The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Cyberkriminelle und professionelle Angreifer investieren viel Zeit und Mühe, um neue Angriffspunkte zu identifizieren und bestehende Attacken zu perfektionieren. Seit WannaCry feiern zum Beispiel Würmer ein Revival – und breiten sich immer öfter aggressiv in Unternehmensnetzen aus. Da die Zahl der Schwachstellen auf Desktop-PCs stetig abnimmt, suchen die Angreifer verstärkt nach neuen Kanälen und Plattformen, um Systeme zu infizieren – und entscheiden sich zunehmend für IoT-basierte Systeme..
In diesem Webinar erfahren Sie:
• Mit welchen neuen Angriffsformen sich Cyberkriminelle heute bereichern
• Vor welchen neuen Angriffsvektoren sich Unternehmen schützen müssen
• Welche Gefahren in IoT-Umgebungen drohen
• Welchen gezielten Angriffen Unternehmen jüngst ausgesetzt waren
Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to their host’s place in the network, meaning efforts can be wasted on remediating already protected vulnerabilities while ignoring those left exposed to attack.
To have a real impact on lowering your risk of cyberattack, organizations need to centralize and analyze data from their entire attack surface to narrow focus on the vulnerabilities most likely to be used in a cyberattack.
In this webinar, you will learn:
• What scanners miss in discovery, prioritization, remediation and oversight processes and how to fill in the gaps
• How the intersection of your assets, networks, business and the threat landscape impact vulnerability risk
• Why context-based approaches target remediation at your riskiest vulnerabilities and help identify patching alternatives
• Insights from Skybox’s 2018 Vulnerability and Threat Trends Report mid-year update
Join Skybox Security and (ISC)² on Sept 26, 2018 (Wed) at 14:00 (Singapore time), as we explore how to get more value out of your data, visualize your attack surface and centralize vulnerability management to systematically reduce your risk of cyberattack.
Presenter: Greg Singh, Technical Director, APAC, Skybox Security
Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
In this webinar, 128 Technology and Light Reading will discuss the benefits of session-smart routers in SD-WAN deployments.
Network complexity not only increases IT costs, but can also create network fragility and security risks. Recent approaches to reducing network complexity through Software Defined Wide Area Networking (SD-WAN) offer some short-term relief, but are still largely based on decades-old network paradigms that only create more complexity in the long run.
Session Smart Networking is different. Session Smart networks can truly simplify the network, as well as provide a breadth of SD-WAN capabilities – including application visibility, software-define branches, multi-path routing and network segmentation. As a result, organizations using a Session Smart approach can realize breakthrough gains in performance, agility, security and scale.
Federal CIOs recognize the need to develop “zero-trust” networks — designed around the assumption that every user and every session on the network poses a risk for data compromise. That means finding a way forward, beyond trusted internet connections (TIC) and other perimeter defenses. Find out how agencies are augmenting their infrastructure, using new generation cloud tools, to easily manage network micro-services to govern user sessions and better protect their networks.
In this webinar, you’ll learn:
- How to deploy policy-driven, software-defined security services without replacing your existing infrastructure
- How to reduce bandwidth consumption and improve TIC and satellite transmission performance by eliminating the need for virtual LAN tunnels
- How moving to smart-session technology can improve existing network agility and security — and streamline cloud adoption
Applications are our crown jewels. They run our businesses, power grid, military defenses, personal & business banking, social networks, hospitals, and entertainment, and yet are they secure? No, they are most vulnerable, and tend to remain so!
In this session, we’ll take a look at data which provides an analysis of tens of thousands of applications from 2017-2018 from approximately 900 companies both enterprise and SMB. The analysis includes global brands and local businesses, hundreds of thousands of application security tests and checks, along with an examination of code and behavior.
Joseph Feiman, PhD, Chief Strategy Officer
Joseph Feiman is the chief strategy officer at WhiteHat Security, a leading application security provider. Feiman is responsible for WhiteHat’s overarching business strategy and vision, to further its success in empowering secure development and operations. Previously, Feiman worked for 18 years at Gartner, where he was a Gartner research vice president and fellow.
Setu Kulkarni, Vice President, Product & Corporate Strategy
As the Vice President of Product & Corporate Strategy, Setu is responsible for product vision, strategy, and direction at WhiteHat Security. Setu joined the WhiteHat leadership team in early 2016 after a 10+ year stint at TIBCO Software Inc., where he most recently led product management and strategy for the Operational Intelligence product portfolio.
