Hi [[ session.user.profile.firstName ]]

IT Security

  • Rapid7 Roundtable: Overcoming The Innovation Paradox in 2017 - EMEA Rapid7 Roundtable: Overcoming The Innovation Paradox in 2017 - EMEA David Etue, Russ Verbofsky, Brian Gray, Bo Weaver, Jose Enchautegui Recorded: Jan 17 2017 75 mins
    Spending less. Exercising more. Finding ways to better manage a potentially world-shattering paradox. Clearly, some resolutions are more challenging than others - and not many people have it harder than security and IT pros.

    Why? The innovation paradox. If you haven't heard the name, you're definitely familiar with the concept: As our use of technology surges, so does the complexity of managing and securing it. No wonder infosec professionals count prioritizing vulnerabilities and threat among their toughest challenges - in this fast-paced and ever-evolving landscape, it's nearly impossible to know where to focus first. We're hoping to change that.

    In this webcast, our panel of security experts will dive deeper into the catch 22 of security and share the resolutions and initiatives they're implementing in 2017 to overcome this paradox, not only for individual organizations, but for the industry as a whole.

    Listen in for the kind of insight and advice that will help you take a fresh look at your security program and set new goals for 2017, as our panel answers big questions, like:

    How are you managing the innovation paradox today?
    Has IoT evolved to be more than just a consumer problem? How is your organization thinking about it?
    What have you been working towards over the last couple of years?
    What should we be striving to achieve over the next couple years?
    What are the resolutions and top initiatives for security professionals in 2017?
  • Il lato oscuro del traffico crittografato Il lato oscuro del traffico crittografato Cristiano Cafferata Recorded: Jan 17 2017 57 mins
    Partecipa al nostro webcast live e scopri gli strumenti per eliminare i punti morti nel tuo sistema di difesa. Scopri come implementare un modello di scalabilità basato sulla rete per il tuo firewall di nuova generazione.

    Registrati al webcast per scoprire come:
    •Prevenire gli attacchi crittografati con SSL
    •Implementare un modello di scalabilità basato sulla rete per i firewall di nuova generazione
    •Risolvere i problemi di prestazioni dell'ispezione SSL
  • Information Security and Cyber Risk Information Security and Cyber Risk Ian Beale and Richard Cross Recorded: Jan 17 2017 60 mins
    The continued growth in size and frequency of costly data breaches has increased the pressure on senior leadership and Boards of Directors to take a rigorous approach to understanding and managing cyber security risk. With this in mind, ERM teams are being asked to weigh in the organization’s response to these risks. Join this webinar to learn from CEB how your peers manage and report on cyber security risks and work with their Information Security counterparts to ensure that their organisations are prepared for the inevitable cyber-attack.
  • El lado oscuro del tráfico cifrado El lado oscuro del tráfico cifrado Eduardo Brenes Recorded: Jan 17 2017 60 mins
    Participe en nuestro webcast en directo y obtenga las herramientas que necesita para eliminar los puntos ciegos de su defensa de seguridad. Descubra cómo implementar un modelo basado en la red para escalar un firewall de próxima generación.

    Inscríbase en este webcast y descubra cómo puede:
    •Prevenir ataques cifrados mediante SSL
    •Implementar un modelo basado en la red para escalar firewalls de próxima generación
    •Solucionar los retos de rendimiento de la inspección SSL
  • Die Schattenseite des verschlüsselten Verkehrs Die Schattenseite des verschlüsselten Verkehrs Stephan Kaiser Recorded: Jan 17 2017 64 mins
    Nehmen Sie an unserem Live-Webcast teil und erfahren Sie, wie Sie Schwachstellen in Ihrem Sicherheitskonzept beseitigen. Wir sagen Ihnen, wie Sie ein netzwerkbasiertes Modell zur Skalierung von Next-Generation-Firewalls implementieren können.

    Melden Sie sich für den Webcast an und erfahren Sie, wie Sie:
    •SSL-verschlüsselte Angriffe verhindern
    •ein netzwerkbasiertes Modell zur Skalierung von Next-Generation-Firewalls implementieren
    •Performance-Probleme bei der SSL-Prüfung lösen
  • Office 365 and SaaS Optimization with SD-WAN Office 365 and SaaS Optimization with SD-WAN Ramesh Prabagaran, VP Product Management & Lloyd Noronha, Head of Global Marketing, Viptela Recorded: Jan 16 2017 47 mins
    Gartner’s recent research revealed that 78% of organization are using or plan to use Office 365, and by 2019 half of the global deployments will face network related problems. Limited WAN optimization capability further complicate the problems and presents a major performance and productivity challenge for Office 365 and all SaaS applications.

