The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Moderator: Graham Cluley | Panelists: Michael Howard, Louella Ferscunandes, Howard RobertsRecorded: Dec 14 201839 mins
In this HP Security Panel webinar, we’ll look beyond The Wolf films to discuss the smartest ways of safeguarding against hackers.
Listen and hear how our expert panelist address a series of pressing issues such as:
• Are vendors using scaremongering to sell their own services?
• If faces are the new fingerprints, what are the security risks?
• How big a threat is IoT and what’s the next Mirai Botnet?
• Is the public sector the weakest link?
• Can security be baked into the hardware?
This is an excellent opportunity to gain invaluable security insights from experts on the frontlines.
Graham Cluley: Award-winning security blogger - moderator
Michael Howard: Head of Security Practice, HP Inc.
Louella Fernandes: Research Director Quocirca
Howard Roberts: Print Technologist, HP Inc.
Stay connected to the latest HP Security Solutions by visiting:
Moderators - Caroline Baldwin & Matthew ValentineRecorded: Dec 14 201847 mins
Essential Retail and Retail Design World sit down with a mulled wine (or two) to discuss their favourite retail stories of the year and their predictions for 2019.
Join editors Caroline Baldwin and Matthew Valentine for their Christmas webinar on the 14 December 2018 to discover:
•What were the hottest trends of 2018?
•What is coming around the corner in 2019 in terms of the latest technology and design trends?
•And the answer to the biggest question of the year – is the high street really dying? Is it a terminal disease or can we save our favourite shops?
La gestione della sicurezza e la risposta agli eventi informatici sono tra le principali sfide affrontate dalle aziende. La mancanza di visibilità e conoscenza di questi rischi nel tuo ambiente di rete aggrava ulteriormente il problema.
Guarda questo webinar per scoprire come adottare un approccio olistico e connesso all'orchestrazione della sicurezza. Scopri come implementare policy e controlli di sicurezza più intelligenti per un ambiente di rete più focalizzato, sicuro e conforme. Argomenti del webinar:
• Realizzare un accesso Single Sign-On (SSO) per il provisioning e la gestione dei servizi di sicurezza per la rete, gli endpoint e il cloud
• Gestire tutti i processi e i servizi di sicurezza da un’unica e semplice interfaccia cloud comune
• Ottenere visibilità e consapevolezza situazionale della sicurezza di rete da un unico pannello
• Assicurare una gestione delle policy priva di errori
• Implementare ed eseguire il provisioning dei firewall in remoto attraverso il cloud
Daniela Fusaro, Senior Solutions ArchitectRecorded: Dec 14 201818 mins
Trotz der unstillbaren Nachfrage nach Bandbreite müssen Unternehmen die Sicherheitsrichtlinien des Netzwerks immer noch schnell überprüfen und durchsetzen. Das ist besonders schwierig, wenn Sie Netzwerke von 10 Gb auf 40 Gb oder von 40 Gb auf 100 Gb aufrüsten.
Nehmen Sie teil am Webcast von Daniela Fusaro, Senior Solutions Architect bei Gigamon. Sie erläutert, wie Sie die mit diesen Netzwerkupgrades verbundenen Sicherheitsrisiken lösen, Ihre Sicherheit stärken, die IT vereinfachen und Kosten senken können.
Sie erfahren folgendes:
- Erhöhen Sie Ihren ROI für die Sicherheit: Filtern Sie die richtigen Daten aus dem Netzwerkverkehr der physikalischen, virtuellen und Cloud-Infrastruktur und leiten Sie diese an die relevanten Tools weiter
- Reduzieren Sie Ihr Sicherheitsrisiko: Überdenken Sie Ihre Netzwerksicherheitsarchitektur neu, indem Sie verschlüsselten Datenverkehr nur einmal entschlüsseln und die Überprüfung dieser Daten durch mehrere Sicherheitstools ermöglichen
- Verbessern Sie die Reaktion auf Bedrohungen: Erkennen Sie Muster und Bedrohungsvektoren in heterogenen Netzwerken schneller
Finden Sie heraus, wie sowohl Netzwerk- als auch Security-Teams bei Netzwerk-Upgrades schneller und sicherer zusammenarbeiten können, um Sicherheitsbedenken zu lösen - registrieren Sie sich noch heute!
