Hi [[ session.user.profile.firstName ]]

IT Security

  • Briefings Part 2 - How Government Agencies Can Harness the power of A. I.
    Briefings Part 2 - How Government Agencies Can Harness the power of A. I. Ian Doyle, Executive Security Advisor, U.S. Govt, IBM; John McCumber, Dir, Cybersecurity Advocacy, (ISC)2 (Moderator) Recorded: Nov 17 2017 39 mins
    With the eruption of connected devices and the Internet of Things, cybersecurity professionals have a lot on their plates. More connected devices equates to more traffic, more attack routes, more attempts at cybersecurity breaches, and a lot more data that needs to be analyzed. As the volume of intrusions and breaches multiple, Artificial Intelligence (A.I.) may be able to provide a tool to gain defensive advantage for government agencies. Join John McCumber, (ISC)2’s Director of Cybersecurity Advocacy and Ian Doyle, IBM’s Executive Security Advisor for the U.S. Government as they discuss how to leverage these collaborative and cognitive solutions to help prevent, detect, and respond to today’s cybersecurity threats impacting your agency.
  • Benefits of Engaging with an Open Source Project
    Benefits of Engaging with an Open Source Project Dave Neary, NFV/SDN Community Strategist, Red Hat Recorded: Nov 17 2017 22 mins
    Listen to Dave Neary, SDN and NFV with Open Source at Red Hat talk about the benefits of engaging with an open source project as a user and what we can expect to see next for NFV and SDN standards.
  • Briefings Part 1 - Using A.I. to Find the Needle in the Federal Haystack
    Briefings Part 1 - Using A.I. to Find the Needle in the Federal Haystack Ian Doyle, Executive Security Advisor, U.S. Govt, IBM; John McCumber, Dir, Cybersecurity Advocacy, (ISC)2 (Moderator) Recorded: Nov 17 2017 41 mins
    A recent research study conducted by Meritalk on the use of Artificial Intelligence (A.I.) asked federal cybersecurity professionals to share their views on the use of AI to enhance a cybersecurity analyst’s ability to identify and understand sophisticated threats, by tapping into unstructured data and correlating it with local cybersecurity offenses. What are the cybersecurity implications within the Federal Government for the rise of A.I.? What role can A.I. play in incident response? Can it help prepare agencies for real-world cyber attack scenarios? Join John McCumber, (ISC)2’s Director of Cybersecurity Advocacy and Ian Doyle, IBM’s Executive Security Advisor for the U.S. Government for an examination of the recent study and results.
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Reynolds - Imagine Communications, Limor Schafman - TIA Recorded: Nov 17 2017 46 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Steve Reynolds, CTO, Imagine Communications

    Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.

    Host: Limor Schafman, Content Development Director, TIA

    NOT BICSI accredited.
  • Best Practices for GDPR when hosting data off-premises
    Best Practices for GDPR when hosting data off-premises Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity Recorded: Nov 17 2017 49 mins
    GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises.

    But what does GDPR really mean to businesses, how will it impact the way in which organisations handle their data and engage with trusted third parties?

    Join Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity for a thought provoking discussion drawing from real-life examples on:

    1) Organisational best practices when working with cloud service providers to adhere to GDPR

    2) Key factors organisations to take into account when complying to GDPR

    3) The steps global enterprises are taking get themselves #fit4GDPR
  • Data Loss Prevention (DLP) v15 - The Information Centric Security Generation
    Data Loss Prevention (DLP) v15 - The Information Centric Security Generation Salah Nassar, Director Product Marketing, Symantec and Ben Yang, Director of Product Management, Symantec Recorded: Nov 17 2017 47 mins
    Symantec launched a major release for DLP, version 15, that focuses on expanding core DLP technology and Information Centric Security.

    In today’s cloud generation, data is shared through personal email, created and shared on cloud apps, and accessed via BYO devices by employees, partners, and vendors. With the persistent threat of a breach looming, maintaining visibility, protection, and control over your sensitive data is key for business and maintaining compliance.

    Join us on this webinar to review what’s new with Symantec DLP 15 and get first-hand view of the revolutionary Information Centric Security approach.

    Register Today
  • Career Conversations w/ Paula Brand  - Maximize Your Linked Profile
    Career Conversations w/ Paula Brand - Maximize Your Linked Profile Guest Speaker: Paula Brand, Host: Jessica Gulick Recorded: Nov 17 2017 63 mins
    Attend this Women's Society of Cyberjutsu webinar to discover how you can fully maximize your Linked profile to be found for the right opportunities. Learn how to customize your URL and why keywords impact your headline, summary and skills sections. Understand the importance of having visual elements and expressing your true brand on your profile.

    About the Speaker:

    Combining her expertise in career counseling, human resources, workforce development and training facilitation, Paula Brand has inspired hundreds of women to take charge of their careers. She speaks to groups and provides individual career coaching on using LinkedIn effectively, managing a successful career and going through career transitions. Past organizational clients include the World Bank, NIH/NIAID, the Johns Hopkins University SAIS program and the Penn Wharton Public Policy Initiative.

    Her education includes a Master’s Degree in Applied Psychology from the University of Baltimore, a Bachelor’s Degree from the University of North Carolina at Greensboro and three industry certifications including: Global Career Development Facilitator, Certified Professional Résumé Writer and Job and Career Transition Coach.

    Paula is involved in professional associations and is a past President of the Maryland Career Development Association (MCDA). In 2014, she received the Professional Contributions Award from the Middle Atlantic Career Counseling Association (MACCA) and MCDA’s Outstanding Career Practitioner Award.
  • What does the Cloud mean for the Future of Cybersecurity?
    What does the Cloud mean for the Future of Cybersecurity? Darius Goodall, Director, Product Marketing - Security Products, Barracuda Recorded: Nov 16 2017 52 mins
    The growing migration of business critical applications to SaaS based solutions and public cloud platforms signals a fundamental shift in IT infrastructure. The cloud requires organizations to take a fresh look at their security posture in the light of new threats and an expanding deployment surface. We will discuss the emerging security requirements as results of these shifts and provide recommendations to securely operate in cloud environments
  • Don't Get Stung by the OWASP Top 10 - Getting the Most from Advanced WAF
    Don't Get Stung by the OWASP Top 10 - Getting the Most from Advanced WAF Nathan McKay, Security Solutions Manager, F5 Networks; Danny Luedke, Product Marketing Manager, F5 Networks Recorded: Nov 16 2017 65 mins
    Web application security is complex, difficult, and costly – the problems are well known, but remain prevalent out in the real world. Most development teams do not have the resources to sufficiently protect against the myriad of attacks that are relevant to each vector, and the level of expertise required is difficult to come by even if your project has the time and budget for it. This is further compounded by the need to address these vulnerabilities over and over in every application that goes out the door making it a significant blocker in your path to production.

    The good news is that advanced WAF technology is more accessible and affordable than ever before. F5 has teams of researchers and engineers dedicated to this task, and their industry-leading expertise is packaged and available today to defend apps of any size and variety. With the right tools, comprehensive WAF coverage can not only reduce your exposures and give you better control over your applications but also help optimize your resources and reduce overall operating costs. F5 is committed to supporting the OWASP Top 10 and providing defenses for everything it addresses, but that’s just the tip of the iceberg.

    In this webinar you will learn:
    - About the primary risks to your app, including those addressed by the Top 10.
    - How to make the most of development resources by using WAF to do the heavy lifting for you.
    - How F5’s unique and flexible deployment options will make WAF remediation for your app a snap.
    - How you can go beyond the Top 10 and address additional risk, such as DDoS, bot defense, intellectual property theft, or fraud.
    - How WAF can optimize and filter unwanted traffic to help you cut costs in the cloud.
  • Phishing and Fraud: Latest Trends and Best Practices for Protection
    Phishing and Fraud: Latest Trends and Best Practices for Protection Dee Millard, Anti-Fraud Solutions Consultant, Easy Solutions Recorded: Nov 16 2017 55 mins
    Join us for this live, interactive webinar, where you will learn:

    • What the latest threat trends are that we are seeing in 2017 and going into 2018

    • Which organizations are most at risk

    • How you can implement immediate strategies to proactively protect your institution and your customers

    About our presenter:
    Dee Millard is an experienced risk management consultant with over two decades of experience in helping organizations of all sizes exceed their fraud prevention programs and compliance requirements. Her expertise includes online and mobile banking fraud prevention, enterprise financial crimes management, digital banking, and anti-money laundering.
  • Threat Intelligence for Every Security Function
    Threat Intelligence for Every Security Function Dave Shackleford, SANS and Chris Pace, Recorded Future Recorded: Nov 16 2017 61 mins
    There's a common misconception that threat intelligence simply means feeds of indicators just for SOCs or high-level reports only useful to security leaders. The fact is threat intelligence can be a valuable weapon in every part of your information security strategy. In this webinar, we'll take a close look at five different roles generally found within information security organizations: vulnerability management, incident response, security operations, threat analysis, and CISOs. Discover what specific processes and responsibilities are found in each team and how threat intelligence can be integrated into each to improve accuracy and reduce time to action.
  • Taking the Offensive
    Taking the Offensive John ‘Lex’ Robinson, Anti-Phishing / Cyber Security Strategist Recorded: Nov 16 2017 42 mins
    The bad news: phishing is still the #1 cyber-attack vector. The good news: new PhishMe research shows how you can go on the offensive and strengthen your resiliency to costly phishing attacks.

