Hi [[ session.user.profile.firstName ]]

IT Security

  • Prevent Major Data Breaches with Threat Lifecycle Management
    Prevent Major Data Breaches with Threat Lifecycle Management Seth Goldhammer, Senior Director of Product Management Recorded: Jul 26 2017 62 mins
    Throughout 2017 organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    A traditional prevention-centric strategy naively assumes all threats can be blocked at the perimeter, which leaves you blind to the threats that do get in. Many organisations are shifting to a more balanced strategy including detection and response. Enter Threat Lifecycle Management (TLM) - your playbook for rapidly detecting and responding to cyber-attacks.

    In this webcast, Seth Goldhammer, senior director of product management at LogRhythm, explains what TLM is, and demonstrates how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.
  • The Evolution of SSL/TLS and Browser Compliance Requirements in 2017
    The Evolution of SSL/TLS and Browser Compliance Requirements in 2017 Dathan Demone, Entrust Datacard Recorded: Jul 25 2017 57 mins
    SSL/TLS Industry requirements are changing at an unprecedented pace. Over the last couple of years, new requirements have been passed down by the CA and browser community to help further solidify the security practices around obtaining and using SSL/TLS and other types of publicly trusted certificates. Over the next 12 months, more important changes are being introduced to continue that trend. Join Dathan Demone, Product Manager at Entrust Datacard, who will discuss both past and future changes that will have a major impact on all certificate subscribers. In this Webinar, we will discuss topics such as:

    • New changes coming to browsers and how they notify end users about the proper use of SSL/TLS on all web pages
    • Changes to certificate lifetime policies and verification rules that are being introduced in 2017
    • New requirements around Certificate Transparency that are being introduced in October, 2017
    • Updates to recommended security best practices and new vulnerabilities in the world of SSL/TLS
    • Certificate Authority Authorization and how this can be used to protect your organization against fraud
  • Secure your GOV.UK Verify Account with YubiKey
    Secure your GOV.UK Verify Account with YubiKey Yubico Team Recorded: Jul 25 2017 2 mins
    GOV.UK Verify is a new simple way for UK citizens to access an increasing range of UK government services online. This is the first government service in the world to make support for the new open authentication standard FIDO U2F.

    UK citizens can easily purchase a FIDO U2F authenticator online and register it with Digidentity, one of the UK government’s certified identity service providers. Yubico’s durable FIDO U2F-certified YubiKeys work with a single touch, and need no drivers or client software. YubiKeys are used by millions of people in over 160 countries.

    Find out more at yubico.com/govuk
  • Integrating U2F - From Concept to Implementation
    Integrating U2F - From Concept to Implementation Dain Nilsson, Engineering Lead Recorded: Jul 25 2017 58 mins
    FIDO Universal 2nd Factor (U2F) is an open authentication standard that enables internet users to securely access any number of online services, with one single YubiKey device, instantly and with no drivers or client software needed.

    U2F leverages public key cryptography, protecting against modern hacker techniques used in the current breach-filled world. Major online services -- such as GitHub, Google, and Dropbox -- are leading the way to protect their employees and global users with U2F.

    This technical webinar provides an introduction to concepts on how to implement U2F, including code examples using Python.
  • The Side Effects of the Internet of Things
    The Side Effects of the Internet of Things Chenxi Wang, ITSPmagazine | Ted Harrington, ISE | Gary Hayslip, Webroot | Mike Ahmadi, Synopsys Recorded: Jul 25 2017 43 mins
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -
    Innovation is moving so fast. Each day there's a new device or technological service to hit the market designed to make our lives easier, more convenient, and perhaps even healthier. They listen to us, watch us, learn about us. They help us make decisions. They “guess” our next move - our pending desire. They make decisions - even take action on our behalf. As a society we snatch up these new devices as quickly as they hit the shelves and use them with open arms, unknowingly putting our privacy and safety at risk.

    How many devices are there? What are they used for? In this session, we’ll focus on the side effects associated with devices used to run our countries, our cities, our homes, our lives - even our physical being.

    Ultimately, it’s about the lack of cybersecurity - because there is a lack of cybersecurity, there’s no conversation about it, and therefore there is no understanding (awareness) of what’s at risk for using these devices. It’s not necessarily a bad thing - but the fact we are making uninformed decisions as a society means we could be putting ourselves and our loved ones at risk without even knowing it.

    This panel is part 1 of 2 parts - it’s all about the lack of security and the side effects it has on us as individuals and as a society. What are we trading in exchange for using these devices to make our lives “better”? Bottom line... are you (we) surrendering to the technology?

