Hi [[ session.user.profile.firstName ]]

IT Security

  • AI and the new Cyber Battlefield
    AI and the new Cyber Battlefield Simon Bryden, Consulting Systems Engineer, Fortinet Live 45 mins
    As the scale and complexity of cyber attacks grows faster than ever, new ways must be explored to fight back.

    Using machines to perform tasks such as malware analysis and real-time anomaly detection means a faster time to protection, frees up analyst time for more advanced research, and marks a big step forward in the battle against cyber crime.

    This session discusses how you can leverage machine learning and other artificial intelligence techniques to enhance and extend your existing detection methods.
  • Keynote Panel: DevOps & Digital Transformation - How to Overcome Challenges
    Keynote Panel: DevOps & Digital Transformation - How to Overcome Challenges Prakash Vyas (Splunk), James Finister (TCS), Rob Akershoek (Shell), Dimitri van den Broek & Barclay Rae (Essential SM) Live 60 mins
    Businesses are being forced to move at a higher speed than ever before, but the challenges are coming thick and fast - namely facing new competition, cost pressures, skills gaps, monitoring and metrics, and understanding and adhering to evolving standards for innovation, quality and reliability. These challenges make Digital Transformation a tricky game to win.

    In this session, our panel of experts will discuss how DevOps can make digital transformation easier and help you;

    * Deliver business value
    * Boost bottom lines
    * Give the best customer experience

    Join the discussion on and level-up your DevOps game!

    Rob Akershoek, Solution Architect, Shell
    Prakash Vyas, ITOA Specialist EMEA, Splunk
    James Finister, Global ITSM Strategist, Tata Consultancy Services
    Dimitri van den Broek, EVP, Strategic Alliances & Co-Founder, ITpreneurs

    Moderated by Barclay Rae, ITSMf Board Member and Director, Essential SM
  • The Biggest Cloud Security Threats are Self-Inflicted
    The Biggest Cloud Security Threats are Self-Inflicted Ryan Holland, Senior Director of Cloud Architecture, Alert Logic Recorded: Jul 17 2018 21 mins
    We are witnessing a vast wave of data breaches across the globe – these breaches are fruits of sophisticated cyber criminals, but also of the complexity that plagues IT security. Businesses are told to cover the basics of cybersecurity, but even the basics can be complex. The attack surface is larger than ever before, companies are being offered different security tools, new policies are being introduced and all of this has led to a gap that today’s cyber criminals are exploiting.

    Join Ryan Holland, Alert Logic’s Senior Director of Cloud Architecture, as he shares best practices for reducing the negative impact of IT sprawl, security sprawl and the ever-evolving attack surface.

    Highlights include:
    - Cloud security threats
    - The importance of understanding your cloud attack surface
    - Cyber breaches & vulnerabilities – real-life examples
    - CSP security services
    - Security sprawl – what you don’t know can hurt you

    This impactful webinar will help you to understand what key strategies you can adopt to increase security, manage risk and be compliant.
  • [Hebrew session] Is your Office 365 data protected?
    [Hebrew session] Is your Office 365 data protected? Guy Noy, Systems Engineer Recorded: Jul 17 2018 58 mins
    SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

    • Accidental data exposure with SharePoint®
    • Uncontrolled use of personal OneDrive® accounts
    • Data security violations in Exchange

    Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

    Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

    You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
  • Encryption – An Important Pillar of Data Security Strategy
    Encryption – An Important Pillar of Data Security Strategy Rahul Kumar, Country Manager, India, SAARC Recorded: Jul 17 2018 34 mins
    How do you prevent the loss of secure or confidential information of your organisation to an untrusted environment or user?
    Have you met various regulatory requirements regarding financial, health or personal Identifiable Information to avoid risk of massive fines if a breach occurs?
    Join Rahul Kumar, Country Manager India, WinMagic, for a 30 min webinar and ask him why Encryption should be an important pillar of your data security strategy.
  • What’s New in Data Protector v 10
    What’s New in Data Protector v 10 Paul Carapetis, Presales, Micro Focus Recorded: Jul 17 2018 45 mins
    In this age of extreme data growth and variety, ever more stringent regulations, complicated hybrid environments including physical, virtual and cloud, and reducing IT budgets, Micro Focus has released version 10 of its Data Protector platform, part of the Micro Focus Data Protection Suite.  In this webcast attendees will learn how they can better protect their applications across legacy and modern platforms, use analytics to track and manage SLAs and improve the security of their backup to mitigate the risk of cyberattacks when they upgrade to Data Protector 10.  A live demo of the new features will be shown should time permit.
  • How the Gap Uses Recorded Future Fusion for Advanced Automation
    How the Gap Uses Recorded Future Fusion for Advanced Automation Rodrigo Bijou, Senior Manager – Cyber Defense Center (CDC), Gap Inc. Recorded: Jul 16 2018 29 mins
    With almost 3,200 stores and more than 150,000 employees worldwide, Gap’s security is incredibly complex. To secure its employees, partners, and customers, the company is drawing together insights from numerous sources of threat data, helping the largest specialty retailer in the United States stay ahead of emerging cyberattacks.