    SD-WAN provides an essential set of features that solves the networking issues related to Office 365 and SaaS applications. This webinar will cover the following major topics:

    - How traditional networks impair O365 performance, and why?
    - Why enterprises overlook the importance of strategically placing cloud gateways
    - Understanding tradeoffs among reliability, performance and user-experience when architecting the WAN for your cloud
    - Best practice architectures for different kinds of SaaS applications
  • Analyst Keynote: Research Insights on the Next Generation WAN (EMA Research) Analyst Keynote: Research Insights on the Next Generation WAN (EMA Research) Shamus McGillicuddy, Senior Analyst, EMA Research Recorded: Jan 16 2017 40 mins
    Join Analyst Shamus McGillicuddy (EMA Research) as he provides insight from the research of 200 networking professionals into how enterprises are utilizing Software-Defined WAN (SD-WAN) and transforming their business connectivity.

    Going in detail on the survey results, Shamus will walk you through the key trends in SDN and SD-WAN across major enterprises. These include the major application performance issues, operational challenges, cloud migration hurdles and reasons for rapid SD-WAN adoption.

    Some of the key discussion topics will include:
    - What percentage are transitioning from MPLS to Hybrid, and why?
    - How pervasive is 4G/LTE in the WAN?
    - How Cloud migration affects WAN infrastructure teams?
    - What are the major drivers for NFV services?
    - How important is WAN optimization?
    - What are the characteristics of major organizations deploying SD-WAN?
    - What are the major tools to monitor and manage SD-WAN?

    Preview of some of the results:

    - 96% of enterprises say they use wireless as the primary network connectivity in at least some of their sites (4G/LTE is the most common wireless technology, followed by carrier/municipal Wi-Fi)
    - Only 52% of enterprises monitor their WAN provider’s service-level agreements (SLAs)
    - 30% say their service providers have violated an SLA in the past year

    The wide area network (WAN) is the essential infrastructure component to driving global communication, collaboration and data access across enterprise networks. Enterprises have been deploying traditional architectures but with increased cloud adoption and high bandwidth demands, a new architecture of connectivity is needed. IT organizations across the globe have begun adopting SD-WAN to address their new connectivity requirements.
  • Voice of the Customer: First American SD-WAN Transformation Voice of the Customer: First American SD-WAN Transformation CJ Metz, Senior IT Manager Network Engineering, First American & Archish Dalal, Senior Systems Engineer, Viptela Recorded: Jan 16 2017 48 mins
    Learn how one of the largest title insurance companies in the US is deploying Viptela SD-WAN to eliminate the word “backup” from their vocabulary.

    In this session, CJ Metz of First American will discuss how their transformative strategy for the Wide Area Network (WAN) simplifies compliance and enables resiliency for their enterprise. He will cover the business drivers and demonstrate the viability of broadband usage for critical enterprise applications.

