Hi [[ session.user.profile.firstName ]]

IT Security

  • Equifax Hack and Improving Data Protection
    Equifax Hack and Improving Data Protection Satya Gupta (Virsec Systems), Shawn Burke (SungardAS), Vamshi Sriperumbudur (CipherCloud), William Leichter (Virsec) Recorded: Sep 21 2017 61 mins
    In the aftermath of the Equifax data breach, both consumers and enterprises are scrambling for ways to minimize the impact. Since highly personal information was exposed (social security numbers, addresses, birthdays), the implications of this breach could haunt us in the long-term future.

    What are the lessons of this breach to individuals, as well as organizations?

    Join this interactive panel discussion with security experts to learn:
    - The short and long-term effects of this data breach
    - What you can do to protect yourself and your organization
    - How to protect against future scams
    - Why breaches happen and how organizations can improve their breach prevention efforts, as well as employ technologies and process for faster breach detection and response
    - How to improve cyber security going into 2018

    Speakers:
    - Satya Gupta, CTO, Virsec Systems
    - Shawn Burke, Global Chief Security Officer, Sungard Availability Services
    - Vamshi Sriperumbudur, VP Marketing, CipherCloud

    Moderator:
    - William Leichter, VP Marketing, Virsec Systems
  • Using data analytics to drive your business ahead of the competition
    Using data analytics to drive your business ahead of the competition Cory Minton, Dell EMC; Steven Totman, Cloudera; Parviz Peiravi, Intel; and Nick Curcuru, Mastercard Recorded: Sep 21 2017 57 mins
    The most important topics in business today are focused on data analytics, security, the Internet of Things, machine learning, and artificial intelligence.
    How can leveraging data analytics to enable these strategic technology trends to drive your digital transformation and elevate your business? Where are you in adopting and implementing key strategies for driving your business ahead of the competition?
    Join industry leaders in data analytics including MasterCard, Cloudera, Dell EMC and Intel for a candid panel discussion on ways to drive success in business today. Examine the economic value of data and how you can use that data to build and protect your organization. Hear how data analytics strategies drive entirely new revenue streams, how security supports strategies, how data consolidation enables growth, and how insights from data elevate customer interactions.
  • Long Term Impact of PSD2 & How to Select a Strategic Partner
    Long Term Impact of PSD2 & How to Select a Strategic Partner Vanita Pandey, VP of Product Marketing at ThreatMetrix Recorded: Sep 21 2017 40 mins
    Join the Webinar: Long Term Impact of PSD2 & How to Select a Partner a Strategic Partner, featuring Vanita Pandey, VP of Product Marketing at ThreatMetrix, as she discusses the long-term impact of the Payment Service Directive (PSD2) and how to find a strategic partners in today’s crowded PSD2 landscape.

    The webinar will help you understand:

    •How the PSD2 requirements can be implemented in practice
    •Long-term impact of the PSD2 directive
    •How risk-based authentication (RBA) can be used to optimize the user experience
    •How to find a strategic partner in the crowded PSD2 landscape
  • Making the Executive Decision for Security Awareness Training
    Making the Executive Decision for Security Awareness Training Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Sep 21 2017 46 mins
    Cyber Security is on everybody’s minds these days. You can’t log in to your favorite web-based news site, it seems, without seeing a warning about ransomware, spear phishing, social engineering attacks or CEO fraud. Attackers have all the time in the world to create very targeted attacks, yet employees have seconds to decide if they will open an email, click on an attachment or even worse, install an “upgrade” supposedly sent by their IT department or software vendor.

