Hi [[ session.user.profile.firstName ]]

IT Security

  • 7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace
    7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace Daniele Nicita, Consulting Systems Engineer, FireEye Italia Recorded: Mar 28 2017 45 mins
    Oggi tutti parlano di Endpoint, il panorama è piuttosto confuso, i messaggi marketing sembrano essere tutti uguali indipendentemente dal vendor che li propone.
    Quali sono le domande da porsi per fare chiarezza?
    Partecipa ad un webinar live dove Daniele Nicita analizzerà le 7 domande che più spesso si è sentito fare e che aiutano a chiarire questo mondo degli Endpoint in rapidissimo cambiamento.
  • Detecting Network Threats: What Can Endpoint Data Tell You?
    Detecting Network Threats: What Can Endpoint Data Tell You? Greg Foss, Security Architect, LogRhythm & Chris Berninger, Senior Systems Engineer, Carbon Black Recorded: Mar 28 2017 60 mins
    Data-driven security is the future, but alarm fatigue and data overload continue to hold Security Operations teams back. Fortunately, there are some easy ways to organise and correlate data so you can simplify the threat hunting process and free up your resources to better detect, respond and neutralise advanced threats.

    In this webcast, Greg Foss, Security Architect at LogRhythm, and Chris Berninger, Senior Systems Engineer at Carbon Black, discuss how to proactively search for and detect threats in your network.

    You’ll learn:

    • To use endpoint data to gain visibility into your network and understand what’s really going on in your network
    • How LogRhythm SmartResponse can help orchestrate security operations
    • Threat hunting techniques using Carbon Black within LogRhythm

    Register now to discover how to use insights from endpoint data to best protect your organisation from advanced attacks.
  • Prevention Week Pt 1: Stop Credential Theft and Abuse
    Prevention Week Pt 1: Stop Credential Theft and Abuse Brian Tokuyoshi, Senior Solutions Analyst at Palo Alto Networks Recorded: Mar 28 2017 35 mins
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.
  • Prevention Week Pt 1: Stop Credential Theft and Abuse
    Prevention Week Pt 1: Stop Credential Theft and Abuse Brian Tokuyoshi, Senior Solutions Analyst at Palo Alto Networks Recorded: Mar 28 2017 35 mins
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.
  • Learn: SANS CyberTalent Women's Immersion Academy (Cybersecurity Training)
    Learn: SANS CyberTalent Women's Immersion Academy (Cybersecurity Training) Sonny Sandelius, SANS CyberTalent Division Recorded: Mar 27 2017 63 mins
    Join the SANS Institute and WSC for an insightful presentation about the SANS CyberTalent Women’s Immersion Academy. This academy is designed to help qualified women receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in six to eight months, depending upon program selected. The program is at NO COST to the selected women who attend and includes training and certification.

    Applications are due by April 5th, 2017.

    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • Hear from a recent graduate who will share her experience
    • How this training academy and related certifications can help your career
  • BrightTALK at RSA 2017: Gary Hayslip, CISO of San Diego on the 2017 Threatscape
    BrightTALK at RSA 2017: Gary Hayslip, CISO of San Diego on the 2017 Threatscape Gary Hayslip, CISO, City of San Diego and Josh Downs, Community Manager, BrightTALK Recorded: Mar 27 2017 13 mins
    BrightTALK caught up with Gary Hayslip, CISO of the City of San Diego for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - Cyber challenges for the new Trump administration
    - How to improve diversity and equality in the information security industry
    - Critical infrastructure and its specific vulnerabilities
    - How to prepare IoT networks to ensure that they're not at risk from malicious threat actors
    - The evolution of cyber threats

    About the Speaker:
    As CISO for the City of San Diego, Gary Hayslip advises the City’s executive leadership (mayoral, city council, and 30+ city departments and agencies) on protecting city government information resources. He oversees citywide cybersecurity strategy and the enterprise cybersecurity program, operations, compliance and risk assessment services. His mission includes creating a “risk aware” culture that places high value on securing city information resources and protecting personal information entrusted to the City. He is Co-Chair for Cybertech and an active member of ISSA, ISACA, OWASP and INFRAGARD.
  • Own Your Keys to the Cloud
    Own Your Keys to the Cloud Rich Mogull, CEO, Securosis; Ken Beer, GM AWS; Jon Fan, Dir of Enterprise Products, Box Recorded: Mar 24 2017 59 mins
    As organizations, like yours, move their data to the cloud file sharing and collaboration solutions, there may be a limit to what type of data can be moved there without controlling your own encryption keys. With recently announced Box KeySafe (formerly Box EKM), you can now take advantage of content collaboration in the cloud while maintaining independent control over the encryption keys that protect their content. How?

    Box has partnered with Amazon Web Services to provide on-demand management of keys through AWS KMS (Key Management Services). This is a perfect option for organizations that require a simple solution configurable in 30 minutes to address advanced security needs.

    Join Rich Mogull, Industry Analyst and CEO of Securosis with Ken Beer, General Manager of Amazon Web Services and Jon Fan, Dir of Enterprise Products at Box to learn how to:

    - Identify whether you need customer-managed encryption
    - Evaluate options and identify requirements
    - Real-world case studies from different industries and company sizes
    - How organizations justify the investment
    - How to deploy fast without compromising usability and governance at scale
  • Demo - New Box Provider Solution
    Demo - New Box Provider Solution Missy Krasner, Box Recorded: Mar 24 2017 42 mins
    Are you looking for ways to digitize your paper-based workflows at your hospital? Faxing, scanning and burning CDs are labor intensive and require infrastructure costs? To address this, Box, the leading HIPAA compliant collaboration platform for providers and payors has launched a new Provider Solution that helps healthcare organizations digitize paper-based workflows. This new solution includes our core Box collaboration service with our new Box DICOM Viewer (an FDA cleared Class II Medical device), Box Governance to help with data retention and content security, and some new partner integrations that includes messaging into and out of EHRs.

    View this on-demand webinar to see how the new Box Provider Solution helps hospitals:

    - Digitize paper based workflows - Integrate with faxing services to minimize manual paper-based workflows and improve document capture.
    - View and share medical images - Store, view and share clinical imaging studies securely in the cloud or on any mobile device. Share imaging studies across facilities, with patients and with referring doctors. Enable remote diagnosis or 2nd opinion workflows and wet reads and consults on-the-go.
    - Communicate securely with EHR/PHRs - Using the government sponsored Direct secure messaging protocol, Box can send and receive medical records from EHRs/PHRs in the form of CCDs or CDAs.
    - Stay secure and HIPAA compliant - Set data retention policies and content security rules with the new Box Governance service. Box signs HIPAA Business Associate Agreements with its healthcare customers and offers the best-in-class security, auditing and reporting.
  • The Total Economic Impact of Box
    The Total Economic Impact of Box Michelle S. Bishop, Principal Consultant of Total Economic Impact™ Practice, Forrester; Jeremy Wood, Sr Director of PM, Box Recorded: Mar 24 2017 62 mins
    Looking to better understand your return on investment from using Box – and how you can use the same ROI­analysis techniques to make smarter IT decisions within your own organization?

    Today's workforce demands the ability to work securely from anywhere, at any time, on any device. These highly mobile­centric employees need robust tools to collaborate among diverse teams, yet sophisticated cybersecurity threats have placed new demands on IT – and on the applications they're choosing to deploy. Although cloud solutions have revolutionized the way we get work done, many businesses are still struggling to understand the true cost benefit of deploying these invaluable solutions.

    Box has commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study, creating a detailed financial analysis of the cost, benefit, flexibility and risk factors associated with deploying Box.

    Watch this webinar to learn why the Forrester TEI study can be the key to your organization's digital evolution:
    - Become more familiar with Box and its functionality
    - Hear a detailed ROI analysis of Box deployment, as outlined in the -
    Forrester TEI study for Box
    - Discover the methodology Forrester uses to develop the study
    - Gain insight into how you can apply the Forrester methodology to your own company
  • The Simple, Smart Way to Move to the Cloud with Box
    The Simple, Smart Way to Move to the Cloud with Box Aaron Kramer, Head of Consulting, Box; Greg Cannan, Divisional Informational Officer, Toyota USA​ Recorded: Mar 24 2017 51 mins
    Considering the move to cloud but facing challenges getting there?

    Companies of all sizes and in all industries have recognized the productivity gains and cost benefits of moving to the cloud, but many often end up inadvertently using migration methods that are inefficient and insecure. After all, moving massive amounts of sensitive data to the cloud isn't a simple undertaking!

    At Box, we believe businesses across the globe should be able to make a smooth and seamless transition to the cloud so they can start reaping its benefits faster. That's why we're excited to announce a new service called Box Shuttle: the simple, smart way to migrate large amounts of content to Box.

    Watch now to learn about how our content migration services can help you move to Box.

    - Justify the investment – and return on investment – of content management in the cloud
    - Learn how Box can help you do the heavy lifting with customizable migration service offerings
    - Hear how Toyota moved hundreds of millions of files to Box and got up and running in a week

    It's your move. Register now for the webinar to learn how Box can help you accelerate your shift to the cloud.
  • The Next Wave of Content Management
    The Next Wave of Content Management Cheryl McKinnon, Principal Analyst, Forrester Research; Rand Wacker, VP of Enterprise Product Management, Box Recorded: Mar 24 2017 49 mins
    You're now thinking about moving your content management to the cloud, and the tools you need are finally here. Jumpstart the transition by joining this conversation with Forrester's Principal Analyst, Cheryl McKinnon and Box's VP of Enterprise Product Management, Rand Wacker where they'll cover the changing ECM landscape and reveal exclusive trends in the space.

    Plus, you'll hear from Box on how it offers a simple, modern approach to content management, bringing you the key capabilities from your legacy ECM system without compromising user experience or security.

    Join this webinar to hear about:
    - The recent evolution of the ECM landscape
    - The future of ECM and how to implement successful change management
    - Box's modern approach to content management and what it means for the enterprise
  • Rapid7 AppSpider Product Demo
    Rapid7 AppSpider Product Demo Hollis Howell Recorded: Mar 24 2017 23 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • Internet of Things: Smarter Security and Visibility in Manufacturing
    Internet of Things: Smarter Security and Visibility in Manufacturing Barbara Giamanco, Kimberly Knickle & Patricia Panchak Recorded: Mar 24 2017 63 mins
    Manufacturing is evolving worldwide and IoT is supporting better manufacturing processes.

    New information technologies make managing manufacturing operations more efficient and the work smarter. The Internet of Things (IoT) has the potential to radically improve visibility throughout the manufacturing process.

    Join this dynamic discussion with Barbara Giamanco, CEO, Social Centered Selling, Kimberly Knickle, Research Vice President, IDC Manufacturing Insights, and Patricia Panchak, Editor-in-Chief, Industry Week and Group Content.

    In this webcast you will:

    - Learn how smart manufacturing impacts all areas of the business
    - See how new technologies enable the tracking of assets, processes and resources
    - Learn what it takes to make sure machines work together
    - See how teams of knowledge workers will orchestrate the process
    - Learn how to construct your security roadmap
  • Rapid7 InsightIDR Product Demo - APAC
    Rapid7 InsightIDR Product Demo - APAC Eric Sun and Pat Haley Recorded: Mar 24 2017 48 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    - How to cut through the noise to detect attacks
    - How to investigate incidents faster
    - How to end the drudgery of security data management
    - Q&A
    - And more!
  • Avoiding IT and Operational Technology Convergence Pitfalls
    Avoiding IT and Operational Technology Convergence Pitfalls Dan Ortega - Vice President of Marketing Recorded: Mar 23 2017 4 mins
    In this video, we discuss pitfalls to avoid when consolidating IT and Operational Technologies

    A key technology convergence impacting the mainstream adoption of the Internet-of-Things (IoT) is the coming together of Information Technology (IT) and Operational Technology (OT).
    Below we explore five potential pitfalls to avoid when considering unified IT and OT:
    1.Visibility: Improving visibility across unified IT/OT infrastructure has some benefits such as enabling a single service desk to handle both IT and OT domains, and being able to use common management tools.

    2.Security: We have discussed how operational technology can create a risk for IT. There is, however, an upside of converging IT and OT. The converged technology infrastructure can be subject to the same security policies and can use common compliance controls.

    3.Scalability: By operating OT and IT in separate silos, you miss out on opportunities to procure complimentary technology for both. Purchasing can negotiate better discounts if they are buying technology in high volumes and IT gets to buy IT and OT technology that works together because it can be pre-integrated.

    4.Administration: By keeping IT and OT separated, an organization cannot benefit from being able to lower administration costs through streamlining and centralizing management.

    5.Collaboration: Higher up the food chain, since OT is normally more closely aligned with how the business makes money, a converged IT and OT solution can improve the partnership between business and IT.
    Blazent focuses on providing near real-time insights that can be gained by being able to ingest and analyze large numbers of IT and IoT data streams, correcting data gaps and inconsistencies before the data is consumed.
  • RSA 2017 — Security and Availability
    RSA 2017 — Security and Availability Bryan Embrey, Senior Product Marketing Manager, Cradlepoint Recorded: Mar 23 2017 1 min
    At RSA 2017, Cradlepoint Senior Product Marketing Manager Bryan Embrey discusses security and five-nines availability that is cloud-monitored and cloud-managed through a single pane of glass.
  • RSA 2017 — SDN for IoT
    RSA 2017 — SDN for IoT Todd Kelly, SVP for Emerging Technologies, Cradlepoint Recorded: Mar 23 2017 2 mins
    At RSA 2017, Cradlepoint SVP for Emerging Technologies Todd Kelly discusses the influx of the Internet of Things, and how a Software-Defined Perimeter approach can foster single-pane-of-glass management of networks, applications, and workloads.
  • RSA 2017 — All-in-One Solutions in Branches & Vehicles
    RSA 2017 — All-in-One Solutions in Branches & Vehicles Kevin Johnson, Solution Architect, Cradlepoint Recorded: Mar 23 2017 2 mins
    At RSA 2017, Cradlepoint Solution Architect Kevin Johnson talks about all-in-one network connectivity and security through Cradlepoint routers — both at the branch and in vehicles.
  • FireEye Government Forum: The Hill Perspective
    FireEye Government Forum: The Hill Perspective FireEye Recorded: Mar 23 2017 22 mins
    Keynote: The Hill Perspective
    Senator Mark Warner, Virginia
  • Under The Hoodie: Actionable Research from Penetration Testing Engagements-EMEA
    Under The Hoodie: Actionable Research from Penetration Testing Engagements-EMEA Tod Beardsley and Andrew Whitaker Mar 28 2017 1:00 pm UTC 45 mins
    Join Andrew Whitaker and Tod Beardsley in a webcast overview of Rapid7's recently published paper, "Under the Hoodie: Actionable Research from Penetration Testing Engagements." In this webcast, Andrew and Tod will cover the major findings from our latest research, including the vulnerabilities and misconfigurations most often found on our engagements, the effects of account lockouts and two-factor authentication on pen testers, and the most effective countermeasures you can take to detect and prevent criminal hackers from breaking into your network.
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review
    Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Gomathy Kannan, Product Marketing Manager Mar 28 2017 5:00 pm UTC 60 mins
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
  • What Every Healthcare CIO Needs to Know About Cloud IAM
    What Every Healthcare CIO Needs to Know About Cloud IAM Nadav Benbarak Group Marketing Manager, Vertical Solutions Okta Mar 28 2017 5:00 pm UTC 60 mins
    Okta_March SimulcastYour on-prem IAM is probably slowing you down. Adding new apps is slow and brittle. Patient portals are fragmented. Managing external physician and partner access is expensive.

    The good news is that Cloud IAM is changing the game for healthcare providers, payors, and life sciences companies, by removing obstacles to security, cost reduction, and user experience.

    Join our webinar to:

    - Learn about common Healthcare IAM challenges
    - Understand how Cloud IAM enables healthcare modernization
    - See a live demo of the Okta Identity Cloud in action

    Speaker Bio:

    Nadav is a Group Product Marketing Manager for Vertical Solutions at Okta. Prior to Okta, Nadav worked on Google’s Adwords business as a product manager, product marketer, and data analyst. He started his career as a scientist researching applications of nanomaterials. Nadav earned a BS from UC Berkeley as well as an MBA from Harvard Business School.
  • What You Need To Know To Manage a Cyber SOC
    What You Need To Know To Manage a Cyber SOC Brad Bierman, Manager of Security Engineering; Sridhar Karnam, Director of Product Marketing Mar 28 2017 5:00 pm UTC 45 mins
    People - the most important aspect of a Security Operations Center (SOC) that is a dynamic integration of people, process, and technology. It's not the toolset or processes that keep your IT secure, but the experience and expertise. Let's discuss about how we can build, maintain, and update skills needed to effectively manage a cyber SOC.

    About the Presenters: Sridhar Karnam is director of product marketing at Arctic Wolf Networks. Joining Sridhar in this webcast is Brad Bierman, who manages the Arctic Wolf concierge security engineering team.
  • Ensuring Maximum Protection—How 3 Security Vendors Approach Their Own Security
    Ensuring Maximum Protection—How 3 Security Vendors Approach Their Own Security Alvaro Hoyos, David Baker, David Farrow, Gene Meltser Mar 28 2017 5:00 pm UTC 60 mins
    Security vendor products are held to a higher standard of security—and for good reason as the very existence of their organization could be at risk due to a vulnerability. Many of these vendors are turning to bug bounty programs to not only find any vulnerabilities in their products and services, but also to provide assurance to their clients.

    Join our security panel for a live discussion on the following topics:
    1. What unique appsec challenges come along with complex & high-risk environments
    2. How to design security programs to provide robust coverage of those technologies
    3. Why bug bounties were so quickly adopted within the security industry
    4. Open Q&A with the panelists

    Featured speakers:
    Alvaro Hoyos, Chief Security Officer @ OneLogin
    David Farrow, Sr Director, Information Security @ Barracuda Networks
    David Baker, VP Operations @ Bugcrowd, formerly CISO @ Okta
    Gene Meltser, Enterprise Security Architect @ Sophos
  • The Key to Regulatory Compliance? Comprehensive Mainframe Security
    The Key to Regulatory Compliance? Comprehensive Mainframe Security Chip Mason, Director of Mainframe Security Product Management, CA Technologies Mar 28 2017 5:00 pm UTC 60 mins
    Data privacy regulations and standards are only increasing to improve the protection of your most sensitive business assets; consider the General Data Protection Regulation, EU-US Privacy Shield and Payment Card Industry Data Security Standard (PCI DSS) and more. The reality with data is, the mainframe stores the majority of the world’s corporate data. And the other reality is, not many know where all of that data is, let alone able to facilitate regulatory compliance.

    Join Chip Mason, Director of Mainframe Security Product Management on Tuesday, March 28th to discuss the impact of these regulations to your business, what you need to do to comply, and how comprehensive mainframe security management can help you meet these standards and demonstrate compliance with ease.
  • Protect your data on lost or stolen devices with BitLocker
    Protect your data on lost or stolen devices with BitLocker Frank Shen Mar 28 2017 5:30 pm UTC 60 mins
    As the need grows for organizations to empower users to work anywhere, anytime and from any device, IT departments are looking for ways to protect content and data on lost or stolen devices. Microsoft’s BitLocker program can encrypt your drive as well as help protect against unauthorized changes to your system. It is designed to prevent a user’s data from being viewed, extracted or retrieved in case a drive is lost or stolen, which is increasingly important now that users are becoming more mobile.

    In our next webinar, we will discuss some of these sobering statistics, as well as the approach Microsoft is taking to information protection and encryption. Discover deployment and planning considerations and understand the value BitLocker can bring to your organization.
  • How to Automate Protection with Azure Cloud Backup and DRaaS
    How to Automate Protection with Azure Cloud Backup and DRaaS Dustin Sawicki & Jordan Pfingsten, Technical Solutions Professionals, Microsoft Mar 28 2017 6:00 pm UTC 60 mins
    Learn the ins and outs of Disaster Recovery as a Service with simple, automated protection and disaster recovery in the cloud.

    Your environment can be protected by automating the replication of the virtual machines based on policies that you set and control.

    Join this webcast to:
    - Learn how Site Recovery can protect Hyper-V, VMware, and physical servers, and how you can use Azure or your secondary datacenter as your recovery site
    - See how Site Recovery coordinates and manages the ongoing replication of data by integrating with existing technologies including System Center and SQL Server AlwaysOn
    - Understand the total picture of Disaster Recovery as a service (DRaaS)

    This webcast is part of our Think Tank Thursdays – DOE & DHS Dialogue webcast series. Sign up for this session, or the entire series today!
  • Under The Hoodie: Actionable Research from Penetration Testing Engagements
    Under The Hoodie: Actionable Research from Penetration Testing Engagements Tod Beardsley and Andrew Whitaker Mar 28 2017 6:00 pm UTC 45 mins
    Join Andrew Whitaker and Tod Beardsley in a webcast overview of Rapid7's recently published paper, "Under the Hoodie: Actionable Research from Penetration Testing Engagements." In this webcast, Andrew and Tod will cover the major findings from our latest research, including the vulnerabilities and misconfigurations most often found on our engagements, the effects of account lockouts and two-factor authentication on pen testers, and the most effective countermeasures you can take to detect and prevent criminal hackers from breaking into your network.
  • Security 101: BYOD Best Practices: What You Need to Know and Do
    Security 101: BYOD Best Practices: What You Need to Know and Do Scott McAfee Mar 28 2017 6:00 pm UTC 30 mins
    Security 101: Learn best practices for reducing BYOD risks, tips for building policy, and how to protect and secure your network.
  • Azure Weekly Webcast: Hybrid Cloud Storage, Security & Management
    Azure Weekly Webcast: Hybrid Cloud Storage, Security & Management Mack Ratcliffe & Christian Booth, Azure TSPs, Microsoft Mar 28 2017 8:00 pm UTC 60 mins
    Hybrid cloud is a long term strategy.

    For most organizations, hybrid cloud is the long-term strategy, not a transitional phase. Microsoft continues to invest heavily in a rich set of capabilities across Azure and on-premises that allow customers to use a common set of tools and processes to manage their data and applications no matter where they're running.

    Join this webcast to:
    - Learn about our approach to hybrid management
    - Understand the ins and outs of hybrid storage
    - See how hybrid identity works
    - Get to know hybrid cloud security

    This webcast is part of our Explore weekly hot topics on Microsoft Azure webcast series. Sign up for this session, or the entire series today!
  • Under The Hoodie: Actionable Research from Penetration Testing Engagements-APAC
    Under The Hoodie: Actionable Research from Penetration Testing Engagements-APAC Tod Beardsley and Andrew Whitaker Mar 29 2017 1:00 am UTC 45 mins
    Join Andrew Whitaker and Tod Beardsley in a webcast overview of Rapid7's recently published paper, "Under the Hoodie: Actionable Research from Penetration Testing Engagements." In this webcast, Andrew and Tod will cover the major findings from our latest research, including the vulnerabilities and misconfigurations most often found on our engagements, the effects of account lockouts and two-factor authentication on pen testers, and the most effective countermeasures you can take to detect and prevent criminal hackers from breaking into your network.
  • Prevention Week Pt 2: Accelerating Multi-Cloud Deployments
    Prevention Week Pt 2: Accelerating Multi-Cloud Deployments Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks Mar 29 2017 2:00 am UTC 60 mins
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market. New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
  • Prevention Week Pt 2: Accelerating Multi-Cloud Deployments
    Prevention Week Pt 2: Accelerating Multi-Cloud Deployments Matt Keil, Director of Product Marketing, Public Cloud at Palo Alto Networks Mar 29 2017 8:00 am UTC 60 mins
    Organizations are rapidly embracing multi-cloud architectures that span software-defined data centers (private clouds) and public cloud environments. To help organizations protect their cloud-based applications and data from cyberattacks, PAN-OS® 8.0 expands the VM-Series with new models and optimized performance, making it the broadest, most powerful line of virtualized firewall appliances on the market. New scalability and resiliency features for Microsoft® Azure® and Amazon® Web Services enable organizations to build secure cloud-centric architectures. Workflow automation features for VMware® NSX® and KVM with OpenStack® help streamline VM-Series deployments.
  • Protection of Personal Data – Getting in Shape for GDPR
    Protection of Personal Data – Getting in Shape for GDPR Bob Mann Mar 29 2017 9:00 am UTC 75 mins
    With the EU General Data Protection Regulation (GDPR) just over 12 months away, now is the right time for organizations to review their data governance and protection requirements. Employing data classification is now the best practice standard in the first step to achieving a holistic data-centric security strategy to ensure you comply with EU GDPR and other regulations. But where do you start and how do you overcome challenges to implement classification successfully?

    During this session, with his extensive experience delivering data governance and classification projects for leading global brands, Bob Mann (CISO) will explore the common challenges encountered within data classification projects. He will provide real-world guidance for senior security, audit and risk professionals on how to accelerate your GDPR compliance initiatives.

    Why should I attend this webinar?

    This webinar will provide you with practical advice identifying how data classification can help improve your data governance measures and get your data protection processes in shape in advance of EU GDPR

    This presentation will also explore the different approaches to data classification and uncover the top tips and practical steps to make data classification that much easier to implement in your organisation.
  • Faster, Wider and Stronger Cyber Security with SIEM
    Faster, Wider and Stronger Cyber Security with SIEM Dan Hanman, Consulting Systems Engineer SIEM Mar 29 2017 9:00 am UTC 45 mins
    Locks, barriers and traps will eventually be broken and overcome. The enterprise security infrastructure must continuously evolve in order to continue to protect the enterprise’s assets and provide mitigation in case of a breach.

    Security operations tools can play a critical role in maintaining the enterprise security posture through internal and external evolution.

    During this presentation, we will explore the role of SIEM as an enabler and how FortiSIEM can be a catalyst for a more efficient, effective and complete cybersecurity infrastructure.
  • Introducing the industry's first Secure Internet Gateway in the cloud.
    Introducing the industry's first Secure Internet Gateway in the cloud. Brian Roddy, Engineering Executive, Cloud Security and Bobby Guhasarkar, Director Product Marketing, Cisco Umbrella Mar 29 2017 3:00 pm UTC 60 mins
    The world is evolving… from how we work to where we work and how we access our sensitive data. Is your security keeping pace with the changes?

    Find out how you can block threats like never before with the industry’s first Secure Internet Gateway in the cloud.

    Join Cisco Security Experts: Brian Roddy, Engineering Executive, Cloud Security and Bobby Guhasarkar, Director Product Marketing, Cisco Umbrella, on Wednesday, March 22nd at 10am PT for a can’t miss review of what needs to be your first line of defense in 2017.

    Attendees will see why Cisco Umbrella provides visibility unlike any other security platform:

    -Protects users on and off network
    -Provides broadest coverage of malicious destinations and files
    -Defends against known and emergent threats over all ports and protocols

    Register and learn why you need a Secure Internet Gateway that’s easy to deploy and manage, uncovers attacks before they launch AND integrates with your existing security investments.

    Your security starts here.
  • Tech Refresh: Out with the Old
    Tech Refresh: Out with the Old Nextgov | Dell EMC & Intel Mar 29 2017 3:00 pm UTC 60 mins
    The Department of Defense uses 8-inch floppy disk drives to manage nuclear forces. The Treasury Department has 56-year-old computer code to update taxpayer accounts. And the Department of Homeland Security and Department of Veterans Affairs rely on COBOL for a number of their agency functions. To address these aging systems, in October 2016 the Office of Management and Budget proposed a series of guidelines to help agencies assess their IT modernization needs.

    But as federal workers determine how to refresh their technology during 2017, they’ll need to parse through the good and the bad that comes with old legacy systems and determine what comes next. Tune in on March 29 as we talk with agency experts about what’s necessary for an IT system to succeed and how to implement these changes.
  • How to automate security investigation and remediation for real time response
    How to automate security investigation and remediation for real time response Barak Klinghofer, Co-Founder and CPO, Hexadite and Steven Forsyth, RnD Manager, HPE Security ArcSight Mar 29 2017 4:00 pm UTC 60 mins
    The effectiveness of a security system depends on how quickly it detects and responds to threats. Is your security system able to tackle security challenges in near real time, while reducing false positives so analysts can focus on critical events and Indicators of Compromise (IOCs)?

    HPE Security ArcSight ingests large volumes of security events and correlates against IOCs in real time to identify potential threats. Hexadite Automated Incident Response Solution (AIRS) takes these security alerts in real time and performs investigation and remediation at scale.

    Learn how the combination of these two systems gives you the ability to:
    • Gain visibility across the entire IT footprint
    • Detect security threats in real-time
    • Automate incident investigation
    • Perform automated or semi-automated remediation actions
  • ISACA Certifications Information and Update
    ISACA Certifications Information and Update Kim Cohen Mar 29 2017 5:00 pm UTC 60 mins
    Becoming ISACA certified is one of the best ways to prove you have the knowledge and expertise to secure the modern enterprise against escalating IT-related threats and get ahead in your career. Attend this webinar and learn about the CISA, CISM, CGEIT, CRISC certifications, as-well as ISACA’s CSX performance-based cyber security products.
  • How to Approach Portfolio Risk Aggregation
    How to Approach Portfolio Risk Aggregation Samit Shah Mar 29 2017 5:00 pm UTC 45 mins
    Join us on Wednesday, March 29th has Samit Shah, BitSight's Insurance Solutions Manager discusses how cyber insurers should approach portfolio risk aggregation and how other businesses can use this mindset to decrease risk across their portfolio of vendors.
  • Protecting Yourself from Top Threats in 2017
    Protecting Yourself from Top Threats in 2017 Charles Johnson, Alert Logic Sales Engineering Manager Mar 29 2017 5:00 pm UTC 45 mins
    In 2016 attackers raised the stakes and became more organized in the effort to monetize pirated systems and proliferate data.  We’ll cover the trends and some of the new interesting exploits while providing strategies on how to best defend against what may come in 2017.  Whether you’re an individual hoping for more privacy or a business owner looking to stay out of the headlines, you’ll be better equipped to guard your data and information systems after this presentation. 
  • The Rise of IoT Botnets and How to Defend Against Them
    The Rise of IoT Botnets and How to Defend Against Them Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Mar 29 2017 5:00 pm UTC 60 mins
    Nobody thought it was possible to spawn a 1Tbps+ DDoS attack by hijacking connected devices. Connected Internet of Things (IoT) devices are smart, convenient and notoriously lacking in security. IoT devices can be easily exploited due to their inherent security gaps. Soon these IoT-based attacks will become everyday occurrences for service providers and enterprises the like.

    Join Stephen Gates, Chief Research Intelligence Analyst at NSFOCUS, and learn about IoT-based botnets, how to detect them and how to better protect your connected devices.

    Viewers will learn about:
    - An exclusive overview of the Mirai malware and how it’s being used against your organization
    - The latest tactics, techniques, and procedures hackers are using in the escalation of IoT-based botnets
    - How to detect and defeat these attacks via cloud and on-premises defenses
  • Identity & Access Management in Healthcare: Strengthening IT Security
    Identity & Access Management in Healthcare: Strengthening IT Security Craig Eidelman & Alfred Ojukwu, US Health and Life Sciences, Microsoft Corporation Mar 29 2017 6:00 pm UTC 60 mins
    Help strengthen security through effective identity management, monitoring, and protection

    Microsoft solutions can help strengthen security through effective identity management, monitoring and protection. We’ll provide an overview of the capabilities of Azure Active Directory, and Microsoft’s Identity and Access Management cloud solution (IDaaS). With capabilities including Identity Protection, SSO to thousands of SaaS apps, conditional access policies, self-service password reset, discovery and many more, Azure Active Directory is the most comprehensive IDaaS solution.

    Join this webcast to learn how to:
    • Enable single sign-on to any cloud and on-premises web app, even with iOS, Mac OS X, Android, and Windows Devices
    • Easily extend Active directory to the cloud and continue protecting sensitive user information, data and apps
    • Protect on-premises web apps with secure remote access, simultaneously reducing cost and enhancing security with self-service

    This webcast is part of our Modern Workplace in Healthcare webcast series. Sign up for this session, or the entire series today!
  • The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale?
    The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale? Bob Hicks, SVP and General Manager, TierPoint Mar 29 2017 6:30 pm UTC 45 mins
    Are you employing a balanced approach to Hybrid IT in the changing multi-cloud landscape? In this webinar, Bob Hicks, Senior Vice President, Operations discusses four cornerstones to consider to reduce risk. Through his 30-year career in IT and data center operations management, Bob has accumulated a deep understanding of the forces affecting hybrid infrastructures and has helped demystify the complexities surrounding Hybrid IT and cloud environments for organizations of all sizes.