    Listen to Rodrigo Bijou, senior manager at Gap’s Cyber Defense Center (CDC), explain how the company uses Recorded Future Fusion to:

    • Speed up the investigation of indicators through smarter automation.
    • Augment workflows in security operations with contextualized threat intelligence.
    • See gains in productivity as well as greater confidence in security decisions.
  • How to Automate Security Investigations with Reveal(x) & Phantom
    How to Automate Security Investigations with Reveal(x) & Phantom Dan Tucholski, Solutions Engineer Recorded: Jul 16 2018 63 mins
    Learn three real-world threat detection, investigation, and automation scenarios with Reveal(x) & Phantom.
  • Code with Speed…and Security: Gamified Developer AppSec Training (2018)
    Code with Speed…and Security: Gamified Developer AppSec Training (2018) Matias Madou, Ph.D., Co-Founder and CTO, Secure Code Warrior and Dylan Thomas, Sr. Product Manager, Micro Focus Fortify Recorded: Jul 16 2018 38 mins
    Delivering quality code on time and on budget is one of the biggest challenges of organizations worldwide. With evolving cyber security threats, security became a top of mind concern for board rooms and an essential KPI for development/testing. Since fixing security related (or any) issues later on in the software lifecycle is highly inefficient, the best approach is to blend security early on in the development/testing processes. One of the key methods of having fewer vulnerabilities in the code is through not introducing vulnerabilities in the first place. This requires increasing the security knowledge and awareness of developers through secure code development training.

    Fortify on Demand offers application security as a service with integrated secure development, security testing and continuous monitoring making securing applications easy and scalable for organizations. As part of Fortify on Demand, we offer gamified developer training as a result of our partnership with Secure Code Warrior. Secure Code Warrior addresses the root cause of security vulnerabilities in applications by educating developers on how to apply secure coding techniques. Fortify on Demand (FoD) integrates with Secure Code Warrior, so developers can not only identify but also remediate vulnerabilities in application code in a gamified manner—this appeals to the gaming mentality of developers by providing a competitive element.
  • Case Study and Best Practices for Protecting Customer Data
    Case Study and Best Practices for Protecting Customer Data Daniel O'Neill, Director of Global Security, Rackspace Recorded: Jul 16 2018 24 mins
    People HR® helps companies manage their employees, which means handling high volumes of personal information – just the type of data criminals wants. They required support to protect critical customer data and reach an exceptional standard on compliance and security; a need emphasized with the introduction of the General Data Protection Regulation (GDPR).

    Given the sensitive nature of the data, People HR required effective security controls to be put in place to ensure adherence to regulatory requirements. Implementing new technologies can be costly and filling the cyber security skills gap has become increasingly difficult in today’s evolving threat landscape. The set and forget, controls-based strategy of the past will no longer adequately protect organisations against more sophisticated cyberattacks.

    In this session, Rackspace will discuss how the provision of proactive monitoring, intrusion detection and incident response in addition to data encryption enabled People HR to protect customer data and create clear policies around the data governance and protection regulation with an approach that is both platform agnostic and cloud-centric.
  • Visibility: The Key to Better Threat Detection
    Visibility: The Key to Better Threat Detection Matt Selheimer, Chief Marketing and Strategy Officer, Alert Logic Recorded: Jul 16 2018 30 mins
    Networks, services, applications and data are under virtually constant siege from both automated and targeted attacks. Once compromises and data breaches are discovered, companies often learn that attackers have been camped out for months – conducting reconnaissance and spreading across the network to find the most valuable resources or data. Therefore, it is important for organisations to have effective threat detection and incident response systems in place to identify and address threats.

    Many organisations are also starting to realise that simply replying on blocking tools is not the right approach, it is the lack of visibility in most cases, that leads organisations missing the obvious signs of a cyber attack.

    Effective threat detection is continuously monitoring your cyber assets for advanced threats, alerting you to validated exploits, and rapidly investigating and responding to confirmed incidents.
  • Top Business Security Risks and How You Can Fight Back
    Top Business Security Risks and How You Can Fight Back Graham Cluley, Independent Computer Security Expert Recorded: Jul 16 2018 30 mins
    According to cyber security experts, the frequency and severity of cyber attacks are on the rise, causing alarm to businesses and customers across a variety of industries. Taking a proactive, strategic approach to evaluating your cyber security strategy is critical, it starts with understanding who your organisations adversaries are and what the impact would be on your business if you were the victim of a cyberattack.

