteel, Senior Director, Marketing Recorded: Nov 15 2018 57 mins
    As companies become increasingly sophisticated in tracking private data, customer sensitivity and government oversight requires that they improve privacy protection and monitoring standards. This interactive conversation with Ivanti CISO Phil Richards will cover topics such as:

    - How to recognize, control, and protect personal data
    - The importance of asset discovery in your privacy program
    - Workflows for managing transactions involving private data
    - Educating other departments on their role in privacy protection
    - The importance of control frameworks for protecting private data
  • Hello Direct Internet Access; Hello Risk
    Hello Direct Internet Access; Hello Risk
    Kevin Rollinson, Product Marketing Manager, Cisco Umbrella Recorded: Nov 15 2018 41 mins
    Business today happens at the branch. But where does IT work? Typically, not at the branch. So enterprises struggle to manage nontraditional users and even more connected devices across disparate branch locations.

    As direct internet access increases, the risk of exposure to critical business resources rises. At the same time, application usage via multiple clouds (Office 365, G-suite, etc.) challenges the existing network architecture.

    What does this add up to? Pressure for IT staff as they struggle to reduce costs, improve security measures, and application performance. Join us to learn how to gain better performance and more security effectiveness for your branch offices.
  • Lacework & Snowflake: Security Insights in a High Growth Cloud Environment
    Lacework & Snowflake: Security Insights in a High Growth Cloud Environment
    Omer Singer, Director of Security, Snowflake Computing; Dan Hubbard, Chief Product Officer at Lacework Recorded: Nov 15 2018 31 mins
    Security For Public Cloud + Security Analytics + Data Warehouse Innovation. Lacework and Snowflake Computing are redefining how data is managed and secured.

    Lacework and Snowflake Computing are innovators in their respective markets; data warehousing and security for public cloud. Working together, they deliver powerful and actionable security insights, combined with the most flexible, scalable, easy to use data warehouse on the planet.

    Please join Omer Singer, Director of Security, Snowflake Computing and Dan Hubbard, Chief Product Officer at Lacework Inc., to review and demonstrate their upcoming partnership.
  • Enterprise-wide Kubernetes, Episode 3: Multi-Cloud Persistent Storage
    Enterprise-wide Kubernetes, Episode 3: Multi-Cloud Persistent Storage
    Michael Ferranti, VP, Marketing, Portworx and Anubhav Sharma, VP, Business Development, Nirmata, Recorded: Nov 15 2018 60 mins
    Ready to learn how to manage persistent storage for containers in the multi-cloud environment?

    Kubernetes is enabling multi-cloud strategies for the Enterprise like never before. As data is a fundamental element of all Enterprise applications, without a consistent data management strategy, companies have been able to containerize 5-10% of applications, mostly stateless workloads. With Kubernetes adoption, Enterprises have to think about data management strategies because, without it, companies cannot truly adopt multi-cloud. Data backup, data portability, and DR are critical requirements that have to be addressed as part of any robust Kubernetes solution stack.

    In this webinar, will be talking about best practices on managing persistent storage in a multi-cloud environment and demonstrate application portability across the clouds leveraging Nirmata and Portworx.


    Presenters:
    Anubhav Sharma, VP, Business Development, Nirmata
    Michael Ferranti, VP, Marketing, Portworx,
  • Take the WAN superhighway to the cloud with SD-WAN
    Take the WAN superhighway to the cloud with SD-WAN
    Valerie DiMartino Senior Product Marketing Manager, Sony Kogin Principle Product Marketing, Managed Service Provider Recorded: Nov 15 2018 52 mins
    Azure or adopting Office 365, it’s time to look at SD-WAN to securely connect branch users and deliver and optimized experience that’s eases cloud and SaaS migration. This webinar will explain the advantages that Citrix SD-WAN brings to your Microsoft deployment including tools such as Microsoft Azure Virtual WAN and Office 365 performance.

