The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Meltdown and Spectre have set the scene for 2018 and make attending our webinar even more of an imperative. This year is going to see it all and we have top panellists and audience members joining. The US Secret Service’s Mark Grantz, Middle East’s top Cybersecurity executive, Tushar Vartak, Europes most recognised Cybersecurity and AI visionary Ramses Gallego, Cybersecurity SME Wieland Alge, a NATO cleared hacker and of course, your very own Amar Singh, CISO and co-founder of Wisdom of Crowds and Cyber Management Alliance Ltd.
Join the debate, Share your opinions and hear a wide range of experts share their experience and insights.
Cyber Management Alliance brings you our interactive and educational webinar, inaugurating the new year with an exclusive webinar on what to expect, how and what the criminals are going to do (or not do) and what you can do to protect yourself.
Yes, we know GDPR is around the corner, but we believe there is much more ahead than just privacy concerns.
Cyber attacks are as unique as the attackers behind them and the organizations they target: both attackers and the organizations they target have different objectives. Analysis of attack trends can help determine where security efforts should be focused to prepare for the most common attack types and protect from the highest risk.
In this talk we will walk through the latest data from NTT Security’s Threat Intelligence Reports to show the most common threats facing organizations in various sectors and geographies today.
Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.
In this webinar you will:
· Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
· Watch a live DDoS attack from the attacker's perspective
· Participate in a live Q&A with DDoS experts
Security Information Event Management (SIEMs) systems have become the go-to application for cybersecurity practitioners, but it doesn’t come without a hefty cost or tradeoffs. These costs can include historic data being unreachable, advanced analytic limitations, and reduced enterprise visibility. Pairing SIEMs with a big data machine learning platform allows enterprises to proactively assess risk by accelerating anomaly detection, investigation, and response with machine learning and complete enterprise visibility.
Join TJ Laher, Cybersecurity Solutions Lead, as he discusses how big data and machine learning empowers cybersecurity innovators to optimize SIEM deployments. During this discussion, you will learn how open source technology is helping optimize SIEM deployments allowing organizations to:
• Infinitely scale data storage, access, and machine learning
• Deploy a community defined open data model to break vendor lock-in and gain complete enterprise visibility
• Open up application flexibility while building on a future-proofed architecture
With banks worldwide running proofs of concept for a number of use cases based on blockchain technology. It has become a question of when, not if, many of these initiatives will move into the production stage.
Now is a good time to consider what the expected adoption of blockchain and cryptocurrencies are likely to mean for fraud in banking and commerce.
Attend the webinar to learn:
-How banks and businesses are adopting distributed ledger technologies (DLT)
-What fraud and financial crime implications are created by the use of DLT
-What tools will be required in the future to mitigate DLT-related fraud
In the digital world we all live in, a majority of IT operations and support center organizations still rely on spreadsheets and spray-and-pray emails to entire teams to communicate major IT events due to application failures, network outages, cyberattacks, datacenter outages… During this session, Vincent Geffray will share the eye-opening results from various surveys on state of incident management and best performing companies practices and will explain how the lack of response automation hurts business and negatively impacts IT employees’ work-life balance.
During this session you will:
* Understand why quickly engaging the right team of IT experts is such a hard thing to do
* Understand the mechanisms which lead to a call storm and learn how to prevent it
* Learn how you can improve your incident response process and streamline the communication between the Service Desk, your IT teams and the impacted business users
Vincent Geffray is Senior Director of Product Marketing with focus on IT Incident Response Automation, IT Service Alerting, team Collaboration and Process Orchestration at Everbridge. He has over seventeen years of experience in Digital Operations and Service Management with expertise in Critical Communications, Application Performance Management, IT Process, Runbook and Workload Automation. Vincent has an international experience and he worked in Europe and in North America.
“Make the trust zones smaller” is the rallying cry behind microsegmentation projects. Break up the network into smaller pieces and put firewalls in between those pieces to ensure attackers can’t get from one part of the network to the next. But making microsegmentation projects work relies on a great deal of knowledge of the network and attack pathways. And it’s an incredibly heavy lift–configuring and deploying a microsegmentation solution takes an immense amount of time and resources. Machine learning can significantly reduce the hurdles by learning the network’s intended state and defining the attack pathways that need to be secured, automating the microsegmentation process.
