Hi [[ session.user.profile.firstName ]]

IT Security

  • So schützen sich Unternehmen vor einer Reihe neuer Angriffsvektoren
    So schützen sich Unternehmen vor einer Reihe neuer Angriffsvektoren Andre Engel and Lars Kroll Symantec Live 60 mins
    Cyberkriminelle und professionelle Angreifer investieren viel Zeit und Mühe, um neue Angriffspunkte zu identifizieren und bestehende Attacken zu perfektionieren. Seit WannaCry feiern zum Beispiel Würmer ein Revival – und breiten sich immer öfter aggressiv in Unternehmensnetzen aus. Da die Zahl der Schwachstellen auf Desktop-PCs stetig abnimmt, suchen die Angreifer verstärkt nach neuen Kanälen und Plattformen, um Systeme zu infizieren – und entscheiden sich zunehmend für IoT-basierte Systeme..

    In diesem Webinar erfahren Sie:
    • Mit welchen neuen Angriffsformen sich Cyberkriminelle heute bereichern
    • Vor welchen neuen Angriffsvektoren sich Unternehmen schützen müssen
    • Welche Gefahren in IoT-Umgebungen drohen
    • Welchen gezielten Angriffen Unternehmen jüngst ausgesetzt waren
  • Why Vulnerability Management Demands More Than Scan-and-Patch
    Why Vulnerability Management Demands More Than Scan-and-Patch Greg Singh, Technical Director, APAC, Skybox Security Recorded: Sep 26 2018 63 mins
    Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to their host’s place in the network, meaning efforts can be wasted on remediating already protected vulnerabilities while ignoring those left exposed to attack.

    To have a real impact on lowering your risk of cyberattack, organizations need to centralize and analyze data from their entire attack surface to narrow focus on the vulnerabilities most likely to be used in a cyberattack.

    In this webinar, you will learn:
    • What scanners miss in discovery, prioritization, remediation and oversight processes and how to fill in the gaps
    • How the intersection of your assets, networks, business and the threat landscape impact vulnerability risk
    • Why context-based approaches target remediation at your riskiest vulnerabilities and help identify patching alternatives
    • Insights from Skybox’s 2018 Vulnerability and Threat Trends Report mid-year update

    Join Skybox Security and (ISC)² on Sept 26, 2018 (Wed) at 14:00 (Singapore time), as we explore how to get more value out of your data, visualize your attack surface and centralize vulnerability management to systematically reduce your risk of cyberattack.

    Presenter: Greg Singh, Technical Director, APAC, Skybox Security
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Re-defining the WAN with Session Smart Networking
    Re-defining the WAN with Session Smart Networking Sterling Perrin, Principal Analyst, Optical Networking & Transport, Heavy Reading Recorded: Sep 25 2018 57 mins
    In this webinar, 128 Technology and Light Reading will discuss the benefits of session-smart routers in SD-WAN deployments.
    Network complexity not only increases IT costs, but can also create network fragility and security risks. Recent approaches to reducing network complexity through Software Defined Wide Area Networking (SD-WAN) offer some short-term relief, but are still largely based on decades-old network paradigms that only create more complexity in the long run.

    Session Smart Networking is different. Session Smart networks can truly simplify the network, as well as provide a breadth of SD-WAN capabilities – including application visibility, software-define branches, multi-path routing and network segmentation. As a result, organizations using a Session Smart approach can realize breakthrough gains in performance, agility, security and scale.
  • Improve TIC Performance and Security with Session Smart Technology
    Improve TIC Performance and Security with Session Smart Technology Mark Bunn, TIC Program Manager, Office of Cybersecurity & Communications, DHS Recorded: Sep 25 2018 54 mins
    Federal CIOs recognize the need to develop “zero-trust” networks — designed around the assumption that every user and every session on the network poses a risk for data compromise. That means finding a way forward, beyond trusted internet connections (TIC) and other perimeter defenses. Find out how agencies are augmenting their infrastructure, using new generation cloud tools, to easily manage network micro-services to govern user sessions and better protect their networks.

    In this webinar, you’ll learn:

    - How to deploy policy-driven, software-defined security services without replacing your existing infrastructure
    - How to reduce bandwidth consumption and improve TIC and satellite transmission performance by eliminating the need for virtual LAN tunnels
    - How moving to smart-session technology can improve existing network agility and security — and streamline cloud adoption
  • Applications are Our Crown Jewels, Will They Ever Be Secure?
    Applications are Our Crown Jewels, Will They Ever Be Secure? Joseph Feiman, PhD, Chief Strategy Officer and Setu Kulkarni, Vice President, Product & Corporate Strategy Recorded: Sep 25 2018 49 mins
    Applications are our crown jewels. They run our businesses, power grid, military defenses, personal & business banking, social networks, hospitals, and entertainment, and yet are they secure? No, they are most vulnerable, and tend to remain so!

    In this session, we’ll take a look at data which provides an analysis of tens of thousands of applications from 2017-2018 from approximately 900 companies both enterprise and SMB. The analysis includes global brands and local businesses, hundreds of thousands of application security tests and checks, along with an examination of code and behavior.

    Joseph Feiman, PhD, Chief Strategy Officer
    Joseph Feiman is the chief strategy officer at WhiteHat Security, a leading application security provider. Feiman is responsible for WhiteHat’s overarching business strategy and vision, to further its success in empowering secure development and operations. Previously, Feiman worked for 18 years at Gartner, where he was a Gartner research vice president and fellow.

    Setu Kulkarni, Vice President, Product & Corporate Strategy
    As the Vice President of Product & Corporate Strategy, Setu is responsible for product vision, strategy, and direction at WhiteHat Security. Setu joined the WhiteHat leadership team in early 2016 after a 10+ year stint at TIBCO Software Inc., where he most recently led product management and strategy for the Operational Intelligence product portfolio.
  • Manage Oracle e-Biz Suite Cost & Growth with Micro Focus Structured Data Manager
    Manage Oracle e-Biz Suite Cost & Growth with Micro Focus Structured Data Manager Eric Popiel and Luis M Burgos, Micro Focus Recorded: Sep 25 2018 58 mins
    Organizations that use Oracle e-Business Suite often find that they have waited too long to implement archiving and data management strategies for their application databases. This reactive approach can be much more costly and difficult to implement when your business begins to experience issues. With the right data management strategy in your Oracle environment, you gain benefits in a range of areas, including application performance, long-term compliance, manageability, and infrastructure costs.

    Micro Focus Structured Data Manager software, with its ‘ready-to-run’ modules, for Oracle e-Business Suite, manages production and related non-production databases that support the Oracle e-Business Suite environment. This allows you to gain the right data management strategy to make sure that your business can remain responsive, while keeping costs under control and meeting data retention and compliance requirements.

    Structured Data Manager helps you:
    ● Archive and manage your Oracle e-Business Suite database and reduce its size
    ● Discover and mask/encrypt sensitive data for GDPR & CCPA compliance and test data management
    ● Manage the lifecycle of your data and comply to privacy laws

    Join this live webcast to understand how your organization can enhance your Oracle e-Busi­ness Suite environment with Micro Focus Structured Data Manager.
  • Get Ready for OS Upgrades and Apple Business Manager
    Get Ready for OS Upgrades and Apple Business Manager Nick Thompson, Product Manager, Jamf Recorded: Sep 25 2018 35 mins
    With Apple’s Worldwide Developers Conference (WWDC) behind us, it’s time to review the exciting announcements and discuss how you can prepare now for your future iOS 12, tvOS 12 and macOS Mojave updates.

    In our webinar, Get Ready for OS Upgrades and Apple Business Manager, we’ll explain the new management features and services coming your way.

    We will cover:

    •What new mobile device management (MDM) features will be available with Apple’s upcoming OS releases
    •How to prepare for OS upgrades this fall
    •An introduction to Apple Business Manager
  • Software-Defined Wide Area Network (SD-WAN) 1.0 Group Test Results webinar
    Software-Defined Wide Area Network (SD-WAN) 1.0 Group Test Results webinar Phuong Nguyen, Director, Product Marketing, NSS Labs & Bhaarath Venkateswaran, Director, Product Management, NSS Labs Recorded: Sep 25 2018 49 mins
    The software-defined wide area network (SD-WAN) has gained wide adoption in the past few years. In a recent NSS Labs survey, 82.2% of the survey respondents indicated that their organization has already adopted SD-WAN technology. These products provide robust control, and optimization which makes them a compelling alternative to traditional WAN products.

    In this groundbreaking inaugural test, nine of the industry’s leading SD-WAN products were examined to help enterprises understand the merits of products in the market and identify the capabilities best suited to meet their use case requirements.

    Tune in to our webinar to learn how each of the participating vendors scored!
  • Creating a California Consumer Privacy Act Action Plan
    Creating a California Consumer Privacy Act Action Plan Tom Mighell, Esq., VP of Delivery Services and Greg Forest, CTO, Contoural Recorded: Sep 25 2018 59 mins
    The California Consumer Privacy Act (CCPA) will go into effect on January 1, 2020, providing a relatively short window for companies to prepare. While final details of the CCPA need to be sorted out by the CA Legislature, enough is known to start preparing now. Join Tom Mighell, Esq. and Greg Forest as they present a CCPA Action Plan: what specific steps you need to take to get ready.

    Topics include:
    • Key steps in getting ready for CCPA, including policies, processes, technology and training
    • If you are already GDPR compliant, what you can and can’t leverage to comply with CCPA
    • What areas can be addressed today, even though the rules may change
    • What areas you should wait for until the law is finalized

    Join us for a lively discussion!
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Sep 25 2018 40 mins
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • Office 365 Security Best Practices
    Office 365 Security Best Practices Rob Sobers Recorded: Sep 25 2018 53 mins
    Office 365 is dominating the cloud, yet its native security lacks unified controls required to protect the billions of sensitive files that flow between internal storage and the cloud. Learn why cloud-centric security is not enough, where built-in Office 365 security features fall short and how to enhance Office 365 security with Varonis.
  • Pacific Dental Cloud Migration Strategy on AWS
    Pacific Dental Cloud Migration Strategy on AWS Nemi George, Sr Director, Information Security & Service Operations, Pacific Dental Services & Thomas Robinson, AWS Solutions Recorded: Sep 25 2018 57 mins
    Pacific Dental Service (PDS) is one of the country’s leading dental support organizations, providing supported autonomy to more than 630 dental practices. As a support services provider in the healthcare space, PDS is subject to HIPAA and other regulations, which plays a vital role in their journey to the AWS cloud.

    Join us on September 25th as Nemi George, Sr. Director of Information Security and Service Operations at PDS, walks us through the AWS cloud journey: the required planning, timing, best practices, and their experience to-date. Plus, how Cavirin’s CyberPosture intelligence continues to strengthen Pacific Dental’s security posture and meet compliance regulations.

    Then we are lucky to have Thomas Robinson, Solution Architect for AWS look at the shared responsibility model, validating AWS responsibilities, and the tools available for building HIPAA workloads and maintaining compliance. Topics include AWS CloudTrail and Lambda Functions.

    If you are considering migrating to the cloud, this is a must-see event.
  • The Complete Guide to Responsible Disclosure Programs
    The Complete Guide to Responsible Disclosure Programs Rajesh Krishnan, Product Marketing, Synack. Recorded: Sep 25 2018 28 mins
    To beat criminal hackers, it helps to have ethical ones on your side. Responsible Disclosure Programs - where companies invite suspected security vulnerability reports from the public - have been on the rise in the past few years. Should your company consider Responsible Disclosure? Learn more about the ins and outs of these types of programs and how they can differ in the level of liability and management incurred. Technical. Social, Legal, and other indicators will all be raised.
  • Threat Hunter: Implications of an Active Cyber Defense
    Threat Hunter: Implications of an Active Cyber Defense Griff James (Damrod Analysis) | Wyatt Hoffman (CEIP) | Will Lymer (Loki Labs) | Philip Thomas (Reed Smith) Recorded: Sep 25 2018 62 mins
    It is beyond the ability or willingness of the world’s governments to protect and secure information technology. What role then can the private sector play in making cyberspace safer? Can private enterprises do anything to strike back at attackers, curtailing their freedom of action and raising the costs of malicious activity?

    Consisting of academics and industry experts, this panel will explore the potential for active cyber defence to impede and deter malicious activity and the conditions under which it could be conducted responsibly.

    - Griff James, Director at Damrod Analysis
    - Wyatt Hoffman, Research Analyst, Cyber Policy Initiative at Carnegie Endowment for International Peace
    - Will Lymer, Chief Growth Officer at Loki Labs
  • ISSA International Series: Latest & Greatest Security Attacks & Why They Happen
    ISSA International Series: Latest & Greatest Security Attacks & Why They Happen ISSA International Recorded: Sep 25 2018 87 mins
    With all the money that we spend on precautions, and mitigations for security vulnerabilities, why do we keep on getting hacked? This question is not new, but will be looked at with respect to recent attacks, that have been successful. While not all of these attacks are brand new or represent unique vulnerabilities, they've been very effective. So come and join us as we look at the issues that are being exploited.
  • Increase Performance with KPIs for Security Operations and Incident Response
    Increase Performance with KPIs for Security Operations and Incident Response John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Recorded: Sep 25 2018 51 mins
    Security operations KPIs vary from organization to organization. To be effective, it is crucial that KPIs are selected based on the SMART criteria.

    KPIs provide the critical information required to make fact-based decisions. However, tracking too many KPIs can become a burden to analysts.

    Join our new webinar to discover the best practices for Key Performance Indicators (KPIs) for Security Operations and Incident Response.

    Key takeaways:
    - Why are KPIs important?
    - How to choose the best KPIs?
    - How many KPIs are appropriate to measure?
  • Can We Rein in the Global Cybersecurity Crisis?
    Can We Rein in the Global Cybersecurity Crisis? Troels Oerting, Head of Global Centre for Cybersecurity, World Economic Forum; Usama Fayyad, CIO OODA Health Recorded: Sep 25 2018 54 mins
    The World Economic Forum has elevated cyberattacks as one of the top global risks in terms of likelihood and impact, ahead of all other types of technological, economic, political or terrorist risks. The easy availability of advanced hacking tools combined with our aging infrastructure and outdated security models is a recipe for disaster. To tackle this looming crisis, we need to rethink our approach to security and develop new strategies to protect our most critical applications and infrastructure.

    Join renowned security experts Troels Oerting, CIO of the World Economic Forum for an interactive discussion on new strategies to preempt this global crisis.
  • How to Leverage Tools that Support Innovation and Differentiation
    How to Leverage Tools that Support Innovation and Differentiation Gary Middleton: Group Networking Senior Practice Director DCN,Networking &Chris Wolf: CTO, Global Field & Industry,VMWare Recorded: Sep 25 2018 46 mins
    Organisations will lose their competitive edge if they maintain the status quo. They must embrace innovation and enable their developers by providing them with the tools and flexibility to create new business models and applications.
    Join the discussion with Gary Middleton, Group Networking Senior Practice Director, Dimension Data; and Chris Wolf, CTO, Global Field and Industry, VMware, as they uncover how to:

    • Use containerisation to transform your cloud capabilities.
    • Empower IT to embrace the solutions and services needed to evolve.
    • Build applications that streamline and transform business success.
    • Move with speed and agility while maintaining a strong infrastructure.
    • Exploit the software as a service (SaaS) revolution.
  • High performance log streaming to HDFS with syslog-ng
    High performance log streaming to HDFS with syslog-ng István Molnár, Prooduct Marketing Manager and James Bonamico, presales- engineer. Recorded: Sep 25 2018 37 mins
    Hadoop is one of the most popular MapReduce solutions. Many organizations choose Hadoop as their big data store. syslog-ng Store Box allows seamless integration with Hadoop Distributed File System (HDFS), providing high performance log collection, distribution and pre processing.

    In our upcoming webinar, we will demonstrate how to directly stream any text-based log into HDFS while keeping a high performance rate using syslog-ng Store Box.
  • 7 cybersecurity improvements resulting from an EDR project
    7 cybersecurity improvements resulting from an EDR project Oleg Glebov, Senior Product Marketing Manager, Kaspersky Lab Recorded: Sep 25 2018 72 mins
    EDR technology has been an unceasing topic of conversation over the past 3 or 4 years. Meanwhile, we at Kaspersky Lab have become aware, in our interactions with enterprise organizations, of serious levels of overall dissatisfaction with the outcomes of investment in EDR. Let's try now to understand the main reasons for this, while looking at typical use cases and key enterprise scenarios. The webinar will cover:
    •Drivers of EDR implementation
    •EDR vs Next Generation EPP vs Advanced EPP
    •Key benefits and advantages
    •Use cases of EDR functionality: Integrated Endpoint Protection, Augmentation of the Incident Response process, Automation of the anti-APT solution reaction phase
    •EDR project business justification
  • How to create the self belief and self confidence to sell brilliantly
    How to create the self belief and self confidence to sell brilliantly Leigh Ashton Recorded: Sep 25 2018 28 mins
    Key Takeaways:

    This webinar is for you if you struggle with sales or specific sales activities and will open the door to understanding how you get in your own way of sales success...and how to develop a winning sales mindset that attracts success!

    Reasons to Attend:

    -Discover how your thoughts impact on your sales results
    -Learn how to identify your inner barriers...and how to eliminate them
    -Create your personal way of generating consistently great sales

    Many people feel uncomfortable selling. Part of it is to do with rejection – people saying “no” to you.

    Another part of it is to do with ethics – we don't want to be seen to be taking people's money!

    However, selling is not what it used to be.

    You can only succeed – in the long term - if you give value and help customers.
  • Tieniti informato sui recenti attacchi mirati e le minacce IoT di nuova generazi
    Tieniti informato sui recenti attacchi mirati e le minacce IoT di nuova generazi Sunil Venanzini, Symantec Recorded: Sep 25 2018 45 mins
    Le nuove metodologie per la propagazione delle minacce mettono le aziende sotto pressione

    Per garantirsi il successo, hacker e gruppi criminali che lanciano attacchi mirati continuano ad affinare le armi e identificare nuovi canali di infezione. Sulla scia di WannaCry, i worm riprendono virulenza e si diffondono aggressivamente nelle reti aziendali. Con le vulnerabilità sui computer desktop che si fanno sempre più rare, i criminali vanno in cerca di nuovi canali e nuove piattaforme da cui lanciare le infezioni: l’IoT diventa un bersaglio sempre più allettante.

    In questo webinar apprenderai:
    • Le strategie di diversificazione adottate dai criminali informatici per mantenere la redditività
    • Le nuove metodologie per la propagazione delle minacce, che mettono le aziende sotto pressione
    • La nuova generazione di minacce IoT
    • Le recenti campagne di attacchi mirati
  • Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung
    Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung Ivonne Ehle, DACH Sales Engineer - SCME, Certified Trainer Recorded: Sep 25 2018 28 mins
    Das Wachstum virtualisierter Anwendungen, immer kleinere Backup-Fenster und ein explosionsartiges Datenwachstum haben die Anforderungen an die Datensicherheit und die Speicherinfrastruktur enorm belastet. Backup- und sekundäre Speicherinfrastrukturen kommen oft von mehreren Anbietern, was die Kosten erheblich steigert, betriebliche Ineffizienzen erhöht und zu Datensilos führt, wodurch die zentrale Verwaltung immer komplexer wird.

    Registrieren Sie sich für unseren Webcast und erfahren Sie, wie Sie mit der neuen konvergenten Datenplattform StorageCraft OneXafe Ihre Daten in heterogenen Umgebungen besser schützen und verwalten
  • Predicting Failures Before They Happen With Machine Learning
    Predicting Failures Before They Happen With Machine Learning Nate Smalley, Principal Sales Engineer and Andrew Stein, Staff Business Analytics & IoT Practitioner Recorded: Sep 25 2018 39 mins
    Imagine a world without outages. Glorious, isn’t it? We’d like to help you get there. So how do you stop IT events before they escalate into outages? With a little help from machine learning.

    The predictive capabilities from the Splunk Machine Learning Toolkit (MLTK) combined with the Event Analytics capabilities in Splunk IT Service Intelligence (ITSI) give operations teams like yours the opportunity to proactively act on an event before it becomes an outage. Whether your current IT state is reactive or you’re already in a somewhat proactive state, these predictive capabilities will be something you’ll want to take note of!

    Join our webinar to learn how to:

    ● Predict a service health score
    ● Proactively take action based on those predictions
    ● Employ novel tactics for better incident management using advanced search commands
  • Solution de data privacy dans un contexte GDPR
    Solution de data privacy dans un contexte GDPR Carine Lecadre Perrier, Head of Compliance, Partech avec Sebastien Cognet & Leonardo L’ecaros, Privitar Sep 26 2018 11:00 am UTC 45 mins
    Comment renforcer la confidentialité des données dans un contexte de risque et de nouvelles obligations?

    Privitar est une plateforme logicielle centrale de gouvernance de la confidentialité des données permettant non seulement de répondre à certains enjeux de la GDPR mais également d’avoir une approche fonctionnelle de “Privacy by Design” sur des cas d’usage précis. La plateforme Publisher vous permet de livrer à la demande ou en streaming des jeux de données anonymisées par des techniques de masquage, de perturbation ou de généralisation tout en conservant l’intégrité de vos données sensibles. Il est également possible d’insérer des filigranes invisibles afin d’auditer l’origine d’une donnée en cas de fuite de fichier et ainsi de protéger votre e-réputation. Ce webinar soulignera en premier lieu les obligations du contexte GDPR pour ensuite se concentrer sur l’illustration concrète de deux clients. Il s’achèvera par une démonstration de la solution. Il est important de noter que nos solutions s’insèrent dans vos environnements Big Data et facilitent ainsi le développement de processus analytiques sans compromettre la valeur des données et en respectant la confidentialité due à vos clients et utilisateurs.

    Les speakers:

    Carine Lecadre Perrier | Head of Compliance @Partech
    Sébastien Cognet | Responsable Avant-Vente Europe du Sud @Privitar
    Leonardo L’ecaros | Responsable Commercial Europe du Sud @Privitar
  • Secure Development and Scalable Application Security with CA Veracode
    Secure Development and Scalable Application Security with CA Veracode RJ Gazarek, CA Veracode Product Marketing Sep 26 2018 3:00 pm UTC 45 mins
    Deliver applications faster by writing secure code while integrating with your own toolset. Join this webinar to see how CA Veracode Greenlight can help you do this by bringing security scanning right into your IDE as you are coding, returning most scans in seconds. During this presentation, Product Marketing expert RJ Gazarek will provide:

    •An overview of Greenlight and its integrations with developer tools;
    •A summary of recent Greenlight use cases and successes;
    •A sneak peek of upcoming capabilities for your development teams to leverage

    Whether you are coding in Java, Javascript, C#, or VB.NET, CA Veracode Greenlight has you covered. Developers receive positive feedback when correctly using secure coding practices, as well as instant insight into any security flaws discovered –saving both security and development time and resources.
  • IT Security’s Offering to Cloud: Enable DevOps with Automated Security
    IT Security’s Offering to Cloud: Enable DevOps with Automated Security Colby Dyess, Director Cloud Marketing & Dan Rheault, Sr. Product Marketing Manager, Tufin Sep 26 2018 3:00 pm UTC 60 mins
    DevOps teams often operate outside the purview of IT security, but security is still necessary in the cloud. IT security can ensure that DevOps teams retain their agility and maintain strong security using automation. By integrating security through automation, the security watchdog now becomes the trusted advisor, helping DevOps enable the business.

    Join this webinar on September 26 to hear Tufin experts Colby Dyess and Dan Rheault discuss how information security operations teams integrate security into a dynamic delivery process. We will cover how to:
    •Find commonalities between information security and cloud teams
    •Gain visibility into cloud security
    •Assess risk within the cloud by leveraging a policy-driven approach
    •Enforce security in CI/CD without impeding application delivery
    Register now to learn how automation enables organizations to align cloud and DevOps with security policies.
  • Fast, affordable, on-demand application security testing
    Fast, affordable, on-demand application security testing Simon Howard, Jon Taylor & Nadim Barsoum Sep 26 2018 3:00 pm UTC 60 mins
    Demand for business-critical applications continues to increase, putting IT and development teams under pressure to enable innovation while maintaining security. Hackers are exploiting this pressure to uncover gaps in application security and launch cyberattacks on businesses.

    Join Micro Focus for this live demonstration to see how Fortify on Demand provides fast, affordable, on-demand mobile application security testing for organisations like yours.

    You’ll learn how Fortify on Demand leverages the most advanced, security-focused dynamic testing and static analysis technologies through a global infrastructure to help you:

    •Leverage market-leading application security testing technologies

    •Scale your organisation’s AppSec efforts, giving you immediate access to a global 24x7 testing service

    •Find, verify, and prioritize vulnerabilities to deliver actionable results faster

    •Protect your entire software development lifecycle (SDLC)

    Additionally, our software security partner ITKaa will be discussing how they help customers initiate and operate software security assurance programs based on the Fortify on Demand platform.

    Simon Howard, Fortify Security Solutions Architect, Micro Focus
    Jon Taylor, Fortify Business Manager, Micro Focus
    Nadim Barsoum, Software Security Consultant, ITKaa
  • Live Hacking Using Russia’s Favorite TTPs
    Live Hacking Using Russia’s Favorite TTPs Guy Meoded, Senior Security Researcher at Nyotron and Rene Kolga, Sr. Director of Product Sep 26 2018 4:00 pm UTC 60 mins
    Earlier this year Department of Homeland Security’s US-CERT issued Technical Alert TA18-074A called ‘Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors’. This alert provided information on Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors. It also contained indicators of compromise (IOCs) and technical details on the tactics, techniques, and procedures (TTPs) Russian government cyber actors use to compromise their victims’ networks.

    In this webinar we will go over those TTPs and put them to use. Specifically, we will demonstrate how easy it is to leverage Server Message Block (SMB) protocol authentication session to obtain user’s credential hash and then crack it in real-time revealing the actual password. We will show multiple ways of using this approach and attempt to reproduce Russia’s success in our environment. No product pitches, just good old live hacking!

    About speakers:
    Guy Meoded is a Senior Security Researcher at Nyotron. Prior to Nyotron, Guy was a Trojan Analyst at RSA.

    Rene Kolga, CISSP, is a Sr. Director of Product and Marketing at Nyotron. Rene has over 20 years of industry experience, including expertise in endpoint protection, insider threat, encryption and vulnerability management. Rene run Product teams at multiple Silicon Valley startups as well as Fortune 500 companies, including Symantec, Citrix, Altiris and ThinAir. Earlier in his career, Rene managed Customer Success and QA teams. Rene earned his Computer Science degree from Tallinn University of Technology. He also received an MBA from University of Utah.
  • 5 Novel Threats Detected by Cyber AI in 2018
    5 Novel Threats Detected by Cyber AI in 2018 Dave Masson, Director of Enterprise Cyber Security Sep 26 2018 4:00 pm UTC 45 mins
    With new attack methods emerging every day, organizations are faced with the challenge of defending their systems against never-before-seen, machine-speed threats produced by an ever-evolving adversary. Moreover, insiders bring another layer of uncertainty to every organization – so how do security teams catch what’s lurking within their own networks?

    Darktrace’s cyber AI technology offers the only approach capable of detecting and autonomously responding to subtle, stealthy threats across the entire digital infrastructure.

    Join Darktrace’s Director of Enterprise Cyber Security, Dave Masson, to hear about the latest threats that Darktrace AI has neutralized, including:

    •A sophisticated attacker exfiltrating data via an internet-connected locker
    •A novel form of malware spreading laterally within the network
    •A widespread, insider-run bitcoin operation at a Fortune 500 company
  • How Hertz delivers the ultimate car services experience
    How Hertz delivers the ultimate car services experience Lucy Meyo, Senior Director, Integration Architect, Hertz and David Chao, Senior Director Product Marketing, MuleSoft Sep 26 2018 5:00 pm UTC 60 mins
    Hertz is driving a customer experience transformation with the goal of providing a frictionless customer and partner journey. MuleSoft has been foundational in driving the re-platforming of all of Hertz's customer-facing applications, as they replace nearly 100% of their legacy systems.
  • Increasing Collaboration and Efficiency in the Public Sector
    Increasing Collaboration and Efficiency in the Public Sector Marshall Kurtz, Solutions Architect for Dropbox & Judy Price, Town Clerk for the town of Truckee, California Sep 26 2018 6:00 pm UTC 18 mins
    From state to local governments, and throughout the public sector, employees and staff are seeking better ways to collaborate and boost productivity. But collaboration can be complicated when you're working across different teams, committees, and counties.

    Judy Price, Town Clerk for the town of Truckee, California, will share her experience using Dropbox Business to save time, money, and effort, and focus on the issues that really matter to her city.

    Join us in this webinar as we discuss:

    - Key trends we are seeing in the public sector today
    - How technology can help address pain points for city and local governments
    - How implementing tools like Dropbox has helped streamline several processes in Truckee
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint Srinivas Kumar Vice President of Engineering, Mocana & Keao Caindec, Vice President of Marketing, Mocana Sep 26 2018 6:00 pm UTC 45 mins
    Part 3 Securing Firmware Updates and Patches

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new Iot connected world, you need to think about more than just the data and monitoring hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • Nutanix and Thales, Hyerconverged & Hypersecure
    Nutanix and Thales, Hyerconverged & Hypersecure Stephen O’Connor, Sr. Sales Engineer & Mike Wronski, Principal Product Marketing Manager, Nutanix Sep 26 2018 6:00 pm UTC 60 mins
    The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements that is garnering the most attention right now is data security. Nutanix certainly knows this and is working hard with Thales eSecurity to protect the confidentiality and integrity of sensitive data through strong encryption of user and application data. When used with Vormetric Data Security Manager (DSM), the combined solution provides FIPS certified robust key management and role separation to meet the most stringent security requirements.

    In this webinar, we will examine the key elements of the joint solution as well as what may be the best options for your organization.

    • Understand the types of encryption and their characteristics
    • Understand the critical role of best-in-class key management
    • Learn how to go beyond the encryption basics
  • Dell EMC Data Protection: Innovate without Compromise with the DP4400
    Dell EMC Data Protection: Innovate without Compromise with the DP4400 Adam Brittin, North American Product Line Manager, Data Protection Sep 26 2018 6:00 pm UTC 60 mins
    Transform your data protection strategy with the Dell EMC DP4400. Learn how Dell EMC Data Protection enables you to have backups that are simple to manage, powerful no matter the data, along with tools that can provide lower storage consumption and a peace of mind to your data protection environment.
  • The Quantum Computing Break is Coming. Will You Be Ready?
    The Quantum Computing Break is Coming. Will You Be Ready? Roger Grimes, Data-Driven Defense Evangelist Sep 26 2018 6:00 pm UTC 75 mins
    Quantum computing is a game-changer and will have a huge impact on the way we do business, safeguard data, explore space, and even predict weather events. Yet, some experts say in the not so distant future quantum computers will break existing public key cryptography forever.

    On that digital day of reckoning, every stored secret protected by traditional public key crypto will be broken forever; including TLS, digital certificates, PKI, SSH, RSA, most wireless networks, VPNs, online financial transactions, and even bitcoin and blockchain. All of it made worthless in a second…

    The bad guys will be able to use more secrets against you than ever before, especially in increasingly sophisticated spear-phishing attacks. Attend this exclusive event to learn what you can do to prepare.

    •Why quantum computing is different than traditional binary computing
    •How close quantum computers are to breaking traditional public key cryptography
    •What defenses you can deploy after public key cryptography is broken
    •How to prepare your users - your best, last line of defense

    The quantum computing break is coming. Will you be ready?
  • How Security Teams Use Varonis
    How Security Teams Use Varonis Adrian Pinderhuges Sep 26 2018 7:00 pm UTC 58 mins
    Want inside tips on how to get the most out of DatAlert?
    Join and learn how to use DatAlert through and through - from understanding the dashboard and user alerts to prioritizing your investigations.
  • SOAR above your legacy Security Operations Center
    SOAR above your legacy Security Operations Center Shashwath Hegde, Solutions Architect, APAC, FireEye Sep 27 2018 3:00 am UTC 60 mins
    In this session, we begin by touring a typical Security Operations Center (SOC) and study the day to day activities of the various functions inside. We then explore the various challenges faced by these functions and introduce the idea of taking a platform approach. We wrap the session with an outlook at the future of Security Operations using this approach to consolidate, facilitate and automate workflows of the entire Security Operations Center (SOC).
  • How to Achieve a DevSecOps Culture Using a Lean-Agile Approach
    How to Achieve a DevSecOps Culture Using a Lean-Agile Approach Larry Maccherone, DevSecOps Transformation Leader at Comcast Sep 27 2018 6:00 am UTC 60 mins
    There are a lot of DevSecOps offerings that are just DevOps lipstick on a traditional security-as-a-gate pig. Also, security specialists, especially at large organizations, believe that better security comes from robust independent gating. On the other hand, DevOps has proven that you can safely deploy an order of magnitude or more faster than human gating can achieve.

    What's needed to add security to DevOps are tools that work well with rapid-cycle CI/CD pipelines and an approach that reinforces the DevOps culture and process changes. This requires that security specialists become self-service toolsmiths and coaches and stop thinking of their jobs as gatekeepers.

    Join Larry Maccherone, an industry-recognized thought leader on Lean/Agile, Analytics, and DevSecOps, as he introduces a framework to accomplish this mindset shift. It includes guidance on the characteristics of tools compatible with DevOps. It has been successfully used in a large DevSecOps transformation at Comcast and has gained recognition in DevSecOps circles as a leading framework.
  • 第2のエンドポイント:スマホが狙われている!モバイル脅威に纏わるリアリティと対策
    第2のエンドポイント:スマホが狙われている!モバイル脅威に纏わるリアリティと対策 髙岡 隆佳, エバンジェリスト, Symantec Japan Sep 27 2018 6:00 am UTC 60 mins


    業務でスマホを安全に活用するために欠かせない、Mobile Threat Defense(MTD)という技術がMDMを補うものとして注目されています。本ウェビナーでは脅威の実例を交えながらMTDを実現するソリューションについて解説いたします。

  • Nouveauté OneXafe: nouvelle génération d'appliances de sauvegarde convergées
    Nouveauté OneXafe: nouvelle génération d'appliances de sauvegarde convergées Florian Malecki, International Sr. Product Marketing Director Sep 27 2018 8:00 am UTC 60 mins
    L'explosion des applications virtualisées, la réduction des fenêtres de sauvegarde et la croissance impressionnante du volume de données ont placé un immense fardeau sur les besoins en matière d'infrastructure de stockage et de protection des données. La situation se complique d’autant plus en raison des environnements de protection des données fragmentés actuels et des besoins de sauvegarde de données physiques et virtuelles, sur site et hors site, qui doivent tous satisfaire des niveaux de service différents (SLA). L'infrastructure de sauvegarde et de stockage secondaire est souvent fournie par plusieurs prestataires. Résultat : une augmentation des coûts d'acquisition et des inefficacités opérationnelles. L'agrégation de tous ces produits entraîne de silos de données difficiles à gérer de façon centralisée. Une vue incomplète du flux de protection des données peut conduire à une hausse des coûts d'exploitation, une perte des données et une incapacité à respecter les SLA ainsi que les réglementations et exigences de conformité propres au secteur.

    Rejoignez StorageCraft pour un webcast exclusif afin de découvrir les avantages de la nouvelle plateforme OneXafe converged storage and data.
  • Expert-Talk: Hybride SAP-Landschaften, Digitalisierung & neue Teststrategien
    Expert-Talk: Hybride SAP-Landschaften, Digitalisierung & neue Teststrategien Christian Schütz & Thomas Köppner, Micro Focus Sep 27 2018 8:00 am UTC 60 mins
    Helge Sanden, Chefredakteur des IT-Onlinemagazins (https://it-onlinemagazin.de/, moderiert das Gespräch mit den Experten zu diesem Thema von Micro Focus.

    Dauer und Aufwände für Tests werden oft unterschätzt und herkömmliche Methoden und Verfahren führen nicht mehr zum gewünschten Erfolg: Systemlandschaften sind prozessual extrem miteinander verflochten, teilweise in der Cloud, hybrid und komplex - sowohl im Back-End als auch im Front-End. Regelmäßige Updates und Security-Patches machen Tests zur systemkritischen Daueraufgabe und führen zu permanent wiederkehrenden Aufwänden, für die in Fachbereichen die Kapazitäten fehlen.

    Mittlerweile lassen sich bestehende Prozesse und neue Funktionen kaum noch manuell mit der notwendigen Tiefe testen. SAP ist nicht mehr das alleinige System und die zunehmende Digitalisierung entlang der Prozessketten wird die Notwendigkeit automatisierter End-to-End Tests in hybriden Landschaften zusätzlich verschärfen.

    Welche Antwortmöglichkeiten es für diese Herausforderungen gibt, sollen in diesem Expert Talk vertieft werden. An einem Anwenderbeispiel sehen Sie, wie man in der Praxis eine Teststrategie verändert hat und dabei die komplexen produktiven Landschaften - samt Schnittstellen, Webservices, Systemübergangen, Diensten, mobilen Endgeräten und Cloud-Produkten - möglichst gut abbilden kann. Automatisierung, Virtualisierung und Nutzung vorkonfigurierter Testumgebungen aus der Cloud können hierbei zu großen Produktivitätsschüben führen.

    Unser Anliegen ist es, Ihnen Ideen für Veränderungen im Testmanagement aufzuzeigen, die Aufwände reduzieren, Zeit sparen und die Testqualität verbessern können.

    Wir freuen uns auf Ihre Teilnahme!
  • Firewall Regelwerke ausmisten mit Tufin
    Firewall Regelwerke ausmisten mit Tufin Joachim Nossek , Presales Engineer, Tufin & Thorsten Geissel Senior Systems Engineer DACH,Tufin Sep 27 2018 9:00 am UTC 60 mins
    Ist Ihr Firewall Regelwerk schwerer zu lesen als die Assembler Code?

    Tufin kann Ihnen helfen ein bestehendes Firewall Regelwerk aufzuräumen und von nicht mehr benötigten Regeln und Objekten zu befreien.

    Wir zeigen Ihnen exklusiv welche Werkzeuge Ihnen helfen Transparenz und Compliance sicherzustellen.

    Treffen Sie unseren Systems Engineer Thorsten Geissel in einer Online-Sitzung um mehr über die Best Practices bezüglich der Bereinigung von Firewall Regelwerken zu erfahren:

    •Automatische Entfernung von doppelten oder verdeckten Regeln
    •Effektives Entfernen von Servern, die nicht mehr im Einsatz sind

    Melden Sie sich heute noch an und tragen den Termin in Ihren Kalender ein!
  • Cybersecurity Helden werden nicht geboren ... Sie werden gemacht!
    Cybersecurity Helden werden nicht geboren ... Sie werden gemacht! Giovanni Pascale, Associate Sales Engineer, Proofpoint Sep 27 2018 9:00 am UTC 60 mins
    Phishing ist nach wie vor eine der am schnellsten wachsenden und bösartigsten Bedrohungen für die Sicherheit von Unternehmen aller Branchen. Denn der versierte „Phisher“ von heute schafft es, selbst die ausgefeiltesten technischen Sicherheitsvorkehrungen durch sorgfältig geplante, sozial ausgerichtete E-Mails zu umgehen, die sich immer weiterentwickeln.

    Wie also Mitarbeiter und Unternehmen vor diesen gezielten Angriffen schützen?
    Das Phishing-Simulation- und Sicherheits-Awareness-Training von Proofpoint bietet Organisationen eine zusätzliche Sicherheitsebene, indem es Mitarbeiter auf die neuesten E-Mail-Sicherheitstaktiken testet und informiert. Dies hilft, das Bewusstsein zu erhöhen, die Anzahl erfolgreicher Phishing-Angriffe und Malware-Infektionen zu reduzieren und zukünftige Sicherheitsverletzungen zu verhindern.

    Erfahren Sie in unserem Live-Webcast, mehr über die marktführende Lösung für computerbasierte Security Awareness Trainings und Phishing-Simulation und informieren Sie sich über

    •E-Mail Fraud – Ein Omnipräsentes Thema
    •Proofpoint und Wombat – Eine optimale Ergänzung
    •Maturitätslevel von Security Awareness
    •Wombat Methodologe & Live Demo
  • New OneXafe: next generation converged storage and data protection
    New OneXafe: next generation converged storage and data protection Florian Malecki, International Sr. Product Marketing Director Sep 27 2018 9:15 am UTC 60 mins
    The growth of virtualised applications, diminishing backup windows, and explosive data growth have collectively placed an immense burden on data protection and storage infrastructure requirements. This complexity continues to be exacerbated by today’s fragmented data protection environments and the need to backup physical and virtual, on-premises and off-premises data, all with different service level agreements (SLAs). Backup and secondary storage infrastructure often comes from multiple vendors which significantly increase costs, add operational inefficiencies, and create data silos, making it difficult to manage centrally. An incomplete view of data protection workflow can lead to rising operational costs, data loss, and the inability to meet SLAs and specific industry regulations and compliance requirements.

    Join our webcast and learn how the new StorageCraft OneXafe converged data platform can help you with better protecting and managing your data in heterogeneous environments.
  • How Automation & Orchestration Can Improve Your Incident Response
    How Automation & Orchestration Can Improve Your Incident Response Andy Yeates, Solutions Architect, IBM Resilient Sep 27 2018 9:30 am UTC 31 mins
    To effectively operate in today's changing threat landscape, organizations must draw upon the widest degree of data and intelligence, as well as relevant operational context in order to identify and respond to attacks. This talk is intended to highlight how automation can be leveraged as part of a wider incident response program to resolve cyber incidents and proactively improve overall security posture.
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation
    When the Walls Come Tumbling Down – Network Security for the Cloud Generation Mike Chen, Tim Murphy, Robert Arandjelovic | Live Q&A with Karthik Ramakrishnan Sep 27 2018 10:00 am UTC 75 mins
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:
    - Why you should embrace cloud-based network security
    - The tools you need to provide protection against a variety of attacks
    - Why a proxy belongs at the center of your cloud service
    - Cloud migration strategies
    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today to hear from Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic, Director Product Marketing.

    With a live Q&A from Karthik Ramakrishnan, Senior Systems Engineer, EMEA Emerging Markets
  • Bringing Hacker-Powered Security Testing to DevOps SDLC
    Bringing Hacker-Powered Security Testing to DevOps SDLC Andy Condliffe, Solution Architect EMEA, Synack Sep 27 2018 11:00 am UTC 60 mins
    DevOps allows organizations to bring web, mobile, and IoT applications to life faster than traditional SDLC models. However, continuous releases and updates introduce new risks by the way of exploitable vulnerabilities that are introduced and left undetected and unresolved/unpatched in the production stream.

    Traditional point-in-time penetration tests can’t keep up with the frequency and short deployment cycles of the modern DevOps organization. Traditional pen tests are usually conducted through checklist-based activities that lack the comprehensiveness to mimic and defend against sophisticated cyber attacks. The result? An increase in serious, exploitable vulnerabilities in live applications and a slew of high-profile breaches..

    Leading enterprise organizations are utilizing a crowdsourced security testing platform that combines continuous vulnerability scanning tools with manual, crowdsourced human security testing. This model of offensive and adversarial-based testing delivers realistic attack traffic on customers’ applications, resulting in effective vulnerability discovery and management and “smart” security intelligence without compromising security and control. Scalable and controlled crowdsourced testing at a continuous cadence is the answer for secure DevOps SDLC.

    Join this session by Andy Condliffe of Synack EMEA as he shares how Synack can help lower the risks of dynamic deployments with a continuous, human, offensive security testing model that’s better suited for the modern DevOps organization
  • Fighting back with AI: Tapping the power of AI to elevate cybersecurity posture
    Fighting back with AI: Tapping the power of AI to elevate cybersecurity posture Lindsay Drabwell, Head of Membership Services (ISC)² EMEA, Mike Spradbery, Neil Jones, IBM Sep 27 2018 11:00 am UTC 60 mins
    How can AI help overworked, understaffed and overwhelmed security analyst teams? How can the use of an AI platform help reduce the cost of a data breach? Mike Spradbery, IBM's UK&I Security Technical Leader, will explore these and other questions as he talks live to the experts behind a new Ponemon Institute study on the use of Artificial Intelligence in Cyber Security. Mike will also share case studies of AI in action in Cyber Security and explore how AI is helping organisations elevate their cybersecurity posture and reduce response times.