Hi [[ session.user.profile.firstName ]]

IT Security

  • Email Fraud Defense - Live Demo
    Email Fraud Defense - Live Demo Aaron Neff, Sr Engineer, Parker Bowman Account Manager Recorded: May 26 2017 26 mins
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • Anatomy of WannaCry - Learning from the Ransomware that Paralyzed Global Systems
    Anatomy of WannaCry - Learning from the Ransomware that Paralyzed Global Systems Paul Schofield, Director, Partner Architecture & Enablement, enSilo Recorded: May 26 2017 57 mins
    In early May, the world witnessed a massive ransomware campaign that had a crippling effect on businesses in multiple industries across the globe. What made this ransomware, called WannaCry, so different than others was the ransomware’s ability to combine lateral movement. As opposed to other ransomware that typically infects a few devices within an organization, WannaCry had worm-like capabilities, spreading itself throughout the organizational network and hitting servers.

    While a “kill-switch” was used against WannaCry, organizations are undoubtedly going to continue suffering from WannaCry’s remnants within organizations. More so, the impact of WannaCry will motivate ransomware authors to start adopting lateral movement capabilities. Yet, with all the advanced malware techniques, security professionals are required to ensure the continuous operations of their systems.

    In this webinar, you will:
    - Learn about EternalBlue - the exploit in Microsoft's implementation of the SMB protocol that enabled WannaCry to propagate throughout the organization
    - Watch how WannaCry attacks an unpatched endpoint and encrypts data
    - Receive strategies and best practices to ensure that your systems are protected from advanced ransomware
  • Ransomware - The Great Shakedown
    Ransomware - The Great Shakedown Keith Rayle, Chief Security Strategist, Fortinet Recorded: May 26 2017 63 mins
    Ransomware is the fastest growing security issue for professionals. Cyber criminals leverage a wide range of tools and methods for implementing these types of attacks. Join us in this Web cast to learn about the various types of ransomware, the history of it, current trends, and what you can do in order to protect your critical business environment.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you
    WanaCrypt0r Ransomware – How Palo Alto Networks protects you Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42 Recorded: May 26 2017 46 mins
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Palo Alto Networks Next Generation Endpoint Solution Traps™
    Palo Alto Networks Next Generation Endpoint Solution Traps™ Paul Wilcox Recorded: May 26 2017 49 mins
    You are invited to join this live webinar for an overview of Palo Alto Networks® Traps™ advanced endpoint protection and learn about this market-leading solution that provides multi-method protection against known and unknown threats.

    Hosted by Paul Wilcox, APAC Sales Director for Palo Alto Networks Cybersecurity Solutions Group, you will learn why Traps is the most effective solution on the market today to address the current threat landscape, including:

    •How it effectively prevent attacks against exploits and malware – such as ransomware
    •An overview of the unique approach Traps takes to endpoint security
    •How legacy antivirus is no longer effective enough
    •How Traps can replace your existing legacy antivirus software
    Included in this live webinar will be a live demonstration of Traps in action.
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention]
    SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Charles Woo, Systems Engineer, Palo Alto Networks Recorded: May 26 2017 35 mins
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.

    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you
    WanaCrypt0r Ransomware – How Palo Alto Networks protects you Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42 Recorded: May 26 2017 47 mins
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Stop Attackers from Phishing Your Inbox for Good
    Stop Attackers from Phishing Your Inbox for Good Andrew Coyle, Sales Engineer Recorded: May 25 2017 15 mins
    Inbound email is the primary source of phishing attacks that lead to breaches like ransomware, BEC attacks, malware and credential harvesting. Area 1 Security locks down your email to keep your organization safe from hacks where current secure email gateways and anti-spam filters fail. This webinar shows you how to achieve absolute phishing protection with total preemption.
  • IT Management Is Becoming So Predictive – Which Is Good. Right?
    IT Management Is Becoming So Predictive – Which Is Good. Right? Dan Ortega - Vice President of Marketing Recorded: May 25 2017 5 mins
    Improvements in IT data quality and analysis tools have enabled IT management to spend less time looking into the past and more time enabling the dynamic enterprise of the future. This allows them to anticipate business events more accurately, forecast costs and capacity, and identify operational risks before they appear. Empowered by technology-driven insights and technology-enabled prediction ability, IT leaders have secured a long-sought seat at the table with their business counterparts during the strategic planning process. IT management becoming more predictive is good. Right? Perhaps, but there are some risks to consider.

