Hi [[ session.user.profile.firstName ]]

IT Security

  • Protecting your Digital Way of Life and 2018 Security Trends
    Protecting your Digital Way of Life and 2018 Security Trends Greg Day, VP & CSO, EMEA, Palo Alto Networks Recorded: Apr 20 2018 50 mins
    The way we consume IT is changing in a big way and this is being driven, in no small part, by the continued prevalence of cloud computing.

    How are these changes transforming your business and the landscape you operate in? What do these changes mean for the future?

    Join Greg Day, VP and Chief Security Officer for Palo Alto Networks EMEA as he takes us through the transforming world of IT consumption and what the impacts are for Digital Way of Life and cybersecurity.

    Greg will take us through what trends we have witnessed in recent years, as well as what we can expect in the future - focusing on the fast-changing world of IT consumption, digital transformation and of course what these mean for cybersecurity.
  • Panel: IoT Empowering Digital Transformation with Cloud Security
    Panel: IoT Empowering Digital Transformation with Cloud Security Stuart Davis, Kelvin Rorive, Romain Fourchereau, Markus Handte & Andrew Shepherd Recorded: Apr 20 2018 50 mins
    To catalyse digital transformation, business and IT leaders are embracing the Internet of Things (IoT). The IoT is empowering businesses and consumers to connect to the Cloud, applications, and services. Most importantly - to handle the deluge of data they collect, consume, and analyse. In this context, the role of Cloud security and actionable intelligence is highly significant.

    Take a virtual seat on this cross-industry panel discussion covering the Internet of Things as one of driving forces behind Digital Transformation. The panellists will exchange their experiences and how their organizations approach cloud security and have changed their security strategy to actionable intelligence.

    Panellists;
    * Romain Fouchereau, IOT Analyst IDC
    * Markus Handte, Director of Systems Engineering EMEA ForeScout Technologies
    * Kelvin Rorive, Manager IT Security operations & Threat at Rabobank
    * Stuart Davis, Director of Global Services & Intelligence

    Moderated by;
    * Andrew Shepherd, Palo Alto Networks
  • Career Conversations: Julia Hermann, Global Information Security Analyst
    Career Conversations: Julia Hermann, Global Information Security Analyst Julia Hermann, Information Security Analyst at Giesecke & Devrient GmbH Recorded: Apr 19 2018 61 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guests: Julia Hermann, Information Security Analyst at Giesecke & Devrient GmbH

    Hosted by Elena Steinke, Board Member of the Women's Society of Cyberjutsu

    About the Speaker:
    Julia Hermann brings more than 15 years of experience in systems engineering, IT security and information security management. She started off her career at a large German Telco provider in the field of IT security consulting, developing and implementing security solutions for large international customers. Afterwards, she spent the longest time of her career at an agency of the European Union as Information Security and Risk Officer, establishing IT security from the moment of its foundation.

    Currently, as Information Security Analyst within the corporate security department of an international company in Munich, her main tasks involve assessment of requirements and technical conception of security solutions as well as threat intelligence, security incident management and audits.

    Being a certified CISSP and CISM, she contributed to the foundation of the (ISC)2 Chapter Germany. Previously as a member and since May 2017 as lead of the ISACA Germany Chapter working group on information security, she co-authored the Implementation Guideline ISO/IEC 27001:2013 and participated to the development of the 2-day certification course “Information Security Practitioner.”
  • Making Security Cloud-Friendly
    Making Security Cloud-Friendly Nathan McKay and Robert Haynes Recorded: Apr 19 2018 61 mins
    Security in the cloud vs. cloud security – whose job is it anyway? According to F5 Labs researchers, 86% of successful data breaches begin with compromises of the application layer services or user identities – placing responsibility for app security squarely in the hands of the app owners, developers, and enterprises deploying them. Application security can be difficult and daunting, but it doesn’t have to be.

