Hi [[ session.user.profile.firstName ]]

IT Security

  • Cloud Security for Startups - From A to E(xit)
    Cloud Security for Startups - From A to E(xit) Moshe Ferber of CSA Israel and Shahar Maor of Outbrain Live 60 mins
    Cloud computing perform amazing things for startups, providing young companies with access to enterprise grade infrastructure . But also act as a double edge sword. Lack of proper security controls can lead to multiple challenges varying from longer sales cycles to losing customers & investors trust.
    The Cloud Security Alliance identified those unique challenges and developed a cloud security for startups guidelines.
    In the upcoming webinar, the guidelines co-authors will explain the 3 phases security strategy that is recommended for your cloud based startups.
  • Flexible Consumption Models for HCI Transition
    Flexible Consumption Models for HCI Transition Kevin Green, EMEA BD Manager Open Scale Payment Solutions at Dell Financial Services Recorded: Nov 23 2017 27 mins
    When asked about the challenges of HCI adoption, IDC found that 25% of customers were concerned about cost or were unsure regarding the projected ROI. Dell Financial Services developed the Cloud Flex for HCI program with that in mind. The primary goal is to allow you to move to hyperconverged infrastructure without making a long term commitment.
    Join us for this webinar to learn how companies across many verticals are using Dell financial services to help them in their HC.I transition
  • Breaches, threats and how to improve security in 2018
    Breaches, threats and how to improve security in 2018 Shimon Oren (Deep Instinct), Ted Harrington (ISE), Greg Foss (LogRhythm) Recorded: Nov 23 2017 62 mins
    2017 is not yet over and it's already the year of cyber attacks. From phishing, to hacks, to classified hacking tools leaked and the biggest ransomware attacks to date (Wannacry, NotPetya), security professionals across the world are looking to apply the lessons learned in 2017 for improved cyber security next year.

    Watch this interactive Q&A panel with experts from the artificial intelligence, deep learning and IoT security space to learn about:
    - The biggest attack trends seen so far
    - Impact across industries
    - Threats on the horizon
    - Recommendations to better secure your data and company in 2018

    - Shimon Oren, Head of Cyber-Intelligence at Deep Instinct
    - Ted Harrington, Executive Partner at Independent Security Evaluators
    - Greg Foss, Global SecOps Manager at LogRhythm
  • Wie CASB sich weiterentwickeln muss
    Wie CASB sich weiterentwickeln muss Martin Kroemer, Symantec Recorded: Nov 23 2017 41 mins
    Wie CASB sich weiterentwickeln muss, um sich in Ihre Security-Infrastruktur zu integrieren

    Die schnelle Akzeptanz von Cloud-Anwendungen und -Diensten erhöht die Notwendigkeit von Cloud Access Security Brokers (CASB)

    Es ist Zeit, dass CASB-Systeme sich in Ihre gesamte Security-Infrastruktur einfügen. Dabei müssen zahlreiche Schnittstellen berücksichtigt werden, u. a. DLP, Advanced Malware Protection, Web Security und Endpoint Security. Daher überlegen Unternehmen, wie sie cloudbasierte Security-Lösungen am besten in ihre Umgebung integrieren können, um die Sicherheit zu erhöhen und den operativen Aufwand zu reduzieren.

    Der Webcast sondiert diesen nächsten Schritt, den CASB-Lösungen machen müssen.

    Jetzt anmelden
  • The digital social world. Impacts & opportunities for businesses, jobs & society
    The digital social world. Impacts & opportunities for businesses, jobs & society Debra Bordignon, CTO Dimension Data Australia & Scott Gibson Digital Practice Dimension Data Recorded: Nov 23 2017 63 mins
    Every business is impacted by global digital disruption.
    Even the most successful and iconic 20th century businesses must transform to remain relevant and retain their leadership in the 21st.

    Tech-savvy start-ups with natively digital business models regard this point in time as the best time in the history of the world to invent something.
    The world is buzzing with technology-driven opportunities leveraging the solid platform provided over the past 30 years, birthed from the Internet, then mobility, social
    and now the massive scale of cloud computing and the Internet of Things.

    Join this webinar to learn how your business can leverage the opportunities of digital disruption.

    Debra Bordignon, CTO, Strategist and Innovation Executive, DD Australia
    Scott Gibson, Group Executive: Digital Practice, Dimension Data Group
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Recorded: Nov 23 2017 62 mins
    Three major trends define the Cloud Generation chaos that organisations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organisations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for organisations who face a severe shortage of skilled IT security personnel.

    Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:

    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security

    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response

    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
  • Are you ready for GDPR?
    Are you ready for GDPR? Lockpath Recorded: Nov 22 2017 1 min
    Visit https://lockpath.com/gdpr-checklist for more information on GDPR.

    Gophers Dance Practically Right?

    Giant Dinosaurs Prance Righteously?


    General Data Protection Regulation. An EU data protection regulation that probably affects you and your business.
  • SonicWall Capture Labs
    SonicWall Capture Labs SonicWALL Recorded: Nov 22 2017 5 mins
    In 2016, the SonicWall Capture Threat Network observed 60 million unique malware samples, 7.9 billion malware attack attempts, 638 million ransomware attacks and showed that 62% of SonicWall customer internet sessions were encrypted using SSL/TLS.
    The SonicWall Capture Labs Threat Research Team:
    •Gathers, analyzes, and vets cross-vector threat information from more than one million sensors around the world,

    • Performs rigorous testing and evaluation,
    • Establishes reputation scores for email senders and content
    • Identifies new threats in real-time.

    Get the most up-to-date protection against new attacks with real-time information from SonicWall Capture Labs.
  • Kaspersky Lab’s Industry and Technology Threat Predictions for 2018
    Kaspersky Lab’s Industry and Technology Threat Predictions for 2018 David Emm, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab Recorded: Nov 22 2017 52 mins
    Kaspersky Lab will present an in-depth review of its industry and technology threat predictions for 2018 – and consider what they could mean for some of the world’s most connected industry sectors over the coming year.
    The session will discuss the top trends expected to affect enterprises, with a particular focus on connected healthcare, automotive, financial services, industrial security, and cryptocurrencies.
    The aim of the webinar is to help IT security professionals in all industries to understand the rapidly evolving threat landscape and the actions they can take to defend their organization against these threats.
  • IT Security Attacken 2017 und 2018 in Deutschland, Österreich und der Schweiz: W
    IT Security Attacken 2017 und 2018 in Deutschland, Österreich und der Schweiz: W Candid Wueest, Symantec Recorded: Nov 22 2017 61 mins
    Die Bedrohungslage | November 2017

    Was Sie beachten sollten,um Ihre IT-Security 2018 zu stärken

    Was können Sie von den jüngsten Datenschutzverletzungen und Malware-Wellen lernen? Welche Schlüsse ziehen Sie, um die Sicherheitsvorfälle signifikant zu reduzieren? Wie bereiten Sie Ihre Netzwerke, Server und Endgeräte auf die neuen Angriffsmethoden vor, die 2018 kommen könnten und wie erfüllen Sie gleichzeitig die Regularien, wie GDPR?

    Das folgende Webinar von Orla Cox, Director Security Response Team, sollten Sie daher nicht verpassen!
    Das Webinar behandelt:
    •Analyse der grössten IT Security Vorfälle in 2017: Die Methodik und Hintergründe
    •Die wichtigsten Maßnahmen, die sie sofort ergreifen sollten
    •Eine Prognose für 2018 und besten Schutzmechanismen für 2018 und danach

    Heute noch registrieren
  • In-Depth Analysis of a Fast Flux Botnet
    In-Depth Analysis of a Fast Flux Botnet Or Katz, Principal Lead Security Researcher, Akamai Recorded: Nov 22 2017 60 mins
    In recent years, we have seen large-scale botnets used to execute attacks rarely seen in the past -- botnets that incorporate new features and bigger capabilities than ever before. How and why some of these botnets remain resilient is a question that needs to be answered, and one of the reasons is Fast Flux. Fast Flux is a DNS technique used by botnets to hide various types of malicious activities (such as phishing, web proxying, malware delivery, and malware communication) behind an ever-changing network of compromised hosts acting as proxies. In general, a Fast Flux network is mostly used to make communication between malware and its command and control server (C&C) more resistant to discovery. Akamai’s high visibility to both Web and Enterprise traffic enables new and unique insights on the behavior of such Fast Flux networks.

    In this webinar, you will get an in-depth analysis on:

    - How network fluxing is using domains, IP addresses and even nameservers to become resistant to discovery
    - How Fast Flux networks offer services such as malware communication and hosting of malicious content
    - How botnets are used both for Fast Flux communications and a variety of Web attacks such as Web scraping and credential abuse
    - Best practices for detecting and defending against such botnets

    Join Akamai and (ISC)² on Nov 22 (Wed) at 13:00 (Singapore time) / 16:00 (Sydney time) to learn more about the Fast Flux Botnet.