    Technology-enabled prediction is only as good as the underlying data, and does a poor job of addressing unknown variables. Human intuition and analysis skills have traditionally been used to fill gaps in available data, interpret meaning and project future events. The predictive abilities of most IT leaders are heavily dependent on the quality of information and technology-enabled processing power at their disposal. Modern machine learning systems have made tremendous strides in analyzing large volumes of data to identify trends and patterns based on past and current observations. Their capability to do so is limited, however, by the quality and dependability of data inputs. “Garbage in-garbage out” has been the rule for many years.

    Learning how to harness the power of technology and information and applying it to create valuable predictive insights for an organizations is definitely good; IT leaders should be commended for bringing new capabilities to the decision-making table. As we all know, however, no information is perfect, and technology has its limitations. Becoming entirely reliant on technology for prediction and losing the ability to apply a human filter is a risky situation for businesses. As with many business decisions, it is important to balance the potential benefits with the acceptable risk profile for your organization
  • Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace
    Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace Trent Fierro: Director of Software Solutions Marketing at HPE Aruba Recorded: May 25 2017 58 mins
    With the advent of the mobile workforce and IoT, it’s increasingly difficult to know who and what is on your network, how they got there, and whether or not they pose a risk to your business. Is your current security solution able to quickly detect and effectively respond when things go wrong? The answer lies in whether or not you can consolidate information from various security tools to prioritize remediation activities. Watch this webinar from TechTarget “Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace” and learn how to use data and analytics to protect your enterprise while simplifying remediation by enabling:

    * Device identification
    * Policy control
    * Workflow automation
    * Automated threat protection


    Presenters:

    Jamie Chui: Senior Manager, Technology Alliances at Intel Security
    Brian Beaver: Independent Consultant and Founder of Principle Logics
    Trent Fierro: Director of Software Solutions Marketing at HPE Aruba
  • Hunting From Network to Endpoint (Hunter Spotlight)
    Hunting From Network to Endpoint (Hunter Spotlight) Ryan Nolette, Hunter and security technologist at Sqrrl Recorded: May 25 2017 31 mins
    Ryan Nolette, Sqrrl's hunter and security technologist, will break down:
    • Determining what endpoints to investigate in a hunt
    • Pivoting from network to endpoint investigations
    • Essential tools and best practices for endpoint hunting

    About the hunter:
    Ryan is Sqrrl's primary security technologist and expert. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With over a decade in the infosec field, Ryan has been on the product and operations side of companies such as Carbon Black, Crossbeam Systems, SecureWorks and Fidelity. Ryan has been an active speaker and writer on threat hunting and endpoint security.
  • Lifecycle Container & Docker Security - The CISO's Perspective
    Lifecycle Container & Docker Security - The CISO's Perspective Dave Ginsburg, Ravi Rajamiyer, Izak Mutlu Recorded: May 25 2017 50 mins
    Are containers & Docker secure? We look at best practices across their lifecycle, including image scanning within CI/CD process, container OS hardening, and orchestration security with Kubernetes. Guest speaker is Izak Mutlu, former CISO at Salesforce.
  • Tech Demo - Pseudonymization and Data Masking for the GDPR
    Tech Demo - Pseudonymization and Data Masking for the GDPR Cheryl Tang - Director of Product Marketing, and Steve Pomroy - Chief Technologist, Camouflage Recorded: May 25 2017 35 mins
    This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.

    We’ll provide an overview of:

    o What the General Data Protection Regulation (GDPR) is
    o What is pseudonymization and the benefits of pseudonymizing data
    o How data masking can help organizations comply with GDPR by pseudonymizing data classification capabilities

    Hope you can join us!
  • Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing
    Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing Brian Lawrence, NowSecure Solutions Engineer & Keith Mokris, NowSecure Product Marketing Leader Recorded: May 25 2017 32 mins
    Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.

    Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:

    -- Address DevOps stakeholders' worries and concerns about integrating security testing
    -- Determine the right depth of analysis for continuous mobile app security testing
    -- Track mobile DevSecOps metrics over time to measure success
  • Office 2007 Retirement: Upgrade the smart way today
    Office 2007 Retirement: Upgrade the smart way today Haley Hendricks, Solutions Sales Professional State and Local Government Microsoft Corporation Recorded: May 25 2017 25 mins
    Upgrade your technology for continued support, security, and functionality.

    Office 2007 retirement has pressing ramifications for your Office 2007 system. These include reduced functionality when integrating with modern versions of Office servers, no Microsoft support, and disabled features.

    Because there will be no further security updates, while products will continue to boot up, they will be at risk from hackers, unsupported features, and connected applications. In order to maintain support, an upgrade is required.