    The cloud paradigm has made infrastructure easy for lots of us, and application security is poised to follow suit with advanced security tools now more affordable and accessible than ever via your favorite cloud du jour. We’ve reached a new inflection point where security tools once seen as costly and burdensome can now be seen as business enablers.
  • Best Practices for Effective Endpoint Security
    Best Practices for Effective Endpoint Security Chris Kisselburgh, security engineer, Cloud Harmonics & Joel Boyd, senior product marketing manager, Palo Alto Networks Recorded: Apr 19 2018 63 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • How to Harden Your MFA with Machine Learning
    How to Harden Your MFA with Machine Learning Merritt Maxim, Senior Forrester Analyst, Forrester Research, Al Sargent, Sr. Product Marketing Director, OneLogin Recorded: Apr 19 2018 57 mins
    For security teams who need to reduce the risk of account takeovers, static multi-factor authentication (MFA) is a thing of the past for catching new security risks. Legacy MFA providers that use static rules miss high-risk login and miss security risks. Machine intelligence is now required to determine whether to prompt users for MFA using a broad set of inputs, including networks, geography, devices and time.

    Learn how to detect a broader set of attacks and strengthen your company’s security posture.

    In this learning session, OneLogin’s Al Sargent joins Forrester Senior Analyst, Merritt Maxim to dissect the current state of MFA and highlight the role of machine learning to advance the state of corporate security.
  • Securing Business-Critical Applications on Google Cloud Platform
    Securing Business-Critical Applications on Google Cloud Platform Jigar Shah, Product Line Manager, Public Cloud Recorded: Apr 19 2018 57 mins
    Organizations are adopting Google® Cloud Platform to take advantage of the same technologies that drive common Google services. The power behind GCP, combined with agility and a global footprint, enables you to use the Google Cloud as the sole route to market for new application deployment. The benefits of cloud adoption are well-known, but so too are the challenges of security, possible data loss and business interruption, potentially slowing cloud adoption.

    Join Palo Alto Networks® for a webinar focused on how organizations can securely move to GCP by delivering consistent workload protections that prevent data loss and business interruption.

    During this webinar, we will cover:

    •Security challenges that migrating to the cloud introduces
    •How the Palo Alto Networks cloud security portfolio protects your data and prevents business interruption
    •The role automation plays in ensuring application developers can operate at the speed of the cloud
  • Securing Microservice APIs
    Securing Microservice APIs Matt McLarty - VP API Academy, Scott Morrison - Distinguished Engineer, Rob Wilson - Advisor Recorded: Apr 19 2018 53 mins
    If you’re migrating to a microservice architecture, it’s extremely important to make sure you don’t open up new security vulnerabilities as a result. At the same time, you have to make sure the access control approach you take doesn’t become a bottleneck for your developers or for the scalability of your system.

    Join this webinar to learn:

    - The state of the industry when it comes to API access control for microservices
    - The DHARMA model for defining API security in a microservice architecture
    - A specific DHARMA implementation using the new CA Microgateway
  • Your Future WAN is Wireless, Why Wait?
    Your Future WAN is Wireless, Why Wait? Todd Krautkremer, CMO, Cradlepoint Recorded: Apr 19 2018 60 mins
    In 1997, the world was introduced to 802.11 “WiFi” and within a couple of years, it became a business networking staple. At the time, few would have foreseen that WiFi would become the dominant way we connect at home, work, and play today. As more of what businesses connect to is in the cloud, and more of what they are connecting is outside the office, 4G LTE is quickly becoming the next wireless revolution for connecting people, places, and things. This time, the revolution is in the WAN.

    Just like the evolution of the 802.11 WiFi standard, which is on the cusp of 802.11ax, the world of LTE has evolved significantly since it was first deployed less than a decade ago. Today, cellular providers are already rolling out Gigabit LTE with plans to launch 5G in several other U.S. cities mid-year. Any business contemplating a refresh of their WAN in support of cloud and digital transformation initiatives needs to be thinking about the role of 4G LTE and 5G services. If history is our guide, your future WAN will be wireless.

    Challenges driving next-gen WAN requirements:

    • Branch continuity as more traffic is cloud and Internet bound

    • Combined wired and wireless connectivity to accommodate growing
    bandwidth requirements

    • Accommodating the growing number of WAN endpoints outside the
    branch

    • Edge security and overall management implications

    Cradlepoint is an industry leader in edge solutions for 4G LTE and 5G enabled networks. With the help of Spiceworks, Cradlepoint conducted a survey of over a hundred enterprise IT decision-makers in North America to assess the pervasiveness of 4G LTE within enterprise WANs today and uncover some misconceptions.