Cory Minton and Brett RobertsRecorded: Dec 13 201843 mins
Director of AI and BI at Arrow Electronics, David Fearne, sits down with the Big Data Beard for his second appearance on the show and muses about the rapid evolution from Big Data to AI in the enterprise and the challenges organizations are and will face making real impacts with these emerging technologies.
This episode was recorded in the Dell EMC sponsor booth at Splunk conf2018 in Orlando, FL. A big thanks to Splunk, Dell EMC, and Arrow for making this possible.
Faraz Aladin, Director of Product Marketing @ IllumioRecorded: Dec 13 201849 mins
The sheer intensity and frequency of modern cyberattacks requires you implement new controls to reduce your attack surface and minimize the impact of a breach. The goal? Prevent unauthorized East-West traffic in the event of a breach to ultimately protect the high-value assets of your company. In this webinar, we'll discuss:
- The anatomy of a breach
- Techniques to mitigate the risk of being compromised
- How to use micro-segmentation enabled by real-time visibility to secure your crown jewels
Wouter Maagdenberg, TXTOmediaRecorded: Dec 13 201847 mins
Structured content is an ideal starting place for creating and producing rich media in bulk. A new technology created by TXTOmedia transforms this native and localized written documentation into rich media, such as animation, live-action video, and interactive visuals in an automated, fast, and cost-effective way — enabling versioning and respecting existing workflow processes within large organizations.
TXTOmedia supports XML and Structured Content in multiple languages which is then parsed by and transformed into rich media automatically. This allows you to take existing structured content and create video, slides, visual TOC, Hot Spot Images and Interactive Product Models.
–Watch instead of read; visuals and video are preferred above text by most audiences.
– Rich media creation is no longer a painful manual and disconnected process
–Technical publications become more vital for sales.
ABOUT WOUTER MAAGDENBERG
Wouter Maagdenberg started his career in 1996 with a specialized web agency for the media, music and sports industry in Amsterdam. He focussed on streaming media and continued to develop rich media software. In 2011 he sold his technology company to SDL. Today, Wouter focuses on the auto-creation of video and other rich media content. His company TXTOmedia delivers solutions to transform existing content into rich media such as animations and video for today's screens, AR and VR.
Chris Eng, Veracode Vice President of Research and guest, Forrester Research Principal Analyst Amy DeMartineRecorded: Dec 13 201857 mins
In our recent State of Software Security Volume 9 report, Veracode examined fix rates across 2 trillion lines of code shows that the number of vulnerable applications remains staggeringly high. More than 85 percent of all applications contain at least one vulnerability following the first scan, and more than 13 percent of applications contain at least one very high severity flaw.
One thing is certain: the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.
There are just too many vulnerabilities for organizations to tackle all at once, which means it requires smart prioritization to close the riskiest vulnerabilities first. For the first time, our report shows a very strong correlation between high rates of security scanning and lower long-term application risks, which we believe presents a significant piece of evidence for the efficacy of DevSecOps. In fact, the most active DevSecOps programs fix flaws more than 11.5 times faster than the typical organization, due to ongoing security checks during continuous delivery of software builds, largely the result of increased code scanning.
Join guest presenter Amy DeMartine, Principal Analyst, Forrester Research Inc., and Veracode’s Chris Eng as they deliver valuable takeaways for business leaders, security practitioners and development teams seeking to secure their applications. Listeners will learn potential prioritizations and software development methods that could help their organizations reduce risk more quickly.
Dr. Srinivas Mukkamala, CEO & Co-Founder of RiskSenseRecorded: Dec 13 201849 mins
Dr. Srinivas Mukkamala will share his views on the most dramatic security threats that will draw more attention in 2019. He will identify why new technologies will begin creating an even more porous and vulnerable IT infrastructure. Consider:
- AI might be your friend but it also powers your foes
- Robotic Process Automation (RPA) another crack in your attack surface
- DevOps Automation tools as targets for administrative controls and chaos
- API Keys becoming the keys to the kingdom
There is hope and Dr. Mukkamala will illustrate how organizations can have improved visibility, detection, remediation, and response when dealing with growing reliance on these technologies in 2019 and beyond.