Edgewise’s Chief Data Scientist John O’Neil will deep-dive into the role of machine learning in microsegmentation and demonstrate how a machine learning driven solution could reduce the time and energy needed to deploy microsegmentation from months to hours.
Every business that handles personally identifiable data is subject to privacy regulations and standards, such as PCI-DSS for credit card transaction data, HIPAA for medical records privacy, SOC 2 for any organization that delivers services (including SaaS-delivered solutions) and the European Union’s soon-to-be-enacted GDPR (General Data Protection Regulation). There are also privacy and breach disclosure laws that vary from country to country (even state to state in the US), making it a big challenge to keep up with them all. Failure to comply can result in daily penalties and fines, and a data breach resulting from non-compliance could cost millions in settlements, legal fees, and loss of reputation.
Join special guest, Divya Jeyachandran of Coalfire and John McLeod, CISO of AlienVault to hear what auditors are looking for and how to best prepare for your next audit.
Overview of common compliance requirements
Best practices for preparing for and demonstrating compliance
Keys to overcoming challenges in your on-premises and cloud environments
How a unified security toolset can greatly simplify this process
Sr. Manager - Payments, Cloud & Technology, Coalfire
Divya is a Senior Manager in the Payments practice at Coalfire focusing on data security in cloud environments. She advises and assesses client environments to meet security and compliance requirements such as the PCI DSS. With 8 years of experience in cloud technology, IT security and audit, and network and systems administration combined with understanding the applicability of regulatory security and compliance requirements towards IT solutions, Divya has been the lead QSA for some of the major cloud service providers and security service providers in the industry.
In the age of breaches and increased cyber attacks, security professionals are looking for the best ways to secure their organizations and prepare against upcoming cyber threats. Join this panel of experts are they look back the biggest events of 2017 and provide their recommendations for CISO's on what to look out for in the next months and how to improve their organization's cyber security in 2018.
- Breaches and (Compromised) Identity
- Lessons learned from 2017's major breaches (Equifax, Uber, etc.)
- Fighting cyber fraud, identity theft, account takeovers
- The likelihood of GDPR leading to companies not disclosing breaches
- Cyber attack trends on the horizon
- How to protect against these attacks and build a more resilient enterprise
- John Bambenek, Threat Systems Manager, Fidelis Cybersecurity
- Dennis Leber, CISO at Cabinet for Health and Family Services, Commonwealth of Kentucky
- Kevin Lee, Trust and Safety Architect, Sift Science
- Michael Bruemmer, VP Consumer Protection, Experian Consumer Services
Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.
This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.
Join us to discover how you can:
· Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention
· Gain enhanced visibility into suspicious activity across your endpoint estate
· Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc
In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.
Learn how enterprises can achieve immediate visibility across on-premises, endpoint, and cloud IT environments with Qualys Cloud Platform and its powerful, natively integrated security and compliance applications.
We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed.
Because of this changing value, data must be secured and protected – kept away from people who might pose a threat to its integrity and value. In this world of instantly available information a news leak informed by real data is something that can quickly reduce the value of a product, or even damage the revenue and reputation of your business.
Endpoint-based technologies can help to prevent an attack, but this is a defensive posture - we need to move and become more proactive. Understanding the data you have makes it easier to know what is ‘normal’, in turn this makes it easier to recognize unusual behavior of devices and data which might indicate a threat has breached the network. The faster you are able to see this, the faster you can react – ensuring maximum time possible to mitigate the potential damage.
With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.
This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.
Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
3-D Secure 2.0’s impact on the financial industry will be one of the most significant in recent years. Built around the increasing popularity of mobile commerce, 3-D Secure 2.0 is predicated on risk-based authentication, leveraging data points for accurate verification, while optimizing the consumer experience.
But, what about migration? How do you get from where you are to where you want to be? It’s time to fine-tune your authentication strategy. Join Hannah Preston, Solution Strategist, Payment Security at CA to learn how to:
• Design the best payment security architecture for your business
• Exploit the power of a consistent device identity across online channels
• Incorporate a global network of devices to shut down fraud fast
The future lies in turnkey cloud solutions like hyper-convergence, which is set to displace traditional server and storage models.
