The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Cloud computing perform amazing things for startups, providing young companies with access to enterprise grade infrastructure . But also act as a double edge sword. Lack of proper security controls can lead to multiple challenges varying from longer sales cycles to losing customers & investors trust.
The Cloud Security Alliance identified those unique challenges and developed a cloud security for startups guidelines.
In the upcoming webinar, the guidelines co-authors will explain the 3 phases security strategy that is recommended for your cloud based startups.
When asked about the challenges of HCI adoption, IDC found that 25% of customers were concerned about cost or were unsure regarding the projected ROI. Dell Financial Services developed the Cloud Flex for HCI program with that in mind. The primary goal is to allow you to move to hyperconverged infrastructure without making a long term commitment.
Join us for this webinar to learn how companies across many verticals are using Dell financial services to help them in their HC.I transition
2017 is not yet over and it's already the year of cyber attacks. From phishing, to hacks, to classified hacking tools leaked and the biggest ransomware attacks to date (Wannacry, NotPetya), security professionals across the world are looking to apply the lessons learned in 2017 for improved cyber security next year.
Watch this interactive Q&A panel with experts from the artificial intelligence, deep learning and IoT security space to learn about:
- The biggest attack trends seen so far
- Impact across industries
- Threats on the horizon
- Recommendations to better secure your data and company in 2018
- Shimon Oren, Head of Cyber-Intelligence at Deep Instinct
- Ted Harrington, Executive Partner at Independent Security Evaluators
- Greg Foss, Global SecOps Manager at LogRhythm
Wie CASB sich weiterentwickeln muss, um sich in Ihre Security-Infrastruktur zu integrieren
Die schnelle Akzeptanz von Cloud-Anwendungen und -Diensten erhöht die Notwendigkeit von Cloud Access Security Brokers (CASB)
Es ist Zeit, dass CASB-Systeme sich in Ihre gesamte Security-Infrastruktur einfügen. Dabei müssen zahlreiche Schnittstellen berücksichtigt werden, u. a. DLP, Advanced Malware Protection, Web Security und Endpoint Security. Daher überlegen Unternehmen, wie sie cloudbasierte Security-Lösungen am besten in ihre Umgebung integrieren können, um die Sicherheit zu erhöhen und den operativen Aufwand zu reduzieren.
Der Webcast sondiert diesen nächsten Schritt, den CASB-Lösungen machen müssen.
Every business is impacted by global digital disruption.
Even the most successful and iconic 20th century businesses must transform to remain relevant and retain their leadership in the 21st.
Tech-savvy start-ups with natively digital business models regard this point in time as the best time in the history of the world to invent something.
The world is buzzing with technology-driven opportunities leveraging the solid platform provided over the past 30 years, birthed from the Internet, then mobility, social
and now the massive scale of cloud computing and the Internet of Things.
Join this webinar to learn how your business can leverage the opportunities of digital disruption.
Debra Bordignon, CTO, Strategist and Innovation Executive, DD Australia
Scott Gibson, Group Executive: Digital Practice, Dimension Data Group
Three major trends define the Cloud Generation chaos that organisations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).
On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organisations with ransomware, targeted attacks and mobile malware.
Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for organisations who face a severe shortage of skilled IT security personnel.
Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
-Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
-Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
-Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
-Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
In 2016, the SonicWall Capture Threat Network observed 60 million unique malware samples, 7.9 billion malware attack attempts, 638 million ransomware attacks and showed that 62% of SonicWall customer internet sessions were encrypted using SSL/TLS.
The SonicWall Capture Labs Threat Research Team:
•Gathers, analyzes, and vets cross-vector threat information from more than one million sensors around the world,
• Performs rigorous testing and evaluation,
• Establishes reputation scores for email senders and content
• Identifies new threats in real-time.
Get the most up-to-date protection against new attacks with real-time information from SonicWall Capture Labs.