Jim Fulton, Director Product Marketing, ForcepointRecorded: Dec 13 201835 mins
Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps.
In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security solution enables highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.
George Johnson, Vice President of Cyber Solutions, NC4 and Thanh Nguyen, Vice President of Technology, NC4Recorded: Dec 13 201844 mins
We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?
NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
Mike Osterman, CEO, Osterman ResearchRecorded: Dec 13 201846 mins
CASBs (Cloud Access Security Brokers) can provide visibility and protection for the myriad of sanctioned and unsanctioned cloud applications being used by employees in organizations today. Office 365 is undoubtedly one of the most popular, with most business-grade email and collaboration now taking place in this cloud environment.
In this session, CEO and Osterman Research founder Mike Osterman will discuss how a CASB can help secure Office 365 and review the solutions from Microsoft and Forcepoint. He will:
- Compare Microsoft’s built-in Office 365 Cloud App Security, offered in the Office 365 Enterprise E5 plan, to Forcepoint CASB
- Provide a detailed analysis of how both products compare over 13 key feature areas
- Consider coverage of third-party apps beyond Office 365
Attend this session to explore the best route to full Office 365 security.
Mike Osterman, CEO, Osterman ResearchRecorded: Dec 13 201838 mins
CASBs (Cloud Access Security Brokers), or CSGs (Cloud Security Gateways), are part of the rapid rise of emerging security technologies designed to enable digital transformation. With these solutions, organizations can experience the benefits of innovation and collaboration that cloud applications bring while maintaining visibility and control of their data.
In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. The survey’s main focus points include:
-Key cloud adoption concerns
-Most valued CASB features
-Levels of confidence in controlling data and maintaining compliance
Attend this session to learn more about the need for and use of CASBs in today’s organizations.
Rajesh Krishnan, Product Marketing, SynackRecorded: Dec 13 201822 mins
Adoption of bug bounty programs has doubled in the past 3 years, shining a light on crowdsourced security testing options. The bug bounty model, which incentivizes a crowd of creative hackers to probe organizations’ digital assets for exploitable vulnerabilities, has proven quite effective. However, not all crowdsourced testing programs are equal. All programs crowdsource hackers, most incorporate levels of controls for trust and accountability, and some use testing data to help break down testing coverage levels and risk management.
Join this webinar to learn:
- Why crowdsourcing hackers and bug bounty is trending
- Who these crowdsourced hackers are and what they do
- Where crowdsourced security programs differ
- How to decide what crowdsourced programs best fit your organization
- Where the future of crowdsourced security is heading
Nirav Shah, Sr. Director, Products & Solutions, FortinetRecorded: Dec 13 201835 mins
Fortinet was named a Challenger in the first Gartner Magic Quadrant for WAN Edge Infrastructure.
Join our expert to learn about insights from the report and how Fortinet SD-WAN weaves both networking and security, providing one offering that is scalable, reliable, and secure; setting us apart from the competition.
Jake Reynolds (LogRhythm) and Doug Hurd (Cisco)Recorded: Dec 13 201856 mins
Smarter, faster security through LogRhythm and Cisco integrations
LogRhythm and Cisco are committed to helping you enhance your security operations through the seamless integration and powerful capabilities of the LogRhythm Threat Lifecycle Management platform and Cisco’s Threat Grid, Umbrella, Firepower and ISE.
Currently integrating with over three dozen Cisco products, LogRhythm provides centralized visibility and advanced security analytics across the Cisco-enabled environment and makes security events actionable in the network. Stay in front of cyber adversaries and proactively detect, respond to and remediate cyberthreats with this powerful integration.