WinMagic’s SecureDoc product suite, coupled with Nutanix, provides customers greater control and certainty over their data security through intelligent enterprise-controlled, cloud-agnostic key management & VM-level encryption.
Join us as we unravel some of the most critical considerations for establishing a high performance IT infrastructure that is not only flexible, fluid, and affordable, but provides the consistent security and simplicity needed across your entire environment.
In this webinar you will learn:
Simplicity: Discover how to converge your entire datacenter stack into one solution, reducing silos, and simplifying your operations
Scalability: Learn how you can flexibly and securely scale out to support dynamic workloads and evolving business needs of any size
Manageability: Reduce the complexity of managing traditional infrastructure and security across a disparate array of platforms. Gain simplicity in meeting Compliance audits
Join us on January 18th, 2018 for a lively discussion with Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE, the second largest utility provider in Germany.
We will discuss RWE’s challenges and success in moving their network operations into the future without compromising security and compliance, including:
• consolidating security and orchestrating connectivity across a hybrid network, including legacy firewalls and routers, next generation firewalls, and the AWS cloud platform
• incorporating a cloud-first strategy and a heavy investment in DevOps to identify and address security violations in AWS, and allow application developers to spin up new applications without knowing IPs, protocols and ports
• reclaiming visibility of their firewall configurations and moving from error-prone manual changes to automating the process
• vastly improving workflows to improve audit preparation from a previously non-auditable change process
Register now to gain amazing insight into how they have found success. We will wrap up with a live Q&A, so have your questions ready!
Agile development and DevOps are built on a foundation integrated and automated testing that happens throughout the development lifecycle. Rather than waiting for a testing phase that happens late in the cycle, software quality and security must be verified at every step. In this session you will learn how to validate open source security, compliance, and quality across the SDLC, from design phase to production deployment and beyond.
A threat intelligence entrepreneur sits down with two former NSA spooks to discuss the future of security operations.
In this valuable executive panel, TruSTAR co-founder and CEO Paul Kurtz will interview two former seasoned cybersecurity executives from the NSA. Based on thousands of hours managing SOC operations and operators and developing defense strategies, the panelists will discuss the biggest events of 2017 and what’s ahead in 2018.
The panelists will also discuss what works, what doesn’t, and key gaps requiring attention in security operations centers today. Both SOC managers and operators will find Sherri and Tony’s insights helpful as we move into the new year.
This will be an interactive discussion infused with current threat intelligence research along with professional anecdotes from our highly-seasoned panelists.
1. 2017 Threat Trend Review
2. 2018 SOC Predictions and Gaps
3. Open Q&A
- Sherri Ramsay, Strategic Consultant and former Director of NSA's Threat Operations Center (NTOC)
- Tony Sager, Senior Vice President and Chief Evangelist for CIS (The Center for Internet Security), Director of SANS Innovation Center
- Paul Kurtz, Co-Founder and CEO of TruSTAR Technology
Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).
On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.
Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
-Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
-Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
-Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
-Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring these functions are efficient and effective is more important than ever.
In this session you’ll learn how end-to-end security visibility is a critical first step to improving your security posture. By combining endpoint, network, user activity, and threat intelligence you can be truly data-driven and:
- Identify malicious activity and gain key context to help prevent similar threats
- Apply methods to help improve accuracy and further mitigate risk
- Automate context gathering and response actions to accelerate investigations, and to more effectively contain and prevent threats
Join us and get the inside view into the latest technological advancements powering today’s cybersecurity solutions.
How the recent advanced threats execute on your endpoints and the Palo Alto Networks prevention advisory
Traps replaces legacy antivirus and secures endpoints with a multi-method prevention approach that blocks malware and exploits, both known and unknown, before they compromise endpoints, such as laptops, desktops and servers.
