Your Resource for Information Security Trends & Education
With over 200,000 members, the Information Security Community is the largest community of infosec professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.
NGFW 101: What is it and why should you care?Deena Thomchick, Director of Product Marketing, FortinetWhat makes a firewall a next generation firewall? How can next gen capabilities help you and what are the gotchas you should know before you turn it all on? Get your basic education on NGFW and some tips you should know before you get started.Read more >
If your data, services and processes become compromised, your business can suffer irreparable damage in minutes. The clock is ticking, and how fast you communicate to your major incident resolution team is everything.
Join Scott Bowler, Manager of IT Delivery Management Services, NBN Co, and Abbas Haider Ali, CTO of xMatters and learn how NBN Co identifies major incidents and uses best practices for automating their communication processes to resolve major IT incidents quickly and effectively.
During the event you will learn how to:
- Immediately Identify a major incident
- Instantly locate available major incident managers and target notifications to them
- Get the right resolution team on the job fast based on the required expertise
- Utilize one-click conference bridge technology to get key stakeholders together instantly
- Conduct reviews to identify improvements and prevent similar incidents from reoccurring
As bad actors relentlessly continue to take advantage of the many innovations and trends in our current world, network security professionals are realizing that the passive mode of checking for threats is no longer adequate. As BYOD is now the norm rather than the exception in the corporate world and most organizations have a significant presence in the cloud, bad actors are more than happy to take advantage of the new conduits into the corporate network. Therefore, the need to catch, repair and eliminate security threats as early as possible has never been greater. With this in mind, VSS Monitoring has been helping various enterprise customers to deploy an inline layered security infrastructure that provides multiple lines of defense against the bad actors.
This webinar will present some of the use cases we have been involved in, what were the motivations that led to the deployment of layered security and how a layered security architecture, anchored by VSS Monitoring, allowed enterprises to become more nimble in their never ending fight against bad actors. Join us for a safari tour of an exciting and evolving space!
Despite huge investments in breach prevention technology, data breaches have not slowed down. In just about every major breach, hackers exfiltrated data undetected over many months. Understanding the mindset and approach of cyber criminals can help you and your organization shrink the window between infection and discovery.
In this webinar, Nat Kausik, CEO at Bitglass and Rich Campagna, VP Products at Bitglass will discuss the three major types of breaches, and the techniques used by today’s hackers to execute these breaches. You’ll learn how to identify the clues that they leave behind so that can help you identify a breach early, - limiting breach damage in the process.
Almost every organization is challenged by the increasing need for more bandwidth. Cloud-based services, content-rich applications, and access to internet sites is putting more and more strain on the limited pipes coming in to your data centers. WAN Optimization had been the tool of choice to connect and manage branch office traffic. It's now more and more being used to bridge multiple Internet connections for organizations large and small to create more bandwidth in and out of their data centers. Traditional WAN Link Load Balancing has evolved from simple back up and VPN connectivity to a robust traffic management tool that seamlessly adds bandwidth using virtually any ISP technology. In this webinar you’ll learn the basics of Hybrid WANs, what they and Link Load Balancing can do for your organization, and discover more about Fortinet’s Hybrid WAN solutions.
As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictable, flexible, user- and service-friendly and lower cost to operate. These virtualized, software-controlled networking environments, however, do not yet benefit from the range and sophistication of DDoS protections and security available for traditional networks. This presentation focuses on how the delivery of traffic intelligence, threat detection and attack blocking is evolving, regardless of whether BGP and flow or future SDN/NFV-based techniques are in use.
Attend this session to learn how Arbor Networks is adopting its DDoS solution suite to advance protections in SDN- and NFV-based networks.
Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.
In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.
Join this session to learn:
•Some of the different methods of deploying Flowspec
•How Flowspec compares with alternative filtering methods
•Best practices for secure traffic routing
DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconceptions about DDoS attacks and DDoS defense that leave too many organizations vulnerable today. One misconception is that a DDoS attack is all about size. While certainly true, modern DDoS attacks can enormous, DDoS today is more frequently targeting your applications and security infrastructure, such as your firewall and IPS. Another misconception is that DDoS defense is an either-or proposition. You handle it in the cloud through a provider, or you have DDoS defense on premise. In fact, one layer of protection is not protection at all.
Join us for a session that will cover:
• An overview of the current attack landscape and implications
• Best practice defense against modern DDoS attacks
• Lessons learned by global enterprises struck by attacks
This webinar will provide strategies and best practices to secure your network and apps against threats while optimizing availability and performance.
Computing has extended beyond the exclusive domain of the IT department - a fact that has significantly complicated security, privacy and has put tremendous pressure on today’s networks. IT managers are tasked to automate networking polices, protect against an ever growing and changing number of attacks and keep users happy with the highest level of performance.
Attend this webinar to learn:
- How to protect web applications with an integrated Web Application Firewall solution
- Defend against DDoS and specific application layer attacks
- Simplify access with SSO and securely authenticate to external applications
- Encrypt all traffic while ensuring compliance visibility
Sharing network access and sensitive information with your business
partners could be putting you at risk of third-party breach. These
breaches can be very damaging and may account for major losses in
data, time, and resources. If you’re looking for a better risk
management method, you’re not alone.
Watch this webinar to will learn more about:
- Security risks that could be facing your corporation today.
- How you can utilize selection criteria to build the best solution.
- Methods you can use to assess partner security risk.
- How to make better risk-based decisions by factoring in the security
posture of your organization.
A 2015 PwC survey found that 96% of CEO’s in the US have indicated rising concern about data breaches - and rightly so. With the record-breaking breaches of 2014 barely behind us, organizations want to take steps to avoid becoming the next victim and are looking for signs that can indicate troubling performance. BitSight Technologies may have found one such indicator. Using their Security Ratings data, recent research shows a solid correlation between a company’s botnet grade and their likelihood of experiencing a publicly disclosed breach, demonstrating that Security Ratings are a powerful metric for communicating cyber risk across the enterprise.
Join BitSight CTO and Cofounder Stephen Boyer to discuss this research and to learn why continuous security performance monitoring should be an essential part of your enterprise risk management strategy.
Attendees will learn:
-What is the correlation between botnet grades and publicly disclosed breaches
-Why botnet grades vary across key industries and what the top infections are by sector
-How Security Ratings are generated and the impact botnets and other risk vectors have on these security performance metrics