Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.
This panel of security experts will discuss the internet of things and what's keeping them up at night when they think about security in 2015. After an in-depth discussion, there will be live Q&A from the audience.
This week's panelists include:
Ron Gula, CEO and Founder, Tenable Network Security
Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
Remote office backup presents numerous challenges, including ever-increasing data volumes, network bandwidth constraints, overtaxed IT administrators and complicated, time-consuming backup processes. Compounding all this is a reliance on older technologies that are inefficient and costly. And the more sites your organization has, the challenges multiply.
It's time for businesses to rethink remote office backup; one that meets data and regulatory retention requirements, is easy to deploy and maintain, and is secure and cost effective. Its time to look to the cloud.
Join backup experts Druva to learn how remote office server backup has evolved. Discover how the cloud offers a new, and in most cases, a better approach. In this session you’ll learn:
- How the latest advancements in cloud storage technology scale globally for enterprises of all sizes
- Why advances in cloud security models are addressing stringent global security and data privacy issues, including data residency requirements and more
- How an 'infinite data snapshot model' combined with cost-optimized flexible retention eliminates traditional vendor restrictions.
Hear real-life use cases of how others are leveraging the cloud for remote server backup. Live Q&A will follow to answer your specific questions.
The CyberTECH Cyber+IoT eWeek Roundtable features top industry experts sharing critical updates and information regarding IoT Security. The roundtable will be moderated by eWeek Editor, Chris Preimesberger and includes top cyber, IoT and InfoSec professionals. Special guest speakers include Michael Daniel, Special Assistant to the President and US Cybersecurity Coordinator for the White House, Mark Weatherford, Principal at the Chertoff Group, Enrique Salem, former CEO at Symantec.
What makes a firewall a next generation firewall? How can next gen capabilities help you and what are the gotchas you should know before you turn it all on? Get your basic education on NGFW and some tips you should know before you get started.
If your data, services and processes become compromised, your business can suffer irreparable damage in minutes. The clock is ticking, and how fast you communicate to your major incident resolution team is everything.
Join Scott Bowler, Manager of IT Delivery Management Services, NBN Co, and Abbas Haider Ali, CTO of xMatters and learn how NBN Co identifies major incidents and uses best practices for automating their communication processes to resolve major IT incidents quickly and effectively.
During the event you will learn how to:
- Immediately Identify a major incident
- Instantly locate available major incident managers and target notifications to them
- Get the right resolution team on the job fast based on the required expertise
- Utilize one-click conference bridge technology to get key stakeholders together instantly
- Conduct reviews to identify improvements and prevent similar incidents from reoccurring
As bad actors relentlessly continue to take advantage of the many innovations and trends in our current world, network security professionals are realizing that the passive mode of checking for threats is no longer adequate. As BYOD is now the norm rather than the exception in the corporate world and most organizations have a significant presence in the cloud, bad actors are more than happy to take advantage of the new conduits into the corporate network. Therefore, the need to catch, repair and eliminate security threats as early as possible has never been greater. With this in mind, VSS Monitoring has been helping various enterprise customers to deploy an inline layered security infrastructure that provides multiple lines of defense against the bad actors.
This webinar will present some of the use cases we have been involved in, what were the motivations that led to the deployment of layered security and how a layered security architecture, anchored by VSS Monitoring, allowed enterprises to become more nimble in their never ending fight against bad actors. Join us for a safari tour of an exciting and evolving space!
Almost every organization is challenged by the increasing need for more bandwidth. Cloud-based services, content-rich applications, and access to internet sites is putting more and more strain on the limited pipes coming in to your data centers. WAN Optimization had been the tool of choice to connect and manage branch office traffic. It's now more and more being used to bridge multiple Internet connections for organizations large and small to create more bandwidth in and out of their data centers. Traditional WAN Link Load Balancing has evolved from simple back up and VPN connectivity to a robust traffic management tool that seamlessly adds bandwidth using virtually any ISP technology. In this webinar you’ll learn the basics of Hybrid WANs, what they and Link Load Balancing can do for your organization, and discover more about Fortinet’s Hybrid WAN solutions.
As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictable, flexible, user- and service-friendly and lower cost to operate. These virtualized, software-controlled networking environments, however, do not yet benefit from the range and sophistication of DDoS protections and security available for traditional networks. This presentation focuses on how the delivery of traffic intelligence, threat detection and attack blocking is evolving, regardless of whether BGP and flow or future SDN/NFV-based techniques are in use.
Attend this session to learn how Arbor Networks is adopting its DDoS solution suite to advance protections in SDN- and NFV-based networks.
Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.
In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.
Join this session to learn:
•Some of the different methods of deploying Flowspec
•How Flowspec compares with alternative filtering methods
•Best practices for secure traffic routing