    Join this webcast to:
    - Find out key dates for Office products approaching end of extended support
    - Learn which upgrade option is right for your organization
    - Make sure you implement changes appropriately to avoid a service interruption
  • Let the countdown begin: What does the GDPR mean for US companies?
    Let the countdown begin: What does the GDPR mean for US companies? Stephen Bailey, Head of Privacy at NCC Group, Terry Blake, SureCloud EVP – North America, and Nick Rafferty, SureCloud COO. Recorded: May 25 2017 60 mins
    Exactly one year from the date of this webinar, the General Data Protection Regulation will take effect in the European Union. The GDPR applies to any organization that stores, processes or transfers the personal data of residents within the EU. It includes organizations located in and outside the EU. Non-compliance can result in fines of more than $20 million or 4% of worldwide revenues, whichever is greater. A recent survey found an alarming percentage of US-based companies are planning to reduce their presence in Europe or exit the European Union altogether rather than deal with the GDPR. Instead of tossing up their hands over the GDPR and going home, strategic US companies can follow the defined steps and adopt software solutions that can bring certainty to these uncertain times. In fact, they see another company’s exit from the EU as a potential opportunity to gain share. The good news is that you’re not too late in getting started to meet the GDPR deadline. But as the countdown begins, urgency escalates. The time to act is now.

    In this webinar, you will learn:
    What the GDPR means for you
    How to get started on your journey to compliance
    How the SureCloud GDPR Applications Suite can help you gain and demonstrate compliance and continuously improve your performance

    Agenda includes plenty of time to address your questions.
  • New Traps v4.0: Advancing Endpoint Security, Again!
    New Traps v4.0: Advancing Endpoint Security, Again! Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks Recorded: May 25 2017 51 mins
    We’re excited to announce the availability of the new release of Traps™ advanced endpoint protection, version 4.0. This release is packed with new features and expanded multi-method prevention capabilities that deliver unsurpassed protection against known and unknown threats.

    Join us for a webinar to learn about these new capabilities and improvements in Traps v4.0, including:

    • Support for macOS™ and Android™
    • Protection from malicious macros
    • Prevention of script-based attacks
    • Exploit kit fingerprinting protection
    • Kernel privilege escalation protection

    Plus much more...
  • Using Windows Security Events to Detect Intruders in Your Network
    Using Windows Security Events to Detect Intruders in Your Network Randy Franklin Smith (Windows Security expert), Chris Martin (Security Engineer), Caitlin NoePayne (LogRhythm Sr. TPM) Recorded: May 25 2017 87 mins
    Over time, any given computer on your network will establish a pattern of systems it does and doesn’t talk to. If you can properly baseline that behavior and detect when the computer deviates from normal activity you can produce critical early warnings of a potential incident.

    In this webcast, LogRhythm’s senior technical product manager, Caitlin NoePayne, and principal sales engineer, Chris Martin, join Randy Franklin Smith, Windows Security subject matter expert, to discuss detecting computers on your network talking for the first time using Windows Security Events. They will also demonstrate LogRhythm behavioral analytics rules and case management features that help analysts follow up on suspicious activity alerts.

    Learn how to:

    • Configure your audit policy to generate relevant security events
    • Establish baseline behavior of the machines on your environment
    • Monitor and detect traffic patterns to detect an attacker embedded in your network using Windows Security Events
    • Speed up investigation and response with Security Automation and Orchestration

    Watch now to learn how to use Windows Security Events and LogRhythm to detect when two computers on your network talk to each other for the first time.
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife Recorded: May 25 2017 59 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance
  • Unifying Data Protection both To and In the Cloud
    Unifying Data Protection both To and In the Cloud Dave Bull, Dir, Data Protection Srvs, McAfee, Raj Goel; Keith Young, Brandon Dunlap Recorded: May 25 2017 60 mins
    Organizations continue to adopt cloud strategies and technologies at a dizzying pace. Many organizations now look at new IT projects with cloud optics. With the volume of data being transmitted to, from and existing in the cloud ever increasing, protecting that data can be challenging. How can this data, which is always on the move and in myriad locations, have a coordinated security strategy? Join McAfee and (ISC)2 on May 25, 2017 at 1:00PM Eastern for a discussion on how to unify data security across applications, clouds and various locations.
  • Should you build or buy your security? Midmarket survey findings
    Should you build or buy your security? Midmarket survey findings Sridhar Karnam, Director of Product Strategy Recorded: May 25 2017 55 mins
    A deep dive into the findings and implications of a survey taken by IT professionals in the midmarket space. 100% of respondents indicated they're cybersecurity could improve in one or more areas such as information security, user security training, threat intelligence, overall risk management, and more. And of the threats, viruses, malware, professional cybercriminal, data theft, and phishing are among the top 5 threats facing their organizations.

