Hi [[ session.user.profile.firstName ]]

IT Security

  • Securing the Gaming Industry
    Securing the Gaming Industry Alex Winterflood Recorded: Apr 26 2017 30 mins
    Managing user privileges is an important aspect of comprehensive information security. Ideally, employees should only have access to the data and systems necessary to carry out their role. The problem is that unmanaged privileged accounts can lead to all sorts of problems for a business.

    Think of a privileged account as an access-all-areas pass to confidential business data and systems, allowing users to grant broad access rights that often go far beyond what is needed for that job function. Monitoring the actions of users is therefore paramount for security and compliance.
  • Reduce time to detect and respond to cyber threats - without adding resources
    Reduce time to detect and respond to cyber threats - without adding resources Chris Martin, LogRhythm Security Expert Recorded: Apr 26 2017 48 mins
    Today’s reality is that organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

    In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

    You’ll learn:

    • The definition and details of the TLM framework
    • How TLM enables you to sort through the noise to highlight and investigate concerning incidents
    • How TLM works to streamline processes through automated workflow
    • Specific use cases TLM can address to prevent major data breaches

    Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).
  • SecureMail with Salesforce
    SecureMail with Salesforce Matt Signorello Recorded: Apr 25 2017 4 mins
    This short video provides an overview of how to integrate the DataMotion secure email platform with Salesforce. The platform allows users and developers to easily send sensitive data in and out of Salesforce in a secure manner.
  • Cloudera Government Forum Livestream Afternoon Sessions
    Cloudera Government Forum Livestream Afternoon Sessions Cloudera Recorded: Apr 25 2017 106 mins
    Exploring the path to a more data-driven government will be the focus of the 2017 Cloudera Government Forum, planned for April 25, 2017. Government organizations have enormous data resources. Agency leaders and program management professionals seek practical, secure, and effective methods to extract the valuable information captured in their data repositories—from legacy systems to real-time.

    In its sixth year, the Cloudera Government Forum is an annual gathering to discover what’s new and what’s next for data management and advanced analytics strategies that can be applied for an immediate and positive impact on organizations and missions. Participants learn how they can leverage standards-based, cloud-enabled, and open source data strategies for meaningful digital transformation.
  • Beyond Deployment Velocity: How Technology & Process Increase DevOps Success
    Beyond Deployment Velocity: How Technology & Process Increase DevOps Success Adrian Lane, CTO, Securosis, Jeff Craty, Dir. of Engineering, Veracode, & Tim Jarrett, Sr Dir. of Product Mktg at Veracode Recorded: Apr 25 2017 61 mins
    DevOps increases teamwork, visibility and overall software quality. Yet, integrating security can be challenging for cultural and technological reasons.

    This webinar, featuring Adrian Lane of Securosis and Tim Jarrett and Jeff Cratty of Veracode, dives into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps, and discusses the challenging process and technical requirements for integrating security into DevOps.

    Learn how you can have both development velocity and security without compromising either one.
  • Tackle Your Toughest Security Challenges at Ignite 2017
    Tackle Your Toughest Security Challenges at Ignite 2017 Joerg Sieber, Director, Product Marketing, Palo Alto Networks Recorded: Apr 25 2017 34 mins
    Join this webinar for a sneak preview of the content you can expect at Ignite 2017 in Vancouver, BC, Canada, June 12-15, 2017. This year will be the biggest and most advanced Ignite yet! We are expecting over 4,000 security experts gathering in beautiful Vancouver to tackle their toughest security challenges through a four-day program of hands-on educational sessions, peer-to-peer networking and multiple opportunities to explore all the capabilities and technologies of the Palo Alto Networks Next-Generation Security Platform, which is designed to put an end to the era of breaches by safely enabling applications and providing cyberthreat prevention measures at all steps in the cyberattack lifecycle. Space is limited, and you won’t want to miss this unique event, so sign up today at www.paloaltonetworksignite.com
  • Next Generation Defense in Depth Model
    Next Generation Defense in Depth Model Tari Schreider, CCISO, Chief Cybersecurity Strategist & Author, Prescriptive Risk Recorded: Apr 25 2017 64 mins
    This session will focus on presenting a next generation defense in depth model and answer the question on many CISO’s minds - is it still relevant? A model of defense in depth will serve as a backdrop to introduce you to a wide range of solutions from across the cybersecurity industrial complex that just may change how you view your defense in depth approach.
  • Secure Your Leaky Mobile Apps: Discovery & Remediation
    Secure Your Leaky Mobile Apps: Discovery & Remediation Andrew Hoog, CEO of NowSecure & Setu Kulkarni, VP Product Management at WhiteHat Security Recorded: Apr 25 2017 55 mins
    Mobile devices are everywhere throughout the workplace, and outside the workplace, but mobile phone security as a discipline has been focused on parts of the solution such as WiFi connections, anti-virus and spyware. Mobile security apps are everywhere - but what are they securing? What is the actual security impact to your organization of insecure mobile app usage? For meaningful risk management, you need to understand both the qualitative and quantitative values of mobile security risk.