    Join Lex Robinson, Anti-Phishing / Cyber Security Strategist, as he breaks down data from training simulations and real-life attacks to reveal how you can design a great anti-phishing program. Learn how a proactive approach conditions employees to recognize both active threats—the latest attacks that are costing organizations big-time—and “classic” threats bad actors can recycle whenever they please. See how to gain insights from incident response and phishing intelligence to keep you out in front of evolving threats. You’ll learn how to take the offensive to lower susceptibility, fortify resiliency and disrupt attacks faster.
  • Post-Soviet Bank Heists: A Hybrid Cybercrime Study
    Post-Soviet Bank Heists: A Hybrid Cybercrime Study Abdullah Sheikh, AD, Customer Solutions, Singtel & Thanassis Diogos, Incident Response Team Leader, Trustwave SpiderLabs Recorded: Nov 16 2017 59 mins
    Cyberattacks are getting more sophisticated, using a combination of strategies to penetrate the organisation and often for financial gain. Tune in to hear from Singtel's Abdullah Sheikh and Trustwave SpiderLabs researcher Thanassis Diogos as they describe the latest multi-vector attacks uncovered just recently in the financial industry, a modern ‘bank heist’ that uses technical and non-technical methods, with potential to expand across the globe.

    The webinar will show you the steps taken by this criminal network and how easy it was for them to divert on average USD$5 million in cash for every target they reached. Understand what measures our experts recommend to ensure your organisation doesn’t become a victim of a similar attack in 2018.
  • Endpoint Security: The Final Frontier
    Endpoint Security: The Final Frontier Ed Metcalf, Senior Director Product Marketing, Cylance Recorded: Nov 16 2017 46 mins
    Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.

    Learn how the power of machine learning and artificial intelligence are changing the endpoint protection landscape. Gone are the days of daily signature updates, maxed out performance impact, and the lack of security effectiveness against both known and unknown threats. It is time explore the new world of endpoint security.
  • CISO Insights: How to Eliminate Challenges in Fintech Compliance
    CISO Insights: How to Eliminate Challenges in Fintech Compliance Angelo Purugganan, Chief Information Security Officer at Arctic Wolf Networks Recorded: Nov 16 2017 27 mins
    In today's business environment, most fintech transactions happen at a fast pace, served through web applications using a combination of mobile devices and legacy systems, with some level of protection. While beneficial to small and medium fintech companies, consumers and regulatory agencies are apprehensive about protecting customers personal data and detecting cyber attacks over the internet which impact the integrity of financial transactions.

    In this webinar, we are going to:

    - Explore top cyber threats that fintech companies face
    - Identify what are the Compliance regulations and standards that apply to fintech companies
    - Determine how continuous monitoring and security analytics help meet compliance regulations/standards requirements

    Chief Information Security Officer, Angelo Purugganan, will also be joining us in this discussion. He will be sharing his insights on how security analytics and continuous monitoring can simplify compliance using a SOC-as-a-Service provider.

    To see how you can eliminate challenges in fintech compliance, register now.

    About our CISO speaker:

    Angelo has 15+ years of information security and compliance and 10+ years of software development experience. He has led information security programs for cloud providers and various enterprise clients using frameworks, such as Trust Services Principles, PCI-DSS, HIPAA, FISMA, Euro Directives, ISO-27000, and SOX. He has conducted information security audits in sectors such as SaaS CRM providers, logistics and distribution, manufacturing supply chain, finance ERP, foreign exchange and hedging operations, airline and travel.
  • Respond Faster - Live demo, Incident Response
    Respond Faster - Live demo, Incident Response Joel Bowden, Sr Engineer, Proofpoint Recorded: Nov 16 2017 22 mins
    Join our live incident response demonstration

    Reduce your incident response time.