    - Ted Harrington, Executive Partner at Independent Security Evaluators
    - Gary Hayslip, Vice President & CISO, Webroot
    - Mike Ahmadi, Director of Critical Systems Security, Synopsys Software Integrity Group

    - Chenxi Wang, Host of The New Factor on ITSPmagazine
  • Your Small Business Will Be Hacked - Because It Is Easy
    Your Small Business Will Be Hacked - Because It Is Easy Sean Martin, ITSPmagazine | Rusty Sailors, LP3 | Russell Mosley, Dynaxys | Tom Caldwell, Webroot Recorded: Jul 25 2017 56 mins
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -

    Small and medium businesses face countless threats, most of which have a human at their origin. These criminals, driven by financial gain, are essentially business owners – not unlike yourself – who are looking to spend as little money and as few resources as necessary to generate as much revenue as possible. Therefore, most cybercriminals target businesses that have a false sense of security.

    Why would a cybercriminal spend a fortune going after a Fortune 1,000 when they can spend a few bucks to crack a small business? Exactly!

    During this live webinar, we’ll explore the types of threats that small and medium businesses face and the business risk associated with these threats. It’s easier to get hacked than you think and it’s only a matter of time before it happens. Will your business be prepared? Are you doing everything you can to protect yourself beforehand?

    Knowing that perfection is not possible, our panel of experts will look at 4 key steps that small and medium businesses should take to reach a reasonable level of cybersecurity:

    - How to conduct an analysis to determine risk and the need to focus on cybersecurity within your business
    - How to assess the cost of a breach, a loss of information and the impact that a cybersecurity event can have on your customers and partners
    - How to create a plan to protect your systems, information, revenue and customers’ data
    - Best practices for guiding your implementation, from segmentation to employee access control policies to information protection controls

    Join us for an extremely informative session geared towards small and medium business owners and their IT staff.

    Sean Martin, CISSP, Editor-in-Chief, ITSPmagazine

    Rusty Sailors, President / CTO at LP3 and Chairman, Protecting Tomorrow
    Russell Mosley, Director, Infrastructure & Security, Dynaxys
    Tom Caldwell, Senior Director of Engineering at Webroot
  • [Breach Prevention] How does Credential Theft Affect Your Organization?
    [Breach Prevention] How does Credential Theft Affect Your Organization? Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks Recorded: Jul 25 2017 52 mins
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • Secure Coding Practices: Avoiding SQL Injection Attacks
    Secure Coding Practices: Avoiding SQL Injection Attacks Zach Jones, Sr. Manager - TRC Static Code Analysis, WhiteHat Security Recorded: Jul 25 2017 57 mins
    SQL injection attacks enable attackers to tamper with, delete or steal sensitive data from corporate databases. In this webinar, Zach Jones, senior manager for static code analysis from WhiteHat Security’s Threat Research Center, will discuss SQL injection attacks and how to best defend against them.

    In this webinar, we will:
    - Provide examples of vulnerable code
    - Discuss data boundary concepts between input and target interpreters
    - Explain the differences and advantages of using parameterized queries versus custom stored procedures
    - Discuss the pitfalls of using selective parameterization or trying to sanitize inputs by escaping or encoding them manually

    WhiteHat Security has extensive experience working with customers to identify and fix the latest web application vulnerabilities. Join us to gain a deeper understanding of common web application vulnerabilities, get expert technical advice on defensive tactics, and learn best practices to safeguard your apps from being exploited.
  • Proofpoint Customer Technical Webinar: Imposter Emails & BEC Attacks
    Proofpoint Customer Technical Webinar: Imposter Emails & BEC Attacks Nathan Chessin - Director Field Sales Engineering, Jason Ford - Sr. Systems Engineer, Nick Sullivan - Sr. Systems Engineer Recorded: Jul 25 2017 50 mins
    More than 90% of targeted attacks start with email fraud. Learn how to gain insight into, and effectively defend against, these attacks.

    Join us for a Proofpoint technical webinar, brought to you by engineers, for engineers.  This session will focus on effectively defending your domains from impostors and fraudsters attacking your organization, your customers and your partners.
    Topics will include:
    • The Threat Landscape
    • SMTP Standards and Evolution
    • Stop Attacks with Visibility & Authentication
    • Configuring Email Protection to help block imposter threat
    • Creating DMARC reporting in less than 10 minutes
  • Mitigate Threats with Context-aware Vulnerability Assessment and Risk Analysis
    Mitigate Threats with Context-aware Vulnerability Assessment and Risk Analysis Anand Visvanathan, Principal Product Manager, Symantec Recorded: Jul 25 2017 60 mins
    Most vulnerability management solutions do little to help security leaders put vulnerability and risk information in the context of business.

