Hi [[ session.user.profile.firstName ]]

IT Security

  • [Video] Expert Panel: How to Protect Against Hackers in 2019
    [Video] Expert Panel: How to Protect Against Hackers in 2019
    Moderator: Graham Cluley | Panelists: Michael Howard, Louella Ferscunandes, Howard Roberts Recorded: Dec 14 2018 39 mins
    In this HP Security Panel webinar, we’ll look beyond The Wolf films to discuss the smartest ways of safeguarding against hackers.

    Listen and hear how our expert panelist address a series of pressing issues such as:

    • Are vendors using scaremongering to sell their own services?
    • If faces are the new fingerprints, what are the security risks?
    • How big a threat is IoT and what’s the next Mirai Botnet?
    • Is the public sector the weakest link?
    • Can security be baked into the hardware?

    This is an excellent opportunity to gain invaluable security insights from experts on the frontlines.

    Panelists include:

    Graham Cluley: Award-winning security blogger - moderator
    Michael Howard: Head of Security Practice, HP Inc.
    Louella Fernandes: Research Director Quocirca
    Howard Roberts: Print Technologist, HP Inc.

    Stay connected to the latest HP Security Solutions by visiting:

    http://www8.hp.com/us/en/solutions/business-solutions/printingsolutions/securityoverview.html?jumpid=sc_ucq8stx21w
  • Essential Retail & Retail Design World’s 2018 Round Up
    Essential Retail & Retail Design World’s 2018 Round Up
    Moderators - Caroline Baldwin & Matthew Valentine Recorded: Dec 14 2018 47 mins
    Essential Retail and Retail Design World sit down with a mulled wine (or two) to discuss their favourite retail stories of the year and their predictions for 2019.

    Join editors Caroline Baldwin and Matthew Valentine for their Christmas webinar on the 14 December 2018 to discover:
    •What were the hottest trends of 2018?
    •What is coming around the corner in 2019 in terms of the latest technology and design trends?
    •And the answer to the biggest question of the year – is the high street really dying? Is it a terminal disease or can we save our favourite shops?
  • Visibilità, conoscenza e controllo per potenziare il tuo ecosistema di sicurezza
    Visibilità, conoscenza e controllo per potenziare il tuo ecosistema di sicurezza
    Luca Pesce Recorded: Dec 14 2018 63 mins
    La gestione della sicurezza e la risposta agli eventi informatici sono tra le principali sfide affrontate dalle aziende. La mancanza di visibilità e conoscenza di questi rischi nel tuo ambiente di rete aggrava ulteriormente il problema.

    Guarda questo webinar per scoprire come adottare un approccio olistico e connesso all'orchestrazione della sicurezza. Scopri come implementare policy e controlli di sicurezza più intelligenti per un ambiente di rete più focalizzato, sicuro e conforme. Argomenti del webinar:

    • Realizzare un accesso Single Sign-On (SSO) per il provisioning e la gestione dei servizi di sicurezza per la rete, gli endpoint e il cloud
    • Gestire tutti i processi e i servizi di sicurezza da un’unica e semplice interfaccia cloud comune
    • Ottenere visibilità e consapevolezza situazionale della sicurezza di rete da un unico pannello
    • Assicurare una gestione delle policy priva di errori
    • Implementare ed eseguire il provisioning dei firewall in remoto attraverso il cloud
  • Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Daniela Fusaro, Senior Solutions Architect Recorded: Dec 14 2018 18 mins
    Trotz der unstillbaren Nachfrage nach Bandbreite müssen Unternehmen die Sicherheitsrichtlinien des Netzwerks immer noch schnell überprüfen und durchsetzen. Das ist besonders schwierig, wenn Sie Netzwerke von 10 Gb auf 40 Gb oder von 40 Gb auf 100 Gb aufrüsten.

    Nehmen Sie teil am Webcast von Daniela Fusaro, Senior Solutions Architect bei Gigamon. Sie erläutert, wie Sie die mit diesen Netzwerkupgrades verbundenen Sicherheitsrisiken lösen, Ihre Sicherheit stärken, die IT vereinfachen und Kosten senken können.

    Sie erfahren folgendes:
    - Erhöhen Sie Ihren ROI für die Sicherheit: Filtern Sie die richtigen Daten aus dem Netzwerkverkehr der physikalischen, virtuellen und Cloud-Infrastruktur und leiten Sie diese an die relevanten Tools weiter
    - Reduzieren Sie Ihr Sicherheitsrisiko: Überdenken Sie Ihre Netzwerksicherheitsarchitektur neu, indem Sie verschlüsselten Datenverkehr nur einmal entschlüsseln und die Überprüfung dieser Daten durch mehrere Sicherheitstools ermöglichen
    - Verbessern Sie die Reaktion auf Bedrohungen: Erkennen Sie Muster und Bedrohungsvektoren in heterogenen Netzwerken schneller

    Finden Sie heraus, wie sowohl Netzwerk- als auch Security-Teams bei Netzwerk-Upgrades schneller und sicherer zusammenarbeiten können, um Sicherheitsbedenken zu lösen - registrieren Sie sich noch heute!
  • Arrow's AI Future with David Fearne - a Big Data Beard podcast
    Arrow's AI Future with David Fearne - a Big Data Beard podcast
    Cory Minton and Brett Roberts Recorded: Dec 13 2018 43 mins
    Director of AI and BI at Arrow Electronics, David Fearne, sits down with the Big Data Beard for his second appearance on the show and muses about the rapid evolution from Big Data to AI in the enterprise and the challenges organizations are and will face making real impacts with these emerging technologies.

