The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
The average volume of encrypted web traffic has now crossed the 50% mark. Gartner expects more than 80% of enterprise web traffic to be encrypted by 2019. Protecting against attacks hidden in this traffic is going to be increasingly critical for organizations to safeguard their information and their customers. And you've got to be able to achieve that without complicating your networks or impacting your user-experience.
Join Tomer Weingarten, CEO of SentinelOne, to learn the best strategies to protect against the world of encrypted threats:
How to architect a solution that accelerates time to detection
How IOC search and threat hunting done right can help maximize the benefits of these security pursuits
Insights into the best response strategies to minimize business impact of threats
With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.
What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?
Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
- The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
- Managing IT risk and vulnerabilities
- How to improve breach prevention, detection and response
- What to expect in the future
- Igor Baikalov, Chief Scientist, Securonix
- Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
- Sam Abadir, Director of Product Management, LockPath
The public cloud offers undeniable benefits for organizations including agility, cost savings, and competitive advantages. In fact, some enterprises are choosing to abandon their on-premises data centers altogether and go “all-in” with the public cloud. The reality, however, is that most companies are pursuing a “hybrid” approach, using a combination of public cloud, private cloud, and on-premises resources and infrastructure to deliver applications and services to their employees and customers. But how can you efficiently protect all of your workloads against the latest data breach threats and ransomware attacks across such diverse environments and infrastructures? Tune in to our webcast and learn:
•How to discover, secure, and monitor all of your hybrid cloud workloads from a single console
•How to respond to alerts and update policy across your hybrid cloud without hiring an army of experts
•How to manage virtualized and physical on-premises servers protected by Symantec Data Center Security (DSC) agents from the Cloud Workload Protection (CWP) console
Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.
In this webinar you will:
· Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
· Watch a live DDoS attack from the attacker's perspective
· Participate in a live Q&A with DDoS experts
CI/CD tools like Jenkins enable development teams to deliver software faster. To prevent containers with either high-risk vulnerabilities or compliance violations making it to production, it’s important to integrate automated compliance and vulnerability monitoring that can check, alert on and fail builds. By detecting and remediating security risks early, you reduce overall risk, minimize costly rework, and reduce the effort of downstream security checks.
Join Twistlock Solution Architect Matthew Barker to see how Twistlock integrates directly into Jenkins to improve your risk and compliance posture without slowing down development.
Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.
The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:
* Email Authentication
* Attachment Sandboxing
* Data Loss Prevention
As Fortune reported on Tuesday, the new Blueborne attack vector exposed 5B+ devices to hacking, endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux. Blueborne attacks devices via Bluetooth in a manner never seen before, and spreads through the air (airborne). Users do not need to be on the Internet, take any action, or even pair with another device to be impacted. Blueborne has been called “Bluetooth’s Stagefright moment.”
Watch this webinar to learn:
• Understand the 8 zero-day vulnerabilities (4 critical)
• Which devices are affected
• How Blueborne can take over a device
• How BlueBorne can be used for a Man in the Middle Attack
• What’s involved in protecting your network
About the Speaker:
As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.
If you look at persistent threats through an attacker’s eyes, the most effective and nimble way to derail them is to detect their lateral movements across the environment—as early as possible in the attack process. Chad Gasaway is in the trenches every day helping Illusive customers conduct Red Teaming exercises and implementing deception technology to better guard highly sensitive assets from targeted attacks. In this webinar, Chad will provide an overview of how Illusive’s approach to deception helps organizations operate with greater agility to defend what matters most.
Organizations have spent massive amounts of money to protect the perimeter of their networks, but if your business exists on the internet, there really is no perimeter. In this presentation, we'll discuss Digital Footprints in understanding your company’s external attack surface. We will discuss social, mobile, web attacks and analyze and review lessons learned recently publicized attacks (Polish banking institutions, Apache Struts Vulnerability or WannaCry ransomware. The speed of business and cybercrime isn't slowing down, so how can you be prepared to address and defend against these types of threats? Attend our session to find out how.
Reducing Your Digital Attack Surface and Mitigating External Threats - What, Why, How:
What is a Digital Footprint?
Breakdown of External Threats (Social, Mobile, Web)
What are blended attacks?
What is actually being targeting at your company?
How are your brands, customers, and employees being attack outside of your company?
How to become proactive in threat monitoring on the internet?
Considerations in External Threat solutions
Threat correspondence tracking considerations
Is legal cease and desist letters adequate in stopping attacks?
Examination of a phishing attack campaign
How phishing kits work
Analysis and lesson learned from recent published attacks
What are the most important capability in a digital risk monitoring solution?
Getting started on an IoT project? Are you going to build a business or a liability for yourself? Canonical commissioned a research of 361 IoT professionals to find out how their projects are progressing. The findings were compiled in a report titled Defining IoT Business Models, which explored the practices of organisations currently implementing IoT projects. You can read it for yourself at http://ubunt.eu/vkTPIW
In this webinar, Canonical's EVP of Devices & IoT and 451 Research's IoT Analyst will discuss our findings as well as the challenges and opportunities businesses will face with the internet of things!
Join our webinar to find out...
>How businesses can monetise the internet of things in the long term
>What skills they need and where to find them
>How to address fundamental security considerations.
In the era of cloud, the significance of distribution to the supply chain is changing dramatically. Channel partners have moved-on from ‘tin shifting’ commoditized IT, instead working in tandem with vendors and providers to supply new kinds of complex cloud services to meet enterprise demand. As the focus moves from cloud construction to cloud consumption, the importance of these relationships increases, shifting the market opportunity to an ecosystem of connected specialists. Modern systems integrators, managed service providers and VARs are bringing higher-value, niche and vertical offerings to market that traditional ‘sell through’ models however, do not address. In this session, Rory Duncan, Research Director for Managed Services & Hosting, will outline the revised ‘sell with’ strategies that vendors and service providers alike must adopt in order to facilitate the delivery of high-growth services - including managed private cloud, security and disaster recovery – in partnership with their channel ecosystem.
Leadership Panel Session Featuring:
•Xavier Poisson Gouyou Beauchamps, Vice President, Indirect Digital Services, HPE
•Caroline Paine, Sales Director - Service Providers, OnApp
•Dan Havens, SVP of World Wide Sales, Ormuco
Real estate developers, owners and tenants are rethinking the office building experience. Not only are buildings becoming increasingly efficient in in-door energy management and operations, they are also beginning to interact with the people who work within the walls, and with the out of doors environment.
This type of sentient building design is making use of increased connectivity to and in buildings, as well as the use of sensors and IoT applications. This webcast will discuss communications and connectivity infrastructure that is being deployed in and to current real estate developments; what buiding owners, operators and tenants expect; the impact smart community development is having on smart buildings; and sample smart building IoT applications.
Yann Palmore, Vice President, Smart Building Solutions, JLL
Ray Moya, COO/CTO, Argent Associates, Inc.
>> Yann Palmore helps CRE investors, owners, and operators understand how to rethink building system infrastructure to support Internet of Things (IoT) technologies and drive smart building strategies. Yann’s key responsibilities are to guide clients through a structured process that prioritizes program goals, defines specific smart building strategies, specifies appropriate technologies, and oversees program implementation.
>> Ray Moya has over 25 years of network engineering and organizational management experience. His specializations include, wireline and wireless voice and data networks, network security, software development, and finance. He has designed, engineered and installed hundreds of Fortune 500 Company and Government networks. He leads network-consulting teams in LAN/WAN, software development, wireless technologies, and Network security.
For more about the speakers, please visit: http://www.tiaonline.org/webcast-iot-and-smart-buildings-new-construct
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.
What you will learn
What breach response will look like under the GDPR
What tools and processes a data privacy officer will rely on in case of a breach
What departments and entities will be involved beyond IT
What activities are currently happening within organizations to prepare for the GDPR
What the consequences of the breach could be
Join 451 Research and CenturyLink on the 20th September at 3:00pm UK time, 4:00pm CET, to discuss how enterprises are choosing and deploying digital transformation initiatives for business gain. This webinar will focus on the strategies and actions impacting the European market.
Organisations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.
Digital transformation can play out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.
Join 451 Research and CenturyLink to learn how European enterprises are making assured first steps, and discover the following:
- Understand how companies with more progressive digital transformation strategies are prioritising their efforts for competitive differentiation, changing the nature of their business with innovative technologies, and making service provider choices to accelerate results.
- Gain insights and recommendations from a major survey of the IT priorities of enterprises in Europe.
- Identify the key shifts in business context that will continue to shape digitisation efforts, and how these need to be reflected in a digital transformation roadmap for IT organisations.
Damage, counterfeit, theft, delays: these are some of the most pressing challenges that pharma supply chain executives are facing. Consequences are not limited to disruptions and to higher costs for manually managing exceptions, identify irregularities, and tracing products: there's also direct impact on patient safety, and customer satisfaction putting company reputation at risk.
In this webinar IDC analysts will share its research findings and provide guidance to pharmaceutical executives that want to start harnessing the real value of third generation digital platform, and implement a consistent, efficient and future-ready approach to supply chain management.
About the Speakers:
Silvia Piai is Senior Research Manager within IDC Health Insights for Europe Middle East and Africa. She is responsible for analyzing key trends related to IT strategies and spending in European healthcare organizations, and global Public Health institutions. She advises healthcare organizations and ICT vendors on planning and implementing effective digital health transformation initiatives to drive business innovation. Silvia’s analysis offers in-depth coverage of the technologies that provide the most clinical value in terms of quality, cost, time, and agility and are transforming pre-care, point of care (POC), and post-care today.
Stefanie Naujoks is Senior Research Manager within IDC Manufacturing Insights, where she leads a new global program on Manufacturing Business Ecosystems Strategies. Her research includes managing supply networks, selling into new business ecosystems and manufacturing B2B Commerce, enabling better ecosystem collaboration through industry collaborative clouds, as well as automation and transparency within business ecosystems. Stefanie has published numerous market studies in the fields of digital transformation, IoT, Industry 4.0, Product Lifecycle Management (PLM), Manufacturing Execution Systems (MES) and Supply Chain Management (SCM).
Cognitive Security has game-changing potential to help tackle cybercrime, but how is this playing out in reality? In February this year IBM announced Watson for Cyber Security, described as 'the industry’s first augmented intelligence technology designed to power cognitive Security Operations Centres'. What do customers say about their experiences working with Watson for Cyber Security and how is it helping security analysts improve response times?
Mike Spradbery, IBM's UK&I Security Technical Leader, will discuss not only the promise of Watson for Cyber Security but the client results that IBM is seeing. Mike will talk live to Brian Jensen, the analyst responsible for Cyber Security during the high-profile Wimbledon tennis tournament, to understand the scale and type of attacks the team saw, and how innovative new technologies like Watson for Cyber Security helped the team keep Wimbledon safe and secure.
For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.
In this webinar learn:
- How a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.
- A proxy based architecture is ESSENTIAL to meeting the needs of the cloud generation, to protect against the increasingly sophisticated web threats targeting your business.
Join this interactive Q&A panel to discover the biggest lessons of the recent Equifax breach and how to apply them toward improving your and your organizations cyber security.
Viewers will learn:
- The magnitude of the impact of this breach across consumers and industries
- The true costs of a breach
- How to discover if your personal information has been exposed and what you can do about it
- What to expect in terms of cyber threats in the future
- How can to protect your data and secure your organization
- Expert recommendations on improving breach protection, detection and response
- Brian Robison, Sr. Director of Security Technology, Cylance
- Stephan Chenette, CEO, AttackIQ
- Michael Davis, CTO, CounterTack
- Kevin Flynn, Global Director of Products, Skybox Security
As malware and ransomware become more commercialized, and the evolution of threats accelerates, it’s hard for organizations to keep up – even when they have multiple security products deployed. The latest SANS Cyber Threat Intelligence Survey showed that organizations using threat intelligence can gain dramatic improvements in visibility into threats, to enable a faster and more accurate response.
Join AlienVault for this practical session to learn how smart security teams are integrating cyber threat intelligence into their day to day operations. You'll learn:
- What threat intelligence is, and how it speeds threat detection and incident response
- Key questions to help you evaluate threat intelligence sources and plan for integrating it into your operations
- How AlienVault USM Anywhere integrates threat intelligence with other security capabilities to save valuable time
- A demo of AlienVault USM Anywhere showing how threat intelligence adds valuable context to alarms
Join us for this virtual panel discussion where guest speaker, Forrester's Joseph Blankenship and Siemplify's Amos Stern will present research and best practices driving Security Operations and how Security Orchestration and Automation are shaping the SOC of the Future.
Security Automation and Orchestration are increasingly looked to enable analysts to triage the tsunami of alerts flooding the organization, provide context to accelerate investigation, and provide the playbooks and workflow to drive consistency and efficiency throughout security operations.
In this discussion we will address:
- How to drive efficiency and effectiveness across security operations
- What does the SOC of the future look like and how do we get there
- What should security teams be looking for in Security Orchestration
Today, malicious bots represent an unprecedented threat to organizations of all sizes. The threat is only going to get worse in the next few years, as more-and-more vulnerable IoT devices make their way to the Internet. Bots can be blamed for the world’s largest DDoS attack on record, generated by IoT cameras that were infected with the Mirai malware, and commandeered into a bot army with amazing firepower. And if you think that’s bad, wait till you see what they’re going to do next. Your applications, websites, networks, APIs, and your data will become their next targets.
Join this webinar with other cybersecurity professionals where you’ll learn:
- Why malicious bots represent an unprecedented threat to businesses of all sizes
- What other hazards can we expect to experience due to the malicious bot phenomenon
- What actions can organizations take to manage their risk in the coming bot Armageddon
Le API sono un abilitatore fondamentale per lo sviluppo di nuovi canali digitali. Tuttavia un layer di service exposure basato su API ha sia la complessità architetturale di un sistema middleware che le responsabilità di sicurezza tipiche di un frontend. E’ per questo che risulta fondamentale poter testare la API in modo auto-consistente sin dalle prime fasi di sviluppo del software, in parallelo rispetto al restante ecosistema applicativo ed in autonomia rispetto alle dipendenze infrastrutturali a cui sono vincolate.
As you plan the move to Microsoft Office 365, make sure you have a good handle on the security capabilities you will need to ensure advanced email protection and continuity.
Join Richard Davis, Proofpoint, and Roy Murdoch to hear how you can mitigating security and compliance risks to secure your Office 365 email environment.
Hear how to take advantage of the bottom-line benefits of Office 365 while mitigating security risks with an integrated approach including:
• Superior blocking of advanced threats
• Immediate threat visibility and rapid response
• Greater protection from compliance violations and information loss
• Uninterrupted access to live and historic email
To raise a question to Roy or Richard prior to the event email: O365questions@proofpoint.com
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.
What you will learn:
- What breach response will look like under the GDPR
- What tools and processes a data privacy officer will rely on in case of a breach
- What departments and entities will be involved beyond IT
- What activities are currently happening within organisations to prepare for the GDPR
- What the consequences of the breach could be
Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2013.
Join us in a live webinar as we discuss this threat group whom we asses to be involved in a long-term, resource intensive cyber espionage operation motivated by the prospect of collecting strategic intelligence, including information related to the aviation and energy industries, which would ultimately benefit a nation-state or military sponsor.
Register today to gain deeper insights into this threat group!
On Thursday, 21 September, from 14.00 to 15.30 BST/15.00 to 16.30 CET, Kaspersky Lab will be joined by senior business and IT experts at the Kaspersky CyberSecurity Summit 2017, to debate the top threats facing enterprises – and what they mean for CISOs in terms of incident response, business continuity and risk management. Participants will leave armed with clear, actionable intelligence.
Speakers: Duncan Brown, Associate Vice President, European Security Practice, IDC; Christian Toon, Chief Information Security Officer, Pinsent Masons LLP; Roderick Clayton, EVP and Co-lead, Global Issues and Crisis, Weber Shandwick; Juan Andres Guerrero-Saade, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab; and Alessio Aceti, Head of Enterprise Division, Kaspersky Lab.
The event will be moderated by Geoff White, Television news reporter (BBC and Channel 4 News) and investigative journalist.
The cyberthreat landscape is becoming ever more complex and destructive. Over the last 12 months, attacks targeting enterprises have increased significantly in both number and range – with a measurable impact on operations, revenue, customers and reputation.
In this summit, experts from IT and business will discuss the most dangerous cyberthreats targeting enterprises, how to stay protected even when breached, as well as threat intelligence, incident response, the legal, insurance and communications challenges – and more.
Participants will be able to join in the debate and ask questions. They will leave armed with clear, actionable intelligence.
Blockchain technology burst onto the scene in 2009 and has emerged as one of the digital era’s most promising innovations. From frictionless money transfers and lower transaction costs to seamless real-time payments, blockchain is completely reinventing the global transaction settlement process.
In this webinar, Financial Services experts from everis UK and Dimension Data discuss how blockchain is transforming the way value is exchanged between people, businesses and devices, and outline emerging technologies allowing financial services companies to take advantage of distributed ledgers. They also look to the future of DLTs, sharing predictions on how these will become the standard technology behind transaction settlement for banks, financial markets, and asset exchange networks in the coming decade.
•Steve van den Heever, Group Sales Director, Financial Services, Dimension Data
•Isaac Arruebarrena, Blockchain Programme Manager, everis UK
•Josep Alvarez Perez, Partner, Head of UK Banking Practice and EMEA Blockchain Strategy, everis UK
The Center for Internet Security (CIS), a well-known independent organization, provides a recommended checklist for best securing macOS. Widely considered the standard in the security industry, organizations that adhere to the CIS checklist reduce the risk of vulnerabilities and maximize the protection of their computers and infrastructure. So how do organizations ensure they are implementing the guidelines correctly?
In our webinar, CIS Checklist: How to Secure macOS like a Pro, we’ll explain how organizations can leverage and put to use the CIS checklist recommendations — in conjunction with Jamf Pro — to meet industry regulations and keep their Mac environment secure.
•An overview of the CIS checklist and why it’s important
•Ways to accomplish specific tasks outlined in the security checklist
•The impact on users when Macs are properly secured
•Other security standards in the industry and how to meet them
About the Presenter:
Nick Thompson is on the product team at Jamf, an Apple device management solution for IT professionals. Nick is passionate about technology in the enterprise and closely follows the enterprise mobility management industry. He previously worked at Apple helping companies implement Mac and iOS deployments.
Guest Wi-Fi services, partner networks and multi-tenancy all are drivers to segment the branch and WAN infrastructure to secure and prevent unauthorized access of corporate assets. However, what is segmentation when it comes to the next-generation branch architecture and SD-WAN? Is it really only VLANs and encrypted traffic?
Attend this webinar to understand what is segmentation and how it is applied to software-defined WAN to address:
•Optimal application experience
•Secure and authorized connectivity
•Third party network access and integration
•Local guest services like Wi-Fi
There is an urgent need for a new approach to combat the next generation of cyber-threats beyond the data center - across Operational Technology, Industrial Control Systems (ICS), sensors and industrial IoT devices. New AI-driven technology is making its way into innovation labs and into production environments within the world’s leading energy, manufacturing, municipalities, hospitals, and construction companies. These network-connected robots, sensors and IoT devices offer improvements in automation, efficiency and even safety, but often lack built-in cyber security.
The silver lining is that the same wave of AI that is ushering in these innovations can also be used as an approach to protect them. Darktrace’s AI-powered cyber defense, known as the Industrial Immune System, is used by some of the world’s leading energy and manufacturing companies to detect early indicators of cyber-attacks or vulnerabilities across OT, ICS, sensor and industrial IoT environments.
Join Darktrace’s Executive Vice President, Jeff Cornelius, PhD., to learn how Darktrace’s self-learning technology can be leveraged to help defend digital supply chains and ICS environments from cyber-attacks.
Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent* of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.
Join this webinar to hear from guest speaker Duncan Brown, associate vice president, security practice, IDC, and Jae Lee, security product marketing, Splunk, and discover:
● The time and associated cost security teams spend on incident response and how you compare to your peers
● How organizations are coping with an average of 40 actionable security incidents per week
● Where teams are focusing their security efforts
● Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
Please join us for the 10 Steps for Combating DDoS in Real Time Webinar.
While the nature of distributed denial-of-service (DDoS) attacks is constantly evolving, two things are clear: the volume of attacks is increasing and every business is at risk.
Join fellow IT Security Professionals for an interactive webinar presentation. You'll learn:
- The importance of having a plan in place before attacks happen
- The four basic types of DDoS attacks and what you can do to protect yourself against them
- How to build your response plan using the customizable playbook and action plan
Is your cybersecurity protection making the grade? Healthcare rates a 'C' in security, almost half of US residents have been compromised, and the end-user impact is tens of billions of dollars a year.
An easy first step is understanding the attack vectors and automating HIPAA technical controls. This automation lets you quickly understand your baseline security posture both on-premise and within the public cloud, where you have gaps, and how to remediate them.
Private and public cloud security are logical extensions of securing managed, unmanaged and IoT devices in the physical world. ForeScout security solutions help enhance security and compliance of your virtual assets, regardless of where they are located. In addition, ForeScout’s heterogeneous platform lets you to leverage your on-premises security operations team’s skills and maximize your existing security investments. In this webinar, you’ll learn how ForeScout integrates with third-party solutions to:
• Discover and classify virtual instances (and cloud workloads) and assess their security posture
• Gain consolidated visibility and provide unified policy management across Data Center and cloud environments
• Proactively identify and manage underutilized or shadow VMs
• Allow, deny or segment virtual machines and cloud instances based upon policy compliance
Learn how you can enforce security across your hybrid campus and cloud deployments using one solution. Join us for this live online webinar.
The API economy creates new opportunities and business models supported by connected APIs. Unfortunately, most companies aren’t ready technically or organizationally for this shift, and the change it brings. API-driven application development requires reconsidering how identity, authorization, and accountability change for employees, partners and customers while protecting the organization.
In this presentation, “Create a Secure Digital Identity without Borders in an API Economy”, Okta’s Senior Developer Evangelist Keith Casey (a.k.a. “The API Problem Solver”) will cover the challenges of the API economy and how Okta API Access Management can save your team time, simplify your authorization, and increase the security of your platform.
Attend this webinar to learn:
- What is driving the dominance of APIs
- How to align Security Architects, Integration Architectures and Developers on API Efforts
- How Okta API Asset Management satisfies the API Access Management needs of developers and IT and security leaders
- How Pitney Bowes is transforming their business with APIs and the Okta Platform
Are you considering in earning the Security+ certification from CompTIA? A new version of the Security+ exam debuts this fall - version SYS-501. In this webinar, cybersecurity training provider, CyberVista, dissects the structure of the new Security+ exam. We will explain the 6 Domains that comprise the test while also providing valuable strategies for test day.
Join the Webinar: Long Term Impact of PSD2 & How to Select a Partner a Strategic Partner, featuring Vanita Pandey, VP of Product Marketing at ThreatMetrix, as she discusses the long-term impact of the Payment Service Directive (PSD2) and how to find a strategic partners in today’s crowded PSD2 landscape.
The webinar will help you understand:
•How the PSD2 requirements can be implemented in practice
•Long-term impact of the PSD2 directive
•How risk-based authentication (RBA) can be used to optimize the user experience
•How to find a strategic partner in the crowded PSD2 landscape
The most important topics in business today are focused on data analytics, security, the Internet of Things, machine learning, and artificial intelligence.
How can leveraging data analytics to enable these strategic technology trends to drive your digital transformation and elevate your business? Where are you in adopting and implementing key strategies for driving your business ahead of the competition?
Join industry leaders in data analytics including MasterCard, Cloudera, Dell EMC and Intel for a candid panel discussion on ways to drive success in business today. Examine the economic value of data and how you can use that data to build and protect your organization. Hear how data analytics strategies drive entirely new revenue streams, how security supports strategies, how data consolidation enables growth, and how insights from data elevate customer interactions.
In the aftermath of the Equifax data breach, both consumers and enterprises are scrambling for ways to minimize the impact. Since highly personal information was exposed (social security numbers, addresses, birthdays), the implications of this breach could haunt us in the long-term future.
What are the lessons of this breach to individuals, as well as organizations?
Join this interactive panel discussion with security experts to learn:
- The short and long-term effects of this data breach
- What you can do to protect yourself and your organization
- How to protect against future scams
- Why breaches happen and how organizations can improve their breach prevention efforts, as well as employ technologies and process for faster breach detection and response
- How to improve cyber security going into 2018
Join us at our next Career Conversations with Women in Cyber Security session. This webinar gives WSC members the opportunity to connect with female career professionals. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!
Featured Guest: Elena Steinke, Information Security Strategic & Tactical Architect
Jessica Gulick, VP of the Women's Society of Cyberjutsu board will moderate discussions.
About the Speaker:
Elena Steinke has over 15 years of systems engineering, and Information Security experience in developing solutions, providing strategic direction, designing, building, and directing cybersecurity operations across continents on multi-national projects, in the financial and US Federal sectors. Steinke stood up and directed multiple Security Operation Centers, Network Operation Centers, Data Centers, and management of virtualized storage technologies and elastic cloud environments. She lead security efforts across the globe for Automotive and Mobile Security, Banknote Processing Systems, Electronic Payments, eSIM, and IoT Technologies. She built and led Threat Hunting, Vulnerability Management, Security Assessment, Penetration Testing, Risk Management, Secure Credential Management, Key Management, and Security & Awareness Training programs.
Steinke volunteers as a Director at Women’s Society of Cyberjutsu (WSC). She holds a Bachelors IT, an MBA, and is pursuing her second Masters from Mercyhurst University in Applied Intelligence. Her certifications include CISSP, CEHv9, Security+, and Intel Threat Analyst.
The recent Equifax data breach, which may have jeopardized the personal information of 143 million U.S. consumers, will likely haunt us for years to come.
Join this interactive panel with experts from the cyber security, identity and privacy space to learn more about:
- What we know occurred or is likely to have occurred
- Data Breach Timeline - too slow or too fast
- External communications - how has the breach been handled and communicated
- Internal Actions - security remediation, work with law enforcement, root cause, incident response
- External forces - lawsuits, media scrutiny, and customer communications
- Dr. Christopher Pierson, CSO, Viewpost
- Sarah Squire, Founder and Principal Consultant, Engage Identity
- Dr. Ravi Rajamiyer, VP of Engineering, Cavirin
- Debra J. Farber Executive Privacy & Security Consultant, Cranium USA & Host of "The Privacy Pact," ITSPmagazine