    Attend this webcast to learn about the newly released Symantec Control Compliance Suite Vulnerability Manager and how it can help you:

    • proactively identify security exposures

    • analyze business impact

    • plan and conduct remediation

    Register today!
  • Securing Network Equipment with Trust and Integrity
    Securing Network Equipment with Trust and Integrity Steve Hanna, Senior Principal at Infineon Technologies and Michael Eckel, Security Technologist at Huawei Technologies Recorded: Jul 25 2017 57 mins
    Interconnected networks are critical to the operation of a broad and growing range of devices and services, from computers and phones to industrial systems and critical infrastructure.

    The integrity and security of routers, switches, and firewalls is essential to network reliability, as well as to the integrity and privacy of data on these networks. As increasingly sophisticated attacks are launched on network equipment, strong protection mechanisms for network equipment, both on the device and service level, is required.

    TCG recently has issued its Guidance for Securing Network Equipment with use-cases and implementation approaches to solve these problems, designed to help system designers and network architects get the best security possible from this powerful technology.
    Join TCG experts to learn about using device identity, securing secrets, protecting configuration data, inventorying software, conducting health checks, using licensed feature authorization and more.


    Steve Hanna, Senior Principal at Infineon Technologies, currently chairs TCG’s Embedded Systems and IoT groups and driving the effort for a new industrial IoT group within the organization. He has been active in the Industrial Internet Consortium and its security efforts as well. He is the author of several IETF and TCG standards and published papers, an inventor or co-inventor on 41 issued U.S. patents; and holds a Bachelor’s degree in Computer Science from Harvard University.

    Michael Eckel is a Security Technologist at Huawei Technologies. Previously, he was a researcher and software developer at Fraunhofer SIT; mobile software developer at boostix and a web and software developer for a number of other companies. He holds a masters degree in computer science. Eckel currently participates in the Trusted Computing Group’s NetEQ subgroup, working to secure vulnerable network equipment.
  • Smart Stores
    Smart Stores Ken Hosac, VP, Cradlepoint Recorded: Jul 25 2017 44 mins
    Technology is improving retail operations and enhancing the customer experience. The “Smart Store” has come to life with the rise of the Internet of Things, inspiring stores to adopt applications such as digital signage and IoT sensors.  

    Sign up for this webcast with Ken Hosac, Vice President at Cradlepoint, to learn more about how Smart Stores concepts are changing the dynamics of the shopping experience, creating new retail store standards, and how it’s all dependent upon a foolproof network connection. 
  • AI, Machine Learning and the Future of Cybersecurity
    AI, Machine Learning and the Future of Cybersecurity Demetrios "Laz" Lazarikos (Blue Lava) | Sven Krasser (CrowdStrike) | Alex Pinto (Niddel) | Jisheng Wang (Aruba) Recorded: Jul 25 2017 55 mins
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -
    As cyber threats are evolving at a rapid pace, and firewalls and antiviruses are considered antiquated solutions, companies are constantly looking for the most advanced ways to protect their critical data.

    Artificial intelligence and machine learning are now an integral part of cybersecurity. With cyber attacks becoming more serious, and in some cases endangering human lives, artificial intelligence could be the key to security.

    Join this panel of top security experts as they discuss the role of AI and machine learning in cyber attacks, cyber protection and what the future of security looks like.
    - The impact of AI/ML on security
    - Trends in cyber attacks
    - How to best protect against them and secure our critical assets

    - Demetrios "Laz" Lazarikos, Three Time CISO, Founder of Blue Lava

    - Sven Krasser, Chief Scientist, CrowdStrike
    - Alex Pinto, Co-Founder & Chief Data Scientist, Niddel
    - Jisheng Wang, ‎Senior Director of Data Science, CTO Office - Aruba, a Hewlett Packard Enterprise company
  • Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing
    Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing Nenad Merdanovic, Product Manager, HAProxy Technologies Recorded: Jul 25 2017 52 mins
    Application delivery infrastructure resources are increasingly strained. The new features in modern Application Delivery Controllers along with the demands for SSL to comply with search engine ranking algorithms are major contributors to the problem. It means organizations have to find ways to scale their ADCs. But do they scale up? Or scale out? And how?.
    Join us for this live webinar to discover:
    oThe drivers for the requirement of scalable application delivery infrastructure like SSL adoption and expanding ADC feature sets
    oThe pitfalls and limits of vertically scaling your ADC
    oHow you can use equal-cost multi-path (ECMP) routing to horizontally (and nearly infinitely) scale your ADC
    oHow to use Route Health Injection (RHI) to ensure availability of your ADC cluster
    oExamples of organizations who have accomplished this with HAProxy
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Recorded: Jul 25 2017 58 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • GDPR and Open Source: Best Practices for Security and Data Protection
    GDPR and Open Source: Best Practices for Security and Data Protection Daniel Hedley, Partner, Irwin Mitchell; Matt Jacobs, VP and General Counsel, Black Duck Software Recorded: Jul 25 2017 60 mins
    Legislators in Europe continue to expand the scope of the laws governing information security and personal data protection. As a result, organizations serving consumers and businesses in the region need to understand the implications these laws will have on their use of open source to build software applications.