    Presenter: Or Katz, Principal Lead Security Researcher, Akamai
    Moderator: Ir. Tejinder Singh, Senior Development Expert, T-Systems Malaysia SGA Security Engineering
  • Equifax Breach and Managing Your Vulnerabilities
    Equifax Breach and Managing Your Vulnerabilities Carl Wright (AttackIQ), Igor Baikalov (Securonix), Chris Petersen (LogRhythm), Sam Abadir (LockPath) Recorded: Nov 22 2017 62 mins
    With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.

    What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?

    Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
    - The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
    - Managing IT risk and vulnerabilities
    - How to improve breach prevention, detection and response
    - What to expect in the future

    - Igor Baikalov, Chief Scientist, Securonix
    - Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
    - Sam Abadir, Director of Product Management, LockPath

    - Carl Wright, CRO, AttackIQ
  • Are you Ready for Australia's Privacy Act? A Gemalto Case Study
    Are you Ready for Australia's Privacy Act? A Gemalto Case Study Jean -Pierre Mistral, Legal Counsel for Data Privacy and Graeme Pyper, Regional Director of Enterprise and Cybersecurity Recorded: Nov 22 2017 61 mins
    Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
    Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •The Mandatory Data Breaches scheme
    •Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • Bringing Order to the Chaos of Audit Management
    Bringing Order to the Chaos of Audit Management Sam Abadir, Director of Product Management, LockPath Recorded: Nov 21 2017 56 mins
    Companies and organizations are subjected to multiple types of audits, from internal governance to regulatory requirements to industry standards. Within each, the organization must identify auditable entities, conduct numerous audit activities and communicate findings. Audit management has become a matrix too complex for organizations to rely on spreadsheets, email, or basic collaboration software to perform.

    This reality has created the demand for an automated solution that organizes and centralizes every step of the audit process: risk assessment, planning, fieldwork and testing, time and expense management, issue tracking, workpaper management, reporting and remediation.

    In this webinar, LockPath’s Sam Abadir demonstrates the audit management capabilities of the Keylight Platform to define the audit universe, initiate audit projects and tasks, and generate audit findings and corrective actions.
  • Streamline Your Audit Process With Lockpath Keylight
    Streamline Your Audit Process With Lockpath Keylight Lockpath Recorded: Nov 21 2017 2 mins
    Manage Internal Audits Effortlessly & Effectively with the Lockpath Keylight Platform.

    Visit Lockpath.com/solutions/audit-management for more info.
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018
    Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Jeffrey Ritter Recorded: Nov 21 2017 52 mins
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
  • Digital Transformation Enablers: IoT Analytics and Autonomic Actuation
    Digital Transformation Enablers: IoT Analytics and Autonomic Actuation Kevin Curtis, Distinguished IoT Architect - Connected Cities, Verizon Enterprise Solutions (VES) Recorded: Nov 21 2017 25 mins
    Listen to Kevin Curtis, Distinguished IOT Architect – Connected Cities, Verizon Enterprise Solutions (VES) talk about how digital transformation occurs when information technology (IT) and operational technology (OT) data assets are effectively integrated, to realize new business outcomes and to create transformative value, not previously possible.
  • Understanding your Attack Surface - Research into FT30 organisations
    Understanding your Attack Surface - Research into FT30 organisations Terry Bishop, EMEA Technical Director, RiskIQ Recorded: Nov 21 2017 37 mins
    Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions. Cyber adversaries are taking advantage of this sprawling digital attack surface, looking forweaknesses to exploit. The attack surface has become the battle line between malicious actorsand an organisation’s external threat defenders and its compromise is behind many of the breaches that get reported with alarming frequency.

    In an effort to highlight and quantify the risks which organisations have in their attack surface, we conducted research on the top 30 UK organisations (FT30) to highlight the issues we believe all companies face. We will present the various types of risk we uncovered and offer practical advice on ways to mitigate them and harden your attack surface.
  • Your GDPR compliance journey  – Moving from “What” to “How”
    Your GDPR compliance journey – Moving from “What” to “How” Fred Oberholzer, Gilles Gravier, Alon Rosenthal Nov 23 2017 3:00 pm UTC 60 mins
    With six months before the GDPR becomes effective many organisations have a view on what needs to be done to achieve compliance. However, many more organisations are still evaluating how they are going to address the technology and process challenges. This webinar will explore:

    -Key considerations at the six month mark.
    -Approaches using innovative technologies to help address compliance challenges.
  • APTs - Cómo funcionan y cómo protegerse
    APTs - Cómo funcionan y cómo protegerse Ferran Orosola, Solutions Architect FireEye; Alvaro Culebras Sanchez & Noa Blanco Fernandez, Cybersecurity Engineers, Minsait Nov 23 2017 3:30 pm UTC 45 mins
    Crees que estas protegido frente a las APTs? Te explicamos cómo funcionan y como protegerse

    Los ataques de hoy en día se han vuelto cada vez más sofisticados, lo que ha provocado que las medidas de seguridad tradicionales ya no sean eficaces. Las organizaciones deben adoptar nuevas estrategias de Ciberseguridad que permitan una mayor protección, adaptándose a estas nuevas amenazas.