Organizations that use Oracle e-Business Suite often find that they have waited too long to implement archiving and data management strategies for their application databases. This reactive approach can be much more costly and difficult to implement when your business begins to experience issues. With the right data management strategy in your Oracle environment, you gain benefits in a range of areas, including application performance, long-term compliance, manageability, and infrastructure costs.
Micro Focus Structured Data Manager software, with its ‘ready-to-run’ modules, for Oracle e-Business Suite, manages production and related non-production databases that support the Oracle e-Business Suite environment. This allows you to gain the right data management strategy to make sure that your business can remain responsive, while keeping costs under control and meeting data retention and compliance requirements.
Structured Data Manager helps you:
● Archive and manage your Oracle e-Business Suite database and reduce its size
● Discover and mask/encrypt sensitive data for GDPR & CCPA compliance and test data management
● Manage the lifecycle of your data and comply to privacy laws
Join this live webcast to understand how your organization can enhance your Oracle e-Business Suite environment with Micro Focus Structured Data Manager.
With Apple’s Worldwide Developers Conference (WWDC) behind us, it’s time to review the exciting announcements and discuss how you can prepare now for your future iOS 12, tvOS 12 and macOS Mojave updates.
In our webinar, Get Ready for OS Upgrades and Apple Business Manager, we’ll explain the new management features and services coming your way.
We will cover:
•What new mobile device management (MDM) features will be available with Apple’s upcoming OS releases
•How to prepare for OS upgrades this fall
•An introduction to Apple Business Manager
The software-defined wide area network (SD-WAN) has gained wide adoption in the past few years. In a recent NSS Labs survey, 82.2% of the survey respondents indicated that their organization has already adopted SD-WAN technology. These products provide robust control, and optimization which makes them a compelling alternative to traditional WAN products.
In this groundbreaking inaugural test, nine of the industry’s leading SD-WAN products were examined to help enterprises understand the merits of products in the market and identify the capabilities best suited to meet their use case requirements.
Tune in to our webinar to learn how each of the participating vendors scored!
The California Consumer Privacy Act (CCPA) will go into effect on January 1, 2020, providing a relatively short window for companies to prepare. While final details of the CCPA need to be sorted out by the CA Legislature, enough is known to start preparing now. Join Tom Mighell, Esq. and Greg Forest as they present a CCPA Action Plan: what specific steps you need to take to get ready.
• Key steps in getting ready for CCPA, including policies, processes, technology and training
• If you are already GDPR compliant, what you can and can’t leverage to comply with CCPA
• What areas can be addressed today, even though the rules may change
• What areas you should wait for until the law is finalized
With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?
In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).
After attending you will:
- Recognize what are the top 5 attack vectors and the counter-measures you can take
- Understand the importance of detection and response in the kill-chain for each attack vector
- Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them
Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
Office 365 is dominating the cloud, yet its native security lacks unified controls required to protect the billions of sensitive files that flow between internal storage and the cloud. Learn why cloud-centric security is not enough, where built-in Office 365 security features fall short and how to enhance Office 365 security with Varonis.
Pacific Dental Service (PDS) is one of the country’s leading dental support organizations, providing supported autonomy to more than 630 dental practices. As a support services provider in the healthcare space, PDS is subject to HIPAA and other regulations, which plays a vital role in their journey to the AWS cloud.
Join us on September 25th as Nemi George, Sr. Director of Information Security and Service Operations at PDS, walks us through the AWS cloud journey: the required planning, timing, best practices, and their experience to-date. Plus, how Cavirin’s CyberPosture intelligence continues to strengthen Pacific Dental’s security posture and meet compliance regulations.
Then we are lucky to have Thomas Robinson, Solution Architect for AWS look at the shared responsibility model, validating AWS responsibilities, and the tools available for building HIPAA workloads and maintaining compliance. Topics include AWS CloudTrail and Lambda Functions.
If you are considering migrating to the cloud, this is a must-see event.
To beat criminal hackers, it helps to have ethical ones on your side. Responsible Disclosure Programs - where companies invite suspected security vulnerability reports from the public - have been on the rise in the past few years. Should your company consider Responsible Disclosure? Learn more about the ins and outs of these types of programs and how they can differ in the level of liability and management incurred. Technical. Social, Legal, and other indicators will all be raised.