•Challenges with AV today
•Difference between exploits and malware
What is malware? What is an exploit? How to prevent against both attack vectors
•Prevention is better than a cure
Having a multiple method approach against APTs
•Automated Prevention Platform via Palo Alto Networks
Demo of live hack against Traps 4.1
From the Uber data leakage incident to cases where photographs of young or vulnerable people are stolen and misused on inappropriate websites, there is a fundamental gap: the lack of users' control over their data once it is uploaded onto the Internet. This talk introduces some of the key challenges and scientific trends in returning data control to cloud users, and how STRATUS (https://stratus.org.nz), a 6-year NZD12.23 mil (incl. GST) MBIE-funded cloud security research project, is addressing these gaps. The talk will also cover some of the Cloud Security Alliance's contributions to the STRATUS project.
Today’s workforce is mobile. Organizations are under pressure to provide employees with 24/7 access to network resources over any device from any location. However, enabling that access comes with risk. Join us to find out how you can embrace mobility and provide access to resources over wireless and mobile networks with the same level of security as your wired network.
Join this webcast to learn:
•The security risks involved with providing mobile access
•How to protect data travelling across wireless and mobile networks
•What components should be part of every mobility solution
Oggi la forza lavoro è mobile. Le aziende sono sotto pressione per fornire ai dipendenti l’accesso alle risorse di rete 24 ore su 24, 7 giorni su 7, da qualsiasi dispositivo e da qualunque luogo. Un accesso di questo tipo comporta però diversi rischi. Partecipa a questo webinar per scoprire come adottare la mobilità e fornire l’accesso alle risorse aziendali tramite reti wireless e mobili garantendo lo stesso livello di sicurezza della tua rete cablata.
Guarda questo webcast per scoprire:
•I rischi per la sicurezza derivanti dall'accesso mobile
•Come proteggere i dati nelle reti wireless e mobili
•Quali componenti non dovrebbero mancare in una soluzione di mobilità
Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.
Here’s a sampling of some of the predictions our cybersecurity experts will review:
•Ransomware Prevention more important than ever
•The Internet of Things blurs the line between personal and corporate security
•The era of Software Supply-Chain attacks has begun
•The Cloud will accelerate channel partner migration to next-generation security innovators
•Advances in Machine Learning will improve both patient care and cybersecurity
•Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls
The multi-tenant datacenter market in Asia is expected to grow at a 15% CAGR from 2015-2020, and is the fastest-growing region after Latin America. Hong Kong and Singapore continue to be key markets in that region for growth, despite Singapore having a slower year in 2017, when considering new datacenter builds. In this webinar, we will discuss our most recent findings on the major players and trends in these top markets. We will also preview our research plans for 2018, including the new Asian markets we expect to cover.
Aujourd’hui, le personnel est mobile. Les entreprises doivent fournir à leurs employés un accès 24 heures sur 24 et 7 jours sur 7 aux ressources du réseau, sur tous les appareils, où qu’ils se trouvent. Mais cet accès ne va pas sans risque. Rejoignez-nous pour découvrir comment adopter la mobilité et fournir un accès aux ressources sur les réseaux sans fil et mobiles à un niveau de sécurité équivalent à celui de votre réseau filaire.
Dans ce webcast, vous découvrirez :
•Les risques de sécurité liés à l’accès mobile
•Comment protéger les données circulant sur les réseaux sans fil et mobiles
•Quels sont les composants essentiels de toutes les solutions de mobilité
While some hackers crave the attention of a high profile attack or data breach, others prefer to work in shadows either trying to hide their tracks or are indifferent all together.
Regardless, accurately understanding where an attack comes from is very helpful in defending against future attacks. More importantly, when companies and key organizations work together it is possible to tie together a multitude of individual footprints into a single, conclusive trail back to the originator.
This session will focus on the importance of attribution and includes a case study of how a major cyber criminal was taken down, from the lowest foot soldier to the kingpin himself.
Hoy en día, los trabajadores son móviles. Las organizaciones se ven obligadas a proporcionar a los empleados acceso las 24 horas a los recursos de la red desde cualquier dispositivo y ubicación. Sin embargo, proporcionar ese acceso conlleva cierto riesgo. Participe en nuestro evento y vea cómo puede adoptar iniciativas de movilidad y proporcionar acceso a los recursos a través de redes inalámbricas y móviles con el mismo nivel de seguridad que ofrece su red por cable.