    Join Todd Krautkremer, CMO at Cradlepoint, for a live webinar on April 19th, 2018 at 9:00 am PT to learn about how organizations are leveraging 4G LTE within the enterprise, WANs today, and the role advanced 4G and 5G wireless services will play in next-gen, software-defined WAN strategies.
  • Middleware modernization: Foundation to your Digital success
    Middleware modernization: Foundation to your Digital success Harman Chadha, Lead Solutions Consultant, TIBCO Software; Karthik Sathyamurthy, Solutions Architect, Wipro Limited Recorded: Apr 19 2018 57 mins
    The ability to rapidly connect applications and deliver data-driven insights at scale and at the right time is the key to digital success. The increase in the number and variety of endpoints, expectations around faster delivery of integration solutions and the need to support rapid Innovation are forcing customers to extend and modernize their integration platform.
  • Artificial Intelligence in the Cyber Domain
    Artificial Intelligence in the Cyber Domain Michelle Cantos, Strategic Intelligence Analyst, FireEye & Awalin Sopan, Engineer, Analysis Platform, FireEye Recorded: Apr 19 2018 59 mins
    Artificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Companies need to understand how AI will impact cyber security before they rely on it for network defense.
    On April 19, join Michelle Cantos, Strategic Intelligence Analyst and Awalin N. Sopan, Engineer, Analysis Platform, for the second installation of our three-part webinar series on AI that covers:

    • How AI technology can enhance a businesses’ defensive capabilities
    • How cyber threats can use AI to improve the sophistication and scope of their attacks
    • How FireEye uses machine learning to bolster its internal defenses and tools

    Don’t miss part one of the three-part series “Artificial Intelligence in Cyber Warfare: A Primer” - https://www.brighttalk.com/webcast/7451/305191
  • GDPR Emergency Kit: Improve Your Cybersecurity Posture
    GDPR Emergency Kit: Improve Your Cybersecurity Posture Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Apr 19 2018 49 mins
    The General Data Protection Regulation (GDPR), will come into force on 25th May 2018 and requires organisations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices and document evidence of compliance. If you don’t already have the required security tools and controls in place, your organisation will need to start planning now to achieve compliance and mitigate the risk of fines for failing to comply.

    Achieving and maintaining compliance with the GDPR will require detailed planning and collaboration with your employees and virtually all the businesses in your chain. It will also depend on the adoption of a pragmatic, solutions-based approach to data breach detection. Feels a bit overwhelming at this late stage, right? In this webinar we will share some proactive steps you can take to help you reduce cyber risks and stress, whilst working to address any and all gaps in your security posture.

    Join Oliver Pinson-Roxburgh, EMEA Technical Director of Sales Engineering and Solutions Architecture at Alert Logic, to hear security best practices to help reduce cyber risk, as well as to identify ways to bolster what you have done so far to address the upcoming GDPR. Highlights include:
    - GDPR and what security controls can help to reduce the risks of a data breach
    - How to assess your level of readiness and build your plan around potential concerns or gaps
    - GDPR emergency kit: Best practices for approaching cybersecurity with the view to support the GDPR

    Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.
  • Cybersecurity as Code: Build a secure-by-default Cloud
    Cybersecurity as Code: Build a secure-by-default Cloud Jesse White, Account Principal, Contino Recorded: Apr 19 2018 59 mins
    In this session, you’ll learn the key principles of building “secure-by-default” cloud infrastructure. We will;

    • Dive into the core concepts of system safety and reliability
    • Discuss how to leverage Infrastructure as Code to build fully automated and continuously converging systems
    • Show you how to use encoded compliance frameworks to build self-validating and healing systems
    • Explore how strategic investment in Cloud Native Services can help build defence-in-depth
  • Automating Next-Gen Firewall Deployments with Terraform and Ansible
    Automating Next-Gen Firewall Deployments with Terraform and Ansible Justin Harris, Consulting Engineer, Palo Alto Networks Recorded: Apr 19 2018 38 mins
    Join us for our new cloud webinar, in which cloud automation experts will show you how customers have successfully automated their VM-Series next-gen firewall deployments and effectively protected their DevOps environments in AWS® and Microsoft Azure.

