Hi [[ session.user.profile.firstName ]]

IT Security

  • IT Security Attacken 2017 und 2018 in Deutschland, Österreich und der Schweiz: W
    IT Security Attacken 2017 und 2018 in Deutschland, Österreich und der Schweiz: W Candid Wueest, Symantec Recorded: Nov 22 2017 61 mins
    Die Bedrohungslage | November 2017

    Was Sie beachten sollten,um Ihre IT-Security 2018 zu stärken

    Was können Sie von den jüngsten Datenschutzverletzungen und Malware-Wellen lernen? Welche Schlüsse ziehen Sie, um die Sicherheitsvorfälle signifikant zu reduzieren? Wie bereiten Sie Ihre Netzwerke, Server und Endgeräte auf die neuen Angriffsmethoden vor, die 2018 kommen könnten und wie erfüllen Sie gleichzeitig die Regularien, wie GDPR?

    Das folgende Webinar von Orla Cox, Director Security Response Team, sollten Sie daher nicht verpassen!
    Das Webinar behandelt:
    •Analyse der grössten IT Security Vorfälle in 2017: Die Methodik und Hintergründe
    •Die wichtigsten Maßnahmen, die sie sofort ergreifen sollten
    •Eine Prognose für 2018 und besten Schutzmechanismen für 2018 und danach

    Heute noch registrieren
  • In-Depth Analysis of a Fast Flux Botnet
    In-Depth Analysis of a Fast Flux Botnet Or Katz, Principal Lead Security Researcher, Akamai Recorded: Nov 22 2017 60 mins
    In recent years, we have seen large-scale botnets used to execute attacks rarely seen in the past -- botnets that incorporate new features and bigger capabilities than ever before. How and why some of these botnets remain resilient is a question that needs to be answered, and one of the reasons is Fast Flux. Fast Flux is a DNS technique used by botnets to hide various types of malicious activities (such as phishing, web proxying, malware delivery, and malware communication) behind an ever-changing network of compromised hosts acting as proxies. In general, a Fast Flux network is mostly used to make communication between malware and its command and control server (C&C) more resistant to discovery. Akamai’s high visibility to both Web and Enterprise traffic enables new and unique insights on the behavior of such Fast Flux networks.

    In this webinar, you will get an in-depth analysis on:

    - How network fluxing is using domains, IP addresses and even nameservers to become resistant to discovery
    - How Fast Flux networks offer services such as malware communication and hosting of malicious content
    - How botnets are used both for Fast Flux communications and a variety of Web attacks such as Web scraping and credential abuse
    - Best practices for detecting and defending against such botnets

    Join Akamai and (ISC)² on Nov 22 (Wed) at 13:00 (Singapore time) / 16:00 (Sydney time) to learn more about the Fast Flux Botnet.

    Presenter: Or Katz, Principal Lead Security Researcher, Akamai
    Moderator: Ir. Tejinder Singh, Senior Development Expert, T-Systems Malaysia SGA Security Engineering
  • Equifax Breach and Managing Your Vulnerabilities
    Equifax Breach and Managing Your Vulnerabilities Carl Wright (AttackIQ), Igor Baikalov (Securonix), Chris Petersen (LogRhythm), Sam Abadir (LockPath) Recorded: Nov 22 2017 62 mins
    With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.

    What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?

    Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
    - The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
    - Managing IT risk and vulnerabilities
    - How to improve breach prevention, detection and response
    - What to expect in the future

    Speakers:
    - Igor Baikalov, Chief Scientist, Securonix
    - Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
    - Sam Abadir, Director of Product Management, LockPath

    Moderator:
    - Carl Wright, CRO, AttackIQ
  • Are you Ready for Australia's Privacy Act? A Gemalto Case Study
    Are you Ready for Australia's Privacy Act? A Gemalto Case Study Jean -Pierre Mistral, Legal Counsel for Data Privacy and Graeme Pyper, Regional Director of Enterprise and Cybersecurity Recorded: Nov 22 2017 61 mins
    Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
    Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •The Mandatory Data Breaches scheme
    •Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • Bringing Order to the Chaos of Audit Management
    Bringing Order to the Chaos of Audit Management Sam Abadir, Director of Product Management, LockPath Recorded: Nov 21 2017 56 mins
    Companies and organizations are subjected to multiple types of audits, from internal governance to regulatory requirements to industry standards. Within each, the organization must identify auditable entities, conduct numerous audit activities and communicate findings. Audit management has become a matrix too complex for organizations to rely on spreadsheets, email, or basic collaboration software to perform.