    During this educational webinar led by Dan Hedley, Partner, IT and Commercial from Irwin Mitchell, we’ll provide guidance on the General Data Protection Regulation (GDPR) and why a comprehensive approach to open source security management is essential for GDPR observance. In addition, we’ll review open source management best practices in context of other industry-specific developments like the Network and Information Services Directive and the Electronic Identification Regulation.
  • How Data Governance Holds the Key to GDPR Compliance
    How Data Governance Holds the Key to GDPR Compliance Srikanth Venkat & Ana Gillan, Hortonworks Recorded: Jul 25 2017 61 mins
    The upcoming GDPR legislation represents a sea change for organisations that store or process data relating to EU residents. With penalties for violations up to 4% of annual global turnover, organisations are scrambling to comply with GDPR provisions. Effective data governance and access control helps enterprises manage risk effectively, comply with regulations and gain competitive advantage through agile decision.
    Join Srikanth Venkat, Sr. Director Product Management and Ana Gillan, Solutions Engineer as they discuss effective data governance and its role in complying with regulations such as GDPR. They will also cover Atlas and Ranger, the governance and security components of Hortonworks Data Platform and their role in effective data governance.

    This webinar is not intended to constitute legal advice. Viewers should consult with their own legal counsel regarding compliance with GDPR and other laws and regulations applicable to their particular situation and intended use of any Hortonworks products and services. Hortonworks makes no warranties, express, implied, or statutory, as to the information in this webinar.
  • The Top 4 Ways Vulnerabilities Get Into Your Software
    The Top 4 Ways Vulnerabilities Get Into Your Software Colin Domoney, Consultant Solutions Architect - Veracode Recorded: Jul 25 2017 32 mins
    Why is software so riddled with security defects? Are developers to blame? Is it just the nature of software? We’ve found that there are four primary ways that vulnerabilities end up in your software. Understanding these sources and how to prevent them is a good first step in making your apps less like a red carpet for cyberattackers, and more like a moat.

    Benefits of attending:
    1.Learn how vulnerabilities are getting in your code and how to keep them out from a VP of Engineering
    2.Gain actionable tips and advice on application security– from a development manager who lives it day to day
    3.Move beyond the buzz about the insecurity of open source components – what is the solution?
    4.Identify the best ways to help developers learn to code more securely
    5.Gain insight from the latest research into which languages are introducing what vulnerabilities
  • Does your data security create more pain than it solves? 5 steps to get it right
    Does your data security create more pain than it solves? 5 steps to get it right Raju Verranna, Pre Sales Engineer Recorded: Jul 25 2017 36 mins
    Protecting sensitive client and corporate data is one of the most important responsibilities in any organization. So if your current solution isn’t working for all stakeholders, is it really working at all?

    Key learning:
    1. Increase security and compliance, while maintaining user-friendliness
    2. Deploy encryption without interrupting normal business processes
    3. Ease the daily burden of your data security administration
  • The Human Factor 2017
    The Human Factor 2017 Adenike Cosgrove, Cybersecurity Strategist at Proofpoint , Davide Canali - Senior Threat Analyst Proofpoint Recorded: Jul 25 2017 47 mins
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Mega Breaches: How to mitigate your risks using Data-Centric Security?
    Mega Breaches: How to mitigate your risks using Data-Centric Security? Heidi Shey, Senior Analyst, Forrester and Nico Popp, Senior Vice President, Information Protection, Symantec Recorded: Jul 25 2017 57 mins
    What steps are you taking to minimise your risk of becoming a data breach victim? In this webinar, Symantec and a guest speaker from Forrester share best practices to proactively protect your critical data with data-centric security.

    Get advice on preventing data breaches from these industry experts:

    • Guest Speaker Heidi Shey, Senior Analyst, Forrester. Heidi serves Security & Risk Professionals with solutions for data security and privacy. She also researches sensitive data discovery, data loss prevention, cybersecurity, customer-facing breach response and more.

    • Nico Popp, Senior Vice President, Information Protection, Symantec. Nico is the former CTO of VeriSign Security Services where he led efforts to develop new products and services for Trust Services and Identity Protection.