Kaspersky Lab will present an in-depth review of its industry and technology threat predictions for 2018 – and consider what they could mean for some of the world’s most connected industry sectors over the coming year.
The session will discuss the top trends expected to affect enterprises, with a particular focus on connected healthcare, automotive, financial services, industrial security, and cryptocurrencies.
The aim of the webinar is to help IT security professionals in all industries to understand the rapidly evolving threat landscape and the actions they can take to defend their organization against these threats.
Was Sie beachten sollten,um Ihre IT-Security 2018 zu stärken
Was können Sie von den jüngsten Datenschutzverletzungen und Malware-Wellen lernen? Welche Schlüsse ziehen Sie, um die Sicherheitsvorfälle signifikant zu reduzieren? Wie bereiten Sie Ihre Netzwerke, Server und Endgeräte auf die neuen Angriffsmethoden vor, die 2018 kommen könnten und wie erfüllen Sie gleichzeitig die Regularien, wie GDPR?
Das folgende Webinar von Orla Cox, Director Security Response Team, sollten Sie daher nicht verpassen!
Das Webinar behandelt:
•Analyse der grössten IT Security Vorfälle in 2017: Die Methodik und Hintergründe
•Die wichtigsten Maßnahmen, die sie sofort ergreifen sollten
•Eine Prognose für 2018 und besten Schutzmechanismen für 2018 und danach
In recent years, we have seen large-scale botnets used to execute attacks rarely seen in the past -- botnets that incorporate new features and bigger capabilities than ever before. How and why some of these botnets remain resilient is a question that needs to be answered, and one of the reasons is Fast Flux. Fast Flux is a DNS technique used by botnets to hide various types of malicious activities (such as phishing, web proxying, malware delivery, and malware communication) behind an ever-changing network of compromised hosts acting as proxies. In general, a Fast Flux network is mostly used to make communication between malware and its command and control server (C&C) more resistant to discovery. Akamai’s high visibility to both Web and Enterprise traffic enables new and unique insights on the behavior of such Fast Flux networks.
In this webinar, you will get an in-depth analysis on:
- How network fluxing is using domains, IP addresses and even nameservers to become resistant to discovery
- How Fast Flux networks offer services such as malware communication and hosting of malicious content
- How botnets are used both for Fast Flux communications and a variety of Web attacks such as Web scraping and credential abuse
- Best practices for detecting and defending against such botnets
Join Akamai and (ISC)² on Nov 22 (Wed) at 13:00 (Singapore time) / 16:00 (Sydney time) to learn more about the Fast Flux Botnet.
Presenter: Or Katz, Principal Lead Security Researcher, Akamai
Moderator: Ir. Tejinder Singh, Senior Development Expert, T-Systems Malaysia SGA Security Engineering
With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.
What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?
Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
- The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
- Managing IT risk and vulnerabilities
- How to improve breach prevention, detection and response
- What to expect in the future
- Igor Baikalov, Chief Scientist, Securonix
- Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
- Sam Abadir, Director of Product Management, LockPath
Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.
This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.
Join us to hear more about:
•The Mandatory Data Breaches scheme
•Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
•The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
Companies and organizations are subjected to multiple types of audits, from internal governance to regulatory requirements to industry standards. Within each, the organization must identify auditable entities, conduct numerous audit activities and communicate findings. Audit management has become a matrix too complex for organizations to rely on spreadsheets, email, or basic collaboration software to perform.
This reality has created the demand for an automated solution that organizes and centralizes every step of the audit process: risk assessment, planning, fieldwork and testing, time and expense management, issue tracking, workpaper management, reporting and remediation.
In this webinar, LockPath’s Sam Abadir demonstrates the audit management capabilities of the Keylight Platform to define the audit universe, initiate audit projects and tasks, and generate audit findings and corrective actions.
Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
Listen to Kevin Curtis, Distinguished IOT Architect – Connected Cities, Verizon Enterprise Solutions (VES) talk about how digital transformation occurs when information technology (IT) and operational technology (OT) data assets are effectively integrated, to realize new business outcomes and to create transformative value, not previously possible.
Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions. Cyber adversaries are taking advantage of this sprawling digital attack surface, looking forweaknesses to exploit. The attack surface has become the battle line between malicious actorsand an organisation’s external threat defenders and its compromise is behind many of the breaches that get reported with alarming frequency.
In an effort to highlight and quantify the risks which organisations have in their attack surface, we conducted research on the top 30 UK organisations (FT30) to highlight the issues we believe all companies face. We will present the various types of risk we uncovered and offer practical advice on ways to mitigate them and harden your attack surface.
With six months before the GDPR becomes effective many organisations have a view on what needs to be done to achieve compliance. However, many more organisations are still evaluating how they are going to address the technology and process challenges. This webinar will explore:
-Key considerations at the six month mark.
-Approaches using innovative technologies to help address compliance challenges.
Crees que estas protegido frente a las APTs? Te explicamos cómo funcionan y como protegerse
Los ataques de hoy en día se han vuelto cada vez más sofisticados, lo que ha provocado que las medidas de seguridad tradicionales ya no sean eficaces. Las organizaciones deben adoptar nuevas estrategias de Ciberseguridad que permitan una mayor protección, adaptándose a estas nuevas amenazas.
En este webinar FireEye y Minsait, la unidad de negocio de Indra encargada de la transformación digital de las empresas, muestran qué son las Amenazas Persistentes Avanzadas (Advanced Persistent Threats), cómo funcionan y qué medidas se deben implementar en las organizaciones para protegerse ante las APTs que utilizan el correo electrónico como principal vector de ataque.
One way we can encourage more females into tech and tech entrepreneurship is to raise the profile and visibility of female role models.
This live meet-up event will take place at BrightTALK's London offices and is an opportunity to celebrate female tech founders and to learn from their experience. We’ll be finding out how they’ve overcome the key challenges they’ve faced along the way, as well as the practical advice they’d offer to aspiring female founders. The panel will be filmed, livestreamed, and will be be made available on-demand.
We’ll be talking about:
•Key challenges our tech founders have faced and how they’ve overcome them
•The advantages of being a female in the tech start up world
•The best and the worst things about being an entrepreneur
•Taking a business concept from idea stage, to realisation
•Raising funding – our founders experience of finding - and pitching - to investors
•Our founders’ attitudes to failure
•Establishing a brand – both business and personal
•The relationships that have been vital to our founders success
•What our founders know now, that they wish they knew when they were starting out
Pour relever les défis de sécurité les plus complexes, il vous faut une approche avancée bâtie sur une architecture proxy.
Une telle approche vous permet de vous appuyer sur les meilleures technologies pour offrir sécurité et confiance aux utilisateurs cloud et réseau.
Symantec Secure Web Gateway vous apporte une solution de sécurité optimale sous la forme qui vous convient le mieux : appliance sur site, appliance virtuelle, solution dans le cloud ou une architecture hybride unifiée.
L'architecture proxy unique de cette solution lui permet de surveiller, contrôler et sécuriser le trafic pour offrir une expérience sécurisée sur le Web et dans le cloud.
Ce webcast vous explique :
- Pourquoi l’architecture proxy est plus importante que jamais dans la composition de votre sécurité réseau
- Comment un proxy web peut servir de plate-forme de détection des menaces et de protection des données
- En quoi un filtrage en amont du sandbox via l’architecture proxy permet d’optimiser votre SOC sans grever votre budget
Sécuriser l’accès au web et protéger les données avec une solution de sécurité mise en œuvre dans le cloud.
L’accroissement de l’adoption du cloud, l’usage du mobile et la croissance spectaculaire du télétravail met les infrastructures de sécurité existantes sous pression.
Dans un tel environnement, les équipes de sécurité de l’entreprise doivent faire face aux préoccupations suivantes :
- Comment harmoniser l’application des politiques encadrant l’usage du web et du cloud ?