    This reality has created the demand for an automated solution that organizes and centralizes every step of the audit process: risk assessment, planning, fieldwork and testing, time and expense management, issue tracking, workpaper management, reporting and remediation.

    In this webinar, LockPath’s Sam Abadir demonstrates the audit management capabilities of the Keylight Platform to define the audit universe, initiate audit projects and tasks, and generate audit findings and corrective actions.
  • Streamline Your Audit Process With Lockpath Keylight
    Streamline Your Audit Process With Lockpath Keylight Lockpath Recorded: Nov 21 2017 2 mins
    Manage Internal Audits Effortlessly & Effectively with the Lockpath Keylight Platform.

    Visit Lockpath.com/solutions/audit-management for more info.
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018
    Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Jeffrey Ritter Recorded: Nov 21 2017 52 mins
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
  • Digital Transformation Enablers: IoT Analytics and Autonomic Actuation
    Digital Transformation Enablers: IoT Analytics and Autonomic Actuation Kevin Curtis, Distinguished IoT Architect - Connected Cities, Verizon Enterprise Solutions (VES) Recorded: Nov 21 2017 25 mins
    Listen to Kevin Curtis, Distinguished IOT Architect – Connected Cities, Verizon Enterprise Solutions (VES) talk about how digital transformation occurs when information technology (IT) and operational technology (OT) data assets are effectively integrated, to realize new business outcomes and to create transformative value, not previously possible.
  • Understanding your Attack Surface - Research into FT30 organisations
    Understanding your Attack Surface - Research into FT30 organisations Terry Bishop, EMEA Technical Director, RiskIQ Recorded: Nov 21 2017 37 mins
    Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions. Cyber adversaries are taking advantage of this sprawling digital attack surface, looking forweaknesses to exploit. The attack surface has become the battle line between malicious actorsand an organisation’s external threat defenders and its compromise is behind many of the breaches that get reported with alarming frequency.

    In an effort to highlight and quantify the risks which organisations have in their attack surface, we conducted research on the top 30 UK organisations (FT30) to highlight the issues we believe all companies face. We will present the various types of risk we uncovered and offer practical advice on ways to mitigate them and harden your attack surface.
  • The 3 Pillars of Social Selling. Part 3:Social Selling Top Tips & Tricks
    The 3 Pillars of Social Selling. Part 3:Social Selling Top Tips & Tricks Daniel Disney Recorded: Nov 21 2017 46 mins
    This 3 part webinar series will give show you the 3 key pillars to achieving social success in sales. Learn how to create the ultimate profile, build a winning personal brand, create great and consistent content and build a winning strategy. The final session will be packed with the best industry tips and tricks to make social work for you.

    Part 3 - Social Selling Top Tips & Tricks

    From LinkedIn searching secrets all the way to email address generating hacks, these are the top tips and tricks that will give you a huge advantage in the world of social selling. This webinar will bring everything together in the social selling series and will give you the ultimate list of tools use social to dramatically enhance your pipeline and sales process.
  • Automate the detection and response of phishing attacks
    Automate the detection and response of phishing attacks Greg Foss (LogRhythm), Paul Asadoorian (Security Weekly), John Strand (Black Hills Information Security) Recorded: Nov 21 2017 66 mins
    Phishing campaigns are among the most common and damaging cyberattacks. Despite how common and successful phishing attacks are, often times organisations and their employees are ill-prepared to handle these threats.

    In this webinar, Greg Foss, LogRhythm Manager of Global Security Operations, Paul Asadoorian, Security Weekly CEO and Founder, and John Strand, Black Hills Information Security Owner and Security Analyst, discuss phishing attacks and how you can protect yourself from them. Additionally, the three go on to discuss how LogRhythm’s open-source Phishing Intelligence Engine (PIE), can help streamline and automate the entire process of tracking, analysing, and responding to phishing emails.