    Join these authorities as they explain how a holistic approach to data security and identity puts you back in control.
  • CDL Launch Video
    CDL Launch Video Cloudwick CDL Recorded: Jul 24 2017 2 mins
    Learn how CDL Enhances, Extends & Enables new capabilities for your SIEM, EDR, IDS, IPS, NTA, EUBA and ML solutions at scale.
  • Take Your AWS Cloud Investment to the Next Level
    Take Your AWS Cloud Investment to the Next Level Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Jul 24 2017 37 mins
    AWS cloud is one of the leading cloud providers in the market—and Amazon solutions like Trusted Advisor, Cost Explorer, CloudTrail, CloudWatch, and Inspector can help organizations begin to manage their IaaS infrastructure more efficiently. However, the valuable data provided by these services can be more efficiently leveraged with tools that offer deeper visibility and control.

    Join us to learn tools and tips to take your AWS investment to the next level, including:

    - Forecasting and tagging tips to predict and optimize cloud spend
    - A comprehensive approach to monitoring to ensure secure and compliant infrastructure
    - Proactive risk detection and automated remediation tactics
  • Threat Lab Presents: Q1 Internet Security Report
    Threat Lab Presents: Q1 Internet Security Report Corey Nachreiner, CTO, and Marc Laliberte, Information Security Threat Analyst Jul 26 2017 4:00 pm UTC 60 mins
    The Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network. The team analyzes data from WatchGuard’s Firebox Feed, internal and partner threat intelligence, and a research honeynet, to provide insightful analysis about the top threats on the Internet.

    What types of malware do we catch most often in the wild? Which network services do attackers commonly target? What are the most popular attacks in different regions of the world? Join Corey Nachreiner, CTO, and Marc Laliberte, Information Security Threat Analyst, on July 26th as they explore their key findings from the first quarter of 2017.
  • Hacking Diversity in Cybersecurity
    Hacking Diversity in Cybersecurity Joyce Brocaglia (Alta Associates, EWF) | Jason Painter (Queercon) | Angela Messer (Booz Allen Hamilton) | Suzanne Hall (PwC) Jul 26 2017 4:00 pm UTC 60 mins
    - Broadcast LIVE on Wednesday 7/26 @ 9:00 am PDT from Las Vegas during Black Hat 2017 -
    Cybersecurity investment has gone through the roof in recent years. Yet, there is a global shortage of qualified professionals to fill a growing number of open cybersecurity roles. According to a recent study by Frost & Sullivan, the global cybersecurity workforce will be short by around 1.8 million people by 2022.

    How do organizations cope with the growing demand for security professionals, especially in an age of ever-expanding attack surface and more frequent and sophisticated cyber attacks?

    Join this live video panel of experts as they discuss the current trends shaping the cybersecurity industry, the need for diversity and inclusion, and strategies enterprises can employ to stay ahead of the game.

    - Joyce Brocaglia, Founder/CEO of Alta Associates & Founder of the Executive Women's Forum

    - Angela Messer, Senior Partner, Cyber Business and Talent Lead, Booz Allen Hamilton
    - Jason Painter, Co-Founder & President of Queercon, the largest social network of LGBT hackers in the world
    - Suzanne Hall, Managing Director, Advisory Services, PwC
  • Tech Demo - AWS Container Security with SecureSphere
    Tech Demo - AWS Container Security with SecureSphere Giora Omer - Principal Engineer, Natasha Gupta - Product Marketing Manager Jul 26 2017 5:00 pm UTC 45 mins
    Containers are exponentially growing as an agile and efficient way to deploy applications on the cloud. This opens new security challenges for cloud environments. In this session, learn about how Imperva SecureSphere can protect applications leveraging Amazon’s EC2 Container Service (ECS) and walk through a brief demonstration on configuring SecureSphere alongside applications using ECS.
  • End the IT Blame Game
    End the IT Blame Game Moderator: Isaac Roybal, Presenter: Matt Cauthorn Jul 26 2017 5:00 pm UTC 60 mins
    Network engineers and system administrators can spend a great deal of time responding to user complaints and troubleshooting slow performance issues that are difficult to diagnose or replicate. Resolving those issues can be especially problematic if those applications are provided by a third-party vendor or hosted by third parties, such as SaaS EMR applications, claims processing applications, and practice management applications. Often, IT teams do not have enough visibility to determine root causes or to counter claims from third-party vendors and managed service providers that host applications. With real-time insight into end-user experience for these hosted applications, including application-level transaction details, IT teams can hold vendors accountable and identify root causes faster.

    Learn how ExtraHop helps you identify the root cause of your IT problems, avoiding unnecessary friction among your IT teams and ransomware by providing full, real-time visibility into which devices are accessing network share and what type of behavior they are exhibiting, backed by machine learning for immediate anomaly detection.
  • Endpoint Detection and Response is not enough
    Endpoint Detection and Response is not enough Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Jul 26 2017 5:00 pm UTC 45 mins
    Traditional Endpoint Protection (EPP) products have failed to detect advanced malware that easily evade signature-based antivirus solutions. To counteract this problem, Gartner reports that 100% of EPP solutions will incorporate Endpoint Detection and Response (EDR) capabilities, focused heavily on security analytics and incident response.