    Proofpoint Threat Response Auto-Pull (TRAP) offers a fast, easy and effective solution. It automatically pulls delivered malicious email into quarantine, saving you from all those time-consuming steps. Join us for a demo of this version of the Proofpoint Threat Response platform and learn firsthand how to:

    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
  • AI and the Scientific Method for Cyber Investigation Automation
    AI and the Scientific Method for Cyber Investigation Automation Shawn Riley, Chief Data Officer | Cybersecurity Scientist at DarkLight Recorded: Nov 16 2017 48 mins
    "Artificial Intelligence" is arguably one of the most over-used terms in cybersecurity today and despite the potential, most organizations are in the dark about how best to apply it -- and more importantly, how to explain the results it produces. We will discuss how encoding expert tradecraft using scientific methods and common knowledge / data models - can produce AI with explainable results for improved investigation and an active cyber defense.
  • The Total Economic Impact of Guaranteed Fraud Protection in Ecommerce
    The Total Economic Impact of Guaranteed Fraud Protection in Ecommerce Forrester & Signifyd Recorded: Nov 16 2017 42 mins
    Join us along with Forrester as we have an in-depth look at the Total Economic Impact of Guaranteed Fraud Protection.

    The cost of online fraud for e-commerce merchants extends well beyond chargebacks and fraud-related fees. It includes losses from orders declined unnecessarily, slower order processing and loss of customer loyalty.

    If you have not turned to Guaranteed Fraud Protection to minimize your fraud costs and optimize your operations, you are missing a chance to grow revenue without selling more goods.

    During this session, we’ll cover:
    + The top 5 retail fraud and security threats in 2018 - and how to deal with them
    + The full economic impact of Guaranteed Fraud Protection, including how one enterprise retailer achieved a 3.8x ROI
    + How the right fraud solution can mean faster order fulfillment and higher customer satisfaction.
    + How one retailer added $5.9 million to its bottom line by reducing chargebacks and increasing the number of orders shipped.

    “We went from 88.9 percent order acceptance to 93.5 percent while also displacing 61 basis points for chargebacks.” — manager of a large U.S. retailer’s e-commerce operations.

    Featuring Guest Speakers:
    + Reggie Lau, TEI Principal Consultant, Forrester
    + Brendan Miller, Principal Analyst, Forrester

    ***This webinar will cover a June 2017 commissioned study conducted by Forrester Consulting on behalf of Signifyd.
  • Digital GRC: Innovations for Early Identification and Management of Risk
    Digital GRC: Innovations for Early Identification and Management of Risk Moderated by Colin Whittaker; Yo Delmar, MetricStream; Jason Ford, Contegix; and Cameron Jackson, Riskonnect Recorded: Nov 16 2017 62 mins
    Attendees can earn 1 CPE credit on this session.

    Digitization has become deeply embedded in enterprise strategy, as nearly all businesses and activities have been slated for digital transformations. The significant advantages of digitization, with respect to customer experience, revenue, and cost, have become increasingly compelling, and we are starting to see digital transformations in risk create real business value by improving efficiency and the quality of risk decisions.

    The state of risk management at most global, multiregional, and regional banks is abundant with opportunity. Current processes are resource intensive and insufficiently effective, as indicated by average annual fines above $400 million for compliance risk activities alone. By improving the efficiency and effectiveness of current risk-management approaches, digital risk initiatives can reduce operating costs for risk activities by up to 30 percent, and a digitized risk function can provide better monitoring and control and more effective regulatory compliance. On this webinar our panel of experts will discuss digital innovations for risk management success.
  • Exposing Threats You Don't Even Know About
    Exposing Threats You Don't Even Know About Ross Mathews, V-SOC Operations Manager & Rebekah Wilke, Director Managed Detection & Response, cyber services, Raytheon Recorded: Nov 16 2017 38 mins
    Raytheon cyber services experts will discuss how our Threat Scope Engagement can help organizations of all sizes and complexity mature their cybersecurity posture and operations.

    This session will cover:

    * How we can provide recommendations to enhance prevention, visibility detection capabilities and incident response

    * How to develop custom content to enable more efficient detection of threats and attacks

    * Creating a roadmap to ensure a deep understanding of your network environment and most critical risks to your organization.
  • Security Checklist for Data Migration from On-prem to AWS
    Security Checklist for Data Migration from On-prem to AWS Mike Schuricht, VP Product Management, Bitglass Recorded: Nov 16 2017 42 mins
    Enterprises are quickly moving their corporate data and custom internal apps to IaaS platforms like AWS, but many lack the visibility and control they need over business-critical data and workloads. Services like S3 and RDS, for example, store massive volumes of sensitive data that enterprises must protect.