    First American is able to reduce long term costs while boosting availability and performance at their branches; making them more resilient for business continuity in any economy.
  • Empowering Employee Productivity in the Digital Age Empowering Employee Productivity in the Digital Age Michal Gideoni, Director Product Marketing | Kyle Minar, Product Marketing Manager Recorded: Jan 16 2017 43 mins
    The 4th industrial revolution is upon us. Digital transformation is quickly becoming the most important factor of a company’s ability to compete in the fastest and most disruptive period in our history. It’s time to start asking the tough questions. How do I implement tools to enable our employees to achieve more together? How do I make sure we are optimizing mobile teams and networks without opening ourselves up to security, compliance and privacy risks? How do I get the information I need quickly to make decisions that will shape the future of my business? In this session you will learn how Microsoft is bridging the gap between people and technology with Office 365, Skype for Business, and Intelligent productivity tools, all with the built-in security, privacy and compliance you’ve come to expect.
  • Drive Customer Growth and Business Success with Cloud Business Applications Drive Customer Growth and Business Success with Cloud Business Applications Eanna Sarah, Tom Yang Recorded: Jan 16 2017 28 mins
    Hear how we’re delivering a new approach to business applications, through a single cloud service of purpose-built apps that will help you manage specific business functions.
    Turn your customers in to fans by reinventing your Sales, Customer Service, Finance, Field Service, Operations, Marketing and Project Service Automation processes. This completely integrated platform includes Productivity and Reporting tools, Internet of Things, and is also extensible through its own easy to use graphical development and workflow tools, allowing IT professionals to implement, build and deploy a new level of functionality for a wide range of business processes, using world-class technology.
  • Protect, Detect, Respond: How Cybersecurity Enables Digital Transformation Protect, Detect, Respond: How Cybersecurity Enables Digital Transformation David Gemoll, Cloud Transformation Executive Recorded: Jan 16 2017 18 mins
    Security is key to enable successful digital transformation. Microsoft’s unique approach to security spans the platform, intelligence and partners that organizations need as they encounter more risk and cyber threats than ever before. Microsoft attacks threats with a proven posture: Protect, Detect, Respond. This session will showcase how Microsoft’s investments in a Security platform are giving organizations the resources they need to manage security across a growing number of end-points that span evolving businesses.
  • How the Heck Did They Miss It? Lessons to Learn from the Yahoo Breach How the Heck Did They Miss It? Lessons to Learn from the Yahoo Breach Chris Roberts, Chief Security Architect at Acalvio Technologies Recorded: Jan 13 2017 49 mins
    With 2016 behind us, is this the last Yahoo breach we’ll hear about? Join Chris Roberts, Chief Security Architect at Acalvio Technologies as he discusses the lessons to be learned from the recently disclosed Yahoo breaches, and the nagging questions infosecurity professionals will try to answer in 2017.
  • La face cachée du chiffrement La face cachée du chiffrement Florian Malecki Recorded: Jan 13 2017 61 mins
    Participez à notre webcast en direct et armez-vous pour éliminer les angles morts dans votre dispositif de sécurité. Apprenez à mettre en œuvre un modèle réseau pour pare-feux nouvelle génération.

    Inscrivez-vous à ce webcast. Vous y apprendrez comment :
    •prévenir les attaques dissimulées dans le trafic SSL ;
    •mettre en œuvre un modèle réseau pour pare-feux nouvelle génération ;
    •résoudre les problèmes de performances de l’inspection SSL.
  • Rapid7 InsightIDR Product Demo - APAC Rapid7 InsightIDR Product Demo - APAC Eric Sun and Pat Haley Recorded: Jan 13 2017 48 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    How to cut through the noise to detect attacks
    How to investigate incidents faster
    How to end the drudgery of security data management
    Q&A
    And more!
    We believe this is the SIEM you've been waiting for!
  • The Fortify Ecosystem: Seamless integration into the development toolchain The Fortify Ecosystem: Seamless integration into the development toolchain Scott Johnson, Director of Product Management, Fortify Recorded: Jan 12 2017 39 mins
    Organizations moving at DevOps speed can easily integrate security testing into their Software Development Life Cycle (SDLC) workflow. Join this presentation to discover how built-in application security testing can become a seamless part of your coding process.

    Viewers will learn:

    - How integrations spanning all stages of development, deployment and production enable application security testing into the development tool chain

    - How to empower your developers to test for security vulnerabilities earlier, build better code and secure your software
  • Rapid7 InsightIDR Product Demo Rapid7 InsightIDR Product Demo Eric Sun and Pat Haley Recorded: Jan 12 2017 49 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    How to cut through the noise to detect attacks
    How to investigate incidents faster
    How to end the drudgery of security data management
    Q&A
    And more!
    We believe this is the SIEM you've been waiting for!
  • PCI DSS v3.2. A Fast Assessment to Identify What You Must Do to Comply PCI DSS v3.2. A Fast Assessment to Identify What You Must Do to Comply David Kim. ITPG Secure Compliance. SVP, Governance Risk and Compliance Recorded: Jan 12 2017 53 mins
    Your organization has little over a year to comply with the new PCI DSS v3.2 standard. If you have yet to assess your current security controls against these new standards, it’s time to start. We’ll highlight the key changes, the issues to think about, and the time required to assess, plan and implement. As a PCI Qualified Security Assessor, we know what can trip organizations up and how to avoid missteps.
  • IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare John Smith, Principle Solutions Architect from ExtraHop, Darren Carr, Sr. Technology Architect, from Cerner Recorded: Jan 12 2017 49 mins
    Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.

    Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.
  • CA Briefings Part 5: Annual Trends/Predictions CA Briefings Part 5: Annual Trends/Predictions Nick Nikols, Senior VP and Cybersecurity Business CTO, CA; Brandon Dunlap, Moderator Recorded: Jan 12 2017 58 mins
    2016 was a blockbuster year for cybersecurity -- from a hacker influenced national election to a landmark breach into the Internet of Things that caused the largest botnet attacks in history. What’s in store for 2017? On January 12, join CA Technologies’ Nick Nickols, Security CTO, as he examines the evidence and trends that predict what you can expect in 2017. In this webcast, Nick will discuss:
    ·Key areas to focus your attention and investment - from access governance to threat analytics to IDaaS
    ·The changing landscape of regulations and consumer behavior
    ·Technology transformations and new innovations that will influence the way you prepare for 2017
  • Key Considerations When Moving to Office 365 Key Considerations When Moving to Office 365 Anat Shiwak, Director of Product Marketing, Okta, Marc Jordan, Group Technical Marketing Manager, Okta Recorded: Jan 12 2017 54 mins
    Customers migrating to Office 365 have complex requirements, such as having to work around unique user access and governance challenges that may involve their employees, customers, partners and providers. Solving these unique challenges while providing seamless access across your user populations is an issue many businesses face – but management can be achieved.

    When you attend this live webinar you will learn:

    - Understand key decisions to make while moving to the cloud with Office 365
    - Discover how to automatically assign service-level licenses
    - Learn how to easily manage user provisioning from one pane of glass

    Explore how you can remove the identity barriers for your Office 365 migration, while building a foundation from which to launch your entire future cloud strategy.
  • What Does the Massive Yahoo Hack Mean for Your Company? What Does the Massive Yahoo Hack Mean for Your Company? Dr. Christopher Pierson, EVP, Chief Security Officer & General Counsel, Viewpost Recorded: Jan 12 2017 37 mins
    With over 1 billion user accounts stolen, the recently disclosed Yahoo breach is the biggest one to date. What does this mean for your organization? Join Chris Pierson, General Counsel and Chief Security Officer at Viewpost as he discusses the Yahoo breaches and the cybersecurity and privacy implications for organizations worldwide.

    About the presenter:
    Dr. Chris Pierson is the EVP, Chief Security Officer & General Counsel for Viewpost - a Fintech payments company. He is a globally recognized cybersecurity expert and entrepreneur who holds several cybersecurity and technology patents. Dr. Pierson serves on the Department of Homeland Security’s Data Privacy and Integrity Advisory Committee and Cybersecurity Subcommittee and is a Distinguished Fellow of the Ponemon Institute. Previously, Chris was the first Chief Privacy Officer, SVP for the Royal Bank of Scotland’s U.S. banking operations leading its privacy and data protection program. Chris was also a corporate attorney for Lewis and Roca where he established its Cybersecurity Practice representing companies on security and data breach matters.
  • How to Make a Virtual Cloud Network in 10 Minutes or Less How to Make a Virtual Cloud Network in 10 Minutes or Less Roger Billings and Val Heusinkveld of Cradlepoint Recorded: Jan 12 2017 59 mins
    In the year 2017, it’s amazing what’s possible. With Network-as-a-Service, anyone — even your CFO — can create a secure Virtual Cloud Network in 10 minutes or less. When it comes to reducing man-hours, hardware and complexity, this is what they call a “game-changer.”

    Cradlepoint NetCloud Engine provides a streamlined process to deploy cloud-based networks in minutes to connect people, places, and things anywhere. You can make the public Internet your private network without giving up visibility, security, and control.

    At 9 a.m. PST / 12 p.m. EST on Jan. 12, 2017, join Cradlepoint Global Solutions Architect Roger Billings and CFO Val Heusinkveld to watch exactly how easy it is to set up a Virtual Cloud Network in 10 minutes or less.
  • The Critical Infrastructure Attack Surface: Assessing Its Threats and Defenses The Critical Infrastructure Attack Surface: Assessing Its Threats and Defenses Sameer Bhalotra, frm. cybersecurity director at the White House, Kennet Westby, president of Coalfire, James Carder, CISO Jan 17 2017 5:00 pm UTC 60 mins
    The recent DDoS attack on Dyn did much more than simply disrupt service to websites of some of the biggest online brands. It caused many to question our definition of critical infrastructure and the best way to ensure crucial functions are protected.