    In this webinar you’ll learn how to:

    * Implement touchless deployment for your fully configured firewalls with native and third-party automation tools, such as Terraform® and Ansible®
    * Consume tags to execute your commit-less policy updates
    * Automate VM-Series deployments across your multi-cloud environment
  • BadUSB - Die Gefahr und Schutzmöglichkeiten mit DriveLock Smart DeviceGuard
    BadUSB - Die Gefahr und Schutzmöglichkeiten mit DriveLock Smart DeviceGuard Mario Schwalm, DriveLock Senior Manager PreSales Recorded: Apr 19 2018 46 mins
    Die Demonstration einer Sicherheitslücke bei der Nutzung der USB-Schnittstelle, genannt BadUSB, geistert derzeit durch die internationale Presse. Doch was steckt wirklich dahinter und wie kann man sich davor schützen?
  • [Live Interview from RSA] Nick Bilogorskiy on RSA and Emerging Cyber Threats
    [Live Interview from RSA] Nick Bilogorskiy on RSA and Emerging Cyber Threats Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks and ITSP Magazine Recorded: Apr 18 2018 22 mins
    Join Nick Bilogorskiy, Cybersecurity Strategist at Juniper Networks in conversation with ITSP Magazine as they discuss everything RSA and the latest cyber threats and trends.
  • [CPE Credit Panel] Emerging Threats & Cyber Defense
    [CPE Credit Panel] Emerging Threats & Cyber Defense Chris Roberts (Acalvio) | Nick Bilogorskiy (Juniper Networks) | Dan Lohrmann (Security Mentor) | Joseph Carson (Thycotic) Recorded: Apr 18 2018 53 mins
    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². Tune in for an in-depth look into the evolving cyber threat landscape with CISOs and top security experts. The panel will examine the latest cyber attack trends and provide recommendations for defending enterprises and SMBs.

    Join top cyber security experts for an interactive Q&A roundtable discussion on the biggest threats targeting organizations in 2018:
    - Lessons from recent cyber attacks and breaches
    - What keeps CISOs up at night
    - Biggest cyber security challenges and how to overcome them

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
    - Dan Lohrmann, Chief Strategist & Chief Security Officer, Security Mentor
    - Joseph Carson, Chief Security Scientist, Thycotic

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from San Francisco during RSAC week.
  • Hybrid Defense: How One City Boosted Its Cyber Protection 10X
    Hybrid Defense: How One City Boosted Its Cyber Protection 10X Steve Davidek, IT Manager, City of Sparks; Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Apr 18 2018 37 mins
    In today's landscape, it seems businesses of every size and stripe are at risk of becoming targets of cyberattacks. From government agencies to hospitals, these businesses are increasingly victimized by ransomware attacks and data breaches. So, how do you defend yourself? What do you do when your IT staff lacks the expertise to investigate growing security threats and respond to them in a timely manner? How do you get help from security experts to prevent suffering a future breach?

    Join the City of Sparks (NV) IT decision maker, Steve Davidek, to discover the security challenges faced by most governments and business organizations. Learn how an industry-leading security operations center (SOC)-as-a-service–the AWN CyberSOC–helped the City of Sparks vastly improve its threat detection and response.

    In this webinar, we will explore:

    - Key security challenges that plagued the City of Sparks
    - Reasons why Sparks’ IT team chose our SOC-as-a-service solution instead of building one in-house
    - How AWN CyberSOC™ with Hybrid AI improved Sparks’ threat detection and response by 10X

    Don’t let your organization become a prime target. Register today!

    About our key speaker:

    Steve Davidek has worked in the IT division at the City of Sparks starting as a Computer Operator in 1984 and working in IT Operations for the next 30 years. He was appointed IT Manager in March of 2014.

    Steve’s division is responsible for all Technology projects and budgeting. His team of 8 manages everything from Desktop support, Server Management, Networking, Security, and Systems. Development and Management for all departments at the city including Police, Fire, Public Works, Finance, Planning, City Management, Municipal Court and Recreation.
  • Making Awareness Stick: Secrets to a Successful Security Awareness Program
    Making Awareness Stick: Secrets to a Successful Security Awareness Program Erich Kron CISSP, Security Awareness Advocate Recorded: Apr 18 2018 51 mins
    With 91% of data breaches being the result of human error, security leaders, auditors, and regulators increasingly recognize that a more intentional focus on the human side of security is critical to the protection of organizations. However, organizations have been struggling with and debating the effectiveness of traditional security awareness and training.