In this technical webinar, you’ll learn how to:
- Gain immediate insight with Cisco and LogRhythm’s comprehensive visibility
- Streamline investigations with Umbrella and Threat Grid
- Accelerate and enable endpoint and perimeter remediation with ISE and ASA
Scott Scheferman, Cylance Director of Global Services; Masataka Hashiguchi, Interfocus Sales EngineerRecorded: Dec 13 201856 mins
Join Interfocus and Cylance for this webinar outlining the workplace productivity gains that your business can realize through an integrated and unified platform delivering both IT asset management and endpoint security. Most IT teams today suffer from "alert fatigue" from the growing number of devices on their network, and spend on average 5-13 hours a week cleaning up compromised endpoints. Scott Scheferman from Cylance and Masataka Hashiguchi from Interfocus will demonstrate how automation and prevention is worth a pound of cure on your endpoints.
Sushila Nair (NTT DATA Services) | Topher Chung (OneLogin)Recorded: Dec 13 201860 mins
Discover the cyber security attack trends that will shape your security planning and budgets for 2019. Discover what's new on the threat horizon, how businesses are coping and the key areas for improvement. Learn about the latest technologies enabling stronger and more resilient enterprises.
Join this keynote panel of security experts and industry veterans as they discuss:
- New on the threatscape
- Cyber attack trends seen in 2018
- Addressing your cyber risk
- How to prepare for 2019
- Security strategy and making the most of your security dollars
- New leaps in technology
- Best practices and recommendations
- Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
- Topher Chung, Director of Security Engineering, OneLogin
Abinash Tripathy, Co-founder, HelpshiftRecorded: Dec 13 201862 mins
Bots, artificial intelligence, and messaging — cost-effective, easy-to-implement automation technology —- is gaining a major foothold in customer service organizations, and the impact is palpable. Contact centers are on track to shrink by 50 percent in the next three years as routine tasks are taken over by faster, efficiency-saving bots that can triage requests, boost customer satisfaction, and offer an 8.6 percent increase in profit margin per customer.
These technologies are also making it easy to tap into the gig economy, which is producing a growing supply of tech-savvy labor for companies that also saves costs. For workers, it means flexible arrangements with low barriers to entry, plus more satisfying employment, now that the grunt work has been eliminated by automation.
AI and automation is set to level up the workforce, the economy, and your bottom line. For a closer look at the long-term implications of automation, how to invest in the brave new world of work, and more, don’t miss this VB Live event!
Attend this webinar and learn:
* The workforce implications of customer service bots
* How bots and employees can work side-by-side
* What smart companies are doing to lay the groundwork
* Future of work - what does it look like?
* Abinash Tripathy, Co-founder, Helpshift
* Peter Ryan, Principal Analyst, Ryan Strategic Advisory
* Stewart Rogers, Analyst-at-Large, VentureBeat
* Dilan Yuksel Moderator, VentureBeat
Scott Abel, The Content WranglerRecorded: Dec 13 201857 mins
Join Scott Abel, The Content Wrangler, in The State of Technical Communication 2019 webinar for a review of the troubles, trends, tools, and technologies impacting technical communication teams around the globe.
Scott will share high-level results from our annual Technical Communication Industry Benchmarking Survey. Attendees will receive a complimentary summary of the survey results.
Flaviu Lang & Maik Pietsch | Cloudflare - Experten für Cyber-Sicherheit | DACHDec 17 20189:00 amUTC27 mins
Dieses Webinar bietet Ihnen einen Überblick über die Lage der Cyber-Sicherheit in der DACH Region. Thematisiert werden die verschiedensten Formen, die Cyberangriffe einnehmen können, sowie passenden Schutzmechanismen, die Sie in Ihrem Unternehmen implementieren können.
Andy Yeates, Engineer, IBM ResilientDec 17 201810:00 amUTC40 mins
The Resilient incident response platform (IRP) empowers cyber security teams to orchestrate their incident response processes, and respond to and resolve incidents faster, more effectively, and more intelligently. The Resilient IRP is the leading platform for orchestrating and automating incident response processes.
This presentation will showcase the Resilient IRP’s ability to enable complete IR orchestration and automation - aligning security teams' people, process, and technologies into a single hub for incident response. By understanding the capabilities of the solution, attendees can learn how to:
• Achieve greater intelligence and efficiency by integrating your existing security technologies, including SIEMs, EDR, threat intelligence, and more.