    Hear from Graham Cluley as he examines the latest methods and exploits used by cyber criminals providing an overview of the most current ways they target businesses. You’ll get an insight on how the most sophisticated attackers choose their targets and what they are looking for.

    You will learn about:
    - The ever-changing threat landscape, and how it affects your business
    - Key Considerations for your Cyber Security Strategy
    - Insight into real-life case studies
  • Strategies for Improving Enterprise Application Security
    Strategies for Improving Enterprise Application Security Brad Causey, CISSP, and Rami Elron, Senior Director of Product Management at WhiteSource Recorded: Jul 16 2018 64 mins
    Most online attacks begin when a hacker discovers a single vulnerability in an enterprise application. But how can organizations eliminate these vulnerabilities before they are exploited? While most enterprises are focused on application scanning and remediation, many software development experts are advocating better, more secure application development initiatives that prevent vulnerabilities from occurring in the first place. In this webcast, experts on application security and the DevOps movement discuss the steps that enterprises can take to build security into the app development process.
  • Containers and Kubernetes: Visibility through CloudLens
    Containers and Kubernetes: Visibility through CloudLens Sushil K. Srinivasan, Sr. Product Manager, Ixia, a Keysight Business. Chris Hein, Partner Solutions Architect, Amazon Recorded: Jul 13 2018 35 mins
    As systems evolved from physical servers to virtual machines to the public cloud to containers, the design focus shifted from building a single robust, stable component to building a more stable microservice oriented system where individual service components can be modified or replaced without affecting the overall system. Enterprises in this evolution cycle continue to have a mix of their applications running on physical hardware, virtualized platforms, in public cloud infrastructures and Kubernetes container clusters.

    During this webinar, experts from AWS and Ixia, a Keysight business will share:
    •Strategies to provide packet visibility to your workloads in any environment
    •Insights into planning and implementing strategies
    •Review emerging designs and best practices

    You will also see a step-by-step demonstration of how you can establish packet visibility into your workloads in Physical, Virtual, Cloud, Container or in a Kubernetes Cluster by continuing to maximize on your existing investment in APM, NPM and IDS tools.

    Register to watch this webinar and demo now.
  • SOA and legacy modernization: the first step to the New Enterprise
    SOA and legacy modernization: the first step to the New Enterprise Steven Camina, Senior Product Manager Recorded: Jul 13 2018 45 mins
    Service-enabling legacy assets and effectively managing and orchestrating services is the first step toward realizing the promise of the New Enterprise. In this webinar, Steven Camina, Sr. Product Manager at MuleSoft, will present strategies and demo solutions for getting the most out of your legacy assets and outline the steps you can take to build a solid foundation for APIs down the road.

    You will learn how to:
    •Identify legacy assets within your organization
    •Move data in and out of legacy systems without downtime [DEMO]
    •Wrap legacy applications with APIs to capitalize on existing investments [DEMO]
    •Build future-proof integrations that deliver continued value [DEMO]
  • Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe
    Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe Armin Schneider ; Olaf Mischkovsky Recorded: Jul 13 2018 52 mins
    Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe, schaffen Sie Transparenz und sparen Sie wertvolle Zeit

    Symantec Control Compliance Suite liefert geschäftsrelevante Sicherheits- und Risikoinformationen, mit denen Sie Prioritäten für die Bereiche Sicherheit, IT-Betrieb und Compliance effektiv abstimmen können. Bewertungen erfolgen fortlaufend und automatisiert. Sie erhalten damit eine Gesamtübersicht über Sicherheitskontrollen und Sicherheitslücken. Auf diese Weise sind Sie in der Lage, das Rechenzentrum zu härten, die Behebung von Sicherheitsvorfällen zu priorisieren, sicher auf ein Software-Defined Data Center umzustellen sowie kontinuierliche Bewertungen für die Cyber-Sicherheit und die fortlaufende Überwachung zu unterstützen
  • The Power of Identity2: Delivering end-to-end Identity Access and Governance
    The Power of Identity2: Delivering end-to-end Identity Access and Governance Ron Piovesan, Business Development, Okta Collin Perry, Director of SaaS Solutions, SailPoint Recorded: Jul 12 2018 55 mins
    With the demise of the traditional enterprise network security perimeter, enterprises are leveraging the power of identity to secure and control access to all applications, systems, and data. All this IT infrastructure is housed both on-premises and in the cloud, and must be accessed by authorized local and remote employees as well as a growing web of partners, contractors, and suppliers.