    Join Erich Kron, Security Awareness Advocate at KnowBe4, for this webinar "Making Awareness Stick: Secrets to a Successful Security Awareness Training Program" as he shares results-focused strategies and practical insight on how to build a world-class program.

    Key topics covered in this webinar:
    - Why awareness and training matters
    - Key data points to help make the case for awareness in your organization
    - Five secrets to making awareness work in 2018
    - How to create your "Human Firewall"

    Make this the year that you refuse to settle for mediocrity. Are you ready to go all-in?
  • Approfondimento tecnico: come pianificare e progettare una rete wireless
    Approfondimento tecnico: come pianificare e progettare una rete wireless Claudio Dell'Ali Apr 23 2018 9:00 am UTC 60 mins
    Gli Access Point SonicWall della serie SonicWave, utilizzano la nuova tecnologia Wave 2. Pensata con particolare attenzione alla sicurezza ed alla facilità di utilizzo, la serie SonicWave offre una soluzione End-to-End stabile, sicura e performante.

    Scopri le procedure consigliate per pianificare e implementare una rete Wireless con SonicWall attraverso i seguenti argomenti:
    • Fondamenti di RF e l’importanza della tecnologia 802.11ac Wave 2
    • Una panoramica del portafoglio di prodotti SonicWave
    • Come effettuare un Site Survey per definire dove installare le antenne al fine di ottenere una coperture ottimale
    • Impostazione, monitoraggio e configurazione dei punti di accesso
  • [Webcam Panel] Trends Discussed at RSAC 2018
    [Webcam Panel] Trends Discussed at RSAC 2018 Roselle Safran (Rosint Labs) | Ulf Mattsson (TokenEx) | Dave Morris (Morris Cybersecurity) | UJ Desai (Bitdefender) Apr 23 2018 5:00 pm UTC 60 mins
    Join this post-RSAC panel as we look at the biggest trends and cyber threats covered during the RSA Conference 2018 in San Francisco.

    Tune in for an interactive Q&A panel with industry experts as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches

    Speakers:
    - Roselle Safran, President, Rosint Labs
    - Ulf Mattsson, Head of Innovation, TokenEx
    - David Morris, Managing Partner, Morris Cybersecurity
    - UJ Desai, Group Product Manager, Bitdefender
  • [Breach Prevention Week] Beyond Layered Approach
    [Breach Prevention Week] Beyond Layered Approach Navneet Singh, Product Marketing Director, Palo Alto Networks Apr 23 2018 6:00 pm UTC 60 mins
    Maintaining and troubleshooting disparate, layered security technologies is complex and time-consuming. What’s even more troubling is that these technologies don’t work together effectively to protect you against sophisticated cyberattacks.

    It’s time to rethink IT security with a strategic, architectural approach – preventing successful cyberattacks from getting to your data, apps and users.

    In this webinar, you’ll learn:
    •Why a layered security approach doesn’t work.
    •Why a strategic approach to evaluating security technologies is the way to go.
    •How the security architecture of our next-gen firewalls prevents successful cyber breaches.
  • How to Detect Wire Fraud with Machine Learning and Behavioral Analytics
    How to Detect Wire Fraud with Machine Learning and Behavioral Analytics Eric Tran-Le, VP, Product Management, Guardian Analytics Apr 23 2018 6:00 pm UTC 45 mins
    This webinar is part one of the Wire Webinar Series. We will be discussing how you can leverage Guardian Analytics behavior-based, real-time wire fraud detection solution to monitor all activities and transactions for each account holder allowing you to build a profile of each user’s typical behavior. Tracked activities include hundreds of elements from payment amounts, wire originators and recipients, plus online login, session duration, sequence of activities during each session.
  • Best Practices for Effective Endpoint Security
    Best Practices for Effective Endpoint Security Joel Boyd, senior product marketing manager, Palo Alto Networks & Chris Kisselburgh, security engineer, Cloud Harmonics Apr 24 2018 2:00 am UTC 60 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • [APAC] Intent-Based Networking in Security Policy Management
    [APAC] Intent-Based Networking in Security Policy Management Edy Almer, VP Product Apr 24 2018 5:00 am UTC 45 mins
    The next big thing in networking, intent-based networking, enables users to define what they want and, like magic, their intentions are automatically translated into the desired network environment, including its policies.