    In this webcast, a panel of experts discuss a number of questions around critical infrastructure and the challenges of protecting it against advanced cyber threats. The panelist also highlight the issues and risks the Internet of Things (IoT) pose to securing critical infrastructure.

    You’ll learn:

    • The definition of critical infrastructure
    • The responsibility the private sector plays in protecting the nation’s critical infrastructure
    • How IoT is amplifying the scope of critical infrastructure
    • Where organizations should focus to best mitigate the growing and shifting cyberthreats
  • Packet Pushers Open Mic: Real SD-WAN Challenges Live Q&A Packet Pushers Open Mic: Real SD-WAN Challenges Live Q&A Ethan Banks & Greg Ferro, Analysts and Co-Hosts of Packet Pushers Jan 17 2017 5:00 pm UTC 45 mins
    What is the reality of deploying an SD-WAN? Does it really work? What are the traps, tricks, and stumbles that you need to look for?

    Ethan and Greg from the Packet Pushers will be hosting engineers who have deployed Viptela SD-WAN solutions and will be taking questions from a live audience.

    Analysts Greg Ferro and Ethan Banks, on their show “Three Real-World SD-WAN Deployments”, have interviewed many network engineers who have executed large SD-WAN projects in retail, financials, healthcare, and energy. These include companies like Kindred Healthcare, Freedom Pay, Gap, Visa, Bloomberg, Seventy Seven Energy, Greenhill, and more. They will share some of their learnings on this Live session and then open a lively discussion of everything SD-WAN.
  • Cloud First, Now What? Cloud First, Now What? Palo Alto Networks Jan 17 2017 5:00 pm UTC 60 mins
    Your executive staff has made a strategic decision to move to the cloud, and your team has the seemingly monumental task of executing on this new direction. The journey to the cloud introduces many unknowns, the least of which is determining the applications and data, including precious customer information, that belong in the cloud. Yet your knowledge is limited and you have little time to immerse yourself in this vast topic.

    Join us for the the Cloud First, Now What? webinar hosted by Cloud Security Alliance and sponsored by Palo Alto Networks. In this webinar, we will walk through the process by which your company should implement a cloud first strategy.

    •How to get started
    •Key players and their responsibilities
    •Steps involved in continuous improvement
  • Analyst Keynote: Building the SD-WAN Business Case (Nemertes Research) Analyst Keynote: Building the SD-WAN Business Case (Nemertes Research) John Burke, Principal Analyst and CIO at Nemertes Research Jan 17 2017 6:00 pm UTC 45 mins
    SD-WAN’s transformational potential is not enough. IT teams have to build a compelling business case for making the transition. Savings from MPLS is not the only avenue by which SD-WAN can drive ROI. By providing cheaper and more transparent and automatic failover when WAN links fail, SD-WAN can reduce branch WAN outages and troubleshooting costs by 90%.

    By working with multiple vendors and enterprises, Nemertes has developed and validated an SD-WAN cost model that enables enterprise users to build that business case base on multiple key factors.

    Join Principal Research Analyst and CIO John Burke of Nemertes Research as he presents his latest research findings. These include:

    - The cost-model applied to three real SD-WAN use cases
    - The process for identifying locations that could benefit from higher bandwidth, lower rates, increased reliability, or all three
    - The cost components of connectivity, capex, troubleshooting and more.
    - The comparison between Overlay SD-WAN and In-Net WAN
  • Learn How the NIST CSF Benefits Small and Medium Businesses Learn How the NIST CSF Benefits Small and Medium Businesses Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Jan 17 2017 6:00 pm UTC 60 mins
    Small Businesses are increasingly being targeted by cyber criminals. With precious few resources, how can Small Businesses defend against Ransomware, Data Breach, Insider Threat plus more issues.

    Join this webcast to learn how the NIST Cybersecurity Framework (CSF) can be an important resource to help Small Businesses defend against cyber-attacks. We’ll walk you through the recently released NIST Publication “Small Business Information Security: The Fundamentals” and it’s relation to the NIST CSF.

    - A basic understanding of the Cybersecurity Framework.

    -The purpose and scope of the recently released NIST Small Business Information Security Publication.

    -A review of the alignment of Symantec solutions to the Cybersecurity Framework.

    Join this webcast for a review of the latest NIST guidance and how to apply it to assess and manage Cybersecurity Risks to your business.
  • How To Be Known and Great in Tech How To Be Known and Great in Tech Alyssa Nicoll, Software Engineer at WeaveUp Jan 17 2017 7:00 pm UTC 45 mins
    There is no set path to tech fame, but the doors that being known opens are obvious and desirable.

    Being known in the tech industry, having a following and a name, does not just happen overnight. It takes a lot of work along with continuous attention.
    We only have so much energy to give, so many hours in the day; so the steps we take towards our career goals need to be very intentional.

    In this webinar, Alyssa Nicoll is going to go over the two paths she has discovered to creating a name for yourself and being awesome at what you do.

    2 quick paths to becoming known:
    - Technology
    - Psychology

    2 pitfalls on your way to greatness:
    - Fear
    - Time Management
  • Rapid7 Roundtable: Overcoming The Innovation Paradox in 2017 Rapid7 Roundtable: Overcoming The Innovation Paradox in 2017 David Etue, Russ Verbofsky, Brian Gray, Bo Weaver, Jose Enchautegui Jan 17 2017 7:00 pm UTC 75 mins
    Spending less. Exercising more. Finding ways to better manage a potentially world-shattering paradox. Clearly, some resolutions are more challenging than others - and not many people have it harder than security and IT pros.

    Why? The innovation paradox. If you haven't heard the name, you're definitely familiar with the concept: As our use of technology surges, so does the complexity of managing and securing it. No wonder infosec professionals count prioritizing vulnerabilities and threat among their toughest challenges - in this fast-paced and ever-evolving landscape, it's nearly impossible to know where to focus first. We're hoping to change that.

    In this webcast, our panel of security experts will dive deeper into the catch 22 of security and share the resolutions and initiatives they're implementing in 2017 to overcome this paradox, not only for individual organizations, but for the industry as a whole.

    Listen in for the kind of insight and advice that will help you take a fresh look at your security program and set new goals for 2017, as our panel answers big questions, like:

    How are you managing the innovation paradox today?
    Has IoT evolved to be more than just a consumer problem? How is your organization thinking about it?
    What have you been working towards over the last couple of years?
    What should we be striving to achieve over the next couple years?
    What are the resolutions and top initiatives for security professionals in 2017?
  • Voice of the Customer: Kindred Healthcare SD-WAN Transformation Voice of the Customer: Kindred Healthcare SD-WAN Transformation Eyvonne Sharp, Network Engineer, Kindred Healthcare Jan 17 2017 7:00 pm UTC 45 mins
    Healthcare IT teams have sophisticated needs for SD-WAN, specifically for reliability, security and agility in M&A integration. In this webinar, Kindred Healthcare will reveal their evaluation criteria, process of migration to SD-WAN, and the results.

    Jointly presenting with Palo Alto Networks and Viptela, Kindred will explain in detail the plans and deployment experiences across hospitals, nursing centers, and contract rehabilitation in the US. Kindred is the largest diversified post-acute healthcare provider in the US, and has doubled in the last four years.

    Key Results:
    - Application performance improvement from 4x to 10x at Nursing facilities and Home clinics
    - 700% bandwidth increase
    - Estimated 5-year ROI in Millions
    - Solving complex requirements of M&A and new services in efficient and simple way

    SD-WAN Feature Requirements for Healthcare:
    - Policy based, application-aware routing over multiple, diverse connections
    - Intelligent routing based on network health & application requirements
    - Network segmentation & isolation (Multi tenant/Security)
    - Centralized policy administration & device management
    - Ability to selectively route specific traffic through security appliances (Service Chaining)
    - Application aware traffic shaping
    - Centralized provisioning feature, or zero touch methodology
    - Multiple Ethernet, MPLS or LTE connectivity options
  • VMware: A Virtual Edge Solution for Managed Branch Services VMware: A Virtual Edge Solution for Managed Branch Services Vanessa Little, Sr. Manager Global NFV EcoSystem Architecture, VMware & Ariful Huq, Product Management, Viptela Jan 17 2017 8:00 pm UTC 45 mins
    vCloud NFV is an open, carrier-grade NFVI platform. It delivers a tightly integrated solution with virtual compute, storage and networking resources coupled with intelligent operations and management capability.

    Viptela SD-WAN has achieved VMware Ready Status for NFV. SD-WAN solutions, on vCloud NFV, enable service providers to deliver elastic bandwidth, advanced services and greater flexibility in terms of cost and QoS. The Viptela SD-WAN platform opens up new opportunities for service providers by unifying WAN connection management (MPLS, Internet and 4G/LTE), segmenting traffic, providing zero touch provisioning and supporting application aware routing for enterprise customers.

    This webinar will highlight the key elements of vCloud NFV and SD-WAN in providing a fully packaged solution for Service Providers including:

    - How to accelerate and automate instantiating, provisioning and managing of virtual network services (including SD-WAN)
    - Deliver carrier-grade network availability and multi-tenancy
    - Provide advanced networking and security VNFs including switching, routing, QoS and monitoring
    - Enable single pane of glass visibility, monitoring and policy based automation
  • IDC CloudView Survey Says: Accelerate & Enhance your Cloud Competencies IDC CloudView Survey Says: Accelerate & Enhance your Cloud Competencies Scott Emigh, CTO of Corporate Accounts & Jonathan Swartz, Azure National Solution Director Jan 17 2017 9:00 pm UTC 60 mins
    According to IDC's CloudView 2016 survey, 58% of organizations have embraced the cloud for more than one or two workloads, but only 5% believe they have an optimized cloud strategy.

    When beginning your journey to the cloud, the first step is often the most challenging. Poor guidance, complex technologies, security questions, and regulatory concerns, plus the ever-increasing pressures to innovate while managing costs, lead to indecision for many business and IT leaders.

    To give customers the tools they need for cloud success, Microsoft gathered insights from thousands of customer engagements to create the Cloud Accelerator Program—a structured, targeted series of lessons and resources for quickly achieving measurable cloud results.

    Join this webcast to:
    - Learn from the success of others. Get the skills, tools, and approaches to solving business problems enabled by the power of the Azure platform.
    - Discover the breadth of the Azure platform. Find new ways to help solve your company’s most critical business problems.
    - Experience all that the Azure platform can bring to your business. Use hands-on content and real solutions running in your environment to create real business value.
    - Implement the insights gained from thousands of customers in your own environment with the help of Microsoft and our partners.
  • Beat Hackers Through Visibility, Precision and Quick Response Beat Hackers Through Visibility, Precision and Quick Response Travis Grandpre, HPE Director of ArcSight Product Marketing and Justin Kelso, HPE ArcSight Jan 17 2017 9:00 pm UTC 45 mins
    As organizations scale, having a robust security posture is critical. To achieve this, organizations rely on intelligent security operations. Visibility plays a crucial part in this. This means having visibility across boundaries, not just across networks and IT, but also into operational data and IoT devices.

    Join this presentation to learn:

    •What's needed to enable visibility into millions of events per second
    •How to provide context to the collected data
    •Role of machine learning in real-time correlation and analytics
    •How to prioritize security analyst tasks, optimize resources and save time

    Discover the capabilities powering intelligent security operations that enable you to track alerts and investigate threats at the speed of the attacker.
  • 2017 Cybersecurity Predictions 2017 Cybersecurity Predictions Sean Duca, Sean Duca, VP and Regional CSO, Asia Pacific, Palo Alto Networks Jan 18 2017 2:00 am UTC 60 mins
    Cybersecurity is in a state of constant change and evolution and 2016 was no different. In 2017 you have an opportunity to get ahead of cybercriminals by understanding existing and potential threats and how to mitigate against them.

    •Why cybersecurity is extending beyond the IT department and what you can do about it.
    •How to enable customer and employee innovation and efficiency securely
    •Trends for ransomware and practical advice to protect your organisation and deal with attacks.
    •Identifying the weak links in your organisation and steps you can take to strengthen them.
  • Rapid7 Roundtable: Overcoming The Innovation Paradox in 2017 - APAC Rapid7 Roundtable: Overcoming The Innovation Paradox in 2017 - APAC David Etue, Russ Verbofsky, Brian Gray, Bo Weaver, Jose Enchautegui Jan 18 2017 3:00 am UTC 75 mins
    Spending less. Exercising more. Finding ways to better manage a potentially world-shattering paradox. Clearly, some resolutions are more challenging than others - and not many people have it harder than security and IT pros.

    Why? The innovation paradox. If you haven't heard the name, you're definitely familiar with the concept: As our use of technology surges, so does the complexity of managing and securing it. No wonder infosec professionals count prioritizing vulnerabilities and threat among their toughest challenges - in this fast-paced and ever-evolving landscape, it's nearly impossible to know where to focus first. We're hoping to change that.

    In this webcast, our panel of security experts will dive deeper into the catch 22 of security and share the resolutions and initiatives they're implementing in 2017 to overcome this paradox, not only for individual organizations, but for the industry as a whole.

    Listen in for the kind of insight and advice that will help you take a fresh look at your security program and set new goals for 2017, as our panel answers big questions, like:

    How are you managing the innovation paradox today?
    Has IoT evolved to be more than just a consumer problem? How is your organization thinking about it?
    What have you been working towards over the last couple of years?
    What should we be striving to achieve over the next couple years?
    What are the resolutions and top initiatives for security professionals in 2017?
  • 2017 Cybersecurity Predictions 2017 Cybersecurity Predictions Sean Duca, Sean Duca, VP and Regional CSO, Asia Pacific, Palo Alto Networks Jan 18 2017 9:00 am UTC 60 mins
    Cybersecurity is in a state of constant change and evolution and 2016 was no different. In 2017 you have an opportunity to get ahead of cybercriminals by understanding existing and potential threats and how to mitigate against them.

    •Why cybersecurity is extending beyond the IT department and what you can do about it.
    •How to enable customer and employee innovation and efficiency securely
    •Trends for ransomware and practical advice to protect your organisation and deal with attacks.
    •Identifying the weak links in your organisation and steps you can take to strengthen them.
  • The Role of IT: Change or Die The Role of IT: Change or Die Kevin Linsell, Director of Strategy & Architecture, Adapt Jan 18 2017 9:00 am UTC 60 mins
    Cloud, Mobile, Big Data, Social Media - the pillars to our new digital society and a springboard for innovation by businesses of all shapes and sizes. But so what? It’s all just hype, right? Should you be starting to do things differently? Join us for this webinar if you want a reality check...

    Duration: 30 mins + Q&A
  • Auditing Neglected Critical Infrastructure Auditing Neglected Critical Infrastructure Ian Whiting - CEO Titania Group Jan 18 2017 2:00 pm UTC 30 mins
    Key network infrastructure devices are overlooked yet they provide critical functionality. Exploiting web application weaknesses and service buffer overflows is exciting, but the housekeeping of network infrastructure is not. Issues in network infrastructure devices can lead to network wide problems that would cause system admininstration nightmares. This presentation provides a review of key security devices, often side-lined when looking at security. It covers the value of these devices to "Blue Teams", issues "Red Teams" can highlight, desired outcomes and auditing practices.
  • Key Strategies and Best Practices To Proactively Protect Digital Assets and Apps Key Strategies and Best Practices To Proactively Protect Digital Assets and Apps Charlie Kraus,Sr. Product Marketing Manager, Limelight Networks & Kerrion Burton-Evans,Solutions Engineer, Limelight Networks Jan 18 2017 2:00 pm UTC 60 mins
    In the last few months we have seen cyber attacks on corporations as diverse as Deutsche Telekom and Tesco. From the boardroom to the backroom there is an increasing awareness of complex cyber-security attacks. Businesses need a proactive solution that not only protects digital content and properties but also keeps one step ahead of these evolving threats.

    Join us on 18th January for a live webinar with Limelight's digital security experts, who will share specific use cases to illustrate key strategies and best practices for a cloud-based security solution.
  • What’s Next In Securing Identities? Key Identity & Access Management Trends What’s Next In Securing Identities? Key Identity & Access Management Trends Danna Bethlehem Jan 18 2017 4:00 pm UTC 60 mins
    Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.

    Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:

    -The status of the two-factor authentication market and what we can expect in the years to come
    -The enterprise risk issues of using social media credentials to access to corporate resources
    -The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
    -The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
  • How to Implement User-based Controls for Cybersecurity How to Implement User-based Controls for Cybersecurity Navneet Singh, Product Marketing Director, Next-Generation Firewall Jan 18 2017 5:00 pm UTC 45 mins
    Visibility and policy control based on users is critical for cybersecurity. User-based policies readily show their business relevance, are more secure, easier to manage, and allow better forensics. In this webinar you will:

    •Learn the value of user-based controls using real-life data breach examples
    •Discover a step-by-step approach for implementing User-IDTM on your Palo Alto Networks Next-Generation Firewall