    Get the results and takeaways from the survey and gain insight into whether it is best for your organization to build or buy a security operations center (SOC) in this interactive webcast.
  • Learning from the RSA Conference 2017 - Uncover Data Security Blind Spots
    Learning from the RSA Conference 2017 - Uncover Data Security Blind Spots Ulf Mattsson, CTO Atlantic BT Security Recorded: May 25 2017 60 mins
    The RSA conference is a unique and valuable event for IT security experts from around the world. With cyber-attacks on the rise, securing your data is more imperative than ever. The RSA conference pointed out that revisions to PCI (Payment Card Industry) DSS (Data Security Standard) is increasingly focusing on Rugged DevOps or SecDevOps, and the different approach called DevSecOps, embracing the speed of DevOps and continuous delivery in a secure environment. DevOps does affect security, and you can use it to your advantage. As cloud, big data and DevOps disrupt traditional approaches to security, new capabilities emerge to automate and enhance security operations.
    Join this session and learn how to automatically address these data security blind spots and how security can be built into the development process and IT platforms. We will discuss how security can be built into Rugged DevOps,SecDevOps, DevSecOps, Scrum, SAFe, DAD and use in Large-scale Development.
  • De waarde van Next Generation Security Platform
    De waarde van Next Generation Security Platform Fred Streefland May 29 2017 12:00 pm UTC 60 mins
    De combinatie van complexe, moderne IT-omgevingen en een snel ontwikkelende bedreigingen maakt het voor veel bedrijven een uitdaging om kosten laag te houden en tegelijk de systemen te beschermen waarvan hun werk afhankelijk is.

    In veel gevallen zijn de uitdagingen het resultaat van te veel verschillende beveiligingsoplossingen die geen samenhang hebben in combinatie met een gebrek aan tijd en/of expertise.

    Organisaties in alle soorten en maten gaan deze uitdagingen aan door te zoeken naar manieren om hun beveiligingsinfrastructuur te bundelen, zodat ze hun beveiligingsbeleid kunnen verbeteren en de totale eigendomskosten (TCO) kunnen verlagen.

    Neem deel aan onze webinar waar we bespreken hoe het Next-Generation Security Platform van Palo Alto Networks uw organisatie in staat stelt om:

    - De bedreigings “footprint” te verkleinen
    - Bekende en onbekende aanvallen te voorkomen
    - Beleid aan gebruikers te verbinden
  • Come proteggere le comunicazioni e-mail
    Come proteggere le comunicazioni e-mail Cristiano Cafferata May 29 2017 1:30 pm UTC 75 mins
    Le comunicazioni basate sulla posta elettronica sono un elemento fondamentale per fare business in modo efficace. Ecco perché le e-mail sono un vettore privilegiato per il sabotaggio delle reti e un trampolino di lancio per la diffusione di malware, tra cui ransomware e minacce zero-day.

    Questo webcast mostra come SonicWall Email Security – ora integrato con Capture Advanced Threat Protection – può fornire una protezione sandbox multi-engine basata sul cloud per le email dei tuoi clienti.

    Partecipa al webinar per scoprire come questa soluzione completa, flessibile e scalabile è in grado di:

    •Scansionare numerosi tipi di allegati e-mail per rilevare eventuali minacce avanzate
    •Analizzarli in una sandbox multi-engine
    •Bloccarli finché non viene accertata la loro natura
    •Installare rapidamente le signature di riparazione
  • SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture
    SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec May 30 2017 5:00 am UTC 30 mins
    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    We look forward to welcoming you in our webinar.

    Register today!
  • The General Data Protection Regulation or “We Don’t Know What We Don’t Know”
    The General Data Protection Regulation or “We Don’t Know What We Don’t Know” Patrick Grillo, Senior Director, Security Solutions, Fortinet May 30 2017 9:00 am UTC 45 mins
    The clock is ticking on the General Data Protection Regulation (GDPR) coming into effect and while there isn’t wide scale panic yet, lots of organizations are either 1) in denial or 2) just coming to grips with its implications.

    The difficulty with GDPR is that the regulation states the “WHAT” but pretty much is silent on the “HOW”. The overwhelming majority of the regulation deals with process, procedure and is it really necessary to collect the data and stresses the rights of the data subject. How to protect the data, in movement and in rest, is left to individual organizations to decide except for the vague mention of “continuous risk assessment” and “state of the art”.

    Another major change from the existing national regulations, which were enacted during the mid to late 1990s, GDPR takes into account the massive change in how technology plays in everyday. To protect the data subject, the punitive aspect of non-compliance is significant with penalties of €20M or 4% of annual turnover, whichever is GREATER.