    Join us to learn how the Okta Identity Cloud coupled with SailPoint Identity Governance can help you securely and effectively authenticate, provision, and govern access to all applications and data across the hybrid cloud and on-premises enterprise.

    Join the two leaders in Identity for this informative webinar and learn how to:

    · Achieve unified access, control, and IT efficiency
    · Mitigate the risk of a security breach and enforce corporate and compliance policies
    · Provide seamless identity access and governance
  • Developing an effective Software-Defined-WAN Strategy for your business
    Developing an effective Software-Defined-WAN Strategy for your business John Elliott, Principal Consultant, Carousel Industries Recorded: Jul 12 2018 43 mins
    With a wide range of SD-WAN solutions from dozens of vendors, how do you determine what’s best for your business?

    With the adoption of cloud, and support for rich media applications and mobile users, network managers are moving towards a software-defined approach to evolve their WAN, but selecting the right vendor and consumption model can be overwhelming.

    This webinar provides a decision framework for developing your strategy and making the right choices for your business.

    In this webinar, you will learn:

    • The specific capabilities SD-WAN solutions should be delivering
    • MPLS vs SD-WAN and the pros and cons of each
    • How to navigate the SD-WAN vendor landscape
    • The predominant SD-WAN consumption models, and the benefits and pitfalls of each
  • Automating Security Compliance with Ease
    Automating Security Compliance with Ease Lucy Kerner, principal technical product marketing manager, Security, Red Hat Jennifer LuPiba, product mkt manager, Red Hat Recorded: Jul 12 2018 53 mins
    As hybrid IT environments continue to expand and evolve, security must be automated to scale and mitigate risks to achieve compliance and meet the needs of the business.

    In this webinar, we’ll cover how to:
    - Rapidly and consistently deploy security and compliance configurations automatically in both virtualized and container environments.
    - Easily apply NIST-validated national checklist content such as DISA STIG, PCI-DSS, and more to a single image or across your virtual and container environment.
    This discussion will be in the context of integrating OpenSCAP in Red Hat® Enterprise Linux® with Red Hat Ansible® Automation.
  • Mind the Gap: The 5 Most Common Cloud Security Oversights
    Mind the Gap: The 5 Most Common Cloud Security Oversights Jacob Serpa, Product Marketing Manager, Bitglass, Brandon Dunlap (Moderator) Recorded: Jul 12 2018 60 mins
    Even with a renewed focus on security, cloud applications have introduced new risks that many organizations have yet to address. Powerful productivity platforms have been widely deployed in an effort to enable employee communication and facilitate collaboration. Apps enabling employee communication and collaboration cannot be secured with traditional firewalls and gateways. They require a fundamental rethinking of security – a shift from endpoint and network-centric protection to data protection. Join Bitglass and (ISC)2 on July 12, 2018 at 1:00PM Eastern as we explore the five most common security oversights that may put your cloud data at risk.
  • Marie Curie, Open Source, Kickstarter and Women in Tech
    Marie Curie, Open Source, Kickstarter and Women in Tech Mandy Whaley, Director of Developer Experience, Cisco Recorded: Jul 12 2018 50 mins
    Think of Marie Curie. Would you expect to find a fascinating number of similarities between the Curie's treatment of their work in the early 1900's and today's tech industry? I certainly didn't…

    Join Mandy Whaley to explore how the Curie's used an approach similar to modern Open Source licensing to open the process for isolating radium to the scientific community, and how the limitations at the time on the rights of women to own intellectual property influenced this decision.

    Also, learn how Marie Curie also used a strategy similar to Kickstarter to raise funds to buy radium for her own research, and how all of these experiences and lessons can help us today.
  • Getting Your Bearings in a DevSecOps World
    Getting Your Bearings in a DevSecOps World Apoorva Phadke, Associate Principal Consultant, Synopsys Recorded: Jul 12 2018 48 mins
    Development and operations teams have already come a long way by aligning around the shared goal of delivering stable, high-quality software—quickly. By automating manual processes and building tools into the continuous integration and continuous delivery (CI/CD) pipeline, they’ve increased trust between groups, which is essential as these once-disparate teams tackle critical issues together. In this webinar, you’ll learn how to build a DevSecOps culture in your organization with automated and integrated application security tools and the right training for each team.
  • Avoiding the Dreaded DNS Hijack
    Avoiding the Dreaded DNS Hijack Dhivya Chandramouleeswaran of Adobe Recorded: Jul 12 2018 40 mins
    With increasing adoption of cloud services by organizations, there is unfortunately often an absence of decommissioning checks when such services are no longer in use. It is often up to developers and operations teams to properly clean them up. DNS records pointing to deleted cloud artifacts - not yet purged from name servers - create dangling DNS records. When these artifacts have the potential to be reclaimed by nefarious actors, organizations may become vulnerable to domain hijacking and subdomain takeover attacks.