• Adapt to real-time incident conditions with Resilient Dynamic Playbooks –ensuring a fast and complete response to all incident types.
• Build, configure, and maintain your own IR action plans within hours or days
Dania Ben Peretz, Product ManagerDec 17 20183:00 pmUTC45 mins
Are you getting the most out of your Security Policy Management Solution?
Today’s security policy management solutions do much more than automate traditional change management tasks. And yet, managing processes is becoming increasingly complex, time consuming and riddled with errors.
Many professionals believe they need additional sophisticated tools to address these challenges. However, you may already have what you need, up and running in your organization.
Join us in this webinar to learn how AlgoSec’s solution simplifies and automates security policy management to make the enterprise more agile, more secure and more compliant across your ever-changing network:
•Gaining visibility of unsecured traffic used by your business applications
•Closing the gaps in your network map to get your automation in place faster
•Tying cyberattacks to business impact
•Being audit-ready all the time
As year 2018 draws to a close, one thing is clearly evident – more enterprises than ever are getting breached and the traditional line of defenses are simply not holding up! With an unprecedented sophistication to these new breed of cyberattacks, now run by organized syndicates instead of mere criminals, and an equal pressure on resources, CIOs and CISOs are facing a classic dilemma. How does one secure their enterprise and actively reduce risk, while they also strive to empower their employees, organizations and digitally transformed businesses to be productive and competitively agile in the marketplace.
As the cybersecurity space innovates and evolves, there are clear must-do items that CIOs and CISOs must act upon for dramatically improving their cybersecurity with optimal investment and time. Attend this webinar as Bala Desikamani, Vice President – Marketing, Cyberinc highlights ‘5 things CISOs & CIOs must do in 2019’. He will offer a simple yet highly effective approach that will help leaders secure and significantly mitigate the risk to their businesses while empowering their businesses and employees with a new level of freedom and productivity.
The webinar will cover
1. A brief reprise of the harsh realities of Cybersecurity today
2. Caught in the web: The vicious reactive model of cybersecurity
3. Breaking free: The Cybersecurity Handbook – 5 thing CISOs and CIOs must do in 2019
4. The path to get there – dramatically reduce attack surface, unlock value and empower organizations
Bashyam Anant, Vice President Product Management, CavirinDec 17 20186:00 pmUTC60 mins
As 2019 approaches, DevOps & SecOps are looking to minimize the risks due to change management delays and manual processes. Today's existing approaches are good at monitoring and presenting what is wrong, but don’t take that vital next step in automating the correction of any issues.
In this Webinar we will show you how to close the security gap through auto-remediation, combining AWS Lambda functions and Ansible Playbooks. Auto-remediation extends from your cloud security posture to your VMs and container instances, on-prem, or in the cloud.
Can't make the date? No problem. Simply complete the registration form and we'll send you the recording to watch at your convenience.
Adam Brady & Mark Baker, LogRhythmDec 18 20189:00 amUTC48 mins
The Internet of Things (IoT) will generate, process and share more data than ever before. Data that needs to be secured.
The data generated by non-traditional sensors and systems can help detect anomalous behaviour and maintain the uptime we expect from the new wave of connected devices.
In this webinar, LogRhythm’s security experts will explain how this data can be used, with examples from a range of industries – from jet turbine manufacturers to in-home automation providers.
Join the webinar to discover:
1. How IoT devices blur the boundaries between IT security, operational technology and security in the physical world
2. How to gain visibility into the data generated by these devices – and what it really means
3. What customers have experienced through real-life use cases
Aria Naderi; Zbigniew SkurczynskiDec 18 20189:00 amUTC60 mins
IT-Vorfälle treten ständig auf, von Ausfällen, Verlangsamungen von Anwendungen bis hin zu Cyberangriffen und einigen, die kritischer sind als andere. Bei IT-Vorfällen, die eine sofortige Aufmerksamkeit erfordern, müssen IT-Experten rechtzeitig einbezogen und verschiedene Gruppen informiert und/oder aktualisiert werden. Die Herausforderung, vor der die meisten Unternehmen stehen, besteht in der Koordination der Reaktion auf IT-Vorfälle, wenn Zeit im Vordergrund steht. Zum Beispiel, wie man:
Sammeln und verwalten Sie alle relevanten Informationen zentral.