    In this session, you will learn how Citrix SD-WAN helps:

    • Securely connect branches to the cloud, SaaS, and the Internet
    • Optimize Office 365 connectivity and performance
    • Simplify and automate large-scale branch connectivity with Azure Virtual WAN
  • Building a Data-Centric Architecture for the Future of Government
    Building a Data-Centric Architecture for the Future of Government
    Pure Storage | Red River | Cisco Recorded: Nov 15 2018 61 mins
    Register Now!
  • Low to High: Risk Adverse May Not Make the Most Risk Sense
    Low to High: Risk Adverse May Not Make the Most Risk Sense
    Guy Rosefelt, Director of PM at NSFOCUS and Adrian Sanabria, VP of Strategy and Product Marketing at NopSec Recorded: Nov 15 2018 59 mins
    Recent evidence shows that a surprisingly high portion of vulnerabilities incorporated into malware or exploit kits are ranked low or medium severity. Counter to commonly-accepted practices, focusing only on high-severity vulnerabilities and setting a ‘cut-off’ point for lower scored issues, is not a safe or effective strategy. More importantly, proof-of-concept (POC) code for lower priority vulnerabilities is appearing more quickly after 0-day announcement leading to leading to widespread attacks equally as quickly. NSFOCUS and Nopsec will delve into this recent trend, discuss some of these lower level vulnerabilities being quickly exploited, and provide some thoughts how to better protect against these in the future.
  • Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Nov 15 2018 45 mins
    Kubernetes is widely used to re-architect traditional applications. Many organizations first set up Kubernetes within their on-prem environment and then later expand to the public cloud. This hybrid environment often creates security and compliance challenges with workloads. Join this webinar to learn how to leverage universal security policy definition that works across a hybrid environment.
  • Foolproof Digital Identity with Behavioral Biometrics
    Foolproof Digital Identity with Behavioral Biometrics
    Ehab Samy, VP Product Management, Plurilock Recorded: Nov 15 2018 59 mins
    Digital identity authentication can be challenging to do effectively. Join us to learn about the evolution of biometrics technologies, from those that determine who you ARE in the digital realm, to behavioral biometrics that determine your identity based upon what you DO and how you do it. Ehab Samy, Vice President of Product Management for Plurilock, will map which digital identity management mechanisms are best suited for particular environments including law enforcement, airport security, health care, and the workplace.
  • Accelerate investigation with Proofpoint Threat Response | Live Demo
    Accelerate investigation with Proofpoint Threat Response | Live Demo
    Frank Tsang, Principle Systems Engineer Recorded: Nov 15 2018 32 mins
    Accelerate investigation, prioritize threats, and resolve incidents with less time and effort.

    Proofpoint Threat Response Auto-Pull (TRAP) offers an effective solution. It automatically pulls delivered malicious email into quarantine, saving you from slow and labor-intensive manual process.

    Join us for a live demo of the Proofpoint Threat Response platform and learn how to:

    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
  • 802.11ax or 802.11ac: Which is Right for Your Business?
    802.11ax or 802.11ac: Which is Right for Your Business?
    Cherie Martin, Sr. Solutions Marketing Manager - Aruba Recorded: Nov 15 2018 48 mins
    The industry is buzzing about the soon-to-be released 802.11ax Wi-Fi standard that will greatly increase wireless speed and optimize client battery life. Are you ready to take your network to the next level? Join us as Aruba’s Cherie Martin, Sr. Solutions Marketing Manager, shares the top three things you need to consider in deciding which technology to choose to give your business, employees, and guests, simple, business-class networking without sacrifice
  • Inside a Docker Cryptojacking Exploit
    Inside a Docker Cryptojacking Exploit
    Ethan Hansen, Threat Stack Security Analyst Recorded: Nov 15 2018 30 mins
    Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes. While Docker is great at managing the lifecycle of these workloads, it’s not a security tool.

    In this webinar, Ethan Hansen, Security Analyst for Threat Stack’s Cloud Security Operations Program, will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection. He’ll also provide examples of what to watch for in your logs, cryptojacking and container breakout attempts among them.
  • Cloud Risk-Based Authentication To Prevent Password Based Attacks
    Cloud Risk-Based Authentication To Prevent Password Based Attacks
    Sujay Doshi, Sr. SIEM Solution Engineer Recorded: Nov 15 2018 51 mins
    Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect the sophisticated techniques used by hackers. By integrating your SIEM with your SSO/IDM solution, SOC analysts can gain the visibility needed to prevent these access based attacks.