    So in this confusing and changing environment, where do cyber security technologies come into play?

    This session will focus on the role of the underlying network in any organization’s GDPR compliance efforts and how to take advantage of certain aspects of GDPR to avoid the substantial penalties associated with the regulation.
  • Spotlight on INDIA - Data Security, a Major Consideration in IT/ITES Sector
    Spotlight on INDIA - Data Security, a Major Consideration in IT/ITES Sector Vaibhav Pathak, Sr. Pre Sales Engineer May 30 2017 9:30 am UTC 45 mins
    What does an IT/ITES organization need to consider in its efforts to protect itself from fraud, including data breaches?

    These organizations need to provide assurance to customers, clients, internal stakeholders and regulatory bodies that any data being collected and processed by businesses is secure or risk massive fines, public embarrassment, loss of business, or even a closure of it.

    Key learnings:

    •How to manage data security on shared computing resources?
    •How to secure storage and transfer of data on company-owned, or company-managed endpoints?
    •How to facilitate the path to meeting organizational and industry compliances?
    •How to ease the daily burden of your data security administration functions?
  • Attacchi cyber in EMEA: i nuovi trend
    Attacchi cyber in EMEA: i nuovi trend Gabriele Zanoni, Systems Engineer di FireEye May 30 2017 9:30 am UTC 45 mins
    Partecipa al webinar con Gabriele Zanoni, Systems Engineer di FireEye, per scoprire come si sta evolvendo il panorama delle minacce sulla base dei dati sui cyber attacchi dello scorso anno, rilevati dalle investigazioni di Mandiant.

    Il webinar affronterà temi quali:

    •I nuovi trend negli attacchi di phishing usati per compromettere le aziende
    •I cambiamenti nella telemetria e nella metodologia degli attacchi
    •Le analisi di intelligence sulle minacce emergenti
    •Le nuove strategie di difesa per proteggere al meglio le aziende
    •L’impatto del GDPR sul business
    •Confronto fra trend europei, americani e asiatici
  • Securely Enabling a Hybrid Data Center with Microsoft Azure
    Securely Enabling a Hybrid Data Center with Microsoft Azure Matt Keil, Director of Product Marketing at Palo Alto Networks May 30 2017 12:00 pm UTC 45 mins
    Microsoft® Azure™ is enabling a data center transformation that results in a hybrid architecture that combines your on premises resources and the Azure cloud. From a security perspective, your challenge remains: how to protect your applications and data, regardless of their location.

    Join us for this live webinar to learn how the VM-Series can securely enable a hybrid data center. At the end of the webinar, you will learn:
    •Security considerations when moving to Azure
    •Top 3 VM-Series recommendations to protect your data
    •Tips and techniques to streamline your efforts
  • WannaCry: Inside the Next Generation of Email Attacks
    WannaCry: Inside the Next Generation of Email Attacks Michael Landewe, Researcher, Avanan Cofounder May 30 2017 3:00 pm UTC 45 mins
    Government-developed malware is loose and IT teams are scrambling. Avanan customers were protected and we had the resources of multiple partners to analyze the attack.

    In this webinar we will analyze the details of the WannaCry code and look ahead at what to expect in future email phishing outbreaks. The proliferation of state-sponsored code to unknown attackers makes is all the more necessary to improve the arsenal of tools we use to defend against them.

    We will introduce the zero-day monitoring tool at www.avanan.com/gauge and show how different tools on the Avanan platform responded to the outbreak.

    Today, more than ever, the only protection is a multi-layer, multi-technology, multi-vendor solution. True defense-in-depth that includes the best technology that the security industry can offer.
  • The Role of DevOps in Reducing the Likelihood of a Data Breach
    The Role of DevOps in Reducing the Likelihood of a Data Breach Amy DeMartine, Principal Analyst, Security & Risk, Forrester & Bhavna Sarathy, Principal Product Manager, Veracode May 30 2017 3:00 pm UTC 60 mins
    Security breaches continue to make headlines and negatively impact the reputation and bottom line for many businesses. According to Cybersecurity Ventures, global annual cybercrime costs will double between now and 2021. More than 50% of all cyberattacks target the software application layer* and the number of these attacks grows at a rate of about 25% per year**.

    Enter DevOps- a delivery approach that focuses on continuous software delivery and gives organizations an opportunity to reduce overall security risks in applications. It offers development teams the ability to introduce security earlier in the development lifecycle so they can identify and address vulnerabilities faster.

    While traditional methodologies typically introduce security during later phases of development, DevOps enables security visibility across the lifecycle to decrease discovery and remediation time.