Vea este webcast y descubra:
•Los riesgos de seguridad que conlleva el acceso móvil
•Cómo proteger los datos que circulan por redes inalámbricas y móviles
•Qué componentes debería incluir toda solución de movilidad
Learn the pragmatic and simple approach to deal with GDPR
Join Fred Streefland, senior product marketing manager at Palo Alto Networks and guest speaker Mark Child, managing director at Xcina Consulting, for an informative webinar about taking a pragmatic approach to the GDPR and compliance.
Attend this event to understand:
- New cybersecurity legislation and the main elements of the GDPR
- What’s in the GDPR and what’s not
- Security-specific recitals and articles
- The U.K. Data Protection Bill and modifications to the GDPR
- How Palo Alto Networks can help you become GDPR-compliant
We do hope you can join us for this exclusive webinar.
"Your fees are too high; can you do it for less?" In the highly competitive marketplace we hear dreaded phrases like this all of the time. The easy thing to do is to offer a discount, but that cuts into your profit margins and sets a precedent for the future. You don’t want to become a victim of discounting gone wrong. So what do you do when clients push back on your fees? This webinar runs through the 4 things you can do when clients put pressure on you to lower your fees
The conversation for the upcoming Payment Services Directive (PSD2) has been centered on the digital transformation offered by the new open banking requirements. However, there are major implications for Incident Response (IR) too.
In our upcoming webinar on Wednesday, 13th December at 12.00 GMT our security experts, Jamie Cowper and Craig Roberts, will discuss the following:
The mandatory incident reporting requirements outlined in PSD2
How a well-documented, audited IR process is crucial to security teams meeting the four-hour deadline
The value security orchestration and automation strategies can provide to IR processes for staying compliant
Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.
Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.
During this webinar you’ll learn:
- How should you monitor services built on top of containers?
- What metrics become more relevant in Docker-based environments?
- How do you construct alerts most effectively?
- How do you troubleshoot containers that are rapidly coming and going?
The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
As the scope for security skill and expertise demanded of organisations extends, CISOs are increasingly turning to security consulting partners for strategic guidance and technical and advisory expertise.
There are a broad range of organisations in today’s market offering security consultancy services based on best practices and standard frameworks. Partnering with one of these firms can provide your organisation with the technical expertise to improve network visibility and gain a clearer understanding of your vulnerabilities, provide the strategic and practical guidance that helps you prioritise and build out programmes that enable business objectives, as well as advise on how to effectively engage with the C-suite.
What truly sets Secureworks’ information security consulting services apart is how we utilise our Counter Threat Unit™ and knowledge garnered from thousands of client engagements to ensure you are being consulted on the latest industry trends and threats. This way, the outcome is based on real-world scenarios that matter to your organisation.
Join consultants across our technical and strategic practices as they share lessons learned from their most challenging engagements and the value that real-time threat intelligence has brought to those engagements.
Key topics discussed include:
- Examples of real-world engagements where the CTU™ and Consulting Practice improved the outcomes for clients
- Tools consultants use to ensure that your outcome is based on real-world scenarios and threats that matter to your organisation
- Lessons learned from our most strategic and complex engagements
Since the outbreak of Petya there have been many webinars dissecting the malware, its purpose, and its attribution. We view the Petya outbreak differently. In this webinar we show you how we leveraged threat hunting techniques developed to identify and pattern malicious behaviour evident in malware like Petya.
Join us to
* -See a Live Demo of actual tools used to dissect the malware.
* -Ask and interact with the specialists in threat analysis.
Following on from our successful webinar titled A Day in the Life of a Threat Analyst, we bring you another informational and educational webinar on how an experienced threat analyst would investigate Petya.
Two critical European regulations are rolling out in 2017 and 2018. The General Data Protection Regulation (GDPR) is designed to strengthen the safeguards around personal data and create a more uniform standard within the European Union (EU), while eIDAS is the European Regulation aimed at creating a framework for cross-border electronic identification and transactions across EU member countries.
Paperless vs. Privacy is a real issue facing business in the EU, and around the world. Both eIDAS and GDPR have global ramifications and affect a broad group of industries. Complying with both of these regulations can be a real hardship for some small to mid-size companies.