    This episode was recorded in the Dell EMC sponsor booth at Splunk conf2018 in Orlando, FL. A big thanks to Splunk, Dell EMC, and Arrow for making this possible.
  • Secure Your Digital Crown Jewels with Micro-Segmentation
    Secure Your Digital Crown Jewels with Micro-Segmentation
    Faraz Aladin, Director of Product Marketing @ Illumio Recorded: Dec 13 2018 49 mins
    The sheer intensity and frequency of modern cyberattacks requires you implement new controls to reduce your attack surface and minimize the impact of a breach. The goal? Prevent unauthorized East-West traffic in the event of a breach to ultimately protect the high-value assets of your company. In this webinar, we'll discuss:

    - The anatomy of a breach

    - Techniques to mitigate the risk of being compromised

    - How to use micro-segmentation enabled by real-time visibility to secure your crown jewels
  • Turning Structured Content into 'How To' Videos
    Turning Structured Content into 'How To' Videos
    Wouter Maagdenberg, TXTOmedia Recorded: Dec 13 2018 47 mins
    Structured content is an ideal starting place for creating and producing rich media in bulk. A new technology created by TXTOmedia transforms this native and localized written documentation into rich media, such as animation, live-action video, and interactive visuals in an automated, fast, and cost-effective way — enabling versioning and respecting existing workflow processes within large organizations.

    TXTOmedia supports XML and Structured Content in multiple languages which is then parsed by and transformed into rich media automatically. This allows you to take existing structured content and create video, slides, visual TOC, Hot Spot Images and Interactive Product Models.
     
    Takeaways:

    –Watch instead of read; visuals and video are preferred above text by most audiences.
    – Rich media creation is no longer a painful manual and disconnected process
    –Technical publications become more vital for sales.

    ABOUT WOUTER MAAGDENBERG

    Wouter Maagdenberg started his career in 1996 with a specialized web agency for the media, music and sports industry in Amsterdam. He focussed on streaming media and continued to develop rich media software. In 2011 he sold his technology company to SDL. Today, Wouter focuses on the auto-creation of video and other rich media content. His company TXTOmedia delivers solutions to transform existing content into rich media such as animations and video for today's screens, AR and VR. 
  • The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    Chris Eng, Veracode Vice President of Research and guest, Forrester Research Principal Analyst Amy DeMartine Recorded: Dec 13 2018 57 mins
    In our recent State of Software Security Volume 9 report, Veracode examined fix rates across 2 trillion lines of code shows that the number of vulnerable applications remains staggeringly high. More than 85 percent of all applications contain at least one vulnerability following the first scan, and more than 13 percent of applications contain at least one very high severity flaw.

    One thing is certain: the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.

    There are just too many vulnerabilities for organizations to tackle all at once, which means it requires smart prioritization to close the riskiest vulnerabilities first. For the first time, our report shows a very strong correlation between high rates of security scanning and lower long-term application risks, which we believe presents a significant piece of evidence for the efficacy of DevSecOps. In fact, the most active DevSecOps programs fix flaws more than 11.5 times faster than the typical organization, due to ongoing security checks during continuous delivery of software builds, largely the result of increased code scanning.

    Join guest presenter Amy DeMartine, Principal Analyst, Forrester Research Inc., and Veracode’s Chris Eng as they deliver valuable takeaways for business leaders, security practitioners and development teams seeking to secure their applications. Listeners will learn potential prioritizations and software development methods that could help their organizations reduce risk more quickly.
  • Continuous & Adaptable Security Models will Prevail
    Continuous & Adaptable Security Models will Prevail
    Dr. Srinivas Mukkamala, CEO & Co-Founder of RiskSense Recorded: Dec 13 2018 49 mins
    Dr. Srinivas Mukkamala will share his views on the most dramatic security threats that will draw more attention in 2019. He will identify why new technologies will begin creating an even more porous and vulnerable IT infrastructure. Consider:

    - AI might be your friend but it also powers your foes
    - Robotic Process Automation (RPA) another crack in your attack surface
    - DevOps Automation tools as targets for administrative controls and chaos
    - API Keys becoming the keys to the kingdom

    There is hope and Dr. Mukkamala will illustrate how organizations can have improved visibility, detection, remediation, and response when dealing with growing reliance on these technologies in 2019 and beyond.
  • Transforming Cloud Connectivity & Security in Distributed Networks 
    Transforming Cloud Connectivity & Security in Distributed Networks 
    Jim Fulton, Director Product Marketing, Forcepoint Recorded: Dec 13 2018 35 mins
    Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps.
     
    In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security solution enables highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.
  • It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    George Johnson, Vice President of Cyber Solutions, NC4 and Thanh Nguyen, Vice President of Technology, NC4 Recorded: Dec 13 2018 44 mins
    We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?

    NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
  • Comparing CASB Solutions from Microsoft and Forcepoint
    Comparing CASB Solutions from Microsoft and Forcepoint
    Mike Osterman, CEO, Osterman Research Recorded: Dec 13 2018 46 mins
    CASBs (Cloud Access Security Brokers) can provide visibility and protection for the myriad of sanctioned and unsanctioned cloud applications being used by employees in organizations today. Office 365 is undoubtedly one of the most popular, with most business-grade email and collaboration now taking place in this cloud environment.

    In this session, CEO and Osterman Research founder Mike Osterman will discuss how a CASB can help secure Office 365 and review the solutions from Microsoft and Forcepoint. He will:

    - Compare Microsoft’s built-in Office 365 Cloud App Security, offered in the Office 365 Enterprise E5 plan, to Forcepoint CASB
    - Provide a detailed analysis of how both products compare over 13 key feature areas
    - Consider coverage of third-party apps beyond Office 365

    Attend this session to explore the best route to full Office 365 security.
  • The State of the CASB Market
    The State of the CASB Market
    Mike Osterman, CEO, Osterman Research Recorded: Dec 13 2018 38 mins
    CASBs (Cloud Access Security Brokers), or CSGs (Cloud Security Gateways), are part of the rapid rise of emerging security technologies designed to enable digital transformation. With these solutions, organizations can experience the benefits of innovation and collaboration that cloud applications bring while maintaining visibility and control of their data.

    In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. The survey’s main focus points include:

    -Key cloud adoption concerns
    -Most valued CASB features
    -Levels of confidence in controlling data and maintaining compliance

    Attend this session to learn more about the need for and use of CASBs in today’s organizations.
  • The Complete Guide to Crowdsourced Security Testing
    The Complete Guide to Crowdsourced Security Testing
    Rajesh Krishnan, Product Marketing, Synack Recorded: Dec 13 2018 22 mins
    Adoption of bug bounty programs has doubled in the past 3 years, shining a light on crowdsourced security testing options. The bug bounty model, which incentivizes a crowd of creative hackers to probe organizations’ digital assets for exploitable vulnerabilities, has proven quite effective. However, not all crowdsourced testing programs are equal. All programs crowdsource hackers, most incorporate levels of controls for trust and accountability, and some use testing data to help break down testing coverage levels and risk management.

    Join this webinar to learn:
    - Why crowdsourcing hackers and bug bounty is trending
    - Who these crowdsourced hackers are and what they do
    - Where crowdsourced security programs differ
    - How to decide what crowdsourced programs best fit your organization
    - Where the future of crowdsourced security is heading
  • Achieve SD-WAN Zen With Complete and Balanced Security
    Achieve SD-WAN Zen With Complete and Balanced Security
    Nirav Shah, Sr. Director, Products & Solutions, Fortinet Recorded: Dec 13 2018 35 mins
    Fortinet was named a Challenger in the first Gartner Magic Quadrant for WAN Edge Infrastructure.

    Join our expert to learn about insights from the report and how Fortinet SD-WAN weaves both networking and security, providing one offering that is scalable, reliable, and secure; setting us apart from the competition.
  • Live Demo: Email Protection and Targeted Attack Protection
    Live Demo: Email Protection and Targeted Attack Protection
    Ryan Loo - Sr Systems Engineer Recorded: Dec 13 2018 46 mins
    More than 90% of targeted attacks start with email, and these threats are always evolving.

    Proofpoint helps you stay ahead of these attacks with a people-centric approach that detects, analyzes, and blocks advanced threats before they reach your inbox.

    Join us for a live demo and learn about:

    •How to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Five Creative Ways that Organizations are using Advanced Authentication
    Five Creative Ways that Organizations are using Advanced Authentication
    Kent Purdy and Troy Drewry, Micro Focus Recorded: Dec 13 2018 61 mins
    As organizations realize that today's users expect their digital interactions to be convenient, seamless, and above all secure, demand for new types of authentication heightens.

    In this session we’ll talk about the new ways organizations are using the latest authentication technologies and how they’re preparing the future.
  • Cisco + LogRhythm: Smarter, Faster Security Through Integrations
    Cisco + LogRhythm: Smarter, Faster Security Through Integrations
    Jake Reynolds (LogRhythm) and Doug Hurd (Cisco) Recorded: Dec 13 2018 56 mins
    Smarter, faster security through LogRhythm and Cisco integrations

    LogRhythm and Cisco are committed to helping you enhance your security operations through the seamless integration and powerful capabilities of the LogRhythm Threat Lifecycle Management platform and Cisco’s Threat Grid, Umbrella, Firepower and ISE.

    Currently integrating with over three dozen Cisco products, LogRhythm provides centralized visibility and advanced security analytics across the Cisco-enabled environment and makes security events actionable in the network. Stay in front of cyber adversaries and proactively detect, respond to and remediate cyberthreats with this powerful integration.

    In this technical webinar, you’ll learn how to:

    - Gain immediate insight with Cisco and LogRhythm’s comprehensive visibility
    - Streamline investigations with Umbrella and Threat Grid
    - Accelerate and enable endpoint and perimeter remediation with ISE and ASA
  • Unified Endpoint Management & Security: A Force Multiplier
    Unified Endpoint Management & Security: A Force Multiplier
    Scott Scheferman, Cylance Director of Global Services; Masataka Hashiguchi, Interfocus Sales Engineer Recorded: Dec 13 2018 56 mins
    Join Interfocus and Cylance for this webinar outlining the workplace productivity gains that your business can realize through an integrated and unified platform delivering both IT asset management and endpoint security. Most IT teams today suffer from "alert fatigue" from the growing number of devices on their network, and spend on average 5-13 hours a week cleaning up compromised endpoints. Scott Scheferman from Cylance and Masataka Hashiguchi from Interfocus will demonstrate how automation and prevention is worth a pound of cure on your endpoints.
  • Cyber Security Planning and Strategy for 2019
    Cyber Security Planning and Strategy for 2019
    Sushila Nair (NTT DATA Services) | Topher Chung (OneLogin) Recorded: Dec 13 2018 60 mins
    Discover the cyber security attack trends that will shape your security planning and budgets for 2019. Discover what's new on the threat horizon, how businesses are coping and the key areas for improvement. Learn about the latest technologies enabling stronger and more resilient enterprises.

    Join this keynote panel of security experts and industry veterans as they discuss:
    - New on the threatscape
    - Cyber attack trends seen in 2018
    - Addressing your cyber risk
    - How to prepare for 2019
    - Security strategy and making the most of your security dollars
    - New leaps in technology
    - Best practices and recommendations

    Speakers:
    - Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
    - Topher Chung, Director of Security Engineering, OneLogin
  • Reimagining the Contact Center with Bots & AI
    Reimagining the Contact Center with Bots & AI
    Abinash Tripathy, Co-founder, Helpshift Recorded: Dec 13 2018 62 mins
    Bots, artificial intelligence, and messaging — cost-effective, easy-to-implement automation technology —- is gaining a major foothold in customer service organizations, and the impact is palpable. Contact centers are on track to shrink by 50 percent in the next three years as routine tasks are taken over by faster, efficiency-saving bots that can triage requests, boost customer satisfaction, and offer an 8.6 percent increase in profit margin per customer.

    These technologies are also making it easy to tap into the gig economy, which is producing a growing supply of tech-savvy labor for companies that also saves costs. For workers, it means flexible arrangements with low barriers to entry, plus more satisfying employment, now that the grunt work has been eliminated by automation.

    AI and automation is set to level up the workforce, the economy, and your bottom line. For a closer look at the long-term implications of automation, how to invest in the brave new world of work, and more, don’t miss this VB Live event!

    Attend this webinar and learn:

    * The workforce implications of customer service bots
    * How bots and employees can work side-by-side
    * What smart companies are doing to lay the groundwork
    * Future of work - what does it look like?

    Speakers:

    * Abinash Tripathy, Co-founder, Helpshift
    * Peter Ryan, Principal Analyst, Ryan Strategic Advisory
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Dilan Yuksel Moderator, VentureBeat

    Sponsored by Helpshift
  • The State of Technical Communication: 2019
    The State of Technical Communication: 2019
    Scott Abel, The Content Wrangler Recorded: Dec 13 2018 57 mins
    Join Scott Abel, The Content Wrangler, in The State of Technical Communication 2019 webinar for a review of the troubles, trends, tools, and technologies impacting technical communication teams around the globe.

    Scott will share high-level results from our annual Technical Communication Industry Benchmarking Survey. Attendees will receive a complimentary summary of the survey results.
  • Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Der Anstieg von Cyberattacken auf dem DACH-Markt und wie man ihre Auswirkungen m
    Flaviu Lang & Maik Pietsch | Cloudflare - Experten für Cyber-Sicherheit | DACH Dec 17 2018 9:00 am UTC 27 mins
    Dieses Webinar bietet Ihnen einen Überblick über die Lage der Cyber-Sicherheit in der DACH Region. Thematisiert werden die verschiedensten Formen, die Cyberangriffe einnehmen können, sowie passenden Schutzmechanismen, die Sie in Ihrem Unternehmen implementieren können.
  • Faster, Efficient, More Intelligent Incident Response Orchestration
    Faster, Efficient, More Intelligent Incident Response Orchestration
    Andy Yeates, Engineer, IBM Resilient Dec 17 2018 10:00 am UTC 40 mins
    The Resilient incident response platform (IRP) empowers cyber security teams to orchestrate their incident response processes, and respond to and resolve incidents faster, more effectively, and more intelligently. The Resilient IRP is the leading platform for orchestrating and automating incident response processes.

    This presentation will showcase the Resilient IRP’s ability to enable complete IR orchestration and automation - aligning security teams' people, process, and technologies into a single hub for incident response. By understanding the capabilities of the solution, attendees can learn how to:

    • Achieve greater intelligence and efficiency by integrating your existing security technologies, including SIEMs, EDR, threat intelligence, and more.

    • Adapt to real-time incident conditions with Resilient Dynamic Playbooks –ensuring a fast and complete response to all incident types.

    • Build, configure, and maintain your own IR action plans within hours or days
  • More Things You Can Do with a Security Policy Management Solution
    More Things You Can Do with a Security Policy Management Solution
    Dania Ben Peretz, Product Manager Dec 17 2018 3:00 pm UTC 45 mins
    Are you getting the most out of your Security Policy Management Solution?

    Today’s security policy management solutions do much more than automate traditional change management tasks. And yet, managing processes is becoming increasingly complex, time consuming and riddled with errors.

    Many professionals believe they need additional sophisticated tools to address these challenges. However, you may already have what you need, up and running in your organization.

    Join us in this webinar to learn how AlgoSec’s solution simplifies and automates security policy management to make the enterprise more agile, more secure and more compliant across your ever-changing network:

    •Gaining visibility of unsecured traffic used by your business applications
    •Closing the gaps in your network map to get your automation in place faster
    •Tying cyberattacks to business impact
    •Being audit-ready all the time
  • 5 things CISOs & CIOs must do in 2019 – Cybersecurity Handbook
    5 things CISOs & CIOs must do in 2019 – Cybersecurity Handbook
    Balaji Desikamani, VP - Marketing & Channel Sales Dec 17 2018 5:00 pm UTC 60 mins
    As year 2018 draws to a close, one thing is clearly evident – more enterprises than ever are getting breached and the traditional line of defenses are simply not holding up! With an unprecedented sophistication to these new breed of cyberattacks, now run by organized syndicates instead of mere criminals, and an equal pressure on resources, CIOs and CISOs are facing a classic dilemma. How does one secure their enterprise and actively reduce risk, while they also strive to empower their employees, organizations and digitally transformed businesses to be productive and competitively agile in the marketplace.

    As the cybersecurity space innovates and evolves, there are clear must-do items that CIOs and CISOs must act upon for dramatically improving their cybersecurity with optimal investment and time. Attend this webinar as Bala Desikamani, Vice President – Marketing, Cyberinc highlights ‘5 things CISOs & CIOs must do in 2019’. He will offer a simple yet highly effective approach that will help leaders secure and significantly mitigate the risk to their businesses while empowering their businesses and employees with a new level of freedom and productivity.

    The webinar will cover

    1. A brief reprise of the harsh realities of Cybersecurity today
    2. Caught in the web: The vicious reactive model of cybersecurity
    3. Breaking free: The Cybersecurity Handbook – 5 thing CISOs and CIOs must do in 2019
    4. The path to get there – dramatically reduce attack surface, unlock value and empower organizations
  • Ask the Expert: Everything You Ever Wanted To Know About SD-WAN
    Ask the Expert: Everything You Ever Wanted To Know About SD-WAN
    Ritesh Mukherjee, Vice President Product Management at 128 Technology Dec 17 2018 6:00 pm UTC 60 mins
    Bring your toughest questions and most important SD-WAN challenges to Ritesh Mukherjee, Vice President of Product Management at 128 Technology.
  • Closing the DevOps/SecOps Security Gap
    Closing the DevOps/SecOps Security Gap
    Bashyam Anant, Vice President Product Management, Cavirin Dec 17 2018 6:00 pm UTC 60 mins
    As 2019 approaches, DevOps & SecOps are looking to minimize the risks due to change management delays and manual processes. Today's existing approaches are good at monitoring and presenting what is wrong, but don’t take that vital next step in automating the correction of any issues.

    In this Webinar we will show you how to close the security gap through auto-remediation, combining AWS Lambda functions and Ansible Playbooks. Auto-remediation extends from your cloud security posture to your VMs and container instances, on-prem, or in the cloud.

    Can't make the date? No problem. Simply complete the registration form and we'll send you the recording to watch at your convenience.

    Earn one CPE credit for attending this webcast.
  • Securing the IoT: Keeping planes in the air and the lights on at home
    Securing the IoT: Keeping planes in the air and the lights on at home
    Adam Brady & Mark Baker, LogRhythm Dec 18 2018 9:00 am UTC 48 mins
    The Internet of Things (IoT) will generate, process and share more data than ever before. Data that needs to be secured.

    The data generated by non-traditional sensors and systems can help detect anomalous behaviour and maintain the uptime we expect from the new wave of connected devices.

    In this webinar, LogRhythm’s security experts will explain how this data can be used, with examples from a range of industries – from jet turbine manufacturers to in-home automation providers.

    Join the webinar to discover:
    1. How IoT devices blur the boundaries between IT security, operational technology and security in the physical world
    2. How to gain visibility into the data generated by these devices – and what it really means
    3. What customers have experienced through real-life use cases
  • Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Cherwell + Everbridge: IT-Services schneller als je zuvor wiederherstellen
    Aria Naderi; Zbigniew Skurczynski Dec 18 2018 9:00 am UTC 60 mins
    IT-Vorfälle treten ständig auf, von Ausfällen, Verlangsamungen von Anwendungen bis hin zu Cyberangriffen und einigen, die kritischer sind als andere. Bei IT-Vorfällen, die eine sofortige Aufmerksamkeit erfordern, müssen IT-Experten rechtzeitig einbezogen und verschiedene Gruppen informiert und/oder aktualisiert werden. Die Herausforderung, vor der die meisten Unternehmen stehen, besteht in der Koordination der Reaktion auf IT-Vorfälle, wenn Zeit im Vordergrund steht. Zum Beispiel, wie man:
    Sammeln und verwalten Sie alle relevanten Informationen zentral.
    Identifizieren Sie den geeigneten Informationsaustausch mit verschiedenen Rollen.
    Sicherstellung einer zeitnahen und effektiven Reaktion zwischen den Teams
    Ermöglicht eine effiziente Zusammenarbeit unabhängig vom Standort der Mitarbeiter.

    In diesem Webinar erläutern Aria Naderi von Cherwell und Zbigniew Skurczynski von Everbridge, wie die integrierte Cherwell-Everbridge-Lösung Unternehmen bei der Verwaltung, Kontrolle und Automatisierung ihrer Reaktion auf IT-Vorfälle unterstützt, um die Auswirkungen auf ihre IT-Experten und ihr Unternehmen zu minimieren.
  • Wie rechtfertigen Sie die Kosten eines AppSec-Programms?
    Wie rechtfertigen Sie die Kosten eines AppSec-Programms?
    Julian Totzek-Hallhuber, Principal Solutions Architect at Veracode Dec 18 2018 10:00 am UTC 45 mins
    Traditionell haben die meisten Führungskräfte die IT Sicherheit als notwendiges Übel betrachtet - eine Investition, die nur erforderlich war, um ein schlechtes Ergebnis zu vermeiden, aber nicht als etwas, das neue Kunden einbringen oder den Umsatz steigern würde. Aber das scheint sich zu ändern. Wir stellen zunehmend fest, dass die Erstellung sicherer Software zu einem Wettbewerbsvorteil führt und das Endergebnis steigert.

    Dieses Webinar, das von Julian Totzek-Hallhuber - Principal Solutions Architect bei Veracode gehalten wird, hilft Ihnen dabei, AppSec zu unterstützen. Durch die Darstellung des möglichen ROI einer Cloud-basierten Anwendungssicherheitslösung, die in den Softwareentwicklungslebenszyklus integriert ist, stellen wir Ihnen die Tools zur Verfügung, die Sie zur Erstellung Ihres C-Level-Pitch benötigen.
  • Passwords: The Keys to your (Online) Kingdom
    Passwords: The Keys to your (Online) Kingdom
    David Emm, Principle Security Researcher and Prof. Steven Furnell, Professor of Information Security, University of Plymouth Dec 18 2018 11:00 am UTC 75 mins
    24/7 connectivity is fast becoming an integral part of everyday life. Most of us now routinely bank, shop and socialise online, and the Internet is the life-blood of business.

    Yet too many of us fail to secure our online identities adequately. This presentation will examine why this is important, what we should do to secure our online accounts and how criminals exploit our lack of security.

    **************************************************************************************************

    Steven Furnell is a the Associate Dean and IT Security Professor at the University of Plymouth. His research interests spans multiple areas including: Cyber Security / IT Security, including user authentication, biometrics, cyber crime, intrusion detection and response, security management and culture, usable security; Internet Technologies and Applications; Mobility.
    A published author, Steven will share his insights we can all individually make it harder for Cyber Criminals to access your passwords.

    David Emm is a Principle Research Analyst at Kaspersky Lab and regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable adviser on all aspects of online security.
  • Ask the expert: Cloud Adoption & Procurement in UK Public Sector
    Ask the expert: Cloud Adoption & Procurement in UK Public Sector
    Nicky Stewart Dec 18 2018 2:00 pm UTC 14 mins
    After presenting your business case it's time to think about procurement - but how do you choose between the government's G-Cloud framework or TS2?

    This session will be presented by our Commercial Director Nicky Stewart who will be answering the most frequently asked questions surrounding procurement

    What you'll learn
    - The main differences between TS2 & G-Cloud
    - The Pros & Cons of using TS2 vs G-Cloud
    - Top Tips for making a succesful bid through either framework

    By clicking through this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Jingle Bells, Phishing Smells, Hackers Go Away!
    Jingle Bells, Phishing Smells, Hackers Go Away!
    Robert O'Brien, CEO MetaCompliance Dec 18 2018 3:00 pm UTC 30 mins
    Phishing scams are a persistent problem for organisations at all times of the year, however there is a steep increase in the number of scams at Christmas as hackers take advantage of distracted staff to launch targeted attacks.

    When we’re distracted, mistakes happen, and Christmas tends to be the one time of the year when employees let their guard down which can result in a massive loss of sensitive data.

    Cybercriminals don’t care about your internal processes around Cyber Security awareness communication. They are not stifled by the rules around staff communication.

    Cyber Security awareness training needs to be a top priority and it has to be of “stand out” quality. Not the normal “techno porridge” that has been passing for Information Security and Privacy training over the last 15 years.

    Cyber Security awareness is about the hearts and minds of your staff and it’s one of the biggest challenges in this new digital economy. Join us at our short webinar to hear about the best practice approaches to getting employees to participate in securing your digital assets.

    This 15-minute webinar will cover:

    •The seasonal phishing scams your employees need to be wary of
    •The 5 key aspects of a Cyber Security Awareness program
    •How Cyber Security is not about indulging in wishful thinking.
  • DFLabs’ New Open Integration Framework and Customer Community Portal
    DFLabs’ New Open Integration Framework and Customer Community Portal
    John Moran, Senior Product Manager, DFLabs and Heather Hixon, Senior Solutions Architect, DFLabs Dec 18 2018 3:00 pm UTC 41 mins
    DFLabs’ innovative Open Integration Framework is designed to enable security teams to customize and easily add new automated integrations between their existing security tools and our IncMan SOAR platform, enabling SOCs and MSSPs to add unique incident response actions without the need for complex coding. The new framework is part of DFLabs’ commitment to delivering a more open, community-oriented solution to automation and orchestration, which also includes a new Community Portal.

    The Community Portal serves as a hub for customers, where they can get the latest information and support from DFLabs and interact with other like-minded customers. Moreover, this Community Portal aims to provide a cooperation ecosystem for companies and organizations, where they can share integrations of security tools and IncMan SOAR. This approach will enable our customers to tackle specific use cases by uploading or downloading integration files from the Portal to IncMan SOAR.

    Join this webinar to learn more about these two new exciting features, as well as DFLabs’ other latest developments and enhancements to IncMan SOAR v4.5 including:

    - Open Integration Framework
    - Community Portal
    - Enhanced REST API
    - Automated event triage (START Triage)
    - New bidirectional integrations
    - Improvements to existing integrations
    - And more...
  • Top 2018 Cyberattacks and How to Avoid Them in 2019
    Top 2018 Cyberattacks and How to Avoid Them in 2019
    Joe Schreiber, Technical Director, Business Development, Tufin Dec 18 2018 4:00 pm UTC 60 mins
    Breached. Hacked. Cyberattack. These are all words that dominated headlines in 2018.

    While we all know that the attacks that prompted these headlines were largely avoidable in hindsight, we also know that enforcing security policy across the legacy physical network is challenging. Furthermore, the Cloud First Policy and the adoption of containers introduce new risks to organizations and raise new security concerns that need to be anticipated.

    Join us on December 18 for a webinar with Joe Schreiber, Technical Director of Business Development, to learn from the mistakes of others in 2018 and how to avoid making them – and the headlines – in 2019. We’ll draw from his 20+ years of experience including security operations and incident response.

    Key topics include how to:
    •Develop and deploy an enforceable security policy
    •Clear time for proactive security initiatives
    •Mitigate the inherent risk of DevOps’ CI/CD agility
    •Contain malware outbreaks
    •Anticipate security risks of containers
  • IoT Series [Ep.1]: Foundations -- Architecture and Framework
    IoT Series [Ep.1]: Foundations -- Architecture and Framework
    Johna Till Johnson, CEO & Founder, Nemertes Research Dec 18 2018 4:00 pm UTC 60 mins
    Everyone talks about IoT, and many organizations are implementing it and reaping the business benefits. But even those who have had IoT projects deployed for years may not have a comprehensive architecture and framework in place to help guide technology decisions and streamline operations.

    Join Nemertes CEO Johna Till Johnson as she reviews the IoT architecture and framework and shares guidance gleaned from leading-edge clients and research study participants.
  • Getting Started with Security Operations: How to Access Basic Security Posture
    Getting Started with Security Operations: How to Access Basic Security Posture
    Jae Lee – Director Product Marketing, Security Markets, Splunk Dec 18 2018 5:00 pm UTC 63 mins
    Assessing and monitoring basic security posture is critical. Security teams need the ability to identify and alert on a particular type of malicious activity, AND determine whether that alert is meaningful in a broader context.

    Splunk can help your organization get up and running very quickly with the ability to assess basic security posture. With Splunk, you can centralize security visibility and adopt an investigative mindset to answer questions like:

    - How secure are my endpoints?
    - What is happening on my network?
    - Where is it most critical for me to apply updates?
    - Are user accounts configured properly?
    - Is there any suspicious traffic going out?
    - How is overall security posture in my AWS environment?

    This webinar is perfect for organizations that are just getting started with formalizing their security operations. We’ll show you how with Splunk Security Essentials, a use case framework tool that you can download and stand up quickly to immediately glean security value using your own data sources.
  • Container Security Best Practices: A How-To Discussion
    Container Security Best Practices: A How-To Discussion
    Nate Dyer, Sr. Product Marketing Manager, Tenable Dec 18 2018 5:00 pm UTC 60 mins
    Application containers like Docker help DevOps work faster and quicken time-to-market, but they also create a major Cyber Exposure gap. Traditional vulnerability management approaches can’t easily secure containers – let alone keep pace with the high-velocity world of DevOps and continuous innovation. But don’t despair. We’ve got just the thing to save you from this nightmarish ordeal. Join us as we discuss a number of container security best practices to help you:
    - Learn why “shifting left” is critical to gaining visibility into containers
    - Understand how container security is a win for both security and DevOps
    - Find out three steps you can take to master container security
  • How to Prepare for Windows Server 2008 End of Support
    How to Prepare for Windows Server 2008 End of Support
    Timothy Warner, Microsoft MVP, Pluralsight Dec 18 2018 5:00 pm UTC 57 mins
    Are you running Microsoft Windows Server 2008 or 2003 for your business critical applications, like many enterprises? Server 2008 will reach End of Support in January 2020 and with that no more security and maintenance patches without costly alternatives.