    Well, it’s not magic, and this next big thing is already here. In this new technical webinar, Edy Almer, AlgoSec’s VP of products explains how AlgoSec’s network security policy management solution delivers on the promise of Intent-based networking to enable faster application delivery to market - without compromising on security or compliance.

    In this webinar, Edy will explain how:

    • Users can request network connectivity for their business applications, without having to understand anything about the underlying network or security

    • AlgoSec automatically translates, computes and deploys these intentions directly onto the security devices – all with zero touch (if risk profiles allow)

    • AlgoSec ensures that reality aligns with the intent, or is automatically adjusted if network connectivity deviates or introduces risk or compliance violations
  • How to Lower Vulnerability Risk of DevOps SDLC  w/ Continuous Security Testing
    How to Lower Vulnerability Risk of DevOps SDLC w/ Continuous Security Testing Ron Peeters, Managing Director EMEA, Synack Apr 24 2018 7:00 am UTC 60 mins
    DevOps allows organizations to bring web and mobile applications to life faster than traditional SDLC. However with more frequent application updates, there is increased risk of introducing exploitable vulnerabilities to the production stream that won't get detected.

    Traditional penetration testing can't keep up with the frequency and such short deployment cycles and due to its compliance based nature is not comprehensive enough to mimic increasingly sophisticated cyberattack behavior. The result is many high-profile breaches and an increase of serious, exploitable vulnerabilities in live applications.

    Leading organizations are moving towards a security testing model that combines continuous vulnerability scanning tools with continuous manual testing. The manual security testing is performed by international top class Security Researchers who perform offensive and adversarial-based testing that more closely resembles real attack traffic and better aligns with DevOps SDLC.

    Join this webinar led by Ron Peeters, Managing Director of Synack, to learn more about how continuous application security testing lowers the risk of dynamic deployments with DevOps SDLC Synack’s continuous, offensive security testing model better supports DevOps SDLC and lowers the risk of being breached.
  • Best Practices for Effective Endpoint Security
    Best Practices for Effective Endpoint Security Joel Boyd, Senior Product Marketing Manager, Palo Alto Networks & Chris Kisselburgh, Security Engineer, Cloud Harmonics Apr 24 2018 9:00 am UTC 60 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • Security is NOT an Abstract Concept – Building Consensus in the Boardroom
    Security is NOT an Abstract Concept – Building Consensus in the Boardroom Patrick Grillo, Senior Director, Security Solutions, Fortinet Apr 24 2018 9:00 am UTC 45 mins
    Making the connection between “Cause and Effect” is difficult enough but when technology executives need to explain their strategy to a non-technical audience, all too often the key message is lost in technical jargon.

    When technology is embraced by business leaders, it’s because of the perceived business benefit the technology could bring to the organization. What is frequently not discussed, or even thought about at this level, are the security implications associated with technology. The challenge for the senior technology executives is to be able to associate technology with risk, and risk with business disruption, without resorting to a Fear, Uncertainty and Doubt strategy.

    This session will focus on how senior technology executives can better relate to a non-technical audience, using tangible and quantifiable examples, to both inform and persuade of the need of making security an essential component of any business plan.
  • Get all your questions on GDPR answered
    Get all your questions on GDPR answered Sunil Choudrie, Giampiero Nanni, Robert Arandjelovi, Alexander Peters, Ramses Gallego Apr 24 2018 11:00 am UTC 60 mins
    Do you have a burning question you’d like to ask about the GDPR? Now you have a chance to get an answer – straight from the experts. We’ll be hosting a live Q&A with a panel of GDPR experts. And with the clock ticking down to the May 25th deadline, this is a perfect opportunity to get the answers you need.

    The discussion will enable you to successfully prepare for the GDPR by:

    • Understanding its full implications for your organisation
    • Identifying and tracking personal data, wherever it may be
    • Implementing cyber security to protect your data systems
    • Detecting and responding effectively to security breaches
    • Building a GDPR compliance program for the long term

    Get all your questions answered and ensure you’re ready for May 25th by joining our Q&A.
  • The evolution of ransomware and how to protect your organisation
    The evolution of ransomware and how to protect your organisation Rik Ferguson | Vice President Security Research | Trend Micro Apr 24 2018 2:00 pm UTC 75 mins
    Ransomware has been a huge talking point over the last year or so with the large scale Wannacry and Petya outbreaks that caused significant damage worldwide. The strains that are now being seen show that cybercriminals are becoming more sophisticated in order to try and bypass security controls in order to encrypt files and extort organisations for financial gain.