    Today’s 20/20 panel discussion webcast will focus what you can do to train not only your users, but also your management team about these threats and how they can defend against them.
  • Strategies for the CompTIA Security+ Exam: SYS-501
    Strategies for the CompTIA Security+ Exam: SYS-501 Matt Salmon, CyberVista Lead Instructor Recorded: Sep 21 2017 58 mins
    Are you considering in earning the Security+ certification from CompTIA? A new version of the Security+ exam debuts this fall - version SYS-501. In this webinar, cybersecurity training provider, CyberVista, dissects the structure of the new Security+ exam. We will explain the 6 Domains that comprise the test while also providing valuable strategies for test day.
  • Extend Visibility & Control to Your Private Cloud & Software-Defined Data Center
    Extend Visibility & Control to Your Private Cloud & Software-Defined Data Center Sumit Bhat: Senior Product Marketing Manager, ForeScout Technologies Recorded: Sep 21 2017 20 mins
    Private and public cloud security are logical extensions of securing managed, unmanaged and IoT devices in the physical world. ForeScout security solutions help enhance security and compliance of your virtual assets, regardless of where they are located. In addition, ForeScout’s heterogeneous platform lets you to leverage your on-premises security operations team’s skills and maximize your existing security investments. In this webinar, you’ll learn how ForeScout integrates with third-party solutions to:
    • Discover and classify virtual instances (and cloud workloads) and assess their security posture
    • Gain consolidated visibility and provide unified policy management across Data Center and cloud environments
    • Proactively identify and manage underutilized or shadow VMs
    • Allow, deny or segment virtual machines and cloud instances based upon policy compliance

    Learn how you can enforce security across your hybrid campus and cloud deployments using one solution. Join us for this live online webinar.
  • Protection of ePHI Not Making the Grade?   Automate Risk and Compliance
    Protection of ePHI Not Making the Grade? Automate Risk and Compliance Anupam Sahai, Vice President Product Management, Cavirin Systems Recorded: Sep 21 2017 29 mins
    Is your cybersecurity protection making the grade? Healthcare rates a 'C' in security, almost half of US residents have been compromised, and the end-user impact is tens of billions of dollars a year.

    An easy first step is understanding the attack vectors and automating HIPAA technical controls. This automation lets you quickly understand your baseline security posture both on-premise and within the public cloud, where you have gaps, and how to remediate them.
  • Secure, Easy Access Management in an API Economy
    Secure, Easy Access Management in an API Economy Keith Casey, Senior Developer Evangelist at Okta Recorded: Sep 21 2017 24 mins
    The API economy creates new opportunities and business models supported by connected APIs. Unfortunately, most companies aren’t ready technically or organizationally for this shift, and the change it brings. API-driven application development requires reconsidering how identity, authorization, and accountability change for employees, partners and customers while protecting the organization.

    In this presentation, “Create a Secure Digital Identity without Borders in an API Economy”, Okta’s Senior Developer Evangelist Keith Casey (a.k.a. “The API Problem Solver”) will cover the challenges of the API economy and how Okta API Access Management can save your team time, simplify your authorization, and increase the security of your platform.

    Attend this webinar to learn:
    - What is driving the dominance of APIs
    - How to align Security Architects, Integration Architectures and Developers on API Efforts
    - How Okta API Asset Management satisfies the API Access Management needs of developers and IT and security leaders
    - How Pitney Bowes is transforming their business with APIs and the Okta Platform
  • An Industrial Immune System: AI Cyber Defense for OT, Sensors & IoT Devices
    An Industrial Immune System: AI Cyber Defense for OT, Sensors & IoT Devices Jeff Cornelius, PhD., Executive Vice President of ICS Solutions; Leo Simonovich, Director of Cyber Strategy, Siemens Recorded: Sep 21 2017 31 mins
    There is an urgent need for a new approach to combat the next generation of cyber-threats beyond the data center - across Operational Technology, Industrial Control Systems (ICS), sensors and industrial IoT devices. New AI-driven technology is making its way into innovation labs and into production environments within the world’s leading energy, manufacturing, municipalities, hospitals, and construction companies. These network-connected robots, sensors and IoT devices offer improvements in automation, efficiency and even safety, but often lack built-in cyber security.

    The silver lining is that the same wave of AI that is ushering in these innovations can also be used as an approach to protect them. Darktrace’s AI-powered cyber defense, known as the Industrial Immune System, is used by some of the world’s leading energy and manufacturing companies to detect early indicators of cyber-attacks or vulnerabilities across OT, ICS, sensor and industrial IoT environments.