It is beyond the ability or willingness of the world’s governments to protect and secure information technology. What role then can the private sector play in making cyberspace safer? Can private enterprises do anything to strike back at attackers, curtailing their freedom of action and raising the costs of malicious activity?
Consisting of academics and industry experts, this panel will explore the potential for active cyber defence to impede and deter malicious activity and the conditions under which it could be conducted responsibly.
- Griff James, Director at Damrod Analysis
- Wyatt Hoffman, Research Analyst, Cyber Policy Initiative at Carnegie Endowment for International Peace
- Will Lymer, Chief Growth Officer at Loki Labs
With all the money that we spend on precautions, and mitigations for security vulnerabilities, why do we keep on getting hacked? This question is not new, but will be looked at with respect to recent attacks, that have been successful. While not all of these attacks are brand new or represent unique vulnerabilities, they've been very effective. So come and join us as we look at the issues that are being exploited.
The World Economic Forum has elevated cyberattacks as one of the top global risks in terms of likelihood and impact, ahead of all other types of technological, economic, political or terrorist risks. The easy availability of advanced hacking tools combined with our aging infrastructure and outdated security models is a recipe for disaster. To tackle this looming crisis, we need to rethink our approach to security and develop new strategies to protect our most critical applications and infrastructure.
Join renowned security experts Troels Oerting, CIO of the World Economic Forum for an interactive discussion on new strategies to preempt this global crisis.
Organisations will lose their competitive edge if they maintain the status quo. They must embrace innovation and enable their developers by providing them with the tools and flexibility to create new business models and applications.
Join the discussion with Gary Middleton, Group Networking Senior Practice Director, Dimension Data; and Chris Wolf, CTO, Global Field and Industry, VMware, as they uncover how to:
• Use containerisation to transform your cloud capabilities.
• Empower IT to embrace the solutions and services needed to evolve.
• Build applications that streamline and transform business success.
• Move with speed and agility while maintaining a strong infrastructure.
• Exploit the software as a service (SaaS) revolution.
Hadoop is one of the most popular MapReduce solutions. Many organizations choose Hadoop as their big data store. syslog-ng Store Box allows seamless integration with Hadoop Distributed File System (HDFS), providing high performance log collection, distribution and pre processing.
In our upcoming webinar, we will demonstrate how to directly stream any text-based log into HDFS while keeping a high performance rate using syslog-ng Store Box.
EDR technology has been an unceasing topic of conversation over the past 3 or 4 years. Meanwhile, we at Kaspersky Lab have become aware, in our interactions with enterprise organizations, of serious levels of overall dissatisfaction with the outcomes of investment in EDR. Let's try now to understand the main reasons for this, while looking at typical use cases and key enterprise scenarios. The webinar will cover:
•Drivers of EDR implementation
•EDR vs Next Generation EPP vs Advanced EPP
•Key benefits and advantages
•Use cases of EDR functionality: Integrated Endpoint Protection, Augmentation of the Incident Response process, Automation of the anti-APT solution reaction phase
•EDR project business justification
This webinar is for you if you struggle with sales or specific sales activities and will open the door to understanding how you get in your own way of sales success...and how to develop a winning sales mindset that attracts success!
Reasons to Attend:
-Discover how your thoughts impact on your sales results
-Learn how to identify your inner barriers...and how to eliminate them
-Create your personal way of generating consistently great sales
Many people feel uncomfortable selling. Part of it is to do with rejection – people saying “no” to you.
Another part of it is to do with ethics – we don't want to be seen to be taking people's money!
However, selling is not what it used to be.
You can only succeed – in the long term - if you give value and help customers.
Le nuove metodologie per la propagazione delle minacce mettono le aziende sotto pressione
Per garantirsi il successo, hacker e gruppi criminali che lanciano attacchi mirati continuano ad affinare le armi e identificare nuovi canali di infezione. Sulla scia di WannaCry, i worm riprendono virulenza e si diffondono aggressivamente nelle reti aziendali. Con le vulnerabilità sui computer desktop che si fanno sempre più rare, i criminali vanno in cerca di nuovi canali e nuove piattaforme da cui lanciare le infezioni: l’IoT diventa un bersaglio sempre più allettante.