    In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an overview of the current state of cybersecurity and the DevOps movement, how security is changing the way that software is being built and deployed, and the technologies and best practices organizations should consider in order to reduce the likelihood of a data breach. Specific topics addressing the threat of data breaches to be discussed include:

    • The organizational gaps that both security and development teams are currently tackling with regards to data breach prevention

    • Practical steps both teams can take to transition to a secure DevOps environment

    • Leveraging technologies such as Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle
  • Stopping Malware Before It Reaches Your Network
    Stopping Malware Before It Reaches Your Network Jonathan Barnett | Sales Engineer May 30 2017 5:00 pm UTC 45 mins
    Malware defenses have typically been concentrated at the network edge and then at the endpoint layer. When so much business is now in the cloud and user Internet requests are resolved outside the network it’s time to manage and control at the cloud ‘domain’ layer too. This webinar looks at a simple, fast, highly effective and easy way to block most malware before it reaches your network and deliver more secure Internet access at the same time.
  • Why Continued Improvements & Best-in-Class Modern IT Security is Key
    Why Continued Improvements & Best-in-Class Modern IT Security is Key Nathan Mercer, Sr. Marketing Manager & Michael Niehaus, Director Product Marketing, Microsoft May 30 2017 8:00 pm UTC 60 mins
    Modern IT. Advanced security. Improved productivity. Support and secure devices is more important now than ever before.

    Windows 10, version 1703 (also known as the Windows 10 Creators Update) will continue to bring new security capabilities to IT administrators to help them better protect, defend and respond to threats on their networks and devices. It will also deliver new features and capabilities to help you optimize operations, enhance productivity, and maintain the most secure environment possible. Already, IT administrators estimate a 15% improvement in IT management time with Windows 10. The Creators Update will further shift resources and time-intensive tasks to the cloud, allowing you to acquire, provision, support and secure devices more easily than ever.

    Join this webinar to find out about the latest Window 10 features for IT pros, such as:

    - New actions and insights in Windows Defender Advanced Threat Protection (ATP) that enable you to investigate and respond to network attacks, including sensors in memory, enriched intelligence, and new remediation actions.
    - Best-in-class modern IT features that streamline management and deployment, including new Windows Analytics insights, in-place UEFI conversion, a new mobile application management feature, and continued improvements to Windows as a service.

    You'll also learn how you can provide feedback, and shape the future of Windows, through the Windows Insider Program.
  • 전세계 인터넷 보안 현황 보고서를 통해 살펴보는 최근 DDoS 및 웹 보안 공격 트렌드
    전세계 인터넷 보안 현황 보고서를 통해 살펴보는 최근 DDoS 및 웹 보안 공격 트렌드 인승진 (Howard Leen), 이사 (Enterprise Security Senior Architect), 아카마이코리아 May 31 2017 5:00 am UTC 60 mins
    아카마이는 방대한 양의 데이터를 분석하여 전세계 인터넷 보안에 대한 가장 정확도 높은 가시성을 제공하는 인터넷 보안 현황 보고서(State of the Internet Security Report)를 매 분기마다 발표하고 있습니다.

    해당 보고서를 통해 살펴보면 인터넷 상의 위협 트렌드가 최근 크게 변화하고 있다는 것을 알 수 있으며, 무엇보다도 IoT 기반의 봇넷을 활용한 DDoS 공격의 등장으로 최대 650Gbps에 이르는 대형 공격들이 벌어지고 있음을 확인할 수 있습니다.

    본 웨비나에서는 가장 최근에 발표된 인터넷 보안 현황 보고서를 기반으로 아래와 같은 내용들을 중점적으로 살펴볼 예정입니다.

    - 최근 인터넷 보안 현황 보고서를 통해 알아보는 글로벌 주요 보안 이슈들
    - 아시아 지역에서 발생한 보안 공격 통계
    - IoT 봇넷이 아시아 지역의 보안에 가져온 영향
    - IoT 보안 대비의 중요성
  • Proteja sus comunicaciones vía e-mail
    Proteja sus comunicaciones vía e-mail Alejandro Vázquez May 31 2017 10:00 am UTC 75 mins
    Las comunicaciones basadas en correo electrónico constituyen un elemento fundamental para hacer negocios de forma efectiva. Por ello, el correo electrónico es una puerta de entrada muy popular para sabotear las redes y lanzar campañas de malware, incluidos el ransomware y las amenazas de día cero.

    Este webcast examina cómo SonicWall Email Security – ahora integrado con Capture Advanced Threat Protection – ofrece protección de sandbox multimotor basada en la nube para su correo electrónico.