    In this webinar, Dhivya will discuss:
    - How DNS hijacks differ from domain hijacks
    - Alternatives for identification of expired cloud artifacts
    - Attack mechanisms that may be used
    - Possible monitoring schemes and tools organizations can implement
    - Defensive measures to prevent dangling records and subdomain takeovers
  • Onboarding: How to Turn an A-Player into a B-player in Under 4 Weeks
    Onboarding: How to Turn an A-Player into a B-player in Under 4 Weeks Marcus Cauchi, ISM Fellow Jul 17 2018 10:00 am UTC 60 mins
    You’ve just hired James Bond on to your sales team and you have high hopes for his performance. Assuming you really did hire James Bond and not Mr Bean in a Tux, what can you do to ensure disappointment?

    Why! Fail to do a proper onboarding process! Delude yourself into thinking you hired an adult, a professional, someone who can be depended on to hit the ground running. “John is a big boy and doesn’t want me crowding him. I’ll let him get on with it.”

    This is called management by abdication and is one of the cardinal sins of sales management.

    Onboarding is the lost element of successful recruitment. The best sales managers have a 120 day onboarding plan for new hires. Why 120 days? Because that is the probation period a new hire is typically putting you (their manager, the job they actually bought, the company and the other people on the team) on in case they believe they have made a bad choice of career move.

    You’ve invested time and money in attracting them, selecting them, offering them, legal & HR costs, managing their notice period, paying them, training them and you risk blowing your winnings because you’re too busy, too stupid or too lazy to finish the job you started!

    Onboarding is not about giving them an Ops & Employee Manual to read, giving them some product training and provisioning them with passwords, a laptop and a phone. Those are the tiniest part of a good onboarding process. Onboarding should set up a new hire for success. It should be structured and confirm that you have made the right hire. It should tell you quickly if you haven’t so you can hire slow and fire fast.

    A reliable onboarding process needs to cover 3 things:

    * What do they need to know?
    * By when do they need to know it?
    * Where can they find it?
  • Maximising SoC Effectiveness With Advanced Threat Intelligence
    Maximising SoC Effectiveness With Advanced Threat Intelligence Amar Singh Jul 17 2018 10:00 am UTC 60 mins
    Running a security operations is not a simple undertaking. It takes skilled staff, technology, processes and procedures and loads of practice. In addition, actionable contextual threat intelligence is key when it comes to ensuring the SoC and its teams are affective in early detection of attacks.

    The key word here is EARLY detection. Join Amar Singh and his special panelists as they discuss some of the key pillars of threat intelligence and how to make them work in any SoC environment.
  • *AST in CI/CD - How to Make it Work
    *AST in CI/CD - How to Make it Work Ofer Maor, Director, Solutions Management at Synopsys Jul 17 2018 11:00 am UTC 60 mins
    SAST, IAST, DAST, MAST, *AST – There are plenty of technologies and ways to test your software, but how do we do that without slowing us down in a rapid development environment. In this session we will give practical advice on how to integrate software security testing into your CI/CD and your development process so it works. The session will review the pros and cons of each of the testing technologies, how to adapt it to rapid development, and how to make testing work as organizations are moving to A/B testing. Finally, this session will guide on how to manage the balance between risk and speed to build the right process, so that real threats will become blockers, but other issues will be handled in a parallel, slower cycle, without slowing down the main delivery.
  • Best Practices for Securing Your Enterprise
    Best Practices for Securing Your Enterprise Sushila Nair (NTT DATA Services) | Sergio Caltagirone (Dragos) | Chris Sestito (Cylance) | James Ignacio (JFI Cyber) Jul 17 2018 12:00 pm UTC 60 mins
    Cybercriminals are constantly innovating ways to infiltrate your organization, and steal your valuable data. With an ever expanding attack surface, security professionals are struggling to secure the enterprise.