- Comment protéger efficacement les utilisateurs des menaces web ?
- Comment sécuriser les données sensibles et respecter les réglementations ?
Pour relever ces défis, les entreprises se tournent vers une solution de sécurité mise en œuvre dans le cloud.
Assistez à ce webcast pour apprendre à tirer parti de Symantec Cloud Security Services pour protéger les utilisateurs, les données et les terminaux, et relever les défis de la génération cloud.
Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?
Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
- CPE opportunities, member benefits and getting involved
- Updates on (ISC)² news, developments and changes in your region
- Your membership requirements summarized
- Who are the (ISC)² EMEA team and how we can help you
- Focus discussions
- Q&A session
During March/April 2017, Secureworks and Frost & Sullivan partnered to conduct security readiness research amongst 201 IT leaders within large UK enterprises to determine how realistic their perceived level of security maturity is. The end result is the white paper, Measuring Cybersecurity Preparedness: Illuminating Perception vs Reality in UK Enterprise.
In this webcast, Jarad Carleton, Principle Consultant at Frost & Sullivan, will present key findings from the research, which benchmarks UK enterprises against the Security Maturity Model (SMM), co-developed by Secureworks and Frost & Sullivan.
Hadi Hosn, Global Consulting Solutions Lead at Secureworks, will then explain the Secureworks point of view on some of the challenges UK enterprises are currently facing on their quest for greater security maturity, and how organisations can take positive steps to tackle them.
During this live webcast we will cover:
- How you rate against the UK’s Security Leaders
- The top aspects of security Underprepared organisations should focus on
- The key security weakness where even Security Leaders are vulnerable
- Steps you can take to improve the security posture of your organisation
The need to have a Security Operations Center (SOC) is becoming increasingly evident with each passing day, with data breaches being a common occurrence for many organizations around the globe. But, when organizations start thinking about setting up a SOC, they face a big dilemma - whether to build one in-house, or go with an outsourced or managed services model.
This webinar offers a deeper look into the factors that should play a role in deciding which option is a better fit for organizations, based on their needs and the resources at their disposal.
- A SOC must strike a proper balance between people, processes and technology
- People are the key to any SOC, but are scarce due to a skills shortage
- The right technologies are a key enabler for any SOC, but can often also be remotely delivered
- Getting processes right in an outsourced SOC model can be challenging, but the unavailability of skilled resources may be the bigger challenge
Join us on this webinar as we try to answer the question of how best to handle your security needs, by explaining the pros and cons of both an in-house SOC and an outsourced one, so you can make an informed decision that would be best suited for your organization.
On 25 May 2018, the European General Data Protection Regulation (GDPR) will come into effect – and while it is an European Union’s regulation, it may still affect your organisation here in the Asia Pacific.
But how do you know if your organisation needs to comply with the GDPR, and what is required for compliance? With top level fines of over $20 million for non-compliance, it is better to be safe and sure than sorry.
Join us at our webinar as we discuss:
• How to find out if your company will be impacted by the GDPR
• What is needed to comply with the GDPR
• How the GDPR will be enforced in Asia Pacific
• Capitalising on the GDPR to improve your business
• Real-life issues faced by organisations and how technology can help fix them
Don’t be caught unaware by the GDPR. Register for our webinar today and learn how Symantec technologies help to facilitate GDPR compliance.
Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.
The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:
* Email Authentication
* Attachment Sandboxing
* Data Loss Prevention
Guest Speaker Bob Cormier, VP & Principal Consultant of Forrester, will discuss the results of The Total Economic Impact™ of the Palo Alto Networks Traps solution, an October 2017 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks. Watch this Webinar to see how companies:
• Attained economic total benefits with Traps
• Realized a ROI and the payback period.
• Prevented malicious executables (malware) and prevented vulnerability exploits.