    In this webinar, we explore key security issues faced by enterprises during data migration from on-prem to AWS, how cloud access security brokers (CASBs) are evolving to protect IaaS with granular access controls, real-time-DLP, encryption/tokenization, and more. Learn how a CASB can help enterprises achieve compliance and protect data across apps deployed in AWS.
  • Three Steps to Eliminating Storage Silos
    Three Steps to Eliminating Storage Silos Storage Switzerland, Nexsan Recorded: Nov 16 2017 51 mins
    As an organization grows the number of use cases the data center needs to support increases with it. What starts out as a NAS for file sharing, moves to a SAN for database applications, and then storage for data protection. As the organization hits full stride it might look at arching to limit growth and a mobility solution to support a distributed workforce. The problem is each one of these storage types are silo’ed and have to be implemented, operated and maintained separately. As a result, storage ends up consuming a large chunk of the IT budget.
  • Ransomware's Next Steps
    Ransomware's Next Steps Joel Boyd, Sr. Product Marketing Manager, Endpoint Recorded: Nov 16 2017 39 mins
    Promising huge profits from tiny effort or investment, ransomware remains an exceptionally popular tool for both advanced and novice attackers alike.

    Register now for our webinar and learn how your organization can deploy Traps™ advanced endpoint protection to prevent ransomware attacks without sacrificing your teams’ productivity or resources.

    In this quick, focused webinar, you’ll learn the latest intel on:
    - Trends and predictions
    - New attack vectors and payment schemes
    - Breaking down attacks
  • Official Launch of Symantec Control Compliance Suite 12.0
    Official Launch of Symantec Control Compliance Suite 12.0 Anand Visvanathan, Principal Product Manager, Symantec Nov 21 2017 5:00 am UTC 45 mins
    The release of Symantec Control Compliance Suite version 12.0 is here! Please join us for a special webinar on Tuesday, November 21 to find out what’s new in this release and how it will better help you to:

    Measure and prove compliance with security regulations, mandates, and best practices

    Determine risk and prioritise remediation

    Don’t miss this great opportunity to get the latest news and information on Control Compliance Suite!
  • Symantec Endpoint Protection Mobile – Was die SkyCure-Übernahme für Sie bedeutet
    Symantec Endpoint Protection Mobile – Was die SkyCure-Übernahme für Sie bedeutet Alexander Peters, Symantec (Deutschland) GmbH; Sven von Kreyfeld, Symantec (Deutschland) GmbH Nov 21 2017 9:00 am UTC 60 mins
    Im Webinar erfahren Sie:
    •Wie SEP Mobile Crowd-basierte Threat-Informationen mit Endpoint- und Server-basierte Analysen kombiniert, um bekannte und unbekannte Mobile Threats zuverlässig und proaktiv zu stoppen
    •Wie die Lösung Malware, Netzwerk-basierte Threats sowie Exploits auf Anwendungs- und OS-Ebene erkennt – und zwar sowohl auf iOS als auch auf Android-Geräten, egal ob online oder offline
    •Wie Sie mit vorausschauenden Analysen verdächtige Netzwerke und Anwendungen bewerten können, ehe sie Schaden im Netzwerk anrichten
    •Wie einfach und schnell das Onboarding mittels nativer iOS- und Android-Apps funktioniert und wie Sie die Lösung mit Ihren vorhandenen EMM-, MDM-, SIEM-, IAM- und VPN-Umgebungen verzahnen
    Darüber hinaus verraten wir Ihnen, wie die weitere Roadmap zur Integration der SkyCure-Produkte in unser bestehendes Portfolio aussieht, und geben Ihnen einen kurzen Überblick über alle anderen wichtigen Neuerungen in unserem Portfolio.

    Angriffe auf mobile Endgeräte nehmen rasant zu: Immer öfter nutzen Angreifer maßgeschneiderte Malware und Advanced Persistent Threats, um Smartphones und Tablets zu kompromittieren und auf diese Weise Zugriff auf sensible Daten oder Unternehmensnetz zu erlangen.
    Symantec trägt diesen steigenden Sicherheitsanforderungen mit der Akquisition des Mobile-Security-Spezialisten SkyCure Rechnung – und integriert dessen innovative Technologie jetzt als Symantec Endpoint Protection Mobile (SEP Mobile) in das marktführende Endpoint-Security-Portfolio.