    Join this roundtable discussion with top security experts to learn more about:
    - What's new on the cyber threat landscape
    - Why cyber threat intelligence Is more critical than ever
    - How to prevent and protect against breaches
    - What tools and approaches should security teams use
    - Why network visibility and actionable data about attackers is key
    - Best practices and expert recommendations on improving your enterprise security

    - Sushila Nair, Sr. Director, NTT DATA Services
    - Sergio Caltagirone, Director of Threat Intelligence, Dragos
    - Chris Sestito, Director of Threat Research, Cylance
    - James Felix Ignacio, Founder & CEO, JFI Cyber Solutions
  • Integrating Security and Compliance within Fintech
    Integrating Security and Compliance within Fintech Lucian Morris, Chief Information Officer, LQID Jul 17 2018 12:00 pm UTC 60 mins
    Join Chief Information Officer of LQID Lucian Morris for a timely and informative session on integrating security and compliance within the Financial Technology sector.
  • Stop Cyber Threats With Adaptive Micro-Segmentation
    Stop Cyber Threats With Adaptive Micro-Segmentation Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Vijay Chauhan, Senior Director of Product Marketing, Illumio Jul 17 2018 1:00 pm UTC 60 mins
    Virtualization, the cloud, and the promise of containers have evolved the data center, bringing better application delivery and cost reduction. With these benefits come new risks that include increased East/West traffic and the potential for new cyber threats. Adaptive micro-segmentation is transforming and improving security inside data centers and clouds while speeding up application delivery.

    In this session you’ll learn:
    - How adaptive micro-segmentation enables security anywhere (on premises, AWS, Azure, etc.) on anything (bare metal, VMs, containers).
    - How you can eliminate app delivery delays caused by traditional security approaches.
    - How customers are using adaptive micro-segmentation to instantly protect high-value apps, separate dev and prod with one rule, take existing security policies to the cloud, and more.
  • Why Threat Intelligence should be a key tool in your security portfolio
    Why Threat Intelligence should be a key tool in your security portfolio Fleming Shi, Senior Vice President, Advanced Technology Engineering, Barrcuda; Brianna Fischer, Product Marketing, Barracuda Jul 17 2018 1:00 pm UTC 75 mins
    Knowing which threats are trending right now—and which vectors criminals are using to attack you—is the key to optimizing and fine-tuning your security policies and solutions for effective protection.
    Barracuda collects a vast flow of real-time information and uses big data analytics to crunch those numbers in order to deliver up to date, actionable insights. In this interactive live session with Brianna Fischer and Fleming Shi will discuss:

    • Latest threats in cyber security
    • Real world examples of using threat intelligence in defending against cyber attacks
    • How to use threat intelligence to fine tune your security policies
    • How to gain access to the information you need to stay ahead of the biggest cyber threats

    Register to learn the fastest, easiest way to get the information you need to stay ahead of the biggest cyber threat trends.
  • Incident Remediation: Could this have been prevented?
    Incident Remediation: Could this have been prevented? Manfred Erjak, Consultant, Professional Services Jul 17 2018 1:00 pm UTC 30 mins
    Third and final part of our 'Breach Response Preparedness Series', a 3-part series on state-of-the-art incident investigation techniques and breach response strategies.

    Recovering from a large-scale incident is not an easy task. When compromised by an Advanced Persistent Threat, one must plan the efforts ahead of time to succeed in fully remediating and eradicating the attacker from the environment.

    During this webinar, we will discuss:
    - How to best remediate from such an event;
    - The different stages of the preparation, when it is the best time to remediate, and how to classify actions;
    - Examples of real investigations and remediation efforts to illustrate common complications like remediating too early, remediating partially and working with third party IT providers

    Join your host Manfred Erjak, Professional Services Consultant, for a 25-minute webinar to discuss the latest incident remediation trends.
  • 2018 GTIR Report: Cybersecurity insights for protecting your digital business
    2018 GTIR Report: Cybersecurity insights for protecting your digital business Mark Thomas from Dimension Data & Rob Kraus, from NTT Security Jul 17 2018 2:00 pm UTC 60 mins
    Cybercrime remains a pervasive threat; attractive and lucrative in its ability to generate profits with minimal risk of attribution or interdiction. Barriers to entry are reducing due to the diversification of illicit subscription services, automated software toolkits, and vast online criminal support forums. Cybercriminal ingenuity continues to mature, making the most of attack opportunities arising from new technology adoption.

    In this webinar, we explore the findings of the NTT Security Global Threat Intelligence Report, and provide insights to guide your security investment decisions aligned with your industry sector, geographic profile, and risk appetite.

    We will share notable insights into the evolving and emerging threat landscape, including ransomware, threat intelligence, industry targeting, and compliance regulations observed during the past year.

    - Mark Thomas: Group CTO Cybersecurity,Dimension Data
    - Rob Kraus, Senior Director, Global Threat Intelligence Center Operations, NTT Security
  • The Secret to Harder, Better, Faster, Stronger DevOps
    The Secret to Harder, Better, Faster, Stronger DevOps Prakash Vyas, ITOA Specialist EMEA and Endre Peterfi, Major Account Sales Engineer, Splunk Jul 17 2018 2:00 pm UTC 45 mins
    Does your organization move at the speed your business needs it to? Keeping up with the pace is a game of do or die and those that recognize the impact of DevOps on digital transformation, will be the ones left standing. Bringing together insights from practice experts, industry roundtable discussions and research on the state of DevOps, Splunk shares the secret to winning the DevOps game.