    Unfortunately, Ransomware can enter an organisation through many vectors; including via email spam, phishing attacks, or malicious web downloads making it difficult to defend against. There is no silver bullet when it comes to Ransomware so you need a multi-layered approach, prioritised for the best risk mitigation.

    Join this webinar to find out more on the history and evolution of ransomware, new ransomware techniques such as “rotating” ransomware but importantly to understand how and why threat actors utilise ransomware and what you can do to mitigate against it.
  • [US/UK] Intent-Based Networking in Security Policy Management
    [US/UK] Intent-Based Networking in Security Policy Management Edy Almer, VP Product Apr 24 2018 2:00 pm UTC 45 mins
    The next big thing in networking, intent-based networking, enables users to define what they want and, like magic, their intentions are automatically translated into the desired network environment, including its policies.

    Well, it’s not magic, and this next big thing is already here. In this new technical webinar, Edy Almer, AlgoSec’s VP of products explains how AlgoSec’s network security policy management solution delivers on the promise of Intent-based networking to enable faster application delivery to market - without compromising on security or compliance.

    In this webinar, Edy will explain how:

    •Users can request network connectivity for their business applications, without having to understand anything about the underlying network or security

    •AlgoSec automatically translates, computes and deploys these intentions directly onto the security devices – all with zero touch (if risk profiles allow)

    •AlgoSec ensures that reality aligns with the intent, or is automatically adjusted if network connectivity deviates or introduces risk or compliance violations
  • [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority
    [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority FireEye EMEA Apr 24 2018 2:00 pm UTC 75 mins
    Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.

    Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.

    Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.

    ----------------------------
    "Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."

    - KEVIN MANDIA, CHIEF EXECUTIVE OFFICER, FIREEYE

    "Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
    - PWC Global State of Info Security Survey, 2015
  • New Data Breach Findings: The Year of Internal Threats & Misplaced Data
    New Data Breach Findings: The Year of Internal Threats & Misplaced Data Jason Hart, CTO of Data Protection at Gemalto Apr 24 2018 3:00 pm UTC 60 mins
    2018 has started off as an eventful year with data breaches at Saks Fifth Avenue, Lord & Taylor and Under Armour’s MyFitnessPal app. And it will continue to be a catalyst year for data security with the 25th of May deadline for the European Unions’ General Data Protection Regulation, which regards “privacy as a fundamental human right and to protect it as such.” Data exposed or breached is not only a headache for security teams, but also impacts brand reputation, customer confidence and stock prices.

    Gemalto’s 2017 Breach Level Index found 2.6 billion records where compromised in 2017, a 88% increase from 2016. In this webinar our expert, Jason Hart, will walk attendees through the most shocking 2017 stats, new data breach tactics and how companies can manage risk by mapping out where your data resides. Join us to learn more about:
    -Internal threats and misconfigured cloud databases
    -Growing security threats like data integrity attacks
    -Innovative technology that is solving some of these issues
    -What we have in store for 2018
  • [Webcam Panel] CISO Strategy & the Boardroom
    [Webcam Panel] CISO Strategy & the Boardroom Dr. Christopher Pierson (Binary Sun) | Ben Johnson (Obsidian) | Deidre Diamond (CyberSN) Apr 24 2018 3:00 pm UTC 60 mins
    Having a strong buy-in from the highest level of executive leadership in your organization is a key factor for a successful implementation of your CISO strategy. With high-profile breaches on the rise and a company's reputation at stake, cybersecurity is a top-of-mind issue for CISOs.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Selling your security strategy to the Board
    - Why your Board should be up to date on cybersecurity
    - Top threats to look out for in 2018

    Speakers:
    - Ben Johnson, CTO of Obsidian Security
    - Deidre Diamond, Founder and CEO, CyberSN
    - Dr. Christopher Pierson, CEO of Binary Sun Cyber Risk Advisors
  • Binary vs Source Code Scanning
    Binary vs Source Code Scanning Lupita Carabes, CA Veracode Solutions Architect Apr 24 2018 3:30 pm UTC 30 mins
    The debate between binary versus source code scanning has been an active controversy within the static analysis space since its inception. While source code scanning analyzes un-compiled code, binary scanning analyzes compiled code. However, in the end, the result is the same. Despite this conclusion, this is still an area organizations are compelled to consider during their process of selecting application security solutions.