Identifizieren Sie den geeigneten Informationsaustausch mit verschiedenen Rollen.
Sicherstellung einer zeitnahen und effektiven Reaktion zwischen den Teams
Ermöglicht eine effiziente Zusammenarbeit unabhängig vom Standort der Mitarbeiter.
In diesem Webinar erläutern Aria Naderi von Cherwell und Zbigniew Skurczynski von Everbridge, wie die integrierte Cherwell-Everbridge-Lösung Unternehmen bei der Verwaltung, Kontrolle und Automatisierung ihrer Reaktion auf IT-Vorfälle unterstützt, um die Auswirkungen auf ihre IT-Experten und ihr Unternehmen zu minimieren.
Julian Totzek-Hallhuber, Principal Solutions Architect at VeracodeDec 18 201810:00 amUTC45 mins
Traditionell haben die meisten Führungskräfte die IT Sicherheit als notwendiges Übel betrachtet - eine Investition, die nur erforderlich war, um ein schlechtes Ergebnis zu vermeiden, aber nicht als etwas, das neue Kunden einbringen oder den Umsatz steigern würde. Aber das scheint sich zu ändern. Wir stellen zunehmend fest, dass die Erstellung sicherer Software zu einem Wettbewerbsvorteil führt und das Endergebnis steigert.
Dieses Webinar, das von Julian Totzek-Hallhuber - Principal Solutions Architect bei Veracode gehalten wird, hilft Ihnen dabei, AppSec zu unterstützen. Durch die Darstellung des möglichen ROI einer Cloud-basierten Anwendungssicherheitslösung, die in den Softwareentwicklungslebenszyklus integriert ist, stellen wir Ihnen die Tools zur Verfügung, die Sie zur Erstellung Ihres C-Level-Pitch benötigen.
David Emm, Principle Security Researcher and Prof. Steven Furnell, Professor of Information Security, University of PlymouthDec 18 201811:00 amUTC75 mins
24/7 connectivity is fast becoming an integral part of everyday life. Most of us now routinely bank, shop and socialise online, and the Internet is the life-blood of business.
Yet too many of us fail to secure our online identities adequately. This presentation will examine why this is important, what we should do to secure our online accounts and how criminals exploit our lack of security.
Steven Furnell is a the Associate Dean and IT Security Professor at the University of Plymouth. His research interests spans multiple areas including: Cyber Security / IT Security, including user authentication, biometrics, cyber crime, intrusion detection and response, security management and culture, usable security; Internet Technologies and Applications; Mobility.
A published author, Steven will share his insights we can all individually make it harder for Cyber Criminals to access your passwords.
David Emm is a Principle Research Analyst at Kaspersky Lab and regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable adviser on all aspects of online security.
After presenting your business case it's time to think about procurement - but how do you choose between the government's G-Cloud framework or TS2?
This session will be presented by our Commercial Director Nicky Stewart who will be answering the most frequently asked questions surrounding procurement
What you'll learn
- The main differences between TS2 & G-Cloud
- The Pros & Cons of using TS2 vs G-Cloud
- Top Tips for making a succesful bid through either framework
Robert O'Brien, CEO MetaComplianceDec 18 20183:00 pmUTC30 mins
Phishing scams are a persistent problem for organisations at all times of the year, however there is a steep increase in the number of scams at Christmas as hackers take advantage of distracted staff to launch targeted attacks.
When we’re distracted, mistakes happen, and Christmas tends to be the one time of the year when employees let their guard down which can result in a massive loss of sensitive data.
Cybercriminals don’t care about your internal processes around Cyber Security awareness communication. They are not stifled by the rules around staff communication.
Cyber Security awareness training needs to be a top priority and it has to be of “stand out” quality. Not the normal “techno porridge” that has been passing for Information Security and Privacy training over the last 15 years.
Cyber Security awareness is about the hearts and minds of your staff and it’s one of the biggest challenges in this new digital economy. Join us at our short webinar to hear about the best practice approaches to getting employees to participate in securing your digital assets.