    Join this session to:
    - Find out how DevOps can make your IT team and overall business (work) harder, better, faster, stronger
    - Discover what you need to benefit from DevOps (spoiler alert – you already have the key to its success!)
    - Learn all about ditching meh-trics in favour of measurement that matters
    - Hear how others are already experiencing the value of data-driven DevOps on their digital transformation journey
  • Automation Maturity for Digital Transformation
    Automation Maturity for Digital Transformation John Burke, CIO and Principal Research Analyst, Nemertes Research Jul 17 2018 3:00 pm UTC 60 mins
    Digital transformation relies first and foremost on responsiveness to changing needs and conditions. In order to meet the challenges of DT, IT needs to embrace automation at every level--and in order to do that, IT needs to approach automation differently than it has in the past. Nemertes' 2017-2018 Cloud, Networking and Security Research Study explored maturity in automation practices, revealing the areas where improvement is most needed.
    During this webinar we will share those insights with you.
  • Accudata's White-Hat Files | July 2018 Edition
    Accudata's White-Hat Files | July 2018 Edition Anton Abaya, CISA, PCI QSA, Senior Consultant Jul 17 2018 4:00 pm UTC 15 mins
    Our third White-Hat File comes from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.

    In this 15-minute webinar, he’ll describe the most effective ways he’s used social engineering and phishing techniques to crack into companies, as well as the best practices you can implement to ensure these attacks don’t work on your business.
  • World Map of Malware: The Geography of Hostile Code
    World Map of Malware: The Geography of Hostile Code Dr. Kenneth Geers, Chief Research Scientist Comodo Cybersecurity Jul 17 2018 4:00 pm UTC 60 mins
    Zero-day malware--new malware that has never been seen before-- continues to plague businesses of all sizes. Millions of these unknown files are being crafted or modified each year. They cannot be detected by existing security systems; they hide on endpoints and networks and remain among the most important and effective tools hackers use.

    Join Chief Research Scientist at Comodo Cybersecurity and NATO Cooperative Cyber Defense Centre of Excellence Ambassador, Dr. Kenneth Geers as he analyzes how geopolitical events affect malware in the world's hottest cyber-attack zones. Webinar attendees will learn:
    • How cyber defenders benefit from spending more time on strategic cyber defense analysis.
    • Why cities, countries, continents, verticals and even geopolitical events have their own malware fingerprint.
    • How threat research and intelligence can quickly provide actionable intelligence to Network Security professionals at the tactical level.

    The session draws on data from Comodo Cybersecurity's Threat Intelligence Team's analysis of 300 million malware incidents in the first six months of 2018 and how you can leverage this technology to enhance your IT infrastructure.
  • Advanced & Frictionless Security in a Multi-Cloud Environment
    Advanced & Frictionless Security in a Multi-Cloud Environment Anuj Sawani, Product Marketing Manager Jul 17 2018 5:00 pm UTC 60 mins
    Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

    Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

    Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

    We can make it easier. This webinar will cover:

    •Common speed bumps your security and DevOps teams face
    •Innovative security strategies to tackle a wide range of cloud risks
    •Security automation and integration within the development lifecycle
    •Achieving consistent and advanced multi-cloud protections

    Register now and learn how to secure your multi-cloud environment with advanced, frictionless protection.
  • Making Clouds Secure Again (or for the First Time!)
    Making Clouds Secure Again (or for the First Time!) Doug Cody, Solutions Architect, Synack Jul 17 2018 5:00 pm UTC 60 mins
    Cloud security has come full circle - back to the user. Early cloud vendors promised complete security only to find the truth more nuanced - there’s a shared responsibility. Both infrastructure and applications in the cloud need attention to stay clear of security vulnerabilities old and cloud new. Security testing has evolved to meet the needs of hybrid, public, and private cloud deployments. Attendees of this webinar can expect to learn:

    The shared model for cloud security
    What cloud providers protect...and what they don’t
    How to migrate securely to the cloud
    What penetration testing for cloud environments does differently
  • What’s New in the Reveal(x) Summer 2018 Release
    What’s New in the Reveal(x) Summer 2018 Release Barbara Kay, Sr Director of Security Product Marketing Jul 17 2018 5:00 pm UTC 45 mins
    The ExtraHop Reveal(x) Summer 2018 release introduces new compelling features that will deliver unprecedented visibility, definitive insights, and immediate answers. Join this webinar to learn about:
    * New ways of visualizing threats, including risk scores and headlines
    * New detections including network privilege escalation
    * Threat feed integration with your wire data
    * “Need to know” decryption that respects privacy requirements
    * TLS 1.3 support, including decryption for ephemeral session keys
    * Integrations with Anomali, Palo Alto Networks, ServiceNow, and Splunk
  • Inside (ISC)²: Virtual Town Hall – Enrich. Enable. Excel
    Inside (ISC)²: Virtual Town Hall – Enrich. Enable. Excel Wesley Simpson, (ISC)² COO, Mirtha Collin, (ISC)² Sr. Ed. & Training Mgr., Michelle Schweitz, (ISC)² Media Mgr. Jul 17 2018 5:00 pm UTC 75 mins
    (ISC)² is committed to delivering value to our members, providing a transparent view of the organization’s developments and plans for the future. To that end, please join (ISC)² for a virtual Town Hall meeting on July 17, 2018 at 1:00PM Eastern to review many of our new member benefits, service offerings and look at what is still to come in 2018, including enriching professional development opportunities, Security Congress and more. Members and non members alike will enjoy the opportunity to learn how (ISC)² is delivering on its value promise.
  • How can static analysis help DevOps teams maintain velocity securely?
    How can static analysis help DevOps teams maintain velocity securely? Meera Rao, senior principal consultant and director of the secure development practice - Synopsys Software Jul 17 2018 5:00 pm UTC 45 mins
    Static application security testing (SAST) is the process of examining source code for security defects. SAST is one of many checks in an application security assurance program designed to identify and mitigate security vulnerabilities early in the DevOps process. Integrating SAST tools into DevOps processes is critical to building a sustainable program. And automating these tools is also an important part of adoption, as it drives efficiency, consistency, and early detection.

    If you have questions like these, and you’re concerned about integrating SAST tooling into your DevOps process, this session will offer actionable advice to automate security testing that supports DevOps velocity.

    But DevOps practitioners looking to integrate SAST tools into the DevOps pipeline often have questions:

    How do I manage false positives?
    How do I triage the results?
    What happens to new issues identified?
    How can I use a tool in my DevOps pipeline?
  • Connective Defense: Maximize Your Security Spend By Combining Cyber & Fraud Ops
    Connective Defense: Maximize Your Security Spend By Combining Cyber & Fraud Ops Paul Kurtz, Co-Founder & CEO, TruSTAR Jul 17 2018 5:00 pm UTC 60 mins
    Learn how IBM & Prudential correlate their cyber and fraud intelligence. As long as adversaries can spend $1 on a campaign and force us to spend $10 to protect ourselves, enterprises will lose the war on cybercrime. Rather than building taller silos of data that become even bigger targets for criminals, enterprises must come together around common means of data exchange and collaboration. Join our moderated panel with IBM & Prudential security executives to learn how they organize their cyber and fraud teams and correlate threat intelligence and fraud data across teams to be a force multiplier for their security resources.
  • Harnessing Cybersecurity Automation
    Harnessing Cybersecurity Automation Holly Schipper, Product Marketing Manager, Cybersecurity. Juniper Networks Jul 17 2018 6:00 pm UTC 45 mins
    An understaffed security workforce is struggling to protect your evolving enterprise from ever changing cyber threats. Automation could be the answer to hardening your security posture in these shifting sands. However, the task of implementing automation across such a diverse and continuously morphing environment presents a challenge.

    In this webinar, we will discuss the benefits, complexities and best practices of implementing security automation.
  • SOC-as-a-Service, MDR, MSSP or SIEM. Oh my! What’s right for SMEs?
    SOC-as-a-Service, MDR, MSSP or SIEM. Oh my! What’s right for SMEs? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Jul 17 2018 6:00 pm UTC 60 mins
    With small to mid-size enterprises (SMEs) being increasingly targeted by cyber security attacks, the demand for a solution that provides comprehensive visibility into cyber security threats is now more important than ever before. Amid these concerns, SMEs are also dealing with a shortage of cyber security skills in IT-staffs and the lack of budgets to detect and respond to advanced threats. So, what solutions are currently on the market? What are their pros and cons when it comes to managed detection and response?

    In this webinar, gain key insights into the differences between cybersecurity solutions SOC-as-a-Service, MDR, MSSP, and SIEM, and discover which solution is the best fit for your organization.

    After watching, you will discover why:
    • Cloud-based security-as-a-service is gaining momentum with SMEs
    • SIEM is a great technology for those who can manage it on their own
    • MSSP is great for outsourced security management, but not an answer for better cybersecurity
    • SOC-as-a-Service are the turnkey service that SMEs are looking for

    To determine what’s the best fit for your organization’s security, register now.