    Attend this webinar to hear about:

    - Why password access based attacks in cloud environments?
    - Threat detection and threat hunting use cases for password-based attacks
    - User account based orchestration and incident response actions
    - Walkthrough of Securonix - Okta integration with a live demo
  • Detection and Response, Why Limit Yourself to the Endpoint?
    Detection and Response, Why Limit Yourself to the Endpoint?
    Fernando Montengro of 451 Research & Mitchell Bezzina of Palo Alto Networks Recorded: Nov 15 2018 63 mins
    Visibility is an undeniable requirement of all security teams, but it shouldn’t come at a cost. EDR products are positioned as our last chance to improve defenses though since inception discovery and response times have only increased. Is EDR really enough? Do we need more visibility from other sources? Are security operations actually improving? We’ve surveyed over 300 of your peers to answer one important question, “Will Endpoint Detection and Response help me?”

    Join 451 Research Senior Industry Analyst on Information Security, Fernando Montenegro and Palo Alto Networks Director of Product, Mitchell Bezzina to learn more about:
    •The state of EDR technology and the challenges it faces in today’s threat landscape
    •The need for visibility beyond the endpoint
    •The future of detection and response with XDR
  • An Inside Look at Targeted Ransomware Attacks
    An Inside Look at Targeted Ransomware Attacks
    Peter Mackenzie, Malware Escalations Manager, Sophos Recorded: Nov 15 2018 47 mins
    Join Peter Mackenzie as he discusses the rise of targeted ransomware and why attacks like SamSam, Dharma and BitPaymer are making headlines. Watch a live demo of a ransomware payload being unleashed and the steps you need to protect your organization from similar attacks.
  • Visibility and Risk in the IOT World with NAC 3.0
    Visibility and Risk in the IOT World with NAC 3.0
    Steve Mulhearn, Director Enhanced Technology Fortinet Nov 19 2018 10:00 am UTC 45 mins
    In the rapidly changing threat landscape one of the top concerns for most organisations is the introduction of IOT.

    While some organisations have attempted to prevent the connection of these devices due to their lack or non existence of any security, many organisations and Enterprises have now reached the reality that they are here to stay.

    With this in mind what risk does this pose to your organisation and how to reduce this risk to an acceptable level? We will walk through some of the options available and how they may help Enterprise manage the changing landscape.
  • How To Take Your DDoS Protection To The Next Level
    How To Take Your DDoS Protection To The Next Level
    Timothy Fong, Security Product Expert at Cloudflare | John Esterline, Solutions Engineer at Cloudflare Nov 19 2018 2:00 pm UTC 45 mins
    As the web application security landscape evolves, companies are facing increased pressures to strengthen their security posture. Recently, the world’s largest distributed denial of service (DDoS) recorded attacked GitHub at 1.35 Tbps. While the big attacks get all the headlines, at Cloudflare we have learned about other forms of attacks that can unexpectedly bring your site down.

    Join this webinar to learn about:

    - How small DDoS attacks can still bring your site down
    - A little known way attackers can bypass traditional DDoS protections
    - Why TCP services may make you vulnerable to a DDoS attack
    - Pros and cons of multiple solutions: BGP, MPLS, and building your own
    - How to augment Cloudflare’s unmetered DDoS solution with Spectrum, Rate Limiting, and Argo Tunnel
  • Have it All: Achieving Agility and Security with Automation
    Have it All: Achieving Agility and Security with Automation
    Yoni Geva, Product Manager Nov 19 2018 3:00 pm UTC 60 mins
    Are you still implementing firewall changes manually? Are you still trying to keep track of all the changes and their ramifications with spreadsheets?
    Network security policy automation gives you quick, accurate change management across even the most complex hybrid networks, avoiding security holes, compliance issues and costly outages. With automation, you don’t have to choose between agility and security. You can have both.
    In this webinar, Yoni Geva, Product Manager at AlgoSec, explains how security policies can be updated automatically and accurately.
    Join our webinar to learn how to take advantage of:
    •Automated security policy automation with zero touch
    •Security policy management that keeps up with business requirements
    •Automatic identification of risk
    •Enhanced compliance with quick audit reports on demand
  • Ransomware Solved. Cryptojacking, Next.
    Ransomware Solved. Cryptojacking, Next.
    Anthony Giandomenico, Senior Security Strategist; Damien Lim, ATP Product Marketing; Aamir Lakhani, Sr. Security Strategist Nov 19 2018 6:00 pm UTC 61 mins
    A recent threat landscape assessment reports a double-digit growth of cryptojacking. Organizations will soon be facing a phenomenon similar to ransomware if their security posture is not ready to address this new issue.