    Join us at this webcast to learn the best ways to secure, migrate and future-proof your legacy Windows Server applications without having to recode them. You will learn how:

    A container platform can accelerate migration to Server 2016
    Containers are more than a development toolset used primarily to build new applications
    The Docker container platform gives enterprises a way to containerize and easily migrate existing applications
    Cut infrastructure and management costs for your legacy applications by up to 50%
    Learn how to simplify your migration!
  • Operationalizing Cyber AI: How do we trust it?
    Operationalizing Cyber AI: How do we trust it?
    Andrew Tsonchev, Director of Darktrace Industrial Dec 18 2018 5:00 pm UTC 45 mins
    Today’s cyber security landscape is dominated by talk of AI - but should we really relinquish control to machines? In this webinar, we’ll discuss how to trust AI to combat today’s most advanced cyber-threats and protect our organizations for the long term.

    Join Andrew Tsonchev, Director of Technology at Darktrace, as he explores what it will take to bridge the trust gap between humans and AI.

    Learn:
    - The benefits and challenges of implementing AI in your security stack
    - How AI augments your security team by autonomously detecting and responding to emerging threats
    - How to build trust between your organization and cyber AI
  • Security that Scales: Automating Security and Compliance for DevOps
    Security that Scales: Automating Security and Compliance for DevOps
    Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWS Dec 18 2018 6:00 pm UTC 60 mins
    There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.

    Join us on December 18th to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.

    During this session, you will learn:

    -How DevOps and InfoSec teams can align to the new DevSecOps paradigm

    -Why continuous compliance management is a new business imperative

    -How to build security in to your Continuous Integration/Continuous Development pipeline

    Register Today

    Free Giveaway: Register for this webinar and join the live session for your chance to win a $500 AWS promotional credit. You can use your AWS credit to offset your AWS infrastructure costs when getting started on the marketplace*. Five lucky live attendees will be the winners!

    * subject to the applicable terms and conditions currently available at https://aws.amazon.com/awscredits/.
  • Remote Access Tools: The Hidden Threats Inside Your Network
    Remote Access Tools: The Hidden Threats Inside Your Network
    David Pearson, Principal Threat Researcher, Awake Security Dec 18 2018 6:00 pm UTC 24 mins
    Many remote access tools are used legitimately and not considered malware. However, these tools actively bypass network controls, obscuring which parties are communicating, when, and how. This ability to fly under the radar is attractive to malicious insiders and outside attackers alike. This talk will discuss common techniques these tools use and how security teams can find and understand them.

    In this webinar you will:

    1) Gain an understanding of why remote access tools should be on your radar
    2) Learn common techniques used by remote access tools to bypass conventional detections
    3) Learn how to dissect remote access tools within Wireshark
    4) Discover information that is sometimes leaked by these programs
    5) Learn how to abstract out detection capabilities for this class of programs
  • Expanding your private cloud with containers for quick, responsive innovation
    Expanding your private cloud with containers for quick, responsive innovation
    Brent Roskos, Principal Cloud Architect, Red Hat and Raffaele Spazzoli, Senior Architect, OpenShfit, Red Hat Dec 18 2018 7:00 pm UTC 38 mins
    Increasingly, more organizations are looking to easily build cloud-native applications, deploy them, and manage workloads across a hybrid cloud without sacrificing existing investments. The promise of deploying containers to a hybrid cloud is great—delivering a scalable and workload-driven IT platform with installation integration points that facilitate quick, responsive innovation.

    In this webinar, we’ll discuss how you can accelerate your journey to hybrid cloud and get the most value from open source technology platforms.

    We'll cover:
    - How using Red Hat® OpenShift® Container Platform can expand the flexibility of Red Hat OpenStack® Platform to take full advantage of your cloud infrastructure.
    - Integration points, such as load balancers, node scale-out, avoiding double encapsulation, support for containerized development, persistent object and block storage, autoscaling for virtual machines, and bare metal as a potential service for physical servers.
    - How Red Hat Consulting can help you more quickly make these components work with a well-rounded adoption program to speed up your journey to hybrid cloud.
  • Connecting Secret-level Data in the Cloud
    Connecting Secret-level Data in the Cloud
    GDIT | Mircosoft Dec 18 2018 7:00 pm UTC 60 mins
    Register Now!
  • Penetration Testing or Vulnerability Scanning - Aren’t they the same thing?
    Penetration Testing or Vulnerability Scanning - Aren’t they the same thing?
    Mike Larmie, Federal Solutions Architect, Synack Dec 18 2018 7:00 pm UTC 53 mins
    Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:

    -Who performs the services?
    -How often do they run in a network environment?
    -What’s covered in their data output and reporting?
    -What’s their value?

    Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.

    BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.