    En este webinar FireEye y Minsait, la unidad de negocio de Indra encargada de la transformación digital de las empresas, muestran qué son las Amenazas Persistentes Avanzadas (Advanced Persistent Threats), cómo funcionan y qué medidas se deben implementar en las organizaciones para protegerse ante las APTs que utilizan el correo electrónico como principal vector de ataque.
  • [Video]A Celebration of the Female Tech Entrepreneur: Finding the Founder in You
    [Video]A Celebration of the Female Tech Entrepreneur: Finding the Founder in You Emily Forbes (Seenit), Devika Wood (Vida Care), Jude Ower MBE (Playmob), Zoe Peden (Iris Speaks) Nov 23 2017 7:00 pm UTC 90 mins
    One way we can encourage more females into tech and tech entrepreneurship is to raise the profile and visibility of female role models.

    This live meet-up event will take place at BrightTALK's London offices and is an opportunity to celebrate female tech founders and to learn from their experience. We’ll be finding out how they’ve overcome the key challenges they’ve faced along the way, as well as the practical advice they’d offer to aspiring female founders. The panel will be filmed, livestreamed, and will be be made available on-demand.

    We’ll be talking about:
    •Key challenges our tech founders have faced and how they’ve overcome them
    •The advantages of being a female in the tech start up world
    •The best and the worst things about being an entrepreneur
    •Taking a business concept from idea stage, to realisation
    •Raising funding – our founders experience of finding - and pitching - to investors
    •Our founders’ attitudes to failure
    •Establishing a brand – both business and personal
    •The relationships that have been vital to our founders success
    •What our founders know now, that they wish they knew when they were starting out

    Emily Forbes - Founder, Seenit
    Devika Wood - Co-Founder, Vida
    Jude Ower MBE - Founder and CEO, Playmob
    Zoe Peden - Founder & CEO, Iris Speaks
  • SafeNet Authentication Service Live Product Demo
    SafeNet Authentication Service Live Product Demo Ms. Mukta Gupta - Technical Consultant Engineer, Identity & Data Protection, India & SAARC, Gemalto Nov 24 2017 5:30 am UTC 30 mins
    SafeNet Authentication Service (SAS) delivers fully-automated, highly secure strong authentication-as-a service. A new product demo webinar is now available.

    Register now for our 30 minute demo and see how easy and simple it is to:
    - Set up a strong authentication account on SAS
    - Add users to an account
    - Assign tokens to users
    - Generate reports

    Please email us at InfoAPAC@gemalto.com if you have any questions or problems registering.
  • Rôle crucial du proxy dans la protection de votre entreprise
    Rôle crucial du proxy dans la protection de votre entreprise Hervé Doreau, Directeur Technique, Symantec France Nov 24 2017 1:00 pm UTC 60 mins
    Pour relever les défis de sécurité les plus complexes, il vous faut une approche avancée bâtie sur une architecture proxy.
    Une telle approche vous permet de vous appuyer sur les meilleures technologies pour offrir sécurité et confiance aux utilisateurs cloud et réseau.
    Symantec Secure Web Gateway vous apporte une solution de sécurité optimale sous la forme qui vous convient le mieux : appliance sur site, appliance virtuelle, solution dans le cloud ou une architecture hybride unifiée.
    L'architecture proxy unique de cette solution lui permet de surveiller, contrôler et sécuriser le trafic pour offrir une expérience sécurisée sur le Web et dans le cloud.
    Ce webcast vous explique :
    - Pourquoi l’architecture proxy est plus importante que jamais dans la composition de votre sécurité réseau
    - Comment un proxy web peut servir de plate-forme de détection des menaces et de protection des données
    - En quoi un filtrage en amont du sandbox via l’architecture proxy permet d’optimiser votre SOC sans grever votre budget

    Inscrivez-vous dès aujourd'hui
  • Maîtriser le chaos du cloud
    Maîtriser le chaos du cloud Hervé Doreau, Directeur Technique, Symantec France Nov 24 2017 2:00 pm UTC 45 mins
    Sécuriser l’accès au web et protéger les données avec une solution de sécurité mise en œuvre dans le cloud.