    Join Darktrace’s Executive Vice President, Jeff Cornelius, PhD., to learn how Darktrace’s self-learning technology can be leveraged to help defend digital supply chains and ICS environments from cyber-attacks.
  • Investigation or Exasperation? The State of Security Operations
    Investigation or Exasperation? The State of Security Operations Duncan Brown, Associate Vice President, Security Practice, IDC & Jae Lee, Security Product Marketing, Splunk Recorded: Sep 21 2017 45 mins
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent* of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, associate vice president, security practice, IDC, and Jae Lee, security product marketing, Splunk, and discover:

    ● The time and associated cost security teams spend on incident response and how you compare to your peers
    ● How organizations are coping with an average of 40 actionable security incidents per week
    ● Where teams are focusing their security efforts
    ● Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • 10 Steps for Combating DDoS in Real Time
    10 Steps for Combating DDoS in Real Time David Holmes, Principal Threat Research Evangelist Recorded: Sep 21 2017 49 mins
    Please join us for the 10 Steps for Combating DDoS in Real Time Webinar.

    While the nature of distributed denial-of-service (DDoS) attacks is constantly evolving, two things are clear: the volume of attacks is increasing and every business is at risk.

    Join fellow IT Security Professionals for an interactive webinar presentation. You'll learn:
    - The importance of having a plan in place before attacks happen
    - The four basic types of DDoS attacks and what you can do to protect yourself against them
    - How to build your response plan using the customizable playbook and action plan
  • Protecting the business with SD-WAN segmentation
    Protecting the business with SD-WAN segmentation Robert McBride, Director of Enterprise and Telco Solutions Recorded: Sep 21 2017 33 mins
    Guest Wi-Fi services, partner networks and multi-tenancy all are drivers to segment the branch and WAN infrastructure to secure and prevent unauthorized access of corporate assets. However, what is segmentation when it comes to the next-generation branch architecture and SD-WAN? Is it really only VLANs and encrypted traffic?

    Attend this webinar to understand what is segmentation and how it is applied to software-defined WAN to address:

    •Optimal application experience
    •Secure and authorized connectivity
    •Third party network access and integration
    •Local guest services like Wi-Fi
  • CIS Checklist: How to Secure macOS like a Pro
    CIS Checklist: How to Secure macOS like a Pro Nick Thompson, Product Manager, Jamf Recorded: Sep 21 2017 30 mins
    The Center for Internet Security (CIS), a well-known independent organization, provides a recommended checklist for best securing macOS. Widely considered the standard in the security industry, organizations that adhere to the CIS checklist reduce the risk of vulnerabilities and maximize the protection of their computers and infrastructure. So how do organizations ensure they are implementing the guidelines correctly?

    In our webinar, CIS Checklist: How to Secure macOS like a Pro, we’ll explain how organizations can leverage and put to use the CIS checklist recommendations — in conjunction with Jamf Pro — to meet industry regulations and keep their Mac environment secure.

    We’ll cover:

    •An overview of the CIS checklist and why it’s important
    •Ways to accomplish specific tasks outlined in the security checklist
    •The impact on users when Macs are properly secured
    •Other security standards in the industry and how to meet them

    About the Presenter:

    Nick Thompson is on the product team at Jamf, an Apple device management solution for IT professionals. Nick is passionate about technology in the enterprise and closely follows the enterprise mobility management industry. He previously worked at Apple helping companies implement Mac and iOS deployments.
  • How blockchain is revolutionising  financial services
    How blockchain is revolutionising financial services Steve van den Heever- Dimension Data, Isaac Arruebarrena, & Josep Alvarez Perez - everis UK Recorded: Sep 21 2017 62 mins
    Blockchain technology burst onto the scene in 2009 and has emerged as one of the digital era’s most promising innovations. From frictionless money transfers and lower transaction costs to seamless real-time payments, blockchain is completely reinventing the global transaction settlement process.

    In this webinar, Financial Services experts from everis UK and Dimension Data discuss how blockchain is transforming the way value is exchanged between people, businesses and devices, and outline emerging technologies allowing financial services companies to take advantage of distributed ledgers. They also look to the future of DLTs, sharing predictions on how these will become the standard technology behind transaction settlement for banks, financial markets, and asset exchange networks in the coming decade.

