Hi [[ session.user.profile.firstName ]]

Application Whitelisting: the Good, the Bad, the Unknown

Join Bloor’s Senior Analyst for Security, Fran Howarth, and Jon Parkes, Vice President, Pre-Sales, McAfee EMEA to learn:

- the role that application whitelisting plays in defending networks against attack through a focus on two key areas—controlling what applications are allowed to run
Join Bloor’s Senior Analyst for Security, Fran Howarth, and Jon Parkes, Vice President, Pre-Sales, McAfee EMEA to learn:

- the role that application whitelisting plays in defending networks against attack through a focus on two key areas—controlling what applications are allowed to run and preventing any unauthorised applications (including malware) from executing
- how to protect systems on the network from configuration changes and mistakes that can allow serious vulnerabilities to be exploited.

Fran Howarth specialises in the field of security, primarily information security, but with a keen interest in physical security and how the two are converging. Fran’s other main areas of interest are new delivery models, such as cloud computing, information governance, web, network and application security, identity and access management, and encryption.
For more than 20 years, Fran has worked in an advisory capacity as an analyst, consultant and writer. She writes regularly for a number of publications, including Silicon, Computer Weekly, Computer Reseller News, IT-Analysis and Computing Magazine. Fran is also a regular contributor to Security Management Practices of the Faulkner Information Services division of InfoToday.

Jon Parkes is responsible for all technical sales operations and solution architects for McAfee in EMEA – helping customers to realise solutions to meet their security and business needs, in an optimal way that balances cost of ownership with security posture. Like other IT functions, the security market is maturing, going through consolidation reflecting customers’ desire for trusted partnership with fewer suppliers. Jon’s twenty-year career has been built around global Enterprise consulting and software, working with some of the world’s largest businesses in many industry sectors, including telecommunications, utilities, financial services and Government, holding regional management positions in both EMEA and Asia Pacific.
Recorded Aug 10 2011 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Fran Howarth, Senior Analyst, Security, Bloor Research; Jon Parkes, Vice President, Pre-Sales EMEA, McAfee
Presentation preview: Application Whitelisting: the Good, the Bad, the Unknown
Recommended for you:
  • Date
  • Rating
  • Views
  • Meeting international requirements and leveraging CSA STAR for supply chain mana Meeting international requirements and leveraging CSA STAR for supply chain mana John DiMaria, BSI Recorded: May 4 2016 52 mins
    When an organization adopts cloud services, it is in fact expanding its operations from a local or regional presence to a more global one. As a result, the corresponding organizational operations’ strategy needs to be adjusted to align with these changes. You need to be in line with international requirements as well as your supply-chain. A more formal analysis of the supply-chain as part of a more comprehensive due diligence review also needs to be considered.1

    It is not always clear how the CSP handles incidents, encryption, and security monitoring. Organizations are rarely aware of all the risks they take when working with a CSP. In fact, the risks are multifaceted and are far more complex than those they experienced before moving to the cloud.

    An organization that rushes to adopt cloud services may subject itself to a number of business impacts including

    - Contractual issues over obligations regarding liability, response, and/or transparency
    - Mismatched expectations between the CSP and the customer
    - Lack of internal training and awareness within the user organization
    - Potential for software designers/engineers that are developing software to be unaware of associated risks

    Many organizations are turning to the cloud because of the resources required to manage complex supply chains. It can be challenging for most organizations to understand the supply-chain structure of the CSP’s environment; however, an increase in transparency will increase trust.

    At this session we will discuss:

    -Quick review of module 1
    -How CSA STAR maps to international requirements
    -How you can use CSA STAR to manage and monitor your supply-chain.
  • HPE and Hortonworks Partner to Transform Manufacturing Operations HPE and Hortonworks Partner to Transform Manufacturing Operations HPE, Hortonworks Recorded: May 4 2016 62 mins
    Optimizing manufacturing processes ultimately revolves around increasing output at reduced cost and improved quality. Manufacturers try to minimize inventory levels by scheduling just-in-time delivery of raw materials, but even the smallest miscalculation can cause stock-outs that lead to production delays. Sensors and RFID tags can capture supply chain data, but this creates a large, ongoing flow of data. Hadoop can cost-effectively store this unstructured data, providing manufacturers with greater visibility into their supply chain history, and greater insight into longer term supply chain patterns. This gives manufacturers more lead time to adjust to supply chain disruptions, as well as helps reduce costs and improve margins on finished products.