    Join WhiteHat Security and our technology partner NowSecure for a discussion on leaky apps, and how they can expose private and sensitive data - but more, what kind of data can be exposed.

    We’ll review how insecure mobile applications can create incidents, and how they impact the enterprise or organization. Finally, we will introduce you to the different ways WhiteHat can help you build mobile security into your larger DevSecOps and vulnerability management programs.

    About the Presenters:
    Andrew is the Co-founder and CEO of NowSecure. As a former CIO, Andrew has unique insight into solving enterprise mobile security problems and is driven by NowSecure’s mission to advance mobile security worldwide. He is responsible for the vision, strategy and growth of the company.

    Setu Kulkarni is the VP of Product Management at WhiteHat Security. Setu is responsible for product vision, strategy, and direction at WhiteHat Security. Setu joins the WhiteHat leadership team after a 10+ year stint at TIBCO Software Inc., where he most recently led product management and strategy for the Operational Intelligence product portfolio.
  • Walk this way - First steps towards firewall automation
    Walk this way - First steps towards firewall automation Erez Tadmor, Senior Product Manager, Tufin & Joe Schreiber, Technical Director, Business Development, Tufin Recorded: Apr 25 2017 61 mins
    Automation systems bring a great deal of value. Having the ability to produce better, faster, and more reliable results can go a long way in improving business agility and simplifying day-to-day tasks. Firewall automation also helps tighten security posture and ensure continuous compliance with internal policies and industry regulations.

    Tufin presents the recommended steps to start your journey towards firewall automation. Join us for the first webinar of the series, focusing on rule decommissioning, to learn how you can initiate an immediate and substantial impact on your organization.
  • How to Avoid Business Outages from Misconfigured Network Devices
    How to Avoid Business Outages from Misconfigured Network Devices Joe DiPietro, SE Director at AlgoSec Recorded: Apr 25 2017 36 mins
    A single change to a network device can have far reaching effects on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill – as we have recently seen in the news!

    This technical webinar will walk you through a variety of scenarios that can cause device misconfigurations, including a basic device change, business application connectivity changes, and data center migrations. It will provide both best practices and demonstrate specific techniques to help you understand and avoid misconfigurations and ultimately prevent damage to your business, including how to:

    * Understand and map your enterprise infrastructure topology before you make a change
    * Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    * Common mistakes to avoid when making changes to your network security devices
    * How to better understand business requirements from the network security perspective
  • Five Ways to Transform Your IT With Analytics and Machine Learning
    Five Ways to Transform Your IT With Analytics and Machine Learning Priya Balakrishnan, Director, Solutions Marketing at Splunk; Alok Bhide, Director, Product Management at Splunk Recorded: Apr 25 2017 69 mins
    The status quo of old monitoring solutions and approaches can't handle today's complex, highly distributed service-oriented architectures. We’ve all tried implementing solutions in the past, expecting that they’d offer more visibility and control. But eventually all we got was just one more tool to maintain that didn't provide much value.

    Splunk IT Service Intelligence (ITSI) solves this problem. The solution delivers an advanced data-centric approach to service monitoring driven by machine learning and analytics—taking operations and service intelligence to the next level.