    Wir freuen uns auf Sie!
  • Automate the detection and response of phishing attacks
    Automate the detection and response of phishing attacks Greg Foss (LogRhythm), Paul Asadoorian (Security Weekly), John Strand (Black Hills Information Security) Nov 21 2017 10:00 am UTC 75 mins
    Phishing campaigns are among the most common and damaging cyberattacks. Despite how common and successful phishing attacks are, often times organisations and their employees are ill-prepared to handle these threats.

    In this webinar, Greg Foss, LogRhythm Manager of Global Security Operations, Paul Asadoorian, Security Weekly CEO and Founder, and John Strand, Black Hills Information Security Owner and Security Analyst, discuss phishing attacks and how you can protect yourself from them. Additionally, the three go on to discuss how LogRhythm’s open-source Phishing Intelligence Engine (PIE), can help streamline and automate the entire process of tracking, analysing, and responding to phishing emails.

    Watch now to learn how LogRhythm is helping to automate the detection and response to phishing attacks.
  • Secure your data with IBM Cloud to simplify GDPR Readiness
    Secure your data with IBM Cloud to simplify GDPR Readiness Richard Hogg and Heather Hinton Nov 21 2017 11:00 am UTC 60 mins
    The clock is ticking and it’s time to act as Europe’s most demanding and far reaching Data Security regulation to date has been published. This webinar from IBM Cloud will examine the key requirements of GDPR, and look at how we can IBM's Cloud and Data security capabilities to simplify your GDPR Readiness journey.

    What You Will Learn
    The impact of the Regulation and its key principles
    What data protection by design and by default means for organisations
    The foundational principles of data protection
    Practical application of data protection by design and by default in the Cloud - Data security, encryption capabilities, data breach notification, Multi Cloud SaaS offerings, IBM Cloud services and our Technical and Operational Measures.
    What does signing of 24 IBM Cloud infrastructure and PaaS services means in terms of data protection adherence under GDPR.
  • The 3 Pillars of Social Selling. Part 3:Social Selling Top Tips & Tricks
    The 3 Pillars of Social Selling. Part 3:Social Selling Top Tips & Tricks Daniel Disney Nov 21 2017 11:00 am UTC 60 mins
    This 3 part webinar series will give show you the 3 key pillars to achieving social success in sales. Learn how to create the ultimate profile, build a winning personal brand, create great and consistent content and build a winning strategy. The final session will be packed with the best industry tips and tricks to make social work for you.

    Part 3 - Social Selling Top Tips & Tricks

    From LinkedIn searching secrets all the way to email address generating hacks, these are the top tips and tricks that will give you a huge advantage in the world of social selling. This webinar will bring everything together in the social selling series and will give you the ultimate list of tools use social to dramatically enhance your pipeline and sales process.
  • Understanding your Attack Surface - Research into FT30 organisations
    Understanding your Attack Surface - Research into FT30 organisations Terry Bishop, EMEA Technical Director, RiskIQ Nov 21 2017 2:00 pm UTC 45 mins
    Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions. Cyber adversaries are taking advantage of this sprawling digital attack surface, looking forweaknesses to exploit. The attack surface has become the battle line between malicious actorsand an organisation’s external threat defenders and its compromise is behind many of the breaches that get reported with alarming frequency.

    In an effort to highlight and quantify the risks which organisations have in their attack surface, we conducted research on the top 30 UK organisations (FT30) to highlight the issues we believe all companies face. We will present the various types of risk we uncovered and offer practical advice on ways to mitigate them and harden your attack surface.
  • Digital Transformation Enablers: IoT Analytics and Autonomic Actuation
    Digital Transformation Enablers: IoT Analytics and Autonomic Actuation Kevin Curtis, Distinguished IoT Architect - Connected Cities, Verizon Enterprise Solutions (VES) Nov 21 2017 3:00 pm UTC 30 mins
    Listen to Kevin Curtis, Distinguished IOT Architect – Connected Cities, Verizon Enterprise Solutions (VES) talk about how digital transformation occurs when information technology (IT) and operational technology (OT) data assets are effectively integrated, to realize new business outcomes and to create transformative value, not previously possible.
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018
    Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Jeffrey Ritter Nov 21 2017 3:00 pm UTC 60 mins
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
  • Container Security 101
    Container Security 101 Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security Nov 21 2017 6:00 pm UTC 45 mins
    Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
    Join our webinar to learn:
    •What are containers?
    •How to use containers?
    •What are the security challenges they introduce?
  • Are you Ready for Australia's Privacy Act? A Gemalto Case Study
    Are you Ready for Australia's Privacy Act? A Gemalto Case Study Jean -Pierre Mistral, Legal Counsel for Data Privacy and Graeme Pyper, Regional Director of Enterprise and Cybersecurity Nov 22 2017 12:00 am UTC 60 mins
    Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
    Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •The Mandatory Data Breaches scheme
    •Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • Equifax Breach and Managing Your Vulnerabilities
    Equifax Breach and Managing Your Vulnerabilities Carl Wright (AttackIQ), Igor Baikalov (Securonix), Chris Petersen (LogRhythm), Sam Abadir (LockPath) Nov 22 2017 12:00 am UTC 60 mins
    With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.