In questo webinar apprenderai:
• Le strategie di diversificazione adottate dai criminali informatici per mantenere la redditività
• Le nuove metodologie per la propagazione delle minacce, che mettono le aziende sotto pressione
• La nuova generazione di minacce IoT
• Le recenti campagne di attacchi mirati
Das Wachstum virtualisierter Anwendungen, immer kleinere Backup-Fenster und ein explosionsartiges Datenwachstum haben die Anforderungen an die Datensicherheit und die Speicherinfrastruktur enorm belastet. Backup- und sekundäre Speicherinfrastrukturen kommen oft von mehreren Anbietern, was die Kosten erheblich steigert, betriebliche Ineffizienzen erhöht und zu Datensilos führt, wodurch die zentrale Verwaltung immer komplexer wird.
Registrieren Sie sich für unseren Webcast und erfahren Sie, wie Sie mit der neuen konvergenten Datenplattform StorageCraft OneXafe Ihre Daten in heterogenen Umgebungen besser schützen und verwalten
Imagine a world without outages. Glorious, isn’t it? We’d like to help you get there. So how do you stop IT events before they escalate into outages? With a little help from machine learning.
The predictive capabilities from the Splunk Machine Learning Toolkit (MLTK) combined with the Event Analytics capabilities in Splunk IT Service Intelligence (ITSI) give operations teams like yours the opportunity to proactively act on an event before it becomes an outage. Whether your current IT state is reactive or you’re already in a somewhat proactive state, these predictive capabilities will be something you’ll want to take note of!
Join our webinar to learn how to:
● Predict a service health score
● Proactively take action based on those predictions
● Employ novel tactics for better incident management using advanced search commands
Comment renforcer la confidentialité des données dans un contexte de risque et de nouvelles obligations?
Privitar est une plateforme logicielle centrale de gouvernance de la confidentialité des données permettant non seulement de répondre à certains enjeux de la GDPR mais également d’avoir une approche fonctionnelle de “Privacy by Design” sur des cas d’usage précis. La plateforme Publisher vous permet de livrer à la demande ou en streaming des jeux de données anonymisées par des techniques de masquage, de perturbation ou de généralisation tout en conservant l’intégrité de vos données sensibles. Il est également possible d’insérer des filigranes invisibles afin d’auditer l’origine d’une donnée en cas de fuite de fichier et ainsi de protéger votre e-réputation. Ce webinar soulignera en premier lieu les obligations du contexte GDPR pour ensuite se concentrer sur l’illustration concrète de deux clients. Il s’achèvera par une démonstration de la solution. Il est important de noter que nos solutions s’insèrent dans vos environnements Big Data et facilitent ainsi le développement de processus analytiques sans compromettre la valeur des données et en respectant la confidentialité due à vos clients et utilisateurs.
Carine Lecadre Perrier | Head of Compliance @Partech
Sébastien Cognet | Responsable Avant-Vente Europe du Sud @Privitar
Leonardo L’ecaros | Responsable Commercial Europe du Sud @Privitar
Deliver applications faster by writing secure code while integrating with your own toolset. Join this webinar to see how CA Veracode Greenlight can help you do this by bringing security scanning right into your IDE as you are coding, returning most scans in seconds. During this presentation, Product Marketing expert RJ Gazarek will provide:
•An overview of Greenlight and its integrations with developer tools;
•A summary of recent Greenlight use cases and successes;
•A sneak peek of upcoming capabilities for your development teams to leverage
DevOps teams often operate outside the purview of IT security, but security is still necessary in the cloud. IT security can ensure that DevOps teams retain their agility and maintain strong security using automation. By integrating security through automation, the security watchdog now becomes the trusted advisor, helping DevOps enable the business.
Join this webinar on September 26 to hear Tufin experts Colby Dyess and Dan Rheault discuss how information security operations teams integrate security into a dynamic delivery process. We will cover how to:
•Find commonalities between information security and cloud teams
•Gain visibility into cloud security
•Assess risk within the cloud by leveraging a policy-driven approach
•Enforce security in CI/CD without impeding application delivery
Register now to learn how automation enables organizations to align cloud and DevOps with security policies.
Demand for business-critical applications continues to increase, putting IT and development teams under pressure to enable innovation while maintaining security. Hackers are exploiting this pressure to uncover gaps in application security and launch cyberattacks on businesses.
Join Micro Focus for this live demonstration to see how Fortify on Demand provides fast, affordable, on-demand mobile application security testing for organisations like yours.