    L’accroissement de l’adoption du cloud, l’usage du mobile et la croissance spectaculaire du télétravail met les infrastructures de sécurité existantes sous pression.
    Dans un tel environnement, les équipes de sécurité de l’entreprise doivent faire face aux préoccupations suivantes :
    - Comment harmoniser l’application des politiques encadrant l’usage du web et du cloud ?
    - Comment protéger efficacement les utilisateurs des menaces web ?
    - Comment sécuriser les données sensibles et respecter les réglementations ?
    Pour relever ces défis, les entreprises se tournent vers une solution de sécurité mise en œuvre dans le cloud.

    Assistez à ce webcast pour apprendre à tirer parti de Symantec Cloud Security Services pour protéger les utilisateurs, les données et les terminaux, et relever les défis de la génération cloud.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities
    Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Nathaniel Ford, Moderator, (ISC)² EMEA, Membership Services Team, (ISC)² EMEA Nov 27 2017 12:00 pm UTC 60 mins
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • UK Enterprise Security Maturity: How Does Your Organisation Stack Up?
    UK Enterprise Security Maturity: How Does Your Organisation Stack Up? Jarad Carleton, Principal Consultant at Frost & Sullivan & Hadi Hosn, Global Consulting Solutions Lead at Secureworks Nov 27 2017 2:00 pm UTC 60 mins
    During March/April 2017, Secureworks and Frost & Sullivan partnered to conduct security readiness research amongst 201 IT leaders within large UK enterprises to determine how realistic their perceived level of security maturity is. The end result is the white paper, Measuring Cybersecurity Preparedness: Illuminating Perception vs Reality in UK Enterprise.

    In this webcast, Jarad Carleton, Principle Consultant at Frost & Sullivan, will present key findings from the research, which benchmarks UK enterprises against the Security Maturity Model (SMM), co-developed by Secureworks and Frost & Sullivan.

    Hadi Hosn, Global Consulting Solutions Lead at Secureworks, will then explain the Secureworks point of view on some of the challenges UK enterprises are currently facing on their quest for greater security maturity, and how organisations can take positive steps to tackle them.

    During this live webcast we will cover:

    - How you rate against the UK’s Security Leaders
    - The top aspects of security Underprepared organisations should focus on
    - The key security weakness where even Security Leaders are vulnerable
    - Steps you can take to improve the security posture of your organisation
  • In-house or Outsourced Security Operations Center?
    In-house or Outsourced Security Operations Center? Oliver Rochford, VP of Security Evangelism - DFLabs, Sebastian Hess, AIG Cyber Risk Exec Nov 27 2017 3:00 pm UTC 45 mins
    The need to have a Security Operations Center (SOC) is becoming increasingly evident with each passing day, with data breaches being a common occurrence for many organizations around the globe. But, when organizations start thinking about setting up a SOC, they face a big dilemma - whether to build one in-house, or go with an outsourced or managed services model.

    This webinar offers a deeper look into the factors that should play a role in deciding which option is a better fit for organizations, based on their needs and the resources at their disposal.

    Key takeaways:
    - A SOC must strike a proper balance between people, processes and technology
    - People are the key to any SOC, but are scarce due to a skills shortage
    - The right technologies are a key enabler for any SOC, but can often also be remotely delivered
    - Getting processes right in an outsourced SOC model can be challenging, but the unavailability of skilled resources may be the bigger challenge

    Join us on this webinar as we try to answer the question of how best to handle your security needs, by explaining the pros and cons of both an in-house SOC and an outsourced one, so you can make an informed decision that would be best suited for your organization.
  • Are you Prepared for the General Data Protection Regulations?
    Are you Prepared for the General Data Protection Regulations? Ilias Chantzos, Senior Director EMEA and APJ, Global CIP and Privacy Advisor, Government Affairs, Symantec Corporation Nov 28 2017 5:00 am UTC 60 mins
    On 25 May 2018, the European General Data Protection Regulation (GDPR) will come into effect – and while it is an European Union’s regulation, it may still affect your organisation here in the Asia Pacific.

    But how do you know if your organisation needs to comply with the GDPR, and what is required for compliance? With top level fines of over $20 million for non-compliance, it is better to be safe and sure than sorry.