Deep dive with Forrester to discover the findings of how Palo Alto Networks Traps achieved the above benefits, and how Traps advanced endpoint protection replaced antivirus solutions and secured endpoints with a multi-method approach.
In less than a year (May 28, 2018) the General Data Protection Regulation (GDPR) becomes law in Europe. With the exponential rise in the use of SaaS applications, organizations that process the personal data of EU residents need to be able to maintain compliance with the GDPR while keeping data secure in the cloud.
We invite you to join us for a live webinar on Monday, September 11 in which we zoom in on how our platform, with its SaaS Security service, Aperture, can help your organization meet the upcoming requirements.
Our policy team expert, Danielle Kriz, and our product team expert, Anuj Sawani, team up to provide an overview of the GDPR—in particular its provisions related to securing personal data- and how Aperture can be used to address potential compliance issues. We will also provide a quick overview of how Aperture fits with EU compliance requirements when processing personal data. .
After the presentation, we will have some time for questions and answers with our experts.
There is so much material out there claiming to be the ultimate guide to your GDPR project, but a lot of this is complex jargon that doesn’t offer a pragmatic solution to the GDPR conundrum.
Ensuring a successful GDPR project requires financial investment as well as time. With the May 2018 deadline getting closer, there is an increasing unease within organisations regarding their ability to mitigate the risk and demonstrate compliance.
With this Webinar, we will provide you with 5 practical steps to implement your GDPR project. By the end of the Webinar you will be in possession of structured and practical solutions that lead to GDPR compliance.
As a bonus for attending the Webinar, you will also receive a copy of the official GDPR for Dummies guide. We understand that GDPR is a complex issue, that’s why we worked with subject matter experts and the Wiley brand to create the official GDPR for Dummies guide that offers a practical approach to GDPR.
A few years ago no one was talking about the impact of technology in Norway. When I moved back from New York in 2014, I felt like I was the only woman interested. Knowing that technology would disrupt and change virtually every industry and facet of our society, I felt like I needed to take action.
This led to founding TENK: the Technology network for women. Through TENK I have written and spoken for thousands of people on the impact of technology with a special focus on the importance of diversity and inclusion in the industry.
TENK has worked to inspire women of all ages to lean in and see the opportunities in technology as opposed to shying away from the new and unknown. Girls have been given arenas in which they have been inspired to learn hands on about the many opportunities technology provides from a human centric and creative point of view. TENK believes that the only way to increase girls' interest and participation in technology is by giving it to them on their own terms.
Isabelle has also helped found #Shesgotthis (#hunspanderer) which twice became a successful national campaign reaching more than 2 million people online. This campaign worked on addressing subtle discrimination and gender stereotypes in the workplace.
Join this webinar to learn how to create a movement, set the agenda and how to spike girls' interest in technology.
The future lies in turnkey cloud solutions like hyper-convergence, which is set to displace traditional server and storage models. Join leaders from Scale Computing, WinMagic and Google as they unravel some of the most critical considerations for establishing a high performance IT infrastructure that is not only flexible, fluid, and affordable, but provides the consistent security and simplicity needed across your entire environment – so that you can keep compliant within increasing data privacy regulations.
• Simplicity: Discover why managing infrastructure and security across a disparate array of platforms doesn’t need to be difficult
• Scalability: Learn how you can start with a small deployment, and then flexibly and securely scale out to support dynamic workloads and evolving business needs
• Portability: Virtualization and cloud offer a whole new realm of possibilities, so why limit your business to a single platform? Learn how to securely and efficiently move data from node to node, cluster to cluster, cloud to cloud.
• Availability: Identify best practices for using and managing the data security within local, remote, and cloud-based backups to achieve high-availability and resiliency
• Affordability: Find out how to achieve enterprise-grade hyper-convergence and data security on an SMB budget
Keep in pace with the speed of DevOps and reap the benefits.