    Join our panel of experts for a round table discussion around these types of threats and the tactics cybercriminals are leveraging today plus learn about how Fortinet’s advanced threat protection (ATP) Fabric-enabled approach stops the delivery of malicious crypto-mining malware across the dynamic attack surface targeting end-users and servers from the campus to the cloud.
  • Technology Trends 2019: 5 ways cybersecurity will transform next year
    Technology Trends 2019: 5 ways cybersecurity will transform next year
    Matthew Gyde, Group Executive, Cybersecurity at Dimension Data Nov 19 2018 6:30 pm UTC 60 mins
    CyberConversations around the strength of a company’s cybersecurity has never been more pertinent. We’re generating more data than we know how to deal with, and as the opportunities for cybercriminals proliferate, so does their approach to attacks mature.
    A key piece of advice? Trust no-one. With the cloud continuing to aid digital transformation, and AI/machine learning finally realising their potential, cybersecurity defences are beginning to migrate to a more predictive model. This will allow companies to create digital fingerprints of their employees, improve access to data and applications, and predict attacks before they happen.
    Join Matthew Gyde, Group Executive, Cybersecurity at Dimension Data, as he reveals the main findings from Dimension Data’s Technology Trends 2019 report, exploring how the cybersecurity landscape will shift in 2019, and what measures companies can take to keep the bad guys out.
    This webinar will cover:
    •How zero trust is maturing into digital trust, and the evolution of predictive threat detection.
    •Why organisations are focusing on cloud-based security platforms.
    •Why organisations now aim to be secure by design.
    •How cybersecurity is becoming intelligence driven.
    •Why tighter regulation is affecting risk profiles.
  • Select and Deploy New Security Tools Faster
    Select and Deploy New Security Tools Faster
    Ian Farquhar, Distinguished Sales Engineer, WW Security Subject Matter Expert, Gigamon Nov 20 2018 6:00 am UTC 62 mins
    Sign up for this webinar and find out how to increase the efficiency of your security tools. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance.

    Discover how to select and deploy new security tools faster and more easily than you ever thought possible.

    You’ll learn how to:
    • Implement strategies for keeping up with ever-changing security tools.
    • Test multiple tools under consideration without impacting network performance.
    • Set up tests for inline tools.
    • Strengthen testing and streamline deployment of tools.

    See how to eliminate the challenges of testing and deploying security tools with a security delivery platform.

    Join Gigamon and (ISC)² to learn how to select and deploy new security tools faster.

    Presenter: Ian Farquhar, Distinguished Sales Engineer, WW Security Subject Matter Expert, Gigamon
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Technology Trends 2019: 5 ways the tech landscape will transform next year
    Technology Trends 2019: 5 ways the tech landscape will transform next year
    Ettienne Reinecke, Group CTO at Dimension Data Nov 20 2018 6:00 am UTC 60 mins
    Until now, the tech sector has spoken about innovative technologies somewhat theoretically, without providing a clear picture of how these powerful innovations will be used and what they will look like in practice. This has left people without a solid understanding of how these solutions will ultimately manifest in our work and personal lives.