    Join us in this webinar for a live demo to see how you can:
    - Gain service context by combining event and performance data
    - Get the big picture of your environment to streamline operations
    - Accelerate root-cause analysis and get ahead of customer-impacting outages
    - Prioritize incident investigation and reduce time-to-resolution with events analytics
    - Understand how analytics and machine learning can enhance service intelligence

    Featured Speakers:
    Priya Balakrishnan, Director, Solutions Marketing at Splunk
    Alok Bhide, Director, Product Management at Splunk
  • Cloudera Government Forum Livestream 2017
    Cloudera Government Forum Livestream 2017 Cloudera Recorded: Apr 25 2017 177 mins
    Exploring the path to a more data-driven government will be the focus of the 2017 Cloudera Government Forum, planned for April 25, 2017. Government organizations have enormous data resources. Agency leaders and program management professionals seek practical, secure, and effective methods to extract the valuable information captured in their data repositories—from legacy systems to real-time.

    In its sixth year, the Cloudera Government Forum is an annual gathering to discover what’s new and what’s next for data management and advanced analytics strategies that can be applied for an immediate and positive impact on organizations and missions. Participants learn how they can leverage standards-based, cloud-enabled, and open source data strategies for meaningful digital transformation.
  • Is Your Organisation GDPR Ready?
    Is Your Organisation GDPR Ready? Steve Durbin, Managing Director, ISF LTD Recorded: Apr 25 2017 49 mins
    Many organisations are still unclear as to how they will meet the requirements of the EU GDPR legislation which will come into effect in May 2018. Fundamentally organisations need to start preparing for this now.

    In this webinar Steve addresses some of the key questions organisations are asking such as: does the EU GDPR regulation apply to me? how should I prepare for this legislation? and what additional resources do I need?
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review
    Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Jay Kane, VP Cyber Security & Mike Semaniuk, CISSP Systems Engineer, Palo Alto Networks Recorded: Apr 25 2017 52 mins
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
  • Going Beyond His/tory: The Female Storytellers Shaping Immersive Tech
    Going Beyond His/tory: The Female Storytellers Shaping Immersive Tech Luciana Carvalho, VR Evangelist Recorded: Apr 25 2017 48 mins
    Humans have shared gathered around and communicated through stories throughout history. Text, pictures, images and videos have sought to capture our imagination, or portray the non-fictional in a relatable way. Now, as we move beyond the 2D flat screen to new ways of interacting/communicating with the world — virtual and augmented reality, for example — we begin to see the power of immersion in storytelling, and the impact it has, beyond anything we have ever seen, on those in the receiving end. Arguably, the ultimate empathy machine.

    As we shape the next 'Information Age', and given the state of the world today, never before have we been in more need of putting ourselves in other people’s shoes, and empowering diverse and inclusive voices worldwide. Never before have we seen more women jump at the opportunity to lead and make content that is all-encompassing, that touches and inspires, and that aims to build bridges not walls. Here is their story.

    Learner, maker, systems thinker, innovator and tech evangelist, Luciana splits her time between growing the Realities Centre London — a new innovation space, incubator and academy for B2B/enterprise VR, AR, MR and AI — and Unfold UK, promoting women/diversity in future in the UK. Passionate about VR and tech for good, she carries ongoing research on the possibilities and challenges immersive tech presents as re neuroscience, empathy and female empowerment.

    She was elected one of Code First Girls ‘25 Ones to Watch’, 'Top 5 Female Role Models in the Tech Industry', and Virtual Perceptions' 'Heroes of VR' in 2016.
  • Part II – How to get started with GDPR & Applying Appropriate Security Controls
    Part II – How to get started with GDPR & Applying Appropriate Security Controls Jason Hart, Gemalto, Lisa Bentall, DQM GRC, Adrian Davis, (ISC)² EMEA, Nathaniel Ford, (ISC)² EMEA Recorded: Apr 25 2017 62 mins
    As a follow-up to our previous webinar, this panel discussion will dive into further detail about the GDPR. Presented by compliance experts Lisa Bentall (DQM GRC) and Jason Hart (Gemalto) we will answer some of the big questions raised in the previous webinar and open up to the live audience for an interactive Q&A.