    Even so, customers are realizing that protecting endpoints alone is not enough to prevent security breaches. That’s where a managed detection and response (MDR) service comes into play. MDR provides 360-degree visibility into endpoints and security devices, and offers 24/7 network monitoring.

    In this webinar, you will learn:
    - What EDR vendors offer beyond EPP solutions
    - Why Endpoint Detection and Response alone is not enough
    - How Managed Detection and Response (MDR) makes up for EDR shortcomings
  • [Breach Prevention] Disrupting Credential-based Attacks
    [Breach Prevention] Disrupting Credential-based Attacks Martin Walter, Product Line Manager, Palo Alto Networks Jul 26 2017 5:00 pm UTC 60 mins
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • Power To The People - Knowledge Is Power
    Power To The People - Knowledge Is Power Debra Farber, ITSPmagazine | Chris Roberts, Acalvio | Dr. Christopher Pierson, Viewpost | Arun Vishwanath, SUNY Buffalo Jul 26 2017 6:00 pm UTC 60 mins
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -
    As a society, we continue to focus on the capabilities that new technological products and services bring to bear, leaving the security - or rather, the safety - conversation for a later date and time… if at all.

    Why is this? Perhaps it’s because we don’t care. Or, perhaps it’s because we don’t understand how things work. Or, maybe it’s because we don’t know all the technical mumbo jumbo. Or, it could just be that we expect “someone else” to take care of it for us. For example, every car has a seat belt, right? We don’t have to ask for the car dealer to add seat belts for us and there really aren’t different types of seat belts available in the commercial car arena. Cars just come with seat belts - period. We expect them to be there - even if some people choose to not wear them.

    Regardless of the reason(s) behind the lack of conversation surrounding cybersecurity, we should all be able to agree on one simple fact: we use these new gadgets and services completely unfettered - with little to no regard to the risks we face for our privacy and even our safety.

    Attend this session to gain the initial knowledge necessary by:
    - Learning to ask is this thing secure?
    - Understanding how or why it is or isn’t safe to use.
    - Identifying your role in your own cyber safety and that of those around you.

    It’s time to open our eyes and become aware of our surroundings. Join us to become aware.

    - Debra Farber, Host of The Privacy Pact, ITSPmagazine

    - Chris Roberts, Chief Security Architect, Acalvio Technologies
    - Dr. Christopher Pierson, CISO, Viewpost
    - Arun Vishwanath, Associate Professor at SUNY Buffalo & Black Hat Presenter
  • It’s Time To Take Charge Of Our Digital Future
    It’s Time To Take Charge Of Our Digital Future Ariel Robinson, ITSPmagazine | Jay Beale, Inguardians | Jessy Irwin, Jessysaurusrex | Mzbat Jul 26 2017 9:00 pm UTC 60 mins
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -
    Disruptors and visionaries across the globe are pushing the boundaries of science and technology, economics and industry, healthcare, policy, communications, and governance. From these advances emerge new career paths, educational disciplines, and opportunities for creation and discovery.

    But things don't always work the way we expect them to, and the consequences of disruption are impossible to predict. What is sacrificed for the sake of efficiency or convenience? Who gets to make that call? Whose fault is it when pre-teens get radicalized online, or health records get misused for unauthorized research? And whose job is it to prevent that from happening? Is prevention even possible?

    Individuals, enterprises, and society writ large have the right and responsibility to proactively shape and secure the future, but our ability to do so is at risk. As technology continues to proliferate without being well understood, people who fall victim to its failure or misuse feel more and more disempowered to prevent future damage. This is The Tech Effect: the complacency driven by the complexity of the technology ecosystem, and a rejection of responsibility for individual and collective safety, security, and ethics.

    It’s time to take charge of our digital future.

    Join us for this lively conversation as the experts explore the following:

    - What is a technology ecosystem?
    - Who are the players?
    - What are their roles?
    - What are the challenges with security and privacy?
    - What are the challenges with ethics? How do they compete with capability, capitalism, security, and privacy?
    - What might the long-term impact on humanity be?