Please join us for our BrighTalk webinar where our resident Public Key Infrastructure expert, Eric Avigdor, will help you tread the waters of eIDAS vs. GDPR. Which one is most important for your business? What are the consequences of non-compliance? We will also discuss how to comply with multi-factor authentication, physical access, and encryption requirements.
As European financial institutions work towards compliance with PSD2, there's an intense focus on securing customer data as it's opened up to third parties.
Essential requirements around securing APIs to enable direct payments and account aggregation are accompanied by increased regulations for strong customer authentication. Financial institutions are looking to improve their management of digital identities to ensure customer data remains private.
Not only can a modern digital identity platform help companies with API security and authentication requirements, it can also drive innovation in areas like consent management, with dashboards that allow customers to control their personal data at a granular level. Banks can embed identity into their digital platforms in order to use PSD2 as a strategic opportunity to build trusted relationships with their customers.
2017 was a horrendous year in cyber security every month was filled with major breaches, hacks, and attacks surfacing. The nature and range of the attacks varied from email hacking to recently announced vulnerabilities being exploited, from minor incursions to (potentially) everyone’s financial history being stolen. 2017 will probably go down as the worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2018 bear the full weight and impact of the events of 2017, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2018 landscape?
Join us, make notes, and then check back in a year to see how our panel of experts did in providing insight and making predictions for the 2018 challenges to InfoSec.
Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.
Join us as we discuss:
- How cloud security differs from a public cloud, a private cloud or a hybrid cloud
- How cloud technologies impact a company's security options
- How do you defend against attacks of third-party providers of IT services
- How to develop policies and procedures to test and evaluate servers over which you have no physical control
To better understand what cloud security means to you, register now.
As software eats the world, cloud native tools and methodologies — like containers and devops— are continuously evolving. Organizations that can identify the major trends in this ever-changing landscape and then successfully secure a new cloud native environment will have an advantage in the market.
Join Twistlock's VP of Marketing, Josh Thorngren, as he shares the macro trends he’s seeing in the cloud native security space and the extended cloud native ecosystem in 2018.
Specifically, we’ll cover:
* Rethinking your organization’s approach to defend against the proliferation of easy-to-use, easy-to acquire hacks, exploits and malware
* How to shift security left by developing an entirely new paradigm and set of principles for software delivery and protection
* How to modernize legacy workloads with containers
Managing certificate deployment and certificate pinning are among the top challenges when implementing deep inspection of SSL and TLS certificates on a next-generation firewall.
Join us for a technical deep-dive webcast and demo to learn best practices to a successful SonicWall Deep Packet Inspection of SSL (DPI-SSL) service implementation. This in-depth session will:
• Help size the firewall accurately for DPI-SSL service
• Provide multiple methods for certificate deployment
• Offer guidance for certificate-pinning
• Educate users on the OS certificate store
• Explain how to establish trust with devices in BYOD environments
NowSecure continuously monitors millions of mobile apps in third-party apps in the Apple® App Store® and the Google Play™ store for security, compliance and privacy risks.
A comprehensive analysis of iOS and Android apps found that a staggering 85% of those apps fail one or more of the OWASP Mobile Top 10 criteria. Given that the average mobile device has over 89 mobile apps on it, what are the odds your employees have one or more of the apps and what’s the real risk to your business?
During this webinar, renowned mobile security expert and NowSecure founder Andrew Hoog and Chief Mobility Officer Brian Reed will review the massive data set, detail the areas of exposure and review mitigation recommendations.
Mobile apps power productivity in the modern business; don’t let a few bad apps bring it down.
Note: Live attendees will be entered to win a free mobile app security assessment!
It’s been a busy year for Apple. From unveiling new products and operating systems to forming new enterprise relationships, Apple continues to evolve its capabilities and best practices for managing Mac, iPad, iPhone and Apple TV devices. Before you finalize your IT plans for next year, join us for a look back at major Apple milestones and enjoy a glimpse at where Apple may be headed in the future.
In our webinar, Apple IT Trends for 2018, we’ll examine the strategic moves made by Apple and explain what they mean for you in the new year.
•Apple IT accomplishments in 2017
•Predictions for Apple IT trends in 2018
•IT initiatives to consider and provide examples of organizations already implementing them