    Speakers
    •Steve van den Heever, Group Sales Director, Financial Services, Dimension Data
    •Isaac Arruebarrena, Blockchain Programme Manager, everis UK
    •Josep Alvarez Perez, ‎Partner, Head of UK Banking Practice and EMEA Blockchain Strategy, everis UK
  • From Managing Risk to Creating Value – Compliance Week 2017
    From Managing Risk to Creating Value – Compliance Week 2017 Joe Filer, Senior Vice President, CISO & CPO, Harland Clarke; Sam Abadir, Dir. of Product Management, LockPath Recorded: Sep 21 2017 47 mins
    Join LockPath’s Sam Abadir and Harland Clarke’s Joe Filer in this session from Compliance Week 2017, as they discuss how to how to go from managing risk to creating value, including:

    • Ways to quantify the business value potential of compliance decisions.
    • The difference between metrics and risk-adjusted metrics.
    • How to transform a team or department from a necessary cost to a competitive advantage.
  • Enterprises under fire - how to manage risk and response
    Enterprises under fire - how to manage risk and response Kaspersky Lab Recorded: Sep 21 2017 87 mins
    On Thursday, 21 September, from 14.00 to 15.30 BST/15.00 to 16.30 CET, Kaspersky Lab will be joined by senior business and IT experts at the Kaspersky CyberSecurity Summit 2017, to debate the top threats facing enterprises – and what they mean for CISOs in terms of incident response, business continuity and risk management. Participants will leave armed with clear, actionable intelligence.

    Speakers: Duncan Brown, Associate Vice President, European Security Practice, IDC; Christian Toon, Chief Information Security Officer, Pinsent Masons LLP; Roderick Clayton, EVP and Co-lead, Global Issues and Crisis, Weber Shandwick; Juan Andres Guerrero-Saade, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab; and Alessio Aceti, Head of Enterprise Division, Kaspersky Lab.

    The event will be moderated by Geoff White, Television news reporter (BBC and Channel 4 News) and investigative journalist.

    The cyberthreat landscape is becoming ever more complex and destructive. Over the last 12 months, attacks targeting enterprises have increased significantly in both number and range – with a measurable impact on operations, revenue, customers and reputation.

    In this summit, experts from IT and business will discuss the most dangerous cyberthreats targeting enterprises, how to stay protected even when breached, as well as threat intelligence, incident response, the legal, insurance and communications challenges – and more.

    Participants will be able to join in the debate and ask questions. They will leave armed with clear, actionable intelligence.
  • APT33: New Insights into Iranian Cyber Espionage Group
    APT33: New Insights into Iranian Cyber Espionage Group Stuart Davis, Director, Mandiant; Nick Carr, Senior Manager, TORE Detection & Analysis Recorded: Sep 21 2017 49 mins
    Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2013. 
     
    Join us in a live webinar as we discuss this threat group whom we asses to be involved in a long-term, resource intensive cyber espionage operation motivated by the prospect of collecting strategic intelligence, including information related to the aviation and energy industries, which would ultimately benefit a nation-state or military sponsor.
     
    Register today to gain deeper insights into this threat group!
  • A Day in the Life of a GDPR Breach
    A Day in the Life of a GDPR Breach Adrian Davis, (ISC)² EMEA, Matthias Maier, Elizabeth Davies, Splunk Recorded: Sep 21 2017 62 mins
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?

    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

    What you will learn:
    - What breach response will look like under the GDPR
    - What tools and processes a data privacy officer will rely on in case of a breach
    - What departments and entities will be involved beyond IT
    - What activities are currently happening within organisations to prepare for the GDPR
    - What the consequences of the breach could be
  • Bridging the Office 365 Security Gap
    Bridging the Office 365 Security Gap Richard Davis - Director Cybersecurity Strategy EMEA, and Roy Murdoch - Sales Engineering Manager - NEMEA Recorded: Sep 21 2017 45 mins
    As you plan the move to Microsoft Office 365, make sure you have a good handle on the security capabilities you will need to ensure advanced email protection and continuity.
    Join Richard Davis, Proofpoint, and Roy Murdoch to hear how you can mitigating security and compliance risks to secure your Office 365 email environment.
    Hear how to take advantage of the bottom-line benefits of Office 365 while mitigating security risks with an integrated approach including:
    • Superior blocking of advanced threats
    • Immediate threat visibility and rapid response
    • Greater protection from compliance violations and information loss
    • Uninterrupted access to live and historic email