    Hewlett Packard Enterprise and Hortonworks have a strategic partnership to help manufacturers realize their modern data architecture. Join us for this webinar and learn how Hortonworks leading enterprise-ready open data platform in combination with HPE’s leadership position in the worldwide x86 server market provides manufacturing organizations with proven solutions to help transform manufacturing processes.
  • PCI and Vulnerability Assessments - What’s Missing? PCI and Vulnerability Assessments - What’s Missing? Mike Pittenger, VP of Security Strategy, Black Duck Recorded: May 4 2016 36 mins
    All regulatory requirements (HIPAA, PCI, etc.) include a mandate for assessing vulnerabilities in systems that manage or store sensitive data. Organizations often opt to conduct vulnerability assessments on an annual, quarterly, or even monthly basis. But while vulnerability assessment tools can identify unpatched or misconfigured code bases, these tools overlook a large portion of an organization’s attack surface: known vulnerabilities in applications that are built in-house. These applications will not have public updates, nor will the thousands of open source components they utilize be included in public disclosures. This is concerning because over 6,000 vulnerabilities in open source projects have been reported since 2014. Register for this webinar to discover how to protect yourself.
  • How New Devices Can Help You Make the Most of Windows 10 How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 23 mins
    Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • How New Devices Can Help You Make the Most of Windows 10 How New Devices Can Help You Make the Most of Windows 10 David Hollway, Mike Brohoski, & Pang Ngernsupaluck Recorded: May 4 2016 23 mins
    Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • Pulse Policy Secure - Enabling Secure Mobility Pulse Policy Secure - Enabling Secure Mobility Lisa Lorenzin, Principal Solutions Architect Recorded: May 4 2016 28 mins
    Join us on Wednesday, May 4 at 8am PST to dive deep into enabling enterprises to balance business security with user productivity using BYOD.
  • Maximiser la valeur de vos données avec une plateforme de données connectée Maximiser la valeur de vos données avec une plateforme de données connectée Abdelkrim Hadjidj, Solution Engineer, Hortonworks Recorded: May 4 2016 61 mins
    Tous les métiers ont besoin de données. Pour transformer votre organisation et exploiter vos données vous avez besoin d’une solution pour récupérer, stocker et analyser toutes les données de votre organisation. Une plateforme de données ouverte et connectée vous permettra de prendre des décisions plus rapidement. Nous vous présenterons des exemples d’entreprises qui ont migré leurs plateformes de Hadoop classique vers notre plateforme ainsi que les gains qu’ils ont obtenu.
  • Crime & Spies: The Great Indian Cyber Robbery Crime & Spies: The Great Indian Cyber Robbery Vipul Kumra,Consulting Engineer, FireEye India Recorded: May 4 2016 61 mins
    A cyber-threat group exploiting commercial entities and Government agencies across India for over a decade! Suspected Pakistani Threat Actor Using Surveillance Malware Against Indian Entities! Computers at three banks, pharmaceutical company hacked; hackers demand ransom in bitcoins!
    Almost every day news is full of stories about companies and nations grappling with the new cyber threat landscape. There is a lot more happening behind the scene.
    Join FireEye webinar “Crime & Spies: The Great Indian Cyber Robbery” to hear from the people and the organization which has been the first responder to the majority of the high profile cyber breaches across the world. FireEye has been curating intelligence on malware, advanced threat group tactics and attacker behavior for over a decade.
  • Six Key Capabilities For Securing Office 365 Email Six Key Capabilities For Securing Office 365 Email Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Kelley Mak, Forrester Analyst Recorded: May 3 2016 62 mins
    Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.


    While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.


    Key takeaways include:
    • Why the shift to Office 365 increases criticality of email security
    • Common pitfalls to avoid in the planning stages
    • Key security capabilities to protect from advanced threats

    Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.

    Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
  • Achieving PCI Compliance in AWS: A Customer Case Study Achieving PCI Compliance in AWS: A Customer Case Study Matthew R. McLimans, Computer Engineer at Warren Rogers Recorded: May 3 2016 59 mins
    PCI compliance is a steep enough challenge, but what happens when your entire infrastructure is in AWS? Do the same concepts of network segmentation and separation apply, and if so how? At what point do AWS compliance efforts intersect with your compliance efforts?

    Join this webinar where we will cover how a customer is using the Palo Alto Networks VM-Series for AWS to maintain separation of data and traffic in AWS to improve security and achieve PCI compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Application Whitelisting: the Good, the Bad, the Unknown
  • Live at: Aug 10 2011 9:00 am
  • Presented by: Fran Howarth, Senior Analyst, Security, Bloor Research; Jon Parkes, Vice President, Pre-Sales EMEA, McAfee
  • From:
Your email has been sent.
or close
You must be logged in to email this