Developers and security teams are both challenged to meet security goals in complex environments. Developers already need to manage many separate tools; new AppSec tools that do not integrate well or lack flexible APIs and customizable integrations are met with low adoption, high distraction and a steep learning curve.
Join this 20 minute webinar to see how the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use. Get a first-hand look at how our flexible API allows you to create your own custom integrations or use community integrations. Make security developer-friendly so you can go faster, without sacrificing security.
Listen to GlobalData's Peter Jarich – VP, Consumer Services and Service Provider Infrastructure talk about who is in the lead for 5G test trials and deployments and what regions of the world we can expect the next generation of network communications?
Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and most companies aren't protected.
Learn the three strategies Avidia Bank implemented to shut out today's sophisticated threats and how you can apply them to protect your own organization:
Register now to learn more on:
- How ransomware is going fileless to get past protection
- What makes everyone a target
- Three protection strategies to minimize the risk to your organization
Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.
A common problem in regulated industries is that clients wish to interact with business users via unmanaged consumer applications such Box, Dropbox etc. At the same time, security demands that internal documents not be uploaded to these applications.
Emerging zero-day technology for unmanaged apps makes any cloud service "read-only." View or download content on any app, but not upload, allowing external collaboration while protecting sensitive data and ensuring regulatory compliance. Join us for this Bitglass Webinar express to learn more.
As organizations expand through mergers and acquisitions, there is a need to embrace cloud technologies that simplify and accelerate expansion. To gain competitive advantage, newly acquired technologies and users must be integrated into the overall ecosystem quickly, efficiently and securely - with minimal disruption to your users.
Join guest speaker Merritt Maxim, Principal Analyst at Forrester, and Teju Shyamsundar, Technical Solutions Manager at Okta to discuss identity and security complexities that arise from M&A and how to alleviate these challenges with a cloud IAM solution. Learn how to maintain directory security and reduce IT and compliance costs, while also giving your users day one access to their applications.
Join our webinar to:
* Learn the common challenges in a traditional M&A project
* Understand how a cloud identity and access management solution simplifies your M&A process
* Discover M&A trends and challenges from an industry IAM expert
Since ransomware exploded on the scene, the bad guys are constantly coming out with new versions of ransomware strains to evade detection. Having earned a billion dollars in 2016, they have the resources to keep innovating and now ransomware is being leveraged in ways it has never been before.
Join us for this 45-minute webinar as we discuss the latest innovations in ransomware and how you can reduce damage from ransomware and fortify your last line of defense—your end users.
Key topics covered in this webinar:
• How Ransomware started
• What led to its explosion in growth
• Where Ransomware is heading
• Techniques for dealing with Ransomware
• How to create a "Human Firewall"
How do you know what to look for in your environment? Then what do you do when you find it? This session will help you answer these questions and more! Analytic stories provide a way to organize your searches, understand how to respond to events and what data is needed to detect and respond to this threat and detail why you should care about a given threat. They also allow you to map to different security frameworks so business owners can think about their security posture in business terms. This talk will discuss what makes up an analytic story, how they can be used to guide and inform your investigation and how to better understand your security posture.
Bot은 자동화된 프로그램으로, 웹사이트의 정보를 수집하거나, credential abuse와 같은 악성행위를 수행합니다. Bot으로 인한 피해는 IT 측면의 퍼포먼스 저하 뿐만 아니라, 매출 감소, 경쟁력 저하, 비즈니스 기회 상실과 같이 비즈니스에 심각한 영향을 끼치는 경우까지 퍼져 있습니다. Bot을 운영하는 쪽은 심지어 차단을 회피하기 위한 여러 가지 기술까지 활용하여 지속적으로 대응하기 때문에, 차단만이 모든 문제를 해결해 주는 방법은 아닙니다. 점점 다양해지고 지속적으로 변화하고 발전하는 Bot의 공격 방법 등을 알아보고, 이를 효과적으로 관리하기 위한 접근방법 및 기술에 대해 알아봅니다.