    Join this 20-minute webinar to find out how Veracode approaches this debate on static analysis! See how Veracode focuses not just finding errors, but also on ensuring organizations can fix vulnerabilities in the most efficient way possible. Learn how you can reduce total time to remediate vulnerabilities and how you can make bringing secure software to market fast a competitive advantage.
  • ISSA International Series: IoT/Mobile Security
    ISSA International Series: IoT/Mobile Security Hari Pendyala | S.A. Srinivasa Moorthy | Chris Rouland Apr 24 2018 4:00 pm UTC 120 mins
    The prolific outburst of IoT devices in our lives has become a boon or a curse. Boon as they make it easy to interact with "Things" and Curse as they make it easy for hackers to invade our privacy and breach security.

    Implementing Security in IoT devices is still after thought.This webinar looks at the challenges of securing IoT devices against threats and discusses about the options available to secure these devices.
  • Cryptocurrency Malware: Tips to Avoid Ransomware & Data Loss
    Cryptocurrency Malware: Tips to Avoid Ransomware & Data Loss Mounir Hahad Head of Juniper Threat Labs at Juniper Networks Apr 24 2018 4:00 pm UTC 45 mins
    With exponential growth in ransomware during the last two years, we're all asking how to stay safe. In this presentation you will learn more about the different types of attack which are used to extort money, along with guidance on how to avoid them.
  • Medical Grade Security for your Unpatchable Medical Devices
    Medical Grade Security for your Unpatchable Medical Devices Mick Coady, PwC, and Matt Mellen, Palo Alto Networks Apr 24 2018 4:00 pm UTC 60 mins
    Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network.

    The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves.

    Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments.

    In this webinar, you will discover:
    •The cybersecurity risks posed by unpatchable and hard-to-patch medical devices
    •How to successfully mitigate medical device security risks
    •Strategies you can implement today to secure medical devices
  • DevSecOps Best Practices with Synopsys and GitHub
    DevSecOps Best Practices with Synopsys and GitHub Bryan Cross, Sr. Solutions Engineer, GitHub; Dave Meurer, Alliances Technical Mgr, Black Duck by Synopsys Apr 24 2018 5:00 pm UTC 60 mins
    It's time to add “Sec” into DevOps! But while moving towards newer processes and technologies like agile methodologies, cloud and containers can help you build faster and deliver continuously, there's always the fear that adding security can severely slow things down. By using GitHub with Black Duck by Synopsys, you can automate your secure development workflows, shift security left, and avoid software rot.

    Whether you are an open source developer or enterprise software engineer, GitHub and Synopsys have solutions to help you put “Sec” into the center of DevOps without sacrificing speed and agility. In this live webinar, the experts from Synopsys and GitHub will demonstrate solutions for both open source and enterprise developers. Some highlights will include:

    - The real life of a vulnerability in 2017: Apache Struts
    - Black Duck CoPilot: It’s Free!
    - Black Duck your Pull Requests
  • [Earn 1 CPE] GDPR Compliance MasterClass
    [Earn 1 CPE] GDPR Compliance MasterClass Rebecca Herold, Moderator; John McLeod, AlienVault; Mark McGlenn, Absolute; Brian Philbrook, OneTrust; Jake Olcott, BitSight. Apr 24 2018 5:00 pm UTC 75 mins
    The GDPR is the most significant change in data privacy regulation in more than 20 years. It comes into force on 25 May 2018 and will impact all businesses that process personal data or businesses that process personal data of EU citizens even if they are not in the EU. Obligations for compliance will affect both controller and processors and regulators will get increased enforcement powers and the right to impose fines of up to 4% of global turnover for both data breaches and infringements of the law.

    Attend this CPE accredited educational webinar with our panel of experts to learn what you need to know about the GDPR and how to remain compliant.

    Learning Objectives:

    - Learn how to prepare for GDPR implementation
    - Identify the real life challenges of compliance
    - Learn about prioritizing plans and actions to effectively prepare for data protection
    - Discover some of the benefits, approaches, and tools to comply with the GDPR