    Participe en este evento y descubra cómo esta solución completa, flexible y escalable es capaz de:

    •Escanear una amplia variedad de tipos de archivos adjuntos de correo electrónico para detectar amenazas avanzadas
    •Analizarlos en un sandbox multimotor
    •Bloquearlos antes de que se emita un veredicto de seguridad
    •Implementar rápidamente las correspondientes definiciones
  • The value of Next Generation Security Platform
    The value of Next Generation Security Platform Fred Streefland May 31 2017 12:00 pm UTC 45 mins
    The combination of complex, modern IT environments and a rapidly evolving threat landscape has left many businesses challenged to control costs while effectively protecting the systems on which their operations depend. In many cases, the challenges are brought about by the combination of too many disparate security solutions that do not share context and insufficient time and/or expertise.

    To address these challenges, organisations of all shapes and sizes are looking at ways to consolidate their security infrastructure to improve their security posture and reduce their total cost of ownership.

    Please join us for a webinar where we’ll discuss how Palo Alto Networks’ Next-Generation Security Platform can enable your organization to:

    1.Reduce the threat footprint
    2.Prevent known and unknown attacks.
    3.Tie policies to users.
  • Ransomware & Other Cybersecurity Trends In Major Industries
    Ransomware & Other Cybersecurity Trends In Major Industries Jay Jacobs, Joel Alcon: BitSight May 31 2017 5:00 pm UTC 60 mins
    Large-scale data breaches continue to hit all industries, leading to millions of compromised records. According to the Identity Theft Resource Center, there were 780 data breaches in which nearly 178 million records were compromised. While no industry is immune to data breaches, some are more prepared than others.

    Join Jay Jacobs, Senior Data Scientist at BitSight as he explains how security posture differs in six major industries. This webinar will highlight new findings on:

    - The most common ransomware infections
    - The rate of ransomware infections found across major industries
    - The aggregate BitSight Security Rating for each industry
  • Cybersecurity Threats and Breaches in Higher Education: How to Mitigate the Risk
    Cybersecurity Threats and Breaches in Higher Education: How to Mitigate the Risk Travis Hunter and Nathan Letourneau May 31 2017 5:00 pm UTC 60 mins
    Cybersecurity is top of mind for most organizations today, and the education sector is no different. In today’s digital transforming economy, cybersecurity threats and data breaches have evolved, and the way organizations approach protection, detection and response must evolve as well.
    In this joint webinar, Microsoft and Avaleris will discuss cybersecurity and how organizations can safely increase security on identities in their environments and how they can benefit from securing their identity perimeters. We will draw from real examples in today’s landscape to demonstrate this.
    Based on the exclusive set of cybersecurity briefings hosted by Avaleris in conjunction with Microsoft, learn how your organization can compete in a digital world while mitigating the risk associated with a changing cybersecurity landscape.
  • Visualizing the Evolution of Cyber Threats
    Visualizing the Evolution of Cyber Threats CW Walker, Government SE, Recorded Future and Daniel Hatheway, Senior Technical Analyst, Recorded Future May 31 2017 6:00 pm UTC 60 mins
    Actionable intelligence requires swift analysis and this is only possible with the ability to rapidly sort through vast quantities of data varying in size, source, and format.

    Intelligence analysts need the right tools that empower them to make the quick, informed decisions that our national security demands.

    Recorded Future and Lumify by Altamira provide a powerful big data fusion, analysis, and visualization platform that supports the development of actionable intelligence. Join this webinar to learn how your agency can:

    • Accelerate the transformation of data to valuable insights using Lumify for Recorded Future.
    • Discover complex connections and explore diverse relationships in your data.
    • Enable sharing across your analytic tools and systems.
    • Enhance your analysis with malware samples sandboxed by Recorded Future.

    Lumify for Recorded Future enables analysts to quickly discover important relationships across a variety of data sources, driving a more efficient process for gaining actionable intelligence.
  • Wannacry Ransomware & The Future of Cyber Attacks
    Wannacry Ransomware & The Future of Cyber Attacks Mark Weatherford (vArmour), Gary Hayslip (Webroot), Simon Crosby (Bromium) May 31 2017 6:00 pm UTC 60 mins
    As organizations worldwide are trying to get back to normal in the messy aftermath of the biggest ransomware attack to date, cybersecurity experts see this attack as a warning. If even basic malware can leave such a global impact on enterprises, health organizations, universities and other organizations, what would a more sophisticated attack look like?