    Join us at our webinar as we discuss:

    • How to find out if your company will be impacted by the GDPR
    • What is needed to comply with the GDPR
    • How the GDPR will be enforced in Asia Pacific
    • Capitalising on the GDPR to improve your business
    • Real-life issues faced by organisations and how technology can help fix them

    Don’t be caught unaware by the GDPR. Register for our webinar today and learn how Symantec technologies help to facilitate GDPR compliance.
  • What's New: The Latest Proofpoint Email Security Release
    What's New: The Latest Proofpoint Email Security Release Jeff Burstein, Sr. Director, Product Management Nov 28 2017 11:00 am UTC 45 mins
    Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.

    The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:

    * Email Authentication
    * Attachment Sandboxing
    * Data Loss Prevention
    * Encryption
  • The Forrester Total Economic Impact of Palo Alto Networks Traps
    The Forrester Total Economic Impact of Palo Alto Networks Traps Bob Cormier, VP, Principal Consultant at Forrester Consulting & Dal Gemmell, Head of Endpoint Marketing at Palo Alto Networks Nov 28 2017 12:00 pm UTC 45 mins
    Guest Speaker Bob Cormier, VP & Principal Consultant of Forrester, will discuss the results of The Total Economic Impact™ of the Palo Alto Networks Traps solution, an October 2017 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks. Watch this Webinar to see how companies:

    • Attained economic total benefits with Traps
    • Realized a ROI and the payback period.
    • Prevented malicious executables (malware) and prevented vulnerability exploits.

    Deep dive with Forrester to discover the findings of how Palo Alto Networks Traps achieved the above benefits, and how Traps advanced endpoint protection replaced antivirus solutions and secured endpoints with a multi-method approach.
  • How Securing SaaS Applications Contributes to GDPR Compliance
    How Securing SaaS Applications Contributes to GDPR Compliance Danielle Kriz and Anuj Sawani from Palo Alto Networks Nov 28 2017 2:00 pm UTC 45 mins
    In less than a year (May 28, 2018) the General Data Protection Regulation (GDPR) becomes law in Europe. With the exponential rise in the use of SaaS applications, organizations that process the personal data of EU residents need to be able to maintain compliance with the GDPR while keeping data secure in the cloud.

    We invite you to join us for a live webinar on Monday, September 11 in which we zoom in on how our platform, with its SaaS Security service, Aperture, can help your organization meet the upcoming requirements.

    Our policy team expert, Danielle Kriz, and our product team expert, Anuj Sawani, team up to provide an overview of the GDPR—in particular its provisions related to securing personal data- and how Aperture can be used to address potential compliance issues. We will also provide a quick overview of how Aperture fits with EU compliance requirements when processing personal data. .

    After the presentation, we will have some time for questions and answers with our experts.
  • 5 practical steps to implement your GDPR project
    5 practical steps to implement your GDPR project Robert O'Brien and Shane Fuller Nov 28 2017 2:00 pm UTC 45 mins
    There is so much material out there claiming to be the ultimate guide to your GDPR project, but a lot of this is complex jargon that doesn’t offer a pragmatic solution to the GDPR conundrum.

    Ensuring a successful GDPR project requires financial investment as well as time. With the May 2018 deadline getting closer, there is an increasing unease within organisations regarding their ability to mitigate the risk and demonstrate compliance.

    With this Webinar, we will provide you with 5 practical steps to implement your GDPR project. By the end of the Webinar you will be in possession of structured and practical solutions that lead to GDPR compliance.

    As a bonus for attending the Webinar, you will also receive a copy of the official GDPR for Dummies guide. We understand that GDPR is a complex issue, that’s why we worked with subject matter experts and the Wiley brand to create the official GDPR for Dummies guide that offers a practical approach to GDPR.
  • Creating a movement: Inspiring girls to shape the future with technology
    Creating a movement: Inspiring girls to shape the future with technology Isabelle Ringnes, founder TENK, #Shesgotthis, podcast 20-30 Nov 28 2017 3:00 pm UTC 45 mins
    A few years ago no one was talking about the impact of technology in Norway. When I moved back from New York in 2014, I felt like I was the only woman interested. Knowing that technology would disrupt and change virtually every industry and facet of our society, I felt like I needed to take action.

    This led to founding TENK: the Technology network for women. Through TENK I have written and spoken for thousands of people on the impact of technology with a special focus on the importance of diversity and inclusion in the industry.

    TENK has worked to inspire women of all ages to lean in and see the opportunities in technology as opposed to shying away from the new and unknown. Girls have been given arenas in which they have been inspired to learn hands on about the many opportunities technology provides from a human centric and creative point of view. TENK believes that the only way to increase girls' interest and participation in technology is by giving it to them on their own terms.

    Isabelle has also helped found #Shesgotthis (#hunspanderer) which twice became a successful national campaign reaching more than 2 million people online. This campaign worked on addressing subtle discrimination and gender stereotypes in the workplace.

    Join this webinar to learn how to create a movement, set the agenda and how to spike girls' interest in technology.
  • Simplifying Security across your Universal I.T. Infrastructure
    Simplifying Security across your Universal I.T. Infrastructure Alan Conboy, Scale Computing, Office of the CTO | James LaPalme, WinMagic, VP of Business Development | Scott Van Woudenberg Nov 28 2017 3:30 pm UTC 60 mins
    The future lies in turnkey cloud solutions like hyper-convergence, which is set to displace traditional server and storage models. Join leaders from Scale Computing, WinMagic and Google as they unravel some of the most critical considerations for establishing a high performance IT infrastructure that is not only flexible, fluid, and affordable, but provides the consistent security and simplicity needed across your entire environment – so that you can keep compliant within increasing data privacy regulations.

    Key Learnings:

    • Simplicity: Discover why managing infrastructure and security across a disparate array of platforms doesn’t need to be difficult
    • Scalability: Learn how you can start with a small deployment, and then flexibly and securely scale out to support dynamic workloads and evolving business needs
    • Portability: Virtualization and cloud offer a whole new realm of possibilities, so why limit your business to a single platform? Learn how to securely and efficiently move data from node to node, cluster to cluster, cloud to cloud.
    • Availability: Identify best practices for using and managing the data security within local, remote, and cloud-based backups to achieve high-availability and resiliency
    • Affordability: Find out how to achieve enterprise-grade hyper-convergence and data security on an SMB budget
  • Bringing Security to DevOps with Veracode Integrations
    Bringing Security to DevOps with Veracode Integrations Austin Britt, CA Veracode Solution Architect Nov 28 2017 5:00 pm UTC 30 mins
    Keep in pace with the speed of DevOps and reap the benefits.

    Developers and security teams are both challenged to meet security goals in complex environments. Developers already need to manage many separate tools; new AppSec tools that do not integrate well or lack flexible APIs and customizable integrations are met with low adoption, high distraction and a steep learning curve.

    Join this 20 minute webinar to see how the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use. Get a first-hand look at how our flexible API allows you to create your own custom integrations or use community integrations. Make security developer-friendly so you can go faster, without sacrificing security.
  • The Race for 5G
    The Race for 5G Peter Jarich, Chief Analyst, Global Data Nov 28 2017 6:00 pm UTC 30 mins
    Listen to GlobalData's Peter Jarich – VP, Consumer Services and Service Provider Infrastructure talk about who is in the lead for 5G test trials and deployments and what regions of the world we can expect the next generation of network communications?
  • Protect and Prevent: 3 strategies for blocking fileless attacks and exploits
    Protect and Prevent: 3 strategies for blocking fileless attacks and exploits Jack Danahy, CTO, Barkly Nov 28 2017 6:00 pm UTC 60 mins
    Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and most companies aren't protected.

    Learn the three strategies Avidia Bank implemented to shut out today's sophisticated threats and how you can apply them to protect your own organization:

    Register now to learn more on:

    - How ransomware is going fileless to get past protection
    - What makes everyone a target
    - Three protection strategies to minimize the risk to your organization

    Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.
  • Zero-Day Read-Only Cloud Apps
    Zero-Day Read-Only Cloud Apps Rich Campagna, CEO, Bitglass Nov 28 2017 6:00 pm UTC 30 mins
    A common problem in regulated industries is that clients wish to interact with business users via unmanaged consumer applications such Box, Dropbox etc. At the same time, security demands that internal documents not be uploaded to these applications.

    Emerging zero-day technology for unmanaged apps makes any cloud service "read-only." View or download content on any app, but not upload, allowing external collaboration while protecting sensitive data and ensuring regulatory compliance. Join us for this Bitglass Webinar express to learn more.
  • Secure Identity Management for Mergers and Acquisitions
    Secure Identity Management for Mergers and Acquisitions Merritt Maxim, Principal Analyst at Forrester, Teju Shyamsundar, Technical Solutions Manager at Okta Nov 28 2017 6:00 pm UTC 60 mins
    As organizations expand through mergers and acquisitions, there is a need to embrace cloud technologies that simplify and accelerate expansion. To gain competitive advantage, newly acquired technologies and users must be integrated into the overall ecosystem quickly, efficiently and securely - with minimal disruption to your users.