    Watch now to learn how LogRhythm is helping to automate the detection and response to phishing attacks.
  • Symantec Endpoint Protection Mobile – Was die SkyCure-Übernahme für Sie bedeutet
    Symantec Endpoint Protection Mobile – Was die SkyCure-Übernahme für Sie bedeutet Alexander Peters, Symantec (Deutschland) GmbH; Sven von Kreyfeld, Symantec (Deutschland) GmbH Recorded: Nov 21 2017 52 mins
    Im Webinar erfahren Sie:
    •Wie SEP Mobile Crowd-basierte Threat-Informationen mit Endpoint- und Server-basierte Analysen kombiniert, um bekannte und unbekannte Mobile Threats zuverlässig und proaktiv zu stoppen
    •Wie die Lösung Malware, Netzwerk-basierte Threats sowie Exploits auf Anwendungs- und OS-Ebene erkennt – und zwar sowohl auf iOS als auch auf Android-Geräten, egal ob online oder offline
    •Wie Sie mit vorausschauenden Analysen verdächtige Netzwerke und Anwendungen bewerten können, ehe sie Schaden im Netzwerk anrichten
    •Wie einfach und schnell das Onboarding mittels nativer iOS- und Android-Apps funktioniert und wie Sie die Lösung mit Ihren vorhandenen EMM-, MDM-, SIEM-, IAM- und VPN-Umgebungen verzahnen
    Darüber hinaus verraten wir Ihnen, wie die weitere Roadmap zur Integration der SkyCure-Produkte in unser bestehendes Portfolio aussieht, und geben Ihnen einen kurzen Überblick über alle anderen wichtigen Neuerungen in unserem Portfolio.

    Hintergrund:
    Angriffe auf mobile Endgeräte nehmen rasant zu: Immer öfter nutzen Angreifer maßgeschneiderte Malware und Advanced Persistent Threats, um Smartphones und Tablets zu kompromittieren und auf diese Weise Zugriff auf sensible Daten oder Unternehmensnetz zu erlangen.
    Symantec trägt diesen steigenden Sicherheitsanforderungen mit der Akquisition des Mobile-Security-Spezialisten SkyCure Rechnung – und integriert dessen innovative Technologie jetzt als Symantec Endpoint Protection Mobile (SEP Mobile) in das marktführende Endpoint-Security-Portfolio.

    Wir freuen uns auf Sie!
  • Official Launch of Symantec Control Compliance Suite 12.0
    Official Launch of Symantec Control Compliance Suite 12.0 Anand Visvanathan, Principal Product Manager, Symantec Recorded: Nov 21 2017 44 mins
    The release of Symantec Control Compliance Suite version 12.0 is here! Please join us for a special webinar on Tuesday, November 21 to find out what’s new in this release and how it will better help you to:

    Measure and prove compliance with security regulations, mandates, and best practices

    Determine risk and prioritise remediation

    Don’t miss this great opportunity to get the latest news and information on Control Compliance Suite!
  • How the State of Arizona Took a Proactive Stance Against Cyber Risk Management
    How the State of Arizona Took a Proactive Stance Against Cyber Risk Management Morgan Reed, Mike Lettman, and Dr. Srinivas Mukkamala Recorded: Nov 20 2017 52 mins
    In this webinar, Morgan Reed (CIO) and Mike Lettman (CISO) from the State of Arizona will discuss with RiskSense CEO Srinivas Mukkamala a case study on how the State of Arizona has implemented a proactive cyber risk management program that uses a credit score like model for assessing threats and remediating those that matter most.

    Mr. Reed, Mr. Lettman, and Dr. Mukkamala will continue and expand on their conversation initially started during a learning lounge panel at this year's 2017 NASCIO Conference. They will dive into the details of how their risk management approach has enabled IT to better measure and communicate risk to business leaders, and strategically focus on the most imminent cyber vulnerabilities in their environment.
  • The Role of Machine Learning In Improving Endpoint Security
    The Role of Machine Learning In Improving Endpoint Security Doug Cahill, ESG Senior Analyst Recorded: Nov 17 2017 4 mins
    Listen to the new survey findings from Enterprise Strategy Group (ESG) to gain insights on the threat landscape and what your IT peers deem as the top cybersecurity concerns. Bad actors focus their energy on developing sophisticated attacks. In fact, 46% of organizations have been the victim of ransomware in the last year.