    To raise a question to Roy or Richard prior to the event email: O365questions@proofpoint.com
  • API Sandbox: parallelizzare il test delle API in un ambiente “auto-consistente”
    API Sandbox: parallelizzare il test delle API in un ambiente “auto-consistente” Domenico Maracci Recorded: Sep 21 2017 31 mins
    Le API sono un abilitatore fondamentale per lo sviluppo di nuovi canali digitali. Tuttavia un layer di service exposure basato su API ha sia la complessità architetturale di un sistema middleware che le responsabilità di sicurezza tipiche di un frontend. E’ per questo che risulta fondamentale poter testare la API in modo auto-consistente sin dalle prime fasi di sviluppo del software, in parallelo rispetto al restante ecosistema applicativo ed in autonomia rispetto alle dipendenze infrastrutturali a cui sono vincolate.
  • Understand Virsec in 3 Minutes
    Understand Virsec in 3 Minutes Virsec Systems Recorded: Sep 20 2017 4 mins
    This animated overview provides a quick introduction to Virsec's unique Trusted Execution technology, delivering deterministic protection against today's most advanced memory and fileless attacks.
  • Career Conversations with Women in Cyber Security featuring Elena Steinke
    Career Conversations with Women in Cyber Security featuring Elena Steinke Featured Guest: Elena Steinke, Information Security Strategic & Tactical Architect and Jessica Gulick, VP of WSC Sep 21 2017 11:00 pm UTC 60 mins
    Join us at our next Career Conversations with Women in Cyber Security session. This webinar gives WSC members the opportunity to connect with female career professionals. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Featured Guest: Elena Steinke, Information Security Strategic & Tactical Architect

    Jessica Gulick, VP of the Women's Society of Cyberjutsu board will moderate discussions.

    About the Speaker:
    Elena Steinke has over 15 years of systems engineering, and Information Security experience in developing solutions, providing strategic direction, designing, building, and directing cybersecurity operations across continents on multi-national projects, in the financial and US Federal sectors. Steinke stood up and directed multiple Security Operation Centers, Network Operation Centers, Data Centers, and management of virtualized storage technologies and elastic cloud environments. She lead security efforts across the globe for Automotive and Mobile Security, Banknote Processing Systems, Electronic Payments, eSIM, and IoT Technologies. She built and led Threat Hunting, Vulnerability Management, Security Assessment, Penetration Testing, Risk Management, Secure Credential Management, Key Management, and Security & Awareness Training programs.
    Steinke volunteers as a Director at Women’s Society of Cyberjutsu (WSC). She holds a Bachelors IT, an MBA, and is pursuing her second Masters from Mercyhurst University in Applied Intelligence. Her certifications include CISSP, CEHv9, Security+, and Intel Threat Analyst.
  • Beyond the Equifax Breach - Lessons and Actions to Take
    Beyond the Equifax Breach - Lessons and Actions to Take Dr. Chris Pierson (Viewpost), Sarah Squire (Engage Identity), Debra Farber (The Privacy Pact), Dr. Ravi Rajamiyer (Cavirin) Sep 22 2017 6:00 pm UTC 60 mins
    The recent Equifax data breach, which may have jeopardized the personal information of 143 million U.S. consumers, will likely haunt us for years to come.

    Join this interactive panel with experts from the cyber security, identity and privacy space to learn more about:
    - What we know occurred or is likely to have occurred
    - Data Breach Timeline - too slow or too fast
    - External communications - how has the breach been handled and communicated
    - Internal Actions - security remediation, work with law enforcement, root cause, incident response
    - External forces - lawsuits, media scrutiny, and customer communications

    Speakers:
    - Dr. Christopher Pierson, CSO, Viewpost
    - Sarah Squire, Founder and Principal Consultant, Engage Identity
    - Dr. Ravi Rajamiyer, VP of Engineering, Cavirin
    - Debra J. Farber Executive Privacy & Security Consultant, Cranium USA & Host of "The Privacy Pact," ITSPmagazine
  • 5 things you can do with a security policy management solution [APAC]
    5 things you can do with a security policy management solution [APAC] Jeffrey Starr, CMO & Edy Almer, VP Product Sep 26 2017 5:00 am UTC 60 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • Why sales people fail...and what you can do about it
    Why sales people fail...and what you can do about it Nigel Dunand Sep 26 2017 10:00 am UTC 60 mins
    •Sales cycles dragging on?
    •Not getting in front of enough on-profile prospects?
    •Frustrated by prospects haggling on price?
    •Tired of hearing the same old excuses from your sales team?

    If you manage sales people, and any of these types of challenges resonate with you, then sign up for this webinar.