    Join Ettienne Reinecke, Group CTO at Dimension Data, as he reveals the game-changing approaches that will transform the tech landscape during 2019 and beyond, and how companies can ensure emerging solutions – such as AI, machine learning, robotics and AR/VR – become firmly embedded in their core processes. Ettienne will explore:

    •Why easier access will accelerate the adoption of game-changing technologies.
    •How identity will emerge as the killer app for blockchain.
    •How companies can extract value from data, while respecting privacy.
    •Why the Internet of Things (IoT) will change our lives for the better.
    •How disruption will drive consolidation among tech vendors.
  • Démo Rubrik : Disponibilité instantanée de toutes vos applications
    Démo Rubrik : Disponibilité instantanée de toutes vos applications
    Lionel Meoni, Systems Enginee Manager, Rubrik France Nov 20 2018 9:00 am UTC 33 mins
    Rubrik a développé la première plateforme Cloud Data Management conçue pour la gestion de données convergées avec la protection des données, la recherche, l’analyse, l’archivage et la copie de données pour le cloud hybride entreprise

    Rejoignez Lionel Meoni pour assister à une présentation et une démo et découvrir comment Rubrik remplace les logiciels de sauvegarde par une appliance « plug-and-play » capable d'assurer l'orchestration des données, la gestion des catalogues et la déduplication du stockage. Il vous présentera également la plate-forme SaaS Polaris.
  • LIVE PANEL: Cybersecurity for the Modern Era
    LIVE PANEL: Cybersecurity for the Modern Era
    Tom Berry, Adenike Cosgrove, Swati Lay, Naveen Vasudeva, Graham Edwards and Clive Room Nov 20 2018 10:00 am UTC 60 mins
    In today's ever evolving threat landscape, the attackers are increasingly targeting people rather than technology.

    For CISOs and security professionals, the top priority is to strike the perfect balance between technology and employee empowerment. You need to build defences that start with and work for your organisation's most important asset - your people!

    Join us and our line up of industry experts at this live panel discussion, part of our Hacking Human Nature Summit to hear how they are building people centric strategies.

    Line up:
    •Swati Lay, CISO, Funding Circle
    •Graham Edwards, Former Head of Group Security, Nationwide
    •Naveen Vasudeva, MD & Co-founder, CyberCorre
    •Clive Room, Chairman, White Hat Ball
    •Adenike Cosgrove, International Cybersecurity Strategist, Proofpoint

    Moderated by: Tom Berry, Advisory Board Member, ClubCISO
  • Back to Basics: Solving the Email Fraud Problem
    Back to Basics: Solving the Email Fraud Problem
    Robert Holmes, VP Email Security Products Nov 20 2018 11:30 am UTC 43 mins
    In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology.

    Join this webinar to learn:
    - Findings from our latest Email Fraud study
    - Email Fraud trends from 2017 and threats to look out for in 2018
    - Helpful tips to protect your people, data and brand against Email Fraud
    - Live Q&A with the speakers
  • Live Demo: 360 Degrees of Email Fraud Defense
    Live Demo: 360 Degrees of Email Fraud Defense
    Neil Hammet Nov 20 2018 12:30 pm UTC 45 mins
    Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbH Nov 20 2018 1:00 pm UTC 59 mins
    Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
    Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
  • Driving Behavioural Change Through Phishing Simulation and Security Training
    Driving Behavioural Change Through Phishing Simulation and Security Training
    Paul Down, Wombat Specialist Nov 20 2018 1:30 pm UTC 45 mins
    Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.

    Join us for this webinar where you will learn:

    * About the latest trends and tactics used by threat actors that target your organization
    * How to assess your users’ susceptibility to phishing attacks
    * To respond to threats through end-user training and reporting
  • Comment contextualiser les accès et les habilitations avec le model Zéro Trust
    Comment contextualiser les accès et les habilitations avec le model Zéro Trust
    Chardy N'Diki, Directeur Regional, Europe du Sud Nov 20 2018 2:00 pm UTC 30 mins
    La sécurité doit non seulement être simple mais doit aussi aider les différents métiers d’une entreprise à être plus efficient.

    Dans des environnements où le cloud et la mobilité deviennent la norme, comment réduisez-vous les risques associés à ses usages tout en augmentant la productivité ?

    Durant ce webinaire nous allons vous présentez la plateforme Zéro Trust de Centrify et comment nous pouvons unifier la gestion des accès, des habilitations, la traçabilité en tenant des différents contextes d’usages et des facteurs risque qui y sont associés.
  • Trust No One Part 2.  What Does Zero Trust Mean for You?
    Trust No One Part 2. What Does Zero Trust Mean for You?
    Lindsay Drabwell, Head of Membership, (ISC)² EMEA, Richard Archdeacon, Duo, Daniel Cuthbert, Banco Santander Nov 20 2018 2:00 pm UTC 60 mins
    As early as 2003 the Jericho Forum was created to tackle "de-perimeterisation" and later in 2014 Google released their "BeyondCorp" paper detailing how they made it happen. However, have Zero-Trust security models been adopted in the enterprise and what challenges do organisations face when considering de-perimeterisation?

    Join the discussion between Richard Archdeacon from Duo Security and Daniel Cuthbert from Banco Santander in Part 2 of the Zero Trust series and learn about Zero Trust deployments within the enterprise.
    Speakers:
    Richard Archdeacon, Advisory CISO, Duo Security
    Daniel Cuthbert, Global Head of Cybersecurity Research, Banco Santander

    For Part 1 in the Zero Trust Series, copy and paste this link into your browser: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars?commid=334792&Part2
  • Kaspersky Lab’s Advanced Targeted Threat predictions for 2019
    Kaspersky Lab’s Advanced Targeted Threat predictions for 2019
    Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab’s Global Research and Analysis Team Nov 20 2018 2:00 pm UTC 60 mins
    Kaspersky Lab will share its predictions for what the world’s major threat actors could have planned for the coming year. The webinar will explore some of the key trends in terms of tools, techniques and processes likely to be used by such groups against government organizations, enterprises, critical infrastructure, society at large, and more – and consider what that means for organizations, the security community and international cyberspace.

    The aim of the webinar is to stimulate debate among IT security professionals in all industries and to increase awareness and understanding that will help them to defend their organization against these threats.
  • Live Demo: Phishing Simulation and Security Awareness Training
    Live Demo: Phishing Simulation and Security Awareness Training
    Jen Gough, Sales Engineer, Proofpoint Nov 20 2018 3:00 pm UTC 45 mins
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Wombat Security to see for yourself!

    Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.


    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Everything SMBs and MSPs Need to Know about Machine Learning
    Everything SMBs and MSPs Need to Know about Machine Learning
    George Anderson, Director of Product Marketing at Webroot Nov 20 2018 3:00 pm UTC 60 mins
    Recently, new and established security vendors have upped their use of the fancy-sounding term "machine learning". While the technology isn't new (Webroot won an innovation Edison Award for work in the field over 6 years ago in 2012), it has resurfaced as a marketing buzzword and created some confusion in the industry.

    We’d like to invite you to join Webroot director of product marketing George Anderson for a 30-minute webinar to learn how Machine Learning is used in cybersecurity and how Webroot has been applying it for more than 10 years to create actionable threat intelligence for stopping a wide range of threats.

    Topics include:

    • Understanding Machine Learning (ML)
    • How ML can stop zero-day and never-before-seen threats
    • The importance of contextual analysis and predictive analytics
    • Real-world results from the “new” ML technology
    • How ML Directly Benefits your Customers
  • Measuring Policy Effectiveness
    Measuring Policy Effectiveness
    Michael Rasmussen Nov 20 2018 3:00 pm UTC 36 mins
    Defining Process & Metrics to Demonstrate Policy awareness and adherence.

    Policies are no good if they are left to be documents that are written and forgotten, stored on a physical or electronic shelf collecting real or digital dust. Organizations need policies that are correctly written, but also clearly understood and enforced in the environment. This webinar looks at the key metrics and process to effectively communicate policies in the environment, track awareness, enforce policies, and monitor metrics of policy adherence.

    Attendees will specifically learn how to:
    •Write policies that are clearly understood
    •Develop a policy communication and awareness plan
    •Demonstrate understanding of policies by individuals
    •Enforce policy compliance/adherence
    •Measure and monitor effectiveness of policies
  • Live Demo: Email Protection and Targeted Attack Protection
    Live Demo: Email Protection and Targeted Attack Protection
    Kiran Khokhar, Product Marketing Manager Nov 20 2018 4:00 pm UTC 45 mins
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information.This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Internet of Medical Things: How to Design and Deliver Secure Connected Products
    Internet of Medical Things: How to Design and Deliver Secure Connected Products
    Device Authority – Rob Dobson, PTC – Stefan Küsgen, SyroCon – Thomas Baumgart Nov 20 2018 4:00 pm UTC 60 mins
    The Internet of Medical Things, or Healthcare IoT, refers to a connected infrastructure of medical devices and software applications that can communicate with various healthcare IT systems. Frost & Sullivan estimates that there were 4.5 billion IoMT devices in 2015, a number that they expect to increase to between 20 and 30 billion by 2020.

    As the IoMT device landscape heats up and hospitals delve more into remote care, healthcare systems need to protect each and every IoT device from potential cybersecurity risks. To do this, medical device manufacturers should integrate the power of automation into a rock-solid digital technology foundation, making it easier to stay on top of the security needed to protect both the device and the patient, while also adhering to regulatory compliance.

    Hear from Device Authority, SyroCon and PTC on a real customer use case which encourages building secure connected IoT medical devices. Learn about potential benefits, best practices and key challenges, and how they can be solved with out of the box solutions and integrations between PTC, SyroCon and Device Authority.
  • VxBlock 1000: Redefining Converged Infrastructure with Dell EMC Unity support
    VxBlock 1000: Redefining Converged Infrastructure with Dell EMC Unity support
    Joe Catalanotti, Dell EMC; Eric Sheppard, IDC; Mark Geel, Dell EMC Nov 20 2018 5:00 pm UTC 30 mins
    With its flexible architecture, simplified IT operations and a path to delivering cloud services, the VxBlock 1000 is changing the way you think of CI. Learn what sets Dell EMC Unity apart from other storage options, hear what a leading analyst has to say about converged systems, and see why you should consider a VxBlock 1000 for your next IT infrastructure purchase.
  • Ready for Liftoff? Planning a Safe and Secure Cloud Migration
    Ready for Liftoff? Planning a Safe and Secure Cloud Migration
    Jason Garbis of Cyxtera Nov 20 2018 5:00 pm UTC 60 mins
    Want to transition on-premises workloads to the cloud, but are concerned about consistently securing access? Join us for a webinar where we discuss how you can easily and effectively apply secure access policies throughout your cloud migration, regardless of your infrastructure complexity or architectural starting point. By utilizing a modern, cloud-ready security architecture, you can maintain – and in fact, improve – your enterprise security controls throughout the entire migration process.

    In this webinar, Jason Garbis, CISSP – Vice President of Products at Cyxtera, will discuss
    - Challenges (real and perceived) that enterprises face when moving to the cloud
    - Managing policies and permissions for cloud vs. on-premises workloads
    - The pitfalls of inconsistent security
    - How to secure any application, on any platform, anywhere.

    This webinar is for IT / Security leadership (director, VP, CISO, CIO).
  • Latest Trends in TLS & SSL
    Latest Trends in TLS & SSL
    Presenter: Dean Coclin - Chairman Emeritus, CA/Browser Forum. Moderator: Jeff Barto - Trust Strategist Nov 20 2018 6:00 pm UTC 60 mins
    This webinar is intended to update and prepare you for the latest trends in SSL, including what to look out for, how to prepare and what we think is up next for the online security space. Also, we’ll brief you on the latest initiatives within the CA/Browser forums including any relevant ballots and other industry developments.
  • Bridging Security Gaps with Networks-to-Endpoint Integration
    Bridging Security Gaps with Networks-to-Endpoint Integration
    Konstantin Rychkov, IDC, Senior Research Analyst Nov 20 2018 6:00 pm UTC 60 mins
    The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any. Using a portfolio of integrated products from fewer vendors means greater synergies and efficiencies. This is especially true of endpoint security software, where many organizations have long and established relationships with a favorite vendor. This can lead to a sense of complacency, and there may also exist a disincentive to replace software on all of an organization’s endpoint devices, leaving organizations potentially exposed to an evolving threat landscape.

    Join us for this informative webinar where IDC analyst Konstantin Rychkov will:

    • Introduce the concept of endpoint protection integrated with network security components
    • Demonstrate how the two together provide greater effectiveness and efficiency in security
    • Detail how an integrated security stack is instrumental to holistic enterprise-wide security