    What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?

    Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
    - The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
    - Managing IT risk and vulnerabilities
    - How to improve breach prevention, detection and response
    - What to expect in the future

    - Igor Baikalov, Chief Scientist, Securonix
    - Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
    - Sam Abadir, Director of Product Management, LockPath

    - Carl Wright, CRO, AttackIQ
  • In-Depth Analysis of a Fast Flux Botnet
    In-Depth Analysis of a Fast Flux Botnet Or Katz, Principal Lead Security Researcher, Akamai Nov 22 2017 5:00 am UTC 60 mins
    In recent years, we have seen large-scale botnets used to execute attacks rarely seen in the past -- botnets that incorporate new features and bigger capabilities than ever before. How and why some of these botnets remain resilient is a question that needs to be answered, and one of the reasons is Fast Flux. Fast Flux is a DNS technique used by botnets to hide various types of malicious activities (such as phishing, web proxying, malware delivery, and malware communication) behind an ever-changing network of compromised hosts acting as proxies. In general, a Fast Flux network is mostly used to make communication between malware and its command and control server (C&C) more resistant to discovery. Akamai’s high visibility to both Web and Enterprise traffic enables new and unique insights on the behavior of such Fast Flux networks.

    In this webinar, you will get an in-depth analysis on:

    - How network fluxing is using domains, IP addresses and even nameservers to become resistant to discovery
    - How Fast Flux networks offer services such as malware communication and hosting of malicious content
    - How botnets are used both for Fast Flux communications and a variety of Web attacks such as Web scraping and credential abuse
    - Best practices for detecting and defending against such botnets

    Join Akamai and (ISC)² on Nov 22 (Wed) at 13:00 (Singapore time) / 16:00 (Sydney time) to learn more about the Fast Flux Botnet.

    Presenter: Or Katz, Principal Lead Security Researcher, Akamai
    Moderator: Ir. Tejinder Singh, Senior Development Expert, T-Systems Malaysia SGA Security Engineering
  • IT Security Attacken 2017 und 2018 in Deutschland, Österreich und der Schweiz: W
    IT Security Attacken 2017 und 2018 in Deutschland, Österreich und der Schweiz: W Candid Wueest, Symantec Nov 22 2017 10:00 am UTC 60 mins
    Die Bedrohungslage | November 2017

    Was Sie beachten sollten,um Ihre IT-Security 2018 zu stärken

    Was können Sie von den jüngsten Datenschutzverletzungen und Malware-Wellen lernen? Welche Schlüsse ziehen Sie, um die Sicherheitsvorfälle signifikant zu reduzieren? Wie bereiten Sie Ihre Netzwerke, Server und Endgeräte auf die neuen Angriffsmethoden vor, die 2018 kommen könnten und wie erfüllen Sie gleichzeitig die Regularien, wie GDPR?

    Das folgende Webinar von Orla Cox, Director Security Response Team, sollten Sie daher nicht verpassen!
    Das Webinar behandelt:
    •Analyse der grössten IT Security Vorfälle in 2017: Die Methodik und Hintergründe
    •Die wichtigsten Maßnahmen, die sie sofort ergreifen sollten
    •Eine Prognose für 2018 und besten Schutzmechanismen für 2018 und danach

    Heute noch registrieren
  • Kaspersky Lab’s Industry and Technology Threat Predictions for 2018
    Kaspersky Lab’s Industry and Technology Threat Predictions for 2018 David Emm, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab Nov 22 2017 2:00 pm UTC 90 mins
    Kaspersky Lab will present an in-depth review of its industry and technology threat predictions for 2018 – and consider what they could mean for some of the world’s most connected industry sectors over the coming year.
    The session will discuss the top trends expected to affect enterprises, with a particular focus on connected healthcare, automotive, financial services, industrial security, and cryptocurrencies.
    The aim of the webinar is to help IT security professionals in all industries to understand the rapidly evolving threat landscape and the actions they can take to defend their organization against these threats.
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Nov 23 2017 5:00 am UTC 60 mins
    Three major trends define the Cloud Generation chaos that organisations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organisations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for organisations who face a severe shortage of skilled IT security personnel.

    Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:

    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security

    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response

    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
  • The digital social world. Impacts & opportunities for businesses, jobs & society
    The digital social world. Impacts & opportunities for businesses, jobs & society Debra Bordignon, CTO Dimension Data Australia & Scott Gibson Digital Practice Dimension Data Nov 23 2017 7:30 am UTC 60 mins
    Every business is impacted by global digital disruption.
    Even the most successful and iconic 20th century businesses must transform to remain relevant and retain their leadership in the 21st.

    Tech-savvy start-ups with natively digital business models regard this point in time as the best time in the history of the world to invent something.
    The world is buzzing with technology-driven opportunities leveraging the solid platform provided over the past 30 years, birthed from the Internet, then mobility, social
    and now the massive scale of cloud computing and the Internet of Things.

    Join this webinar to learn how your business can leverage the opportunities of digital disruption.

    Debra Bordignon, CTO, Strategist and Innovation Executive, DD Australia
    Scott Gibson, Group Executive: Digital Practice, Dimension Data Group
  • How CASB Needs to Evolve to Integrate with Your Security Infrastructure
    How CASB Needs to Evolve to Integrate with Your Security Infrastructure Martin Kroemer, Symantec Nov 23 2017 9:00 am UTC 60 mins
    Rapid adoption of cloud apps and services is driving the need for Cloud Access Security Brokers (CASB)

    It is time for CASB systems to weave into your overall security infrastructure. There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security solutions into their environment to improve security and reduce operational overhead.

    This talk will explore this next frontier of CASB solutions.

    Register Today
  • Breaches, threats and how to improve security in 2018
    Breaches, threats and how to improve security in 2018 Shimon Oren (Deep Instinct), Ted Harrington (ISE), Greg Foss (LogRhythm) Nov 23 2017 10:00 am UTC 60 mins
    2017 is not yet over and it's already the year of cyber attacks. From phishing, to hacks, to classified hacking tools leaked and the biggest ransomware attacks to date (Wannacry, NotPetya), security professionals across the world are looking to apply the lessons learned in 2017 for improved cyber security next year.

    Watch this interactive Q&A panel with experts from the artificial intelligence, deep learning and IoT security space to learn about:
    - The biggest attack trends seen so far
    - Impact across industries
    - Threats on the horizon
    - Recommendations to better secure your data and company in 2018

    - Shimon Oren, Head of Cyber-Intelligence at Deep Instinct
    - Ted Harrington, Executive Partner at Independent Security Evaluators
    - Greg Foss, Global SecOps Manager at LogRhythm
  • Cloud Security for Startups - From A to E(xit)
    Cloud Security for Startups - From A to E(xit) Moshe Ferber of CSA Israel and Shahar Maor of Outbrain Nov 23 2017 12:00 pm UTC 60 mins
    Cloud computing perform amazing things for startups, providing young companies with access to enterprise grade infrastructure . But also act as a double edge sword. Lack of proper security controls can lead to multiple challenges varying from longer sales cycles to losing customers & investors trust.
    The Cloud Security Alliance identified those unique challenges and developed a cloud security for startups guidelines.
    In the upcoming webinar, the guidelines co-authors will explain the 3 phases security strategy that is recommended for your cloud based startups.
  • Leveraging Threat Hunting Techniques To Investigate Petya
    Leveraging Threat Hunting Techniques To Investigate Petya Amar Singh Nov 23 2017 2:00 pm UTC 75 mins
    Warning - this is a technical webinar.

    Since the outbreak of Petya there have been many webinars dissecting the malware, its purpose, and its attribution. We view the Petya outbreak differently. In this webinar we show you how we leveraged threat hunting techniques developed to identify and pattern malicious behaviour evident in malware like Petya.

    Join us to
    * -See a Live Demo of actual tools used to dissect the malware.
    * -Ask and interact with the specialists in threat analysis.

    Following on from our successful webinar titled A Day in the Life of a Threat Analyst, we bring you another informational and educational webinar on how an experienced threat analyst would investigate Petya.

    Sign up now for this interactive webinar.