    - Ariel Robinson, Editor & Host, The Tech Effect, ITSPmagazine

    - Jay Beale, CTO & COO, InGuardians
    - Jessy Irwin, Security Empress at Jessysaurusrex
    - Mzbat
  • A Brief History of Ransomware
    A Brief History of Ransomware Alex Tilley, Senior Information Security Consultant and Dan Eden, IT Security & Risk Consultant Jul 27 2017 4:00 am UTC 60 mins
    With the recent global attacks of WannaCry and NotPetya, ransomware has taken the headlines in a massive way. But this is nothing new, the 2014 Crypto locker attacks still in the back of the minds of many organisations. In order to help organisations understand ways to cope with ransomware attacks SecureWorks very own CTU e-crimes lead, Alex Tilley, and senior incident responder, Dan Eden will discuss a brief history of ransomware. Discussing where ransomware originated, some examples of attacks from times gone by and discuss the what, the how, the why, and the who of some of these attacks. Alex and Dan will also provide some tips and tricks to give your organisation the ability to reduce the risk of ransomware affecting your organisation.
  • An Exciting Day in the Life of a Risk Manager! - Really!
    An Exciting Day in the Life of a Risk Manager! - Really! Amar Singh, Chris Payne, Dom Saunders Jul 27 2017 1:00 pm UTC 60 mins
    Policy? We have a policy? Have you read the policy? Thats right...who actually reads company policies?

    Risk and compliance managers globally have lost the fight against user policy acceptance leading to increasing organisational risk and the decreased ability to stand up and demonstrate effective compliance to regulatory bodies.

    Does it have to be this way? In this webinar, we

    * Demo what we use to transform and make mainstream what is often boring and ignored.

    * Show how you can effectively measure (yes measure and report) on how effective your policy implementation is.

    * Better engage and enforce your policies with third parties.
  • Secrets of the Superstar CISO
    Secrets of the Superstar CISO Jake Olcott, VP of Strategic Partnerships, BitSight; Chris McClean, Vice President, Research Director, Forrester (Guest) Jul 27 2017 3:00 pm UTC 60 mins
    As business success grows more reliant on data, technology, and third parties, CISOs and security leaders are finding themselves more often in the spotlight. They're being asked to brief board members, respond to third party requests, guide critical decisions, and make tough strategic calls. These increasing expectations are creating great opportunities for CISOs to shine, but to do so, they need to rise to the occasion. This webinar takes best practices and lessons learned from "superstar" CISOs, explaining what top security leaders are doing to lead their companies successfully through some of today's most complex business and technology challenges.
  • Cyber-Threat Report 2017 - Selected Case Studies from Darktrace
    Cyber-Threat Report 2017 - Selected Case Studies from Darktrace Andrew Tsonchev, Director of Cyber Analysis and Bethany Edgoose, Lead Research Analyst Jul 27 2017 3:00 pm UTC 30 mins
    Over the course of the past year, cyber-attacks have frequently made headlines. In 2017 alone, global ransomware damage costs are expected to exceed $5 billion, with the total cost of cyber-crime expected to reach trillions of dollars.

    Darktrace has detected over 30,000 in-progress cyber-threats, and has firsthand experience with modern, never-before-seen attacks, including fast moving ransomware, new strains of malware, compromised IoT devices, malicious insiders, attacks on cloud environments, and more.

    Join our Director of Cyber Analysis, Andrew Tsonchev, and our Lead Research Analyst, Bethany Edgoose, as they present Darktrace's 2017 Threat Report, review novel cyber-attacks, and break down how they were detected by the Enterprise Immune System.
  • Security a Revenue Center: How Security Can Drive Your Business
    Security a Revenue Center: How Security Can Drive Your Business Joe DiPietro Jul 27 2017 3:00 pm UTC 60 mins
    Traditionally Security was viewed as necessary cost center or an insurance policy you hoped you’d never have to cash in. Yet by automating security policy management you can actually save your organization both time and money and even enable and support the revenue generation processes.

    Presented by Joe DiPietro, SE Director, this technical webinar will provide an overview of how automated security policy management goes beyond providing ROI and cost savings, to directly impacting business productivity and agility.

    This webinar will:

    * Highlight the security policy processes that can be automated, including challenges, benefits, planning and prioritization considerations.
    * Provide an overview of the security management maturity model and highlight opportunities for automation and optimization for each stage of the model.
    * Dissect and assess cost saving and revenue generation opportunities for specific key challenges including security change management, risk management, application migration, and auditing and compliance.
  • CSPs must adopt turnaround strategies to transform customer/employee experience
    CSPs must adopt turnaround strategies to transform customer/employee experience Ken Jacobsen, Group Sales Director, Media and Comms & Rob Allman, Group General Manager, Customer Experience, Dimension Data Jul 27 2017 3:00 pm UTC 45 mins
    CSPs need to engage turnaround strategies to transform customer and employee experience issues across the sector. This will turn current challenges into positives for 2018 and beyond! The latest CX benchmarking report provides insightful findings about the top issues and how to address them through innovative solutions and services.