    Join guest speaker Merritt Maxim, Principal Analyst at Forrester, and Teju Shyamsundar, Technical Solutions Manager at Okta to discuss identity and security complexities that arise from M&A and how to alleviate these challenges with a cloud IAM solution. Learn how to maintain directory security and reduce IT and compliance costs, while also giving your users day one access to their applications.

    Join our webinar to:

    * Learn the common challenges in a traditional M&A project
    * Understand how a cloud identity and access management solution simplifies your M&A process
    * Discover M&A trends and challenges from an industry IAM expert
  • Ransomware: The Billion-dollar Innovation Industry 
    Ransomware: The Billion-dollar Innovation Industry  Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Nov 28 2017 6:30 pm UTC 60 mins
    Since ransomware exploded on the scene, the bad guys are constantly coming out with new versions of ransomware strains to evade detection. Having earned a billion dollars in 2016, they have the resources to keep innovating and now ransomware is being leveraged in ways it has never been before.
    Join us for this 45-minute webinar as we discuss the latest innovations in ransomware and how you can reduce damage from ransomware and fortify your last line of defense—your end users.

    Key topics covered in this webinar:
    • How Ransomware started
    • What led to its explosion in growth
    • Where Ransomware is heading
    • Techniques for dealing with Ransomware
    • How to create a "Human Firewall"
  • Analytic Stories or How I Learned to Stop Worrying and Respond to Threats
    Analytic Stories or How I Learned to Stop Worrying and Respond to Threats David Dorsey, Principal Research Engineer, Splunk Nov 29 2017 1:00 am UTC 45 mins
    How do you know what to look for in your environment? Then what do you do when you find it? This session will help you answer these questions and more! Analytic stories provide a way to organize your searches, understand how to respond to events and what data is needed to detect and respond to this threat and detail why you should care about a given threat. They also allow you to map to different security frameworks so business owners can think about their security posture in business terms. This talk will discuss what makes up an analytic story, how they can be used to guide and inform your investigation and how to better understand your security posture.
  • 진화하는 봇(Bot)의 공격을 방어하라
    진화하는 봇(Bot)의 공격을 방어하라 정덕진, Technical Project Manager II, Akamai Korea Nov 29 2017 5:00 am UTC 60 mins
    Bot은 자동화된 프로그램으로, 웹사이트의 정보를 수집하거나, credential abuse와 같은 악성행위를 수행합니다. Bot으로 인한 피해는 IT 측면의 퍼포먼스 저하 뿐만 아니라, 매출 감소, 경쟁력 저하, 비즈니스 기회 상실과 같이 비즈니스에 심각한 영향을 끼치는 경우까지 퍼져 있습니다. Bot을 운영하는 쪽은 심지어 차단을 회피하기 위한 여러 가지 기술까지 활용하여 지속적으로 대응하기 때문에, 차단만이 모든 문제를 해결해 주는 방법은 아닙니다. 점점 다양해지고 지속적으로 변화하고 발전하는 Bot의 공격 방법 등을 알아보고, 이를 효과적으로 관리하기 위한 접근방법 및 기술에 대해 알아봅니다.
  • 深入分析FastFlux僵尸网络
    深入分析FastFlux僵尸网络 演講人: 欧展鹏, Akamai 亚太和日本地区高级企业安全架构师; 主持人:卢佐华, (ISC)² 北京分会理事长 Nov 29 2017 7:00 am UTC 60 mins

    FastFlux 是一种 DNS 技术,僵尸网络利用其将各种类型的恶意活动(例如网络钓鱼、网络代理、恶意软件交付和恶意软件通信)隐藏于不断变化的受感染主机(充当代理)网络背后。一般来说,FastFlux网络主要用于使恶意软件与其命令和控制服务器 (C&C) 之间的通信更不易于发现。Akamai 对网络和企业流量进行了深入了解,并提供了有关此类FastFlux网络行为的全新独特见解。

    欢迎您加入本次在线研讨会,与 Akamai 亚太及日本地区的企业架构师 Sunny Au (欧展鹏)一起进行深入分析,了解以下内容的更多信息:

    •Flux网络如何利用域名、IP 地址甚至是名称服务器来避开检测

    参加Akamai 和 (ISC)² 在11月29日下午3:00至4:00的在线论坛《深入分析FastFlux 僵尸网络》,聆听专家对僵尸网络的深入解读,还等什么?赶紧加入我们吧。