    •Learn the importance of having a system for selling, and coaching your people to stick to it.
    •Find out why selling features, advantages, and benefits wastes everyone's time.
    •Discover how closing for a decision, YES or NO, can improve your sales teams effectiveness and efficiency.
  • DFLabs IncMan Product Overview
    DFLabs IncMan Product Overview Oliver Rochford, VP of Security Evangelism; Mike Fowler, VP of Professional Services Sep 26 2017 12:00 pm UTC 30 mins
    Learn how DFLabs IncMan can help you automate, orchestrate and measure your incident response and security operations.

    By joining this webinar you will have the opportunity to discover DFLabs IncMan and how our solution can help you to:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the amount of handled Incidents by 300%
  • Defending your endpoints from attacks starts with effective patch management
    Defending your endpoints from attacks starts with effective patch management Symantec Sep 26 2017 1:00 pm UTC 45 mins
    Like many other attacks, the high-profile cyberattacks this year (Wannacrry, NotPetya) have exploited vulnerabilities for which patches and updates already existed.

    Register for this short webinar for an overview on the biggest attacks of the year and learn more about how Symantec Patch Management provides visibility and compliance across today’s heterogenous environments to protect against similar attacks in the future.
  • The Blockchain Bubble: Identifying viable  opportunities for blockchain
    The Blockchain Bubble: Identifying viable opportunities for blockchain Joe Pindar, CTO Office Director of Strategy Sep 26 2017 3:00 pm UTC 60 mins
    Blockchain technology is popping up everywhere from the currency market to smart contracts. The growth in the technology is evident from the investments being made, for example, PwC estimated that in the last nine last nine months of 2016, $1.4 billion had been invested globally in blockchain startups. This stems from its potential to enable efficiencies and cost-saving opportunities based on moving to a decentralized approach and away from the current centralized systems. With all the hype around blockchain, companies need to cut through the hype and ask the question - when does blockchain actually make business sense?

    Blockchain is not a silver bullet and cannot solve every problem. There is also the added complexity of managing the security of many distributed nodes can only be justified by gaining business benefits from using blockchain. In this webinar, we will look at a business qualifying approach to blockchain to help you evaluate valid blockchain use cases and identify the security needs surrounding blockchain operations. Join us to learn more on:
    •Securing blockchain from the edge to the core
    •The operational benefits and pitfalls of blockchain technology
    •Our 4 step qualification process for blockchain business opportunities:
    1.Is there an established business process?
    2.Are there more 3 parties involved – i.e. is it a distributed problem?
    3.Is it important that the data being exchanged is trusted and considered to be factually accurate?
    4.Would automation improve the performance of the process?
  • 5 things you can do with a security policy management solution [US/UK]
    5 things you can do with a security policy management solution [US/UK] Jeffrey Starr, CMO & Edy Almer, VP Product Sep 26 2017 3:00 pm UTC 60 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?

    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec highlights 5 key security management challenges facing enterprise organizations today and explains how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    This technical webinar focuses on:

    - Managing security policies end-to-end across public and private cloud including --Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    - Mapping security vulnerabilities to their applications to assess and prioritize risk
    - Enable SOC engineers to tie cyber-attacks to business processes
    - Migrating Firewall policies between firewall brands
    - Performing a fully automated, zero-touch security policy change
  • Psychological Mechanisms Used in Ransomware Splash Screens
    Psychological Mechanisms Used in Ransomware Splash Screens Jeremiah Grossman, Chief of Security Strategy at SentinelOne Sep 26 2017 3:00 pm UTC 45 mins
    SentinelOne recently released a report with De Montfort University to examines the differing levels of sophistication on the part of the attackers and trends and tactics use to commission a payment from organizations.

    Join this session as we discuss the common trends highlighted in the report including:
    - Time criticality and deadline sensitivity
    - Consequences for not paying or missing the demand
    - The Customer Service Approach on how to pay the ransom
    - The use of a variety of imagery
    - Preferred mechanism for payment