You’ll learn how Fortify on Demand leverages the most advanced, security-focused dynamic testing and static analysis technologies through a global infrastructure to help you:
Earlier this year Department of Homeland Security’s US-CERT issued Technical Alert TA18-074A called ‘Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors’. This alert provided information on Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors. It also contained indicators of compromise (IOCs) and technical details on the tactics, techniques, and procedures (TTPs) Russian government cyber actors use to compromise their victims’ networks.
In this webinar we will go over those TTPs and put them to use. Specifically, we will demonstrate how easy it is to leverage Server Message Block (SMB) protocol authentication session to obtain user’s credential hash and then crack it in real-time revealing the actual password. We will show multiple ways of using this approach and attempt to reproduce Russia’s success in our environment. No product pitches, just good old live hacking!
Guy Meoded is a Senior Security Researcher at Nyotron. Prior to Nyotron, Guy was a Trojan Analyst at RSA.
Rene Kolga, CISSP, is a Sr. Director of Product and Marketing at Nyotron. Rene has over 20 years of industry experience, including expertise in endpoint protection, insider threat, encryption and vulnerability management. Rene run Product teams at multiple Silicon Valley startups as well as Fortune 500 companies, including Symantec, Citrix, Altiris and ThinAir. Earlier in his career, Rene managed Customer Success and QA teams. Rene earned his Computer Science degree from Tallinn University of Technology. He also received an MBA from University of Utah.
With new attack methods emerging every day, organizations are faced with the challenge of defending their systems against never-before-seen, machine-speed threats produced by an ever-evolving adversary. Moreover, insiders bring another layer of uncertainty to every organization – so how do security teams catch what’s lurking within their own networks?
Darktrace’s cyber AI technology offers the only approach capable of detecting and autonomously responding to subtle, stealthy threats across the entire digital infrastructure.
Join Darktrace’s Director of Enterprise Cyber Security, Dave Masson, to hear about the latest threats that Darktrace AI has neutralized, including:
•A sophisticated attacker exfiltrating data via an internet-connected locker
•A novel form of malware spreading laterally within the network
•A widespread, insider-run bitcoin operation at a Fortune 500 company
Hertz is driving a customer experience transformation with the goal of providing a frictionless customer and partner journey. MuleSoft has been foundational in driving the re-platforming of all of Hertz's customer-facing applications, as they replace nearly 100% of their legacy systems.
From state to local governments, and throughout the public sector, employees and staff are seeking better ways to collaborate and boost productivity. But collaboration can be complicated when you're working across different teams, committees, and counties.
Judy Price, Town Clerk for the town of Truckee, California, will share her experience using Dropbox Business to save time, money, and effort, and focus on the issues that really matter to her city.
Join us in this webinar as we discuss:
- Key trends we are seeing in the public sector today
- How technology can help address pain points for city and local governments
- How implementing tools like Dropbox has helped streamline several processes in Truckee
When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new Iot connected world, you need to think about more than just the data and monitoring hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements that is garnering the most attention right now is data security. Nutanix certainly knows this and is working hard with Thales eSecurity to protect the confidentiality and integrity of sensitive data through strong encryption of user and application data. When used with Vormetric Data Security Manager (DSM), the combined solution provides FIPS certified robust key management and role separation to meet the most stringent security requirements.
In this webinar, we will examine the key elements of the joint solution as well as what may be the best options for your organization.
• Understand the types of encryption and their characteristics
• Understand the critical role of best-in-class key management
• Learn how to go beyond the encryption basics
Transform your data protection strategy with the Dell EMC DP4400. Learn how Dell EMC Data Protection enables you to have backups that are simple to manage, powerful no matter the data, along with tools that can provide lower storage consumption and a peace of mind to your data protection environment.
Quantum computing is a game-changer and will have a huge impact on the way we do business, safeguard data, explore space, and even predict weather events. Yet, some experts say in the not so distant future quantum computers will break existing public key cryptography forever.
On that digital day of reckoning, every stored secret protected by traditional public key crypto will be broken forever; including TLS, digital certificates, PKI, SSH, RSA, most wireless networks, VPNs, online financial transactions, and even bitcoin and blockchain. All of it made worthless in a second…
The bad guys will be able to use more secrets against you than ever before, especially in increasingly sophisticated spear-phishing attacks. Attend this exclusive event to learn what you can do to prepare.
•Why quantum computing is different than traditional binary computing
•How close quantum computers are to breaking traditional public key cryptography
•What defenses you can deploy after public key cryptography is broken
•How to prepare your users - your best, last line of defense
The quantum computing break is coming. Will you be ready?
In this session, we begin by touring a typical Security Operations Center (SOC) and study the day to day activities of the various functions inside. We then explore the various challenges faced by these functions and introduce the idea of taking a platform approach. We wrap the session with an outlook at the future of Security Operations using this approach to consolidate, facilitate and automate workflows of the entire Security Operations Center (SOC).
There are a lot of DevSecOps offerings that are just DevOps lipstick on a traditional security-as-a-gate pig. Also, security specialists, especially at large organizations, believe that better security comes from robust independent gating. On the other hand, DevOps has proven that you can safely deploy an order of magnitude or more faster than human gating can achieve.
What's needed to add security to DevOps are tools that work well with rapid-cycle CI/CD pipelines and an approach that reinforces the DevOps culture and process changes. This requires that security specialists become self-service toolsmiths and coaches and stop thinking of their jobs as gatekeepers.
Join Larry Maccherone, an industry-recognized thought leader on Lean/Agile, Analytics, and DevSecOps, as he introduces a framework to accomplish this mindset shift. It includes guidance on the characteristics of tools compatible with DevOps. It has been successfully used in a large DevSecOps transformation at Comcast and has gained recognition in DevSecOps circles as a leading framework.
L'explosion des applications virtualisées, la réduction des fenêtres de sauvegarde et la croissance impressionnante du volume de données ont placé un immense fardeau sur les besoins en matière d'infrastructure de stockage et de protection des données. La situation se complique d’autant plus en raison des environnements de protection des données fragmentés actuels et des besoins de sauvegarde de données physiques et virtuelles, sur site et hors site, qui doivent tous satisfaire des niveaux de service différents (SLA). L'infrastructure de sauvegarde et de stockage secondaire est souvent fournie par plusieurs prestataires. Résultat : une augmentation des coûts d'acquisition et des inefficacités opérationnelles. L'agrégation de tous ces produits entraîne de silos de données difficiles à gérer de façon centralisée. Une vue incomplète du flux de protection des données peut conduire à une hausse des coûts d'exploitation, une perte des données et une incapacité à respecter les SLA ainsi que les réglementations et exigences de conformité propres au secteur.
Rejoignez StorageCraft pour un webcast exclusif afin de découvrir les avantages de la nouvelle plateforme OneXafe converged storage and data.
Helge Sanden, Chefredakteur des IT-Onlinemagazins (https://it-onlinemagazin.de/, moderiert das Gespräch mit den Experten zu diesem Thema von Micro Focus.
Dauer und Aufwände für Tests werden oft unterschätzt und herkömmliche Methoden und Verfahren führen nicht mehr zum gewünschten Erfolg: Systemlandschaften sind prozessual extrem miteinander verflochten, teilweise in der Cloud, hybrid und komplex - sowohl im Back-End als auch im Front-End. Regelmäßige Updates und Security-Patches machen Tests zur systemkritischen Daueraufgabe und führen zu permanent wiederkehrenden Aufwänden, für die in Fachbereichen die Kapazitäten fehlen.
Mittlerweile lassen sich bestehende Prozesse und neue Funktionen kaum noch manuell mit der notwendigen Tiefe testen. SAP ist nicht mehr das alleinige System und die zunehmende Digitalisierung entlang der Prozessketten wird die Notwendigkeit automatisierter End-to-End Tests in hybriden Landschaften zusätzlich verschärfen.
Welche Antwortmöglichkeiten es für diese Herausforderungen gibt, sollen in diesem Expert Talk vertieft werden. An einem Anwenderbeispiel sehen Sie, wie man in der Praxis eine Teststrategie verändert hat und dabei die komplexen produktiven Landschaften - samt Schnittstellen, Webservices, Systemübergangen, Diensten, mobilen Endgeräten und Cloud-Produkten - möglichst gut abbilden kann. Automatisierung, Virtualisierung und Nutzung vorkonfigurierter Testumgebungen aus der Cloud können hierbei zu großen Produktivitätsschüben führen.
Unser Anliegen ist es, Ihnen Ideen für Veränderungen im Testmanagement aufzuzeigen, die Aufwände reduzieren, Zeit sparen und die Testqualität verbessern können.