    Join this CISO panel of security leaders as they discuss:
    - The impact of Wannacry and the reasons behind it
    - What can we learn from this attack and steps to take today
    - How likely are we to see this type of attack repeated on a more devastating scale in the future
    - What should organizations and enterprises do to improve their security posture in the age of ransomware, phishing scams, and IoT

    Speakers:
    - Mark Weatherford, Chief Cybersecurity Strategist at vArmour
    - Gary Hayslip, CISO of Webroot
    - Simon Crosby, CTO of Bromium
  • Security Agility: Enabling Innovation
    Security Agility: Enabling Innovation Misha Govshteyn, SVP of Product Management and Founder at Alert Logic Jun 1 2017 9:00 am UTC 45 mins
    Security and innovation are not often mentioned in the same sentence, but with more and more business-critical applications being moved, or built in the cloud, it is essential that security becomes an agile enabler to cloud adoption. This is where the balance has shifted to integrating security controls into the DevOps lifecycle. Join this session as Misha Govshteyn, SVP of Product Management and Founder at Alert Logic will walk through how to integrate workloads security without slowing down innovation, including:

    -The role of DevOps in security agility
    -Different stages to cloud security maturity
    -The cultural needed for secure innovation
  • Protecting Your Email Communications
    Protecting Your Email Communications Florian Malecki Jun 1 2017 9:00 am UTC 75 mins
    Email-based communications are a fundamental cornerstone for effective business. That’s why email is a popular vector for sabotage across your network and a launch pad for malware – including ransomware and zero-day threats.

    This webcast examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.

    Join us to learn how this comprehensive, flexible and scalable solution can:

    •Scan a broad range of email attachment types to detect advanced threats
    •Analyze them in a multi-engine sandbox
    •Block them prior to a security verdict
    •Rapidly deploy remediation signatures
  • GDPR - 358 Days To Fill the Compliance GAP
    GDPR - 358 Days To Fill the Compliance GAP Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest analyst Enza Iannopollo Jun 1 2017 9:00 am UTC 45 mins
    On the 1st June, there are just 358 days until the EU GDPR comes into force. At its core, the GDPR aims to put control of personal data back into the hands of EU residents. It regulates how personal data is collected, processed, and managed by organisations.

    Businesses have only 358 days left to develop and implement a GDPR compliance roadmap. But what does successful compliance look like? What changes will your organisation have to make to internal processes, and what technologies should your company leverage to ensure that the personal data of EU residents are protected?

    Join Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest Forrester analyst Enza Iannopollo to discuss:
    •The playbook of steps your organisation must implement to drive towards compliance
    •How to embed ‘privacy by design’ to your development life cycles
    •How to protect all identified EU personal data and prevent data breaches
  • Better Detection: Keeping Pace With The Changing Threat Landscape
    Better Detection: Keeping Pace With The Changing Threat Landscape Misha Govshteyn, SVP of Product Management and Founder at Alert Logic Jun 1 2017 10:00 am UTC 45 mins
    The ever-changing cyber threat landscape requires better security practices to assess, detect and block threats to applications and other workloads. Many regulations, such as PCI, HIPAA and the upcoming European GDPR also require accurate and timely detection of threats and compromise. So how can you keep pace with a threat target that is constantly moving?

    In this session, Misha Govshteyn, SVP of Product Management and Founder at Alert Logic provides insight on the latest web application security threats, the role of threat intelligence, security technologies, machine learning and security experts.
  • The Good, The Bad & The Ugly of Threat Detection
    The Good, The Bad & The Ugly of Threat Detection Marc Willebeek-Lemair, Chief Strategy Officer at Alert Logic Jun 1 2017 11:00 am UTC 45 mins
    The challenge all organisations face today is the accuracy of threat detection. In the “old days” we faced mostly worms and viruses and it was easier to create rules to detect and block these types of attacks from even entering your network. The threat landscape has evolved for far past those types of threats. A persistent attacker now approaches a target with a much more concerted effort to gain access to your environment and will use all forms of attack to succeed. Through advanced technologies, machine learning, and security expertise it is easier to cut through the noise of what is good (let it through), what is bad (block it), and what needs further investigation.

    Join Marc Willebeek-Lemair for an in-depth discussion on the essential ingredients needed to deliver a well-integrated security model that combines machine learning and human expertise, to harden your environment against modern cyber threats.
  • The Role of the End User: your strongest line of defence against cyber-attack
    The Role of the End User: your strongest line of defence against cyber-attack Steve Durbin, Managing Director, ISF LTD Jun 1 2017 12:00 pm UTC 45 mins
    People remain a wild card to the cyber security of an organisation. Many businesses recognise people as their biggest asset, yet still fail to recognise the need to secure the human element of information security.

    In this webinar Steve Durbin, Managing Director of the ISF, tackles the question: How can organisations make people their strongest line of defence against cyber attack?