    According to Joe Manuele, Dimension Data’s Group Executive, CX and Collaboration said: “The world has formed a digital skin and business, service, technology and commercial models have changed forever. However, organisations are strategically challenged to keep pace with customer behaviour.” Join us for this webinar where we’ll be discussing the CSP specific findings from the report.
  • Expert Panel: Bug Bounty Trends and What They Mean
    Expert Panel: Bug Bounty Trends and What They Mean Casey Ellis, Founder & CEO, Bugcrowd Jeremiah Grossman, Chief of Security Strategy, SentinelOne HD Moore, Founder of The Meta Jul 27 2017 4:00 pm UTC 60 mins
    Traditional methods for vulnerability discovery are failing us. With rapidly expanding attack surfaces, motivated adversaries, and the growing shortage of full-time infosec professionals, organizations are fighting a losing battle. One thing is clear: We need a new approach.

    Enter the Bug Bounty model. Bug bounties have quickly evolved from a “nice to have” to a “must have” for most application security teams.

    What’s behind this trend? Why are bug bounties growing, and why now?

    Join our expert panel as we discuss the key findings from The 2017 State of Bug Bounty Report.

    - Casey Ellis, Founder & CEO of Bugcrowd
    - Jeremiah Grossman, Chief of Security Strategy at SentinelOne
    - HD Moore, Founder of The Metasploit Project
  • Time for Banks to Reassess Their Risk of DDoS Attacks
    Time for Banks to Reassess Their Risk of DDoS Attacks Tom Bienkowski, Director of DDoS Product Marketing, Arbor Networks Jul 27 2017 4:00 pm UTC 45 mins
    A study by McKinsey suggests the increased operational risk of digital innovation threatens 6% of the net profit for a retail bank. Renowned hactivist group Anonymous’ OpIcarus; a Distributed Denial of Service (DDoS) attack siege on the world’s banking infrastructure and other well publicized successful attacks have exposed just how vulnerable banks are to such threats. The reality is modern day DDoS attacks are getting more frequent, more sophisticated, and are commonly used as a distraction during the data exfiltration stage of advanced threat campaigns. The unfortunately reality is that in many cases, these attacks succeed because the targets were simply inadequately prepared to stop them.

    Join this webcast to learn:
    •The latest trends in DDoS attacks.
    •Commonly overlooked costs due to DDoS attacks.
    •And best practices in DDoS attack defense.
  • The Cost of Insecure Endpoints – New Findings from Ponemon Institute
    The Cost of Insecure Endpoints – New Findings from Ponemon Institute Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute & Richard Henderson, Global Security Strategist, Absolute Jul 27 2017 5:00 pm UTC 60 mins
    Just how dangerous, inefficient, and ineffective are the endpoint security solutions used in most organizations today? Ponemon Institute independently surveyed hundreds of IT security professionals to find out — and are ready to share the surprising results in this important webinar.

    On July 27th, join founder and chairman, Dr. Larry Ponemon, and Richard Henderson, global security strategist at Absolute, for an interactive webinar on the results, including:

    • Exposing the largest dangers and greatest inefficiencies with endpoint security management today
    • Average financial and productivity costs associated with insecure systems – and how to mitigate in your organization
    • Steps you can take now to prevent attacks and stay compliant
  • "Cloud-First" Ransomware - A Technical Analysis
    "Cloud-First" Ransomware - A Technical Analysis Bob Gilbert and Sean Hittel of Netskope Jul 27 2017 5:00 pm UTC 60 mins
    Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months. Why?  Because many organizations don't inspect their cloud SSL traffic for malware and the same functionalities of the cloud dramatically increase productivity (sync, share, collaborate, etc) also provide ransomware developers with a perfect medium for faster delivery of malware payloads to more targets.

    Join Netskope chief evangelist, Bob Gilbert, and Threat Detection Engineer, Sean Hittel, for a fascinating look at how malicious actors now design ransomware to make best use of popular cloud services to hide in plain sight, and do more damage in less time. 
    Bob and Sean will provide technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and how to defend against them.  These include:
    • Virlock, which encrypts files and also infects them, making it a polymorphic file infector 
    • CloudFanta, which uses the SugarSync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities
    • CloudSquirrel, which takes advantage of multiple cloud apps throughout the ransomware kill chain with the intent to steal and exfiltrate user data
    • The Zepto variant of Locky ransomware, now distributed both by popular cloud storage apps and via DLL
  • Not All Endpoint Protection Platforms Are Created Equal
    Not All Endpoint Protection Platforms Are Created Equal Torry Campbell, Senior Director Product Management, Symantec Jul 27 2017 5:00 pm UTC 60 mins
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack
    [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Jul 27 2017 5:00 pm UTC 60 mins
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.