Phishing ist nach wie vor eine der am schnellsten wachsenden und bösartigsten Bedrohungen für die Sicherheit von Unternehmen aller Branchen. Denn der versierte „Phisher“ von heute schafft es, selbst die ausgefeiltesten technischen Sicherheitsvorkehrungen durch sorgfältig geplante, sozial ausgerichtete E-Mails zu umgehen, die sich immer weiterentwickeln.
Wie also Mitarbeiter und Unternehmen vor diesen gezielten Angriffen schützen?
Das Phishing-Simulation- und Sicherheits-Awareness-Training von Proofpoint bietet Organisationen eine zusätzliche Sicherheitsebene, indem es Mitarbeiter auf die neuesten E-Mail-Sicherheitstaktiken testet und informiert. Dies hilft, das Bewusstsein zu erhöhen, die Anzahl erfolgreicher Phishing-Angriffe und Malware-Infektionen zu reduzieren und zukünftige Sicherheitsverletzungen zu verhindern.
Erfahren Sie in unserem Live-Webcast, mehr über die marktführende Lösung für computerbasierte Security Awareness Trainings und Phishing-Simulation und informieren Sie sich über
•E-Mail Fraud – Ein Omnipräsentes Thema
•Proofpoint und Wombat – Eine optimale Ergänzung
•Maturitätslevel von Security Awareness
•Wombat Methodologe & Live Demo
The growth of virtualised applications, diminishing backup windows, and explosive data growth have collectively placed an immense burden on data protection and storage infrastructure requirements. This complexity continues to be exacerbated by today’s fragmented data protection environments and the need to backup physical and virtual, on-premises and off-premises data, all with different service level agreements (SLAs). Backup and secondary storage infrastructure often comes from multiple vendors which significantly increase costs, add operational inefficiencies, and create data silos, making it difficult to manage centrally. An incomplete view of data protection workflow can lead to rising operational costs, data loss, and the inability to meet SLAs and specific industry regulations and compliance requirements.
Join our webcast and learn how the new StorageCraft OneXafe converged data platform can help you with better protecting and managing your data in heterogeneous environments.
To effectively operate in today's changing threat landscape, organizations must draw upon the widest degree of data and intelligence, as well as relevant operational context in order to identify and respond to attacks. This talk is intended to highlight how automation can be leveraged as part of a wider incident response program to resolve cyber incidents and proactively improve overall security posture.
Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.
Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?
In this webinar we'll discuss:
- Why you should embrace cloud-based network security
- The tools you need to provide protection against a variety of attacks
- Why a proxy belongs at the center of your cloud service
- Cloud migration strategies
- Integrations that orchestrate defenses across control points and attack vectors
Register Today to hear from Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic, Director Product Marketing.
With a live Q&A from Karthik Ramakrishnan, Senior Systems Engineer, EMEA Emerging Markets
DevOps allows organizations to bring web, mobile, and IoT applications to life faster than traditional SDLC models. However, continuous releases and updates introduce new risks by the way of exploitable vulnerabilities that are introduced and left undetected and unresolved/unpatched in the production stream.
Traditional point-in-time penetration tests can’t keep up with the frequency and short deployment cycles of the modern DevOps organization. Traditional pen tests are usually conducted through checklist-based activities that lack the comprehensiveness to mimic and defend against sophisticated cyber attacks. The result? An increase in serious, exploitable vulnerabilities in live applications and a slew of high-profile breaches..
Leading enterprise organizations are utilizing a crowdsourced security testing platform that combines continuous vulnerability scanning tools with manual, crowdsourced human security testing. This model of offensive and adversarial-based testing delivers realistic attack traffic on customers’ applications, resulting in effective vulnerability discovery and management and “smart” security intelligence without compromising security and control. Scalable and controlled crowdsourced testing at a continuous cadence is the answer for secure DevOps SDLC.
Join this session by Andy Condliffe of Synack EMEA as he shares how Synack can help lower the risks of dynamic deployments with a continuous, human, offensive security testing model that’s better suited for the modern DevOps organization
How can AI help overworked, understaffed and overwhelmed security analyst teams? How can the use of an AI platform help reduce the cost of a data breach? Mike Spradbery, IBM's UK&I Security Technical Leader, will explore these and other questions as he talks live to the experts behind a new Ponemon Institute study on the use of Artificial Intelligence in Cyber Security. Mike will also share case studies of AI in action in Cyber Security and explore how AI is helping organisations elevate their cybersecurity posture and reduce response times.