This 15-minute webinar will cover:
•The seasonal phishing scams your employees need to be wary of
•The 5 key aspects of a Cyber Security Awareness program
•How Cyber Security is not about indulging in wishful thinking.
John Moran, Senior Product Manager, DFLabs and Heather Hixon, Senior Solutions Architect, DFLabsDec 18 20183:00 pmUTC41 mins
DFLabs’ innovative Open Integration Framework is designed to enable security teams to customize and easily add new automated integrations between their existing security tools and our IncMan SOAR platform, enabling SOCs and MSSPs to add unique incident response actions without the need for complex coding. The new framework is part of DFLabs’ commitment to delivering a more open, community-oriented solution to automation and orchestration, which also includes a new Community Portal.
The Community Portal serves as a hub for customers, where they can get the latest information and support from DFLabs and interact with other like-minded customers. Moreover, this Community Portal aims to provide a cooperation ecosystem for companies and organizations, where they can share integrations of security tools and IncMan SOAR. This approach will enable our customers to tackle specific use cases by uploading or downloading integration files from the Portal to IncMan SOAR.
Join this webinar to learn more about these two new exciting features, as well as DFLabs’ other latest developments and enhancements to IncMan SOAR v4.5 including:
- Open Integration Framework
- Community Portal
- Enhanced REST API
- Automated event triage (START Triage)
- New bidirectional integrations
- Improvements to existing integrations
- And more...
Joe Schreiber, Technical Director, Business Development, TufinDec 18 20184:00 pmUTC60 mins
Breached. Hacked. Cyberattack. These are all words that dominated headlines in 2018.
While we all know that the attacks that prompted these headlines were largely avoidable in hindsight, we also know that enforcing security policy across the legacy physical network is challenging. Furthermore, the Cloud First Policy and the adoption of containers introduce new risks to organizations and raise new security concerns that need to be anticipated.
Join us on December 18 for a webinar with Joe Schreiber, Technical Director of Business Development, to learn from the mistakes of others in 2018 and how to avoid making them – and the headlines – in 2019. We’ll draw from his 20+ years of experience including security operations and incident response.
Key topics include how to:
•Develop and deploy an enforceable security policy
•Clear time for proactive security initiatives
•Mitigate the inherent risk of DevOps’ CI/CD agility
•Contain malware outbreaks
•Anticipate security risks of containers
Johna Till Johnson, CEO & Founder, Nemertes ResearchDec 18 20184:00 pmUTC60 mins
Everyone talks about IoT, and many organizations are implementing it and reaping the business benefits. But even those who have had IoT projects deployed for years may not have a comprehensive architecture and framework in place to help guide technology decisions and streamline operations.
Join Nemertes CEO Johna Till Johnson as she reviews the IoT architecture and framework and shares guidance gleaned from leading-edge clients and research study participants.
Jae Lee – Director Product Marketing, Security Markets, SplunkDec 18 20185:00 pmUTC63 mins
Assessing and monitoring basic security posture is critical. Security teams need the ability to identify and alert on a particular type of malicious activity, AND determine whether that alert is meaningful in a broader context.
Splunk can help your organization get up and running very quickly with the ability to assess basic security posture. With Splunk, you can centralize security visibility and adopt an investigative mindset to answer questions like:
- How secure are my endpoints?
- What is happening on my network?
- Where is it most critical for me to apply updates?
- Are user accounts configured properly?
- Is there any suspicious traffic going out?
- How is overall security posture in my AWS environment?
This webinar is perfect for organizations that are just getting started with formalizing their security operations. We’ll show you how with Splunk Security Essentials, a use case framework tool that you can download and stand up quickly to immediately glean security value using your own data sources.
Application containers like Docker help DevOps work faster and quicken time-to-market, but they also create a major Cyber Exposure gap. Traditional vulnerability management approaches can’t easily secure containers – let alone keep pace with the high-velocity world of DevOps and continuous innovation. But don’t despair. We’ve got just the thing to save you from this nightmarish ordeal. Join us as we discuss a number of container security best practices to help you:
- Learn why “shifting left” is critical to gaining visibility into containers
- Understand how container security is a win for both security and DevOps
- Find out three steps you can take to master container security
Timothy Warner, Microsoft MVP, PluralsightDec 18 20185:00 pmUTC57 mins
Are you running Microsoft Windows Server 2008 or 2003 for your business critical applications, like many enterprises? Server 2008 will reach End of Support in January 2020 and with that no more security and maintenance patches without costly alternatives.
Join us at this webcast to learn the best ways to secure, migrate and future-proof your legacy Windows Server applications without having to recode them. You will learn how:
A container platform can accelerate migration to Server 2016
Containers are more than a development toolset used primarily to build new applications
The Docker container platform gives enterprises a way to containerize and easily migrate existing applications
Cut infrastructure and management costs for your legacy applications by up to 50%
Learn how to simplify your migration!
Andrew Tsonchev, Director of Darktrace IndustrialDec 18 20185:00 pmUTC45 mins
Today’s cyber security landscape is dominated by talk of AI - but should we really relinquish control to machines? In this webinar, we’ll discuss how to trust AI to combat today’s most advanced cyber-threats and protect our organizations for the long term.
Join Andrew Tsonchev, Director of Technology at Darktrace, as he explores what it will take to bridge the trust gap between humans and AI.
- The benefits and challenges of implementing AI in your security stack
- How AI augments your security team by autonomously detecting and responding to emerging threats
- How to build trust between your organization and cyber AI
Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWSDec 18 20186:00 pmUTC60 mins
There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.
Join us on December 18th to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.
During this session, you will learn:
-How DevOps and InfoSec teams can align to the new DevSecOps paradigm
-Why continuous compliance management is a new business imperative
-How to build security in to your Continuous Integration/Continuous Development pipeline
Free Giveaway: Register for this webinar and join the live session for your chance to win a $500 AWS promotional credit. You can use your AWS credit to offset your AWS infrastructure costs when getting started on the marketplace*. Five lucky live attendees will be the winners!
* subject to the applicable terms and conditions currently available at https://aws.amazon.com/awscredits/.
David Pearson, Principal Threat Researcher, Awake SecurityDec 18 20186:00 pmUTC24 mins
Many remote access tools are used legitimately and not considered malware. However, these tools actively bypass network controls, obscuring which parties are communicating, when, and how. This ability to fly under the radar is attractive to malicious insiders and outside attackers alike. This talk will discuss common techniques these tools use and how security teams can find and understand them.
In this webinar you will:
1) Gain an understanding of why remote access tools should be on your radar
2) Learn common techniques used by remote access tools to bypass conventional detections
3) Learn how to dissect remote access tools within Wireshark
4) Discover information that is sometimes leaked by these programs
5) Learn how to abstract out detection capabilities for this class of programs
Brent Roskos, Principal Cloud Architect, Red Hat and Raffaele Spazzoli, Senior Architect, OpenShfit, Red HatDec 18 20187:00 pmUTC38 mins
Increasingly, more organizations are looking to easily build cloud-native applications, deploy them, and manage workloads across a hybrid cloud without sacrificing existing investments. The promise of deploying containers to a hybrid cloud is great—delivering a scalable and workload-driven IT platform with installation integration points that facilitate quick, responsive innovation.
In this webinar, we’ll discuss how you can accelerate your journey to hybrid cloud and get the most value from open source technology platforms.
- How using Red Hat® OpenShift® Container Platform can expand the flexibility of Red Hat OpenStack® Platform to take full advantage of your cloud infrastructure.
- Integration points, such as load balancers, node scale-out, avoiding double encapsulation, support for containerized development, persistent object and block storage, autoscaling for virtual machines, and bare metal as a potential service for physical servers.
- How Red Hat Consulting can help you more quickly make these components work with a well-rounded adoption program to speed up your journey to hybrid cloud.
Mike Larmie, Federal Solutions Architect, SynackDec 18 20187:00 pmUTC53 mins
Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:
-Who performs the services?
-How often do they run in a network environment?
-What’s covered in their data output and reporting?
-What’s their value?
Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.
BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.