    About the presenter:
    Jeremiah’s InfoSec career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry’s biggest names. At SentinelOne, Jeremiah is responsible for designing effective defense strategies against ever-evolving attacks including ransomware. Prior to joining, Jeremiah was the Founder & CEO of WhiteHat Security, specializing in website risk management.
  • How to Design Safe, Secure, and Reliable IoT Critical Infrastructure Systems
    How to Design Safe, Secure, and Reliable IoT Critical Infrastructure Systems Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Sep 26 2017 3:00 pm UTC 60 mins
    There’s no way around it; as a software developer, system engineer, or system architect, you’re going to encounter design complexity when developing safe, secure and reliable IoT systems for today’s critical infrastructure. But in this new software-defined world and with the IoT exploding around us, companies like yours must adapt to stay relevant. While legacy critical infrastructure is too expensive to just replace completely, there are ways to implement new features that will define premium products for your market and meet the safety and security requirements necessary for connecting to the IoT. In Day 1 of this three-day class, we’ll look at how you can transform digitally and ensure that your applications remain safe and secure. Sponsored by Wind River.
  • Risk in the Cloud: Measuring and Mitigating with an Expert
    Risk in the Cloud: Measuring and Mitigating with an Expert Maurice Stebila, CISO, Harmon International, Dan Rheault, Sr. Product Marketing Manager, Tufin Sep 26 2017 3:00 pm UTC 45 mins
    The public cloud is a critical asset for enabling business agility, but the new rapid pace of cloud deployments cannot come at the expense of security. In a time when risks are regularly introduced through the diffusion of ownership of the cloud, security teams need to develop ways to identify the risks introduced to their network, understand how to measure those risks, and devise and employ risk mitigation strategies.

    This Tufin-hosted webinar will feature Maurice Stabila, CISO of Harmon International, a Fortune 500 company. Maurice is an award-winning, published, and internationally renowned leader in IT security. Attendees of this webinar will gain a better understanding of what risks are persistent in the public cloud, how your organization can measure cloud-specific risk, and gain exposure to some techniques for successfully managing cloud risk.

    Join us to hear an industry expert’s approach to solving these new security problems.
  • The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products
    The Next Level of Smarter Endpoint Protection: Going Beyond Anti-Virus Products Jim Waggoner, Sr. Director, Product Management Sep 26 2017 3:00 pm UTC 60 mins
    Antivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses.

    On September 26, Jim Waggoner, Sr. Director, Product Management for FireEye will detail:
    •Why endpoint security products have not provided complete protection
    •Capabilities required for a comprehensive endpoint protection solution
    oAV with threat intelligence
    oDetection and response
    oBehavior and exploit analysis
    oVisibility and automation
    •How the latest FireEye Endpoint Security solution enables you to go from detection to investigation and remediation quickly, all with a single agent

    Attend this webinar as the first step toward a smarter, more adaptive approach to endpoint security.
  • Evaluating CASB - Five Use Cases to Consider
    Evaluating CASB - Five Use Cases to Consider Aaron Smith, Sr. Product Marketing Manager, Cloud Security, Forcepoint Sep 26 2017 3:00 pm UTC 45 mins
    Your organization has a cloud-first imperative. You know that traditional, perimeter defenses will not protect employees using cloud applications. This webcast discusses five emerging use cases and how to address them while keeping employees, partners, and clients productive.

    - Discovery of Shadow IT
    - Managing any vs. all cloud applications
    - Securing users anywhere
    - Protecting the data, wherever it flows
    - UEBA in the cloud - it's more important than you think
  • WannaCry & Petya - Where do we go from here?
    WannaCry & Petya - Where do we go from here? Carl Leonard, Principal Security Analyst, Forcepoint Security Labs & Neil Addleton, Security Advisor, South Australia Health Sep 26 2017 4:00 pm UTC 45 mins
    One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, financial, government and commercial enterprise networks can now be listed among its victims. Our security experts examine the technical and business threats that ransomware continues to pose to organizations for which IT security teams must be prepared to address and overcome.

    During the session, Carl Leonard and Neil Addleton will discuss the latest on WannaCry, Petya, Jaff and Cradlecore as well as examining the concept of “have-a-go” cybercrime. Highlights include:

    - Which ransomware should you defend against?
    - Should you pay the ransom?
    - What can you do to protect your data and network? (research-based)
    - How is your organization using the Cloud in a risky way, putting your data more at risk?
  • Defending Against Ransomware in 2017
    Defending Against Ransomware in 2017 John Bambenek (Fidelis Cybersecurity), Masha Sedova (Elevate Security), Jay Beale (InGuardians) Sep 26 2017 5:00 pm UTC 60 mins
    Hacking and malware attacks, including ransomware attacks, are a major cause of breaches in 2017. With high-profile ransomware attacks on the rise, enterprises and small businesses worldwide are looking to better secure their data from cyber criminals and more nefarious attackers.

    Join this interactive Q&A session with security experts across industries to learn more about:
    - What can we learn from Wannacry, NotPetya and other ransomware attacks seen in 2017
    - Financial motivation or disruption
    - Who is at risk of a ransomware attack
    - What to do before, during, and after a ransomware attack
    - How can we better protect our businesses, organizations, governments and infrastructure from cyber attacks
    - Urgent steps to take today

    Moderator:
    - Jay Beale, CTO & COO of InGuardians

    Speakers:
    - John Bambenek, Threat Systems Manager, Fidelis Cybersecurity
    - Masha Sedova, Co-founder of Elevate Security
  • A Predictive "PreCrime" Approach Requires a Human Focus
    A Predictive "PreCrime" Approach Requires a Human Focus Dr. Richard Ford, Chief Scientist, Forcepoint Sep 26 2017 5:00 pm UTC 45 mins
    In Philip K. Dick's 1956 "The Minority Report," murder ceased to occur due to the work of the "Precrime Division," that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Precrime Division, empowered to intervene before a violation is ever committed.

    In this webcast, we will examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
  • Surviving a CISO Transition
    Surviving a CISO Transition Shahar Ben-Hador - CISO; Bo Kim - Sr. Dir. Information Security; Paul Steen - Vice President, Global Product Strategy Sep 26 2017 5:00 pm UTC 60 mins
    How to make sure a CISO's work isn't dumped when they leave.

    A CISO's departure can leave a company vulnerable and its security posture at risk. Having a plan to manage a CISO succession is critical to business continuity. In this webinar, outgoing Imperva CISO Shahar Ben-Hador and his successor Bo Kim provide key steps to successful succession planning, including:

    * Building a transition timeline
    * Evaluating which projects should be completed and which handed off
    * Determining where to draw the line on investments

    About the Speakers:

    Shahar Ben-Hador, CISO, Imperva

    As the CISO of Imperva (NASDAQ: IMPV) Shahar's team was responsible for Cyber Security and Compliance of the enterprise footprint and Cloud Operations activities for Imperva and Incapsula SaaS product lines.

    Bo Kim, Sr. Dir. Information Security, Imperva

    Bo’s team is responsible for developing and maintaining Imperva’s security posture. He is assuming responsibility from Shahar for cybersecurity and compliance.
  • Next-Generation (SOC) Security Operation Center
    Next-Generation (SOC) Security Operation Center Rinki Sethi, Sr. Director, Information Security and Matt Mellen, Security Architect, Palo Alto Networks Sep 26 2017 5:00 pm UTC 60 mins
    Security Operations Centers, or SOCs, were invented to enable ease of collaboration among security personnel across different technologies and location, providing a full view of an attack. Most traditional SOC practices and tools, where established in a time when cyberattacks were primarily manual in nature. Nowadays, machine-based automated cyberattacks, with multi-steps approach leveraging variety of entry points are the norm and are challenging enterprises to ‘re-think’ their SOC and InfoSec team’s strategy.

    Join Matt Mellen from our PMM team, and Rinki Sethi, who leads our InfoSec team, for an educational webinar on defining and building your Next-Generation SOC, sharing insights and providing best practice from our own experiences.

    Join this information session to understand:

    •Why traditional SOCs fail.
    •What defines a Next-Gen SOC.
    •How to shift in focus from detection to prevention
    •The business value of building a Next-Gen SOC in your organization.
  • Optimize Incident Response in the Age of Ransomware
    Optimize Incident Response in the Age of Ransomware Tom Clavel, Senior Manager, Security Product at Gigamon Sep 26 2017 6:00 pm UTC 60 mins
    Organizations face increasing volumes of network data across their expanding physical, virtual and cloud networks. At the same time, dangerous malware, data breaches and ransomware continue to successfully penetrate their networks. Yet, network security, monitoring and analysis tools are overloaded, Security Operations teams are understaffed and overwhelmed and incident response is becoming more cumbersome and time-consuming.

    Learn how Gigamon, the industry leader in network visibility solutions, can help you optimize incident response and effectively secure your organization’s network using your existing security and monitoring tools.