    Learn more about their top concerns and how they’re turning to machine learning as a strategic technology to prevent future infections.

    The video was commissioned by Cylance and is being distributed under license from ESG.
  • Briefings Part 2 - How Government Agencies Can Harness the power of A. I.
    Briefings Part 2 - How Government Agencies Can Harness the power of A. I. Ian Doyle, Executive Security Advisor, U.S. Govt, IBM; John McCumber, Dir, Cybersecurity Advocacy, (ISC)2 (Moderator) Recorded: Nov 17 2017 39 mins
    With the eruption of connected devices and the Internet of Things, cybersecurity professionals have a lot on their plates. More connected devices equates to more traffic, more attack routes, more attempts at cybersecurity breaches, and a lot more data that needs to be analyzed. As the volume of intrusions and breaches multiple, Artificial Intelligence (A.I.) may be able to provide a tool to gain defensive advantage for government agencies. Join John McCumber, (ISC)2’s Director of Cybersecurity Advocacy and Ian Doyle, IBM’s Executive Security Advisor for the U.S. Government as they discuss how to leverage these collaborative and cognitive solutions to help prevent, detect, and respond to today’s cybersecurity threats impacting your agency.
  • Benefits of Engaging with an Open Source Project
    Benefits of Engaging with an Open Source Project Dave Neary, NFV/SDN Community Strategist, Red Hat Recorded: Nov 17 2017 22 mins
    Listen to Dave Neary, SDN and NFV with Open Source at Red Hat talk about the benefits of engaging with an open source project as a user and what we can expect to see next for NFV and SDN standards.
  • Briefings Part 1 - Using A.I. to Find the Needle in the Federal Haystack
    Briefings Part 1 - Using A.I. to Find the Needle in the Federal Haystack Ian Doyle, Executive Security Advisor, U.S. Govt, IBM; John McCumber, Dir, Cybersecurity Advocacy, (ISC)2 (Moderator) Recorded: Nov 17 2017 41 mins
    A recent research study conducted by Meritalk on the use of Artificial Intelligence (A.I.) asked federal cybersecurity professionals to share their views on the use of AI to enhance a cybersecurity analyst’s ability to identify and understand sophisticated threats, by tapping into unstructured data and correlating it with local cybersecurity offenses. What are the cybersecurity implications within the Federal Government for the rise of A.I.? What role can A.I. play in incident response? Can it help prepare agencies for real-world cyber attack scenarios? Join John McCumber, (ISC)2’s Director of Cybersecurity Advocacy and Ian Doyle, IBM’s Executive Security Advisor for the U.S. Government for an examination of the recent study and results.
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Reynolds - Imagine Communications, Limor Schafman - TIA Recorded: Nov 17 2017 46 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Reynolds, CTO, Imagine Communications

    Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.

    Host: Limor Schafman, Content Development Director, TIA


    NOT BICSI accredited.
  • Kaspersky Lab’s Industry and Technology Threat Predictions for 2018
    Kaspersky Lab’s Industry and Technology Threat Predictions for 2018 David Emm, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab Nov 22 2017 2:00 pm UTC 90 mins
    Kaspersky Lab will present an in-depth review of its industry and technology threat predictions for 2018 – and consider what they could mean for some of the world’s most connected industry sectors over the coming year.
    The session will discuss the top trends expected to affect enterprises, with a particular focus on connected healthcare, automotive, financial services, industrial security, and cryptocurrencies.
    The aim of the webinar is to help IT security professionals in all industries to understand the rapidly evolving threat landscape and the actions they can take to defend their organization against these threats.
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Nov 23 2017 5:00 am UTC 60 mins
    Three major trends define the Cloud Generation chaos that organisations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organisations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for organisations who face a severe shortage of skilled IT security personnel.

    Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:

    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security

    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response

    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
  • The digital social world. Impacts & opportunities for businesses, jobs & society
    The digital social world. Impacts & opportunities for businesses, jobs & society Debra Bordignon, CTO Dimension Data Australia & Scott Gibson Digital Practice Dimension Data Nov 23 2017 7:30 am UTC 60 mins
    Every business is impacted by global digital disruption.
    Even the most successful and iconic 20th century businesses must transform to remain relevant and retain their leadership in the 21st.

    Tech-savvy start-ups with natively digital business models regard this point in time as the best time in the history of the world to invent something.
    The world is buzzing with technology-driven opportunities leveraging the solid platform provided over the past 30 years, birthed from the Internet, then mobility, social
    and now the massive scale of cloud computing and the Internet of Things.

    Join this webinar to learn how your business can leverage the opportunities of digital disruption.

    Speakers:
    Debra Bordignon, CTO, Strategist and Innovation Executive, DD Australia
    Scott Gibson, Group Executive: Digital Practice, Dimension Data Group
  • How CASB Needs to Evolve to Integrate with Your Security Infrastructure
    How CASB Needs to Evolve to Integrate with Your Security Infrastructure Martin Kroemer, Symantec Nov 23 2017 9:00 am UTC 60 mins
    Rapid adoption of cloud apps and services is driving the need for Cloud Access Security Brokers (CASB)

    It is time for CASB systems to weave into your overall security infrastructure. There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security solutions into their environment to improve security and reduce operational overhead.

    This talk will explore this next frontier of CASB solutions.

    Register Today
  • Breaches, threats and how to improve security in 2018
    Breaches, threats and how to improve security in 2018 Shimon Oren (Deep Instinct), Ted Harrington (ISE), Greg Foss (LogRhythm) Nov 23 2017 10:00 am UTC 60 mins
    2017 is not yet over and it's already the year of cyber attacks. From phishing, to hacks, to classified hacking tools leaked and the biggest ransomware attacks to date (Wannacry, NotPetya), security professionals across the world are looking to apply the lessons learned in 2017 for improved cyber security next year.

    Watch this interactive Q&A panel with experts from the artificial intelligence, deep learning and IoT security space to learn about:
    - The biggest attack trends seen so far
    - Impact across industries
    - Threats on the horizon
    - Recommendations to better secure your data and company in 2018

    Speakers:
    - Shimon Oren, Head of Cyber-Intelligence at Deep Instinct
    - Ted Harrington, Executive Partner at Independent Security Evaluators
    - Greg Foss, Global SecOps Manager at LogRhythm
  • Flexible Consumption Models for HCI Transition
    Flexible Consumption Models for HCI Transition Kevin Green, EMEA BD Manager Open Scale Payment Solutions at Dell Financial Services Nov 23 2017 10:30 am UTC 45 mins
    When asked about the challenges of HCI adoption, IDC found that 25% of customers were concerned about cost or were unsure regarding the projected ROI. Dell Financial Services developed the Cloud Flex for HCI program with that in mind. The primary goal is to allow you to move to hyperconverged infrastructure without making a long term commitment.
    Join us for this webinar to learn how companies across many verticals are using Dell financial services to help them in their HC.I transition
  • Cloud Security for Startups - From A to E(xit)
    Cloud Security for Startups - From A to E(xit) Moshe Ferber of CSA Israel and Shahar Maor of Outbrain Nov 23 2017 12:00 pm UTC 60 mins
    Cloud computing perform amazing things for startups, providing young companies with access to enterprise grade infrastructure . But also act as a double edge sword. Lack of proper security controls can lead to multiple challenges varying from longer sales cycles to losing customers & investors trust.
    The Cloud Security Alliance identified those unique challenges and developed a cloud security for startups guidelines.
    In the upcoming webinar, the guidelines co-authors will explain the 3 phases security strategy that is recommended for your cloud based startups.
  • Your GDPR compliance journey  – Moving from “What” to “How”
    Your GDPR compliance journey – Moving from “What” to “How” Fred Oberholzer, Gilles Gravier, Alon Rosenthal Nov 23 2017 3:00 pm UTC 60 mins
    With six months before the GDPR becomