IT Security

Community information
The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
  • The risk of experiencing a security breach is now higher than ever. Over the last 12 months, some of the highest profile companies have been compromised including Anthem, Sony, Home Depot, JPMorgan Chase, Target and more.

    2015 is turning out to be no different. Clearly no organization is immune to a breach and human error continues to play a primary role.

    This webcast will address:
    - Key trends and traits common to high profile security breaches
    - Critical takeaways and lessons learned for a comprehensive security strategy
    - Best practices to reduce the risk of a security breach
  • By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
    You'll learn:
    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • Cybersecurity is a top concern for IT professionals. Gartner expert Lawrence Orans leads an important discussion of the current cybersecurity landscape. He analyzes recent cybersecurity events, emerging threats, and how new technologies are affecting the security calculus.
  • No complexo ambiente de negócios de hoje, a sua organização se depara com dificuldades de segurança cada vez maiores e exigências legais que fazem com que seja essencial controlar e monitorar seus usuários privilegiados.
    O gerenciamento senhas de contas privilegiadas é um ponto de partida para proteger o seu ambiente de TI, mas ainda há muito a ser feito.
    Nesta sessão, descubra como o CA Privileged Identity Manager pode ajudar sua organização a gerenciar identidades privilegiadas (PIM) e controlar de maneira completa seus usuários privilegiados a fim de reduzir o risco de falhas de conformidade ou de violações de segurança com alto custo.
  • Security incident disclosures and vulnerability warnings are being released at an alarming rate, posing a major challenge for Security & Risk (S&R) Professionals. Additionally, firms that adopt virtualized and public cloud infrastructure like AWS are quickly finding that their traditional vulnerability management solutions and processes were not designed for these dynamic, elastic, and API-services centric architectures. An April, 2015 Forrester Research, Inc. report entitled “Market Overview: Vulnerability Management” stated that the vulnerability management technology space has evolved and will help " S&R Pros repair their strained or broken processes and move past low-impact checkbox scanning to proactive, risk-based assessments."

    Join guest speakers Rick Holland, Principal Analyst at Forrester Research, Tim Prendergast, CEO and Co-founder,, and Theodore Kim, Senior Director, SaaS Operations at Jobvite, to learn about:
    * The state of vulnerability management and why Forrester recently said "security and risk pros can't keep up with the tsunami of vulnerabilities."
    * How public cloud infrastructure like AWS adds to vulnerability complexity and has created the the need for new cloud native solutions
    * How Jobvite has implemented an effective security configuration and vulnerability management process for AWS
  • Organizations have long struggled to find objective ways to measure and compare performance, leaving many executives to trust metrics and data points that may not be painting the clearest picture of security posture.

    To highlight this issue, BitSight recently surveyed over 300 IT executives in 4 major industries to assess their confidence in their security performance. We then compared responses to our own security ratings data, which measures effectiveness across key performance areas including security events, configurations, and user behaviors.

    In this webinar, BitSight EVP of Sales & Marketing Tom Turner takes a deeper look into these fidings and discusses the business implications of optimism bias.

    Download this webinar to learn:

    How security performance varies among Finance, Healthcare, Retail, and Energy/Utilities
    Whether optimism bias exists in these industries and how it may be affecting overall security performance
    Why continuous performance monitoring should be a critical component of enterprise risk management and how leading organizations are using BitSight Security Ratings to manage their cyber risk
  • With the proliferation of mobile devices and emergence of free file sharing services, information workers expect and demand fast, responsive services. If enterprise software limitations restrict productivity, end users will circumvent the policies set by their organization in order to get their job done.
    In this 60-minute webinar, Ron Charity, Business Development Manager at AvePoint and Brad McIsaac, Sr. Technical Solutions Professional at AvePoint, will discuss how AvePoint Perimeter can make your on-premises SharePoint environment more powerful than Dropbox, Google Drive, and even Office 365 by enabling two-way collaboration and external sharing without ever having to leave SharePoint.
    In this webinar, you’ll learn how you can:

    • Overcome native SharePoint limitations and productivity challenges
    • Collaborate with external users just like how you work internally
    • Stop your end users from using unsecure file sharing services like Dropbox and Google Drive
    • Increase collaboration with two-way editing and external sharing
    • Enhance the value of on-premises SharePoint and drive adoption
  • NTT Com Security would like to invite you to join us and our partner LogRhythm on July 28th, 2015 from 2:00-3:00 p.m. EST for a webinar addressing the current and ongoing cyber-threat to Financial and Insurance institutions.
  • The SHA-1 algorithm at the core of many SSL certificates is in danger of being compromised by criminals. Google, Mozilla, and Microsoft are phasing out SHA-1 support in their browsers very soon by showing degraded visual indicators.

    Fortunately, SHA-2 replacement certificates are available and much stronger to protect your website. Join us for this webinar to learn:
    -Key dates for replacing SHA-1 certificates
    -How you can get a stronger SHA-2 certificate at no extra cost
    -How to replace your certificate

    We'll also highlight how Symantec is helping you stay ahead of internet threats and keeping your business secure.
  • Over 90% of targeted attacks start with email. Criminals create very convincing emails to trick your users into clicking on a link, opening an attachment, or replying with their credentials. The attack methods criminals employ with phishing emails are constantly changing and so must your email security to block these attacks before damage occurs. Learn about the newest trends in phishing email attacks and how to protect your organization.