Hi [[ session.user.profile.firstName ]]

IT Security

  • Consumer IoT: Concerns and Opportunities
    Consumer IoT: Concerns and Opportunities Informa Recorded: Apr 24 2017 2 mins
    Connected devices are taking over our daily lives. Over 40 million U.S. adults use wearables at least once a month. Around 33% of homeowners in the U.S. use Smart Home products. So, what is holding back consumers from taking the final leap and adopting the Internet of Things?

    The biggest challenges for the IoT adoption is customer perception that IoT devices are too expensive or are unsure of the benefits they provide. Privacy and security of IoT devices is also a cause for concern.

    How can your business overcome these obstacles to consumer IoT adoption? Learn how to jump the gap from early adopter buy-in to mass market success. Join the Internet of Things World 2017:
    https://tmt.knect365.com/iot-world/

    * Use BRIGHT20 and save 20% off your IoT World 2017 registration.
  • Surveillance, Then and Now: The Growing Need for Privacy & Security by Design
    Surveillance, Then and Now: The Growing Need for Privacy & Security by Design Ann Cavoukian, Executive Director, Privacy & Big Data Institute at Ryerson University Recorded: Apr 24 2017 64 mins
    The growth of state surveillance appears to be escalating dramatically. With the most recent Wikileaks Vault 7 revelations, it is clear that independent oversight is totally lacking and yet, much-needed if we ever hope to curb such unwarranted surveillance. Transparency relating to such activities is essential in order to hold governments accountable for their actions. The need for both global privacy and security - by design, is growing on a daily basis, and will be outlined in this presentation, in an effort to move things forward.

    About the Presenter:
    Dr. Ann Cavoukian is recognized as one of the world’s leading privacy experts. She is presently the Executive Director of Ryerson University’s Privacy and Big Data Institute. Dr. Cavoukian served an unprecedented three terms as the Information & Privacy Commissioner of Ontario, Canada. There she created Privacy by Design, a framework that seeks to proactively embed privacy into design, thereby achieving the strongest protection possible. In 2010, International Privacy Regulators unanimously passed a Resolution recognizing Privacy by Design as an international standard. Since then, PbD has been translated into 39 languages. Dr. Cavoukian has received numerous awards recognizing her leadership in privacy, most recently as of the Top 100 Leaders in Identity (January, 2017).
  • What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data
    What Embedded and IoT Developers Think About IoT Security: A Look at Survey Data Stacy Cannady, Cisco Systems and Richard Nass, Embedded Computing Design/OpenSystemsMedia Recorded: Apr 24 2017 60 mins
    Join Stacy Cannady, Cisco Systems and Richard Nass, Embedded Computing Design/OpenSystemsMedia in a webcast Monday, April 24, 10 a.m. Pacific/ 1:00 p.m. East to talk about the hottest issue today in the IoT and embedded design: security.

    With Embedded Computing Design (ECD), the Trusted Computing Group (TCG) conducted an Internet of Things (IoT) Security Survey January to February 2017 to find if and how designers were addressing these concerns.

    The webcast will look at how designers perceive security, whether they’re including security in their designs, challenges to embedded and IoT security, and their awareness and use of trusted computing.

    Attendees will see survey results and hear from our experts on trending security issues and potential solutions to protecting devices, networks and data.
  • Kubernetes Master
    Kubernetes Master Pravin Goyal Recorded: Apr 24 2017 1 min
    Assessing Kubernetes Master Node against CIS Security Benchmark for Kubernetes (Draft)
  • Kubernetes Worker
    Kubernetes Worker Pravin Goyal Recorded: Apr 24 2017 1 min
    Assessing Kubernetes Worker Node against CIS Security Benchmark for Kubernetes (Draft)
  • Interview: CTO of Symantec on advanced cybersecurity
    Interview: CTO of Symantec on advanced cybersecurity Darren Thomson, CTO & VP of Technology, Symantec, EMEA & Andrew Bird, EA Visionary, Interview Moderator Recorded: Apr 24 2017 23 mins
    Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
    ----------
    BrightTALK caught up with Darren Thomson, CTO & VP of Technology, Symantec, for an in-depth conversation on the future of cybersecurity in the context of IoT, AI and Machine Learning.

    Among topics discussed:

    - Trending business vulnerabilities in 2017
    - Particularities of pentesting
    - How to prepare for GDPR in 2018
    - Implications of IoT, AI & machine learning on cyber security
    - Yahoo breach
    - Brexit and cybersecurity
    - Recommendations to CISO's developing security strategies

    About the speaker:
    Darren is an industry recognised IT innovator and strategist, with +20 years of industry experience. He is a published author. His latest work has recently been published by Wiley Co. and is entitled, “Delivering Utility Computing: Business Driven IT Optimisation”. Details can be found at www.amazon.com.
  • Benefits of Machine Learning in IT Infrastructure
    Benefits of Machine Learning in IT Infrastructure Dan Ortega - Vice President of Marketing Recorded: Apr 21 2017 4 mins
    During the next 5 years, machine learning is poised to play a pivotal and transformational role in how IT Infrastructure is managed. Two key scenarios are possible: transforming infrastructure from a set of under-utilized capital assets to a highly efficient set of operational resources through dynamic provisioning based on consumption; and the identification of configurations, dependencies and the cause/effect of usage patterns through correlation analysis.
    In the world of IT infrastructure, it’s all about efficient use of resources. With on-premise infrastructure (compute, storage and network) utilization rates for most organizations in the low single digits, the cloud has sold the promise of a breakthrough. For those organizations moving to Infrastructure as a Service (IaaS), utilization in the middle to high teens is possible, and for those moving to Platform as a Service (PaaS), utilization in the mid-twenties is within reach.
    Dynamic provisioning driven by demand is essentially the same operational concept as power grids and municipal water systems – capacity allocation driven by where resources are consumed, rather than where they are produced.
    The second part of the breakthrough relates to right-sizing infrastructure. Whether this is network capacity or compute Virtual Machine size – machine learning will enable analysis of the patterns of behavior by users and correlate them to the consumption of infrastructure resources.
    During the near term, these benefits will be much more tactical. Automated discovery combined with behavioral correlation analysis will virtually eliminate the need for manual inventory and mapping of components and configuration items in the IT ecosystem to reveal how the ecosystem is operating.
    Today, IT has the opportunity to automate the mapping of components in their infrastructure to provide a more accurate and actionable picture.
  • Modernizing Your SOC: A CISO-led Training
    Modernizing Your SOC: A CISO-led Training Edward Amoroso Recorded: Apr 21 2017 66 mins
    Modern SOCs looks very different than those that were built even a few years ago. This webinar discusses the fundamental shifts in thinking and technology that allow security teams to spend more time seeking out and detecting advanced attacks.
  • Cloud IAM: Accelerating and Securing Mergers and Acquisitions
    Cloud IAM: Accelerating and Securing Mergers and Acquisitions Jiong Liu, Product Marketing Manager, Okta Aaron Yee, Senior Technical Marketing Manager, Okta Recorded: Apr 21 2017 56 mins
    As every company becomes a technology company, merger and acquisition transactions increase and become more complex, and thus more susceptible to vulnerabilities. Often, companies involved are targeted by cyber attacks. Legacy IT systems are a costly, insecure barrier to realizing the full value of M&A.

    Cloud identity access management is transforming the IT delivery of M&A. Connecting all the major stakeholders, like employees, partners, and customers, to every type of technology that they use is crucial. As a result, M&A can happen faster, more securely and at a lower cost.

    Join our webinar to:

    -Learn about IAM challenges in M&A
    -Understand how Cloud IAM solves those challenges and provides business value
    -See a live demo of the Okta Identity Cloud in M&A scenarios
  • Let's Get Critical: The Capabilities You Need for an Analytics-Driven SIEM
    Let's Get Critical: The Capabilities You Need for an Analytics-Driven SIEM Girish Bhat, Director of Security Product Marketing at Splunk & Chris Shobert, Senior Sales Engineer at Splunk Recorded: Apr 21 2017 61 mins
    Splunk Enterprise Security (ES) is an analytics-driven SIEM that powers successful security operations teams. But did you know it is actually made up of distinct frameworks that can each be leveraged independently to meet specific security use cases?

    Join us to learn the technical details behind key ES frameworks including: asset and identity correlation, notable event, threat intelligence, risk analysis, investigation and adaptive response. Splunk experts will discuss real-world examples and demo the key frameworks, which will help you to solve your security challenges.

    Speakers:
    Girish Bhat, director of security product marketing at Splunk
    Chris Shobert, senior sales engineer at Splunk

    Agenda:
    10min - Overview of Splunk Enterprise Security
    40min - Demonstration of key frameworks
    10min - Q&A
  • Are You Prepared to Identify & Defend Against Ransomware?
    Are You Prepared to Identify & Defend Against Ransomware? Mo Abdullahi Recorded: Apr 21 2017 37 mins
    Ransomware’s showing no signs of slowing down – and neither are we!

    We'll teach you about ransomware, how you can protect your data AND demonstrate why Varonis customers have some of the fastest response times in the industry.

    Attend our Webinar to discover:

    Warning signs of an impending ransomware attack
    The most recent ransomware threats (Cryptolocker & its variants, Zcrypt, Locky, and more)
    How Varonis customers:
    Use DatAlert to detect suspicious behavior and insider threats
    Stay up-to-date defending against the latest ransomware variants
    Discover which files were affected and how to recover quickly
  • Human Factor Podcast : Stuart Coulson
    Human Factor Podcast : Stuart Coulson Jenny Radcliffe Recorded: Apr 21 2017 54 mins
    In this episode, I am delighted to talk to Stuart Coulson.

    Stuart has been involved in the information security industry for many years and has extensive experience and expertise of working with major corporations and assisting them with relevant online protection plans and security solutions.

    His current role at the Challenge sees him working with organisations to complement their existing strategies to fill the cyber skills gap.
  • Human Factor Podcast : Dr Daniel Dresner
    Human Factor Podcast : Dr Daniel Dresner Jenny Radcliffe Recorded: Apr 21 2017 44 mins
    In this episode, I am delighted to chat to Dr. Daniel Dresner. Daniel’s LinkedIn profile tells us he is a consulting research analyst and lecturer. His mission is to find the threads that bind information together and mend them when they break. He contributed material to the Cyber Essentials and worked with a colleague to define the only real benchmark of cyber security. Being a proud father and grandfather motivated him to define ‘The Green Surf Code’.
  • Human Factor Podcast : Graham Cluley
    Human Factor Podcast : Graham Cluley Jenny Radcliffe Recorded: Apr 21 2017 35 mins
    In this episode, I was delighted to be joined by Graham Cluley. Graham Cluley is a security blogger, researcher and public speaker. He has been a well-known figure in the computer security industry since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows.
  • Part II – How to get started with GDPR & Applying Appropriate Security Controls
    Part II – How to get started with GDPR & Applying Appropriate Security Controls Jason Hart, Gemalto, Lisa Bentall, DQM GRC, Adrian Davis, (ISC)² EMEA, Nathaniel Ford, (ISC)² EMEA Apr 25 2017 11:00 am UTC 60 mins
    As a follow-up to our previous webinar, this panel discussion will dive into further detail about the GDPR. Presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) we will answer some of the big questions raised in the previous webinar and open up to the live audience for an interactive Q&A.
  • Is Your Organisation GDPR Ready?
    Is Your Organisation GDPR Ready? Steve Durbin, Managing Director, ISF LTD Apr 25 2017 12:00 pm UTC 45 mins
    Many organisations are still unclear as to how they will meet the requirements of the EU GDPR legislation which will come into effect in May 2018. Fundamentally organisations need to start preparing for this now.

    In this webinar Steve addresses some of the key questions organisations are asking such as: does the EU GDPR regulation apply to me? how should I prepare for this legislation? and what additional resources do I need?
  • Going Beyond His/tory: The Female Storytellers Shaping Immersive Tech
    Going Beyond His/tory: The Female Storytellers Shaping Immersive Tech Luciana Carvalho, VR Evangelist Apr 25 2017 12:00 pm UTC 45 mins
    Humans have shared gathered around and communicated through stories throughout history. Text, pictures, images and videos have sought to capture our imagination, or portray the non-fictional in a relatable way. Now, as we move beyond the 2D flat screen to new ways of interacting/communicating with the world — virtual and augmented reality, for example — we begin to see the power of immersion in storytelling, and the impact it has, beyond anything we have ever seen, on those in the receiving end. Arguably, the ultimate empathy machine.

    As we shape the next 'Information Age', and given the state of the world today, never before have we been in more need of putting ourselves in other people’s shoes, and empowering diverse and inclusive voices worldwide. Never before have we seen more women jump at the opportunity to lead and make content that is all-encompassing, that touches and inspires, and that aims to build bridges not walls. Here is their story.

    Learner, maker, systems thinker, innovator and tech evangelist, Luciana splits her time between growing the Realities Centre London — a new innovation space, incubator and academy for B2B/enterprise VR, AR, MR and AI — and Unfold UK, promoting women/diversity in future in the UK. Passionate about VR and tech for good, she carries ongoing research on the possibilities and challenges immersive tech presents as re neuroscience, empathy and female empowerment.

    She was elected one of Code First Girls ‘25 Ones to Watch’, 'Top 5 Female Role Models in the Tech Industry', and Virtual Perceptions' 'Heroes of VR' in 2016.
  • Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review
    Attacks Happen—Breaches Don't Have To. Learn about the Security Lifecycle Review Jay Kane, VP Cyber Security & Mike Semaniuk, CISSP Systems Engineer, Palo Alto Networks Apr 25 2017 12:00 pm UTC 60 mins
    Excuses stop. Answers start.

    Strict policies and solid security measures can’t eliminate hidden threats in your systems. Learn how our Security Lifecycle Review (SLR) examines your network traffic and then generates a comprehensive report unique to your organization.

    In this webinar, you’ll discover some of the types of applications and threats exposing vulnerabilities in your security’s posture.

    There’s no need for excuses. Register now and see what’s really happening on your network.
  • Cloudera Government Forum Livestream 2017
    Cloudera Government Forum Livestream 2017 Cloudera Apr 25 2017 12:30 pm UTC 240 mins
    Exploring the path to a more data-driven government will be the focus of the 2017 Cloudera Government Forum, planned for April 25, 2017. Government organizations have enormous data resources. Agency leaders and program management professionals seek practical, secure, and effective methods to extract the valuable information captured in their data repositories—from legacy systems to real-time.

    In its sixth year, the Cloudera Government Forum is an annual gathering to discover what’s new and what’s next for data management and advanced analytics strategies that can be applied for an immediate and positive impact on organizations and missions. Participants learn how they can leverage standards-based, cloud-enabled, and open source data strategies for meaningful digital transformation.
  • How to Avoid Business Outages from Misconfigured Network Devices
    How to Avoid Business Outages from Misconfigured Network Devices Joe DiPietro, SE Director at AlgoSec Apr 25 2017 2:00 pm UTC 60 mins
    A single change to a network device can have far reaching effects on your business. It can create security holes for cyber criminals, impact your regulatory audit, and even cause costly outages that can bring your business to a standstill – as we have recently seen in the news!

    This technical webinar will walk you through a variety of scenarios that can cause device misconfigurations, including a basic device change, business application connectivity changes, and data center migrations. It will provide both best practices and demonstrate specific techniques to help you understand and avoid misconfigurations and ultimately prevent damage to your business, including how to:

    * Understand and map your enterprise infrastructure topology before you make a change
    * Proactively assess the impact of a change to ensure it does not break connectivity, affect compliance or create a security hole
    * Common mistakes to avoid when making changes to your network security devices
    * How to better understand business requirements from the network security perspective
  • Five Ways to Transform Your IT With Analytics and Machine Learning
    Five Ways to Transform Your IT With Analytics and Machine Learning Priya Balakrishnan, Director, Solutions Marketing at Splunk; Alok Bhide, Director, Product Management at Splunk Apr 25 2017 2:00 pm UTC 75 mins
    The status quo of old monitoring solutions and approaches can't handle today's complex, highly distributed service-oriented architectures. We’ve all tried implementing solutions in the past, expecting that they’d offer more visibility and control. But eventually all we got was just one more tool to maintain that didn't provide much value.

    Splunk IT Service Intelligence (ITSI) solves this problem. The solution delivers an advanced data-centric approach to service monitoring driven by machine learning and analytics—taking operations and service intelligence to the next level.

    Join us in this webinar for a live demo to see how you can:
    - Gain service context by combining event and performance data
    - Get the big picture of your environment to streamline operations
    - Accelerate root-cause analysis and get ahead of customer-impacting outages
    - Prioritize incident investigation and reduce time-to-resolution with events analytics
    - Understand how analytics and machine learning can enhance service intelligence

    Featured Speakers:
    Priya Balakrishnan, Director, Solutions Marketing at Splunk
    Alok Bhide, Director, Product Management at Splunk
  • Walk this way - First steps towards firewall automation
    Walk this way - First steps towards firewall automation Erez Tadmor, Senior Product Manager, Tufin & Joe Schreiber, Technical Director, Business Development, Tufin Apr 25 2017 3:00 pm UTC 60 mins
    Automation systems bring a great deal of value. Having the ability to produce better, faster, and more reliable results can go a long way in improving business agility and simplifying day-to-day tasks. Firewall automation also helps tighten security posture and ensure continuous compliance with internal policies and industry regulations.

    Tufin presents the recommended steps to start your journey towards firewall automation. Join us for the first webinar of the series, focusing on rule decommissioning, to learn how you can initiate an immediate and substantial impact on your organization.
  • Secure Your Leaky Mobile Apps: Discovery & Remediation
    Secure Your Leaky Mobile Apps: Discovery & Remediation Andrew Hoog, CEO of NowSecure & Setu Kulkarni, VP Product Management at WhiteHat Security Apr 25 2017 4:00 pm UTC 60 mins
    Mobile devices are everywhere throughout the workplace, and outside the workplace, but mobile phone security as a discipline has been focused on parts of the solution such as WiFi connections, anti-virus and spyware. Mobile security apps are everywhere - but what are they securing? What is the actual security impact to your organization of insecure mobile app usage? For meaningful risk management, you need to understand both the qualitative and quantitative values of mobile security risk.

    Join WhiteHat Security and our technology partner NowSecure for a discussion on leaky apps, and how they can expose private and sensitive data - but more, what kind of data can be exposed.

    We’ll review how insecure mobile applications can create incidents, and how they impact the enterprise or organization. Finally, we will introduce you to the different ways WhiteHat can help you build mobile security into your larger DevSecOps and vulnerability management programs.

    About the Presenters:
    Andrew is the Co-founder and CEO of NowSecure. As a former CIO, Andrew has unique insight into solving enterprise mobile security problems and is driven by NowSecure’s mission to advance mobile security worldwide. He is responsible for the vision, strategy and growth of the company.

    Setu Kulkarni is the VP of Product Management at WhiteHat Security. Setu is responsible for product vision, strategy, and direction at WhiteHat Security. Setu joins the WhiteHat leadership team after a 10+ year stint at TIBCO Software Inc., where he most recently led product management and strategy for the Operational Intelligence product portfolio.
  • Tackle Your Toughest Security Challenges at Ignite 2017
    Tackle Your Toughest Security Challenges at Ignite 2017 Joerg Sieber, Director, Product Marketing, Palo Alto Networks Apr 25 2017 4:00 pm UTC 30 mins
    Join this webinar for a sneak preview of the content you can expect at Ignite 2017 in Vancouver, BC, Canada, June 12-15, 2017. This year will be the biggest and most advanced Ignite yet! We are expecting over 4,000 security experts gathering in beautiful Vancouver to tackle their toughest security challenges through a four-day program of hands-on educational sessions, peer-to-peer networking and multiple opportunities to explore all the capabilities and technologies of the Palo Alto Networks Next-Generation Security Platform, which is designed to put an end to the era of breaches by safely enabling applications and providing cyberthreat prevention measures at all steps in the cyberattack lifecycle. Space is limited, and you won’t want to miss this unique event, so sign up today at www.paloaltonetworksignite.com
  • Next Generation Defense in Depth Model
    Next Generation Defense in Depth Model Tari Schreider, CCISO, Chief Cybersecurity Strategist & Author, Prescriptive Risk Apr 25 2017 4:00 pm UTC 60 mins
    This session will focus on presenting a next generation defense in depth model and answer the question on many CISO’s minds - is it still relevant? A model of defense in depth will serve as a backdrop to introduce you to a wide range of solutions from across the cybersecurity industrial complex that just may change how you view your defense in depth approach.
  • Beyond Deployment Velocity: How Technology & Process Increase DevOps Success
    Beyond Deployment Velocity: How Technology & Process Increase DevOps Success Adrian Lane, CTO, Securosis, Jeff Craty, Dir. of Engineering, Veracode, & Tim Jarrett, Sr Dir. of Product Mktg at Veracode Apr 25 2017 5:00 pm UTC 60 mins
    DevOps increases teamwork, visibility and overall software quality. Yet, integrating security can be challenging for cultural and technological reasons.

    This webinar, featuring Adrian Lane of Securosis and Tim Jarrett and Jeff Cratty of Veracode, dives into what DevOps is, explain how delivering secure code lends itself to the larger goals of DevOps, and discusses the challenging process and technical requirements for integrating security into DevOps.

    Learn how you can have both development velocity and security without compromising either one.
  • Cloudera Government Forum Livestream Afternoon Sessions
    Cloudera Government Forum Livestream Afternoon Sessions Cloudera Apr 25 2017 5:00 pm UTC 300 mins
    Exploring the path to a more data-driven government will be the focus of the 2017 Cloudera Government Forum, planned for April 25, 2017. Government organizations have enormous data resources. Agency leaders and program management professionals seek practical, secure, and effective methods to extract the valuable information captured in their data repositories—from legacy systems to real-time.

    In its sixth year, the Cloudera Government Forum is an annual gathering to discover what’s new and what’s next for data management and advanced analytics strategies that can be applied for an immediate and positive impact on organizations and missions. Participants learn how they can leverage standards-based, cloud-enabled, and open source data strategies for meaningful digital transformation.
  • Security 101: More Than a Band-Aid: Patching is Critical for SMBs
    Security 101: More Than a Band-Aid: Patching is Critical for SMBs TJ Letourneau, Director of Technical Support Apr 25 2017 6:00 pm UTC 45 mins
    Security 101: Don't ignore those prompts to patch, learn about how cybercriminals exploit vulnerabilities in unpatched environments. Throughout the VIPRE Security 101 series, speakers have come back to the importance of patching. Im many cases, prompts to update Adobe, Java, Chrome, iTunes, Skype and others are to fix newly discovered security vulnerabilties in those products. Cyberminimals exploit those vulnerabbiliteies to open a backdoor onto your systems to drop malware and infect your network. Learn how to address these issues with steps to protect and product considerations.
  • Reduce time to detect and respond to cyber threats - without adding resources
    Reduce time to detect and respond to cyber threats - without adding resources Chris Martin, LogRhythm Security Expert Apr 26 2017 9:00 am UTC 45 mins
    Today’s reality is that organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

    In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

    You’ll learn:

    • The definition and details of the TLM framework
    • How TLM enables you to sort through the noise to highlight and investigate concerning incidents
    • How TLM works to streamline processes through automated workflow
    • Specific use cases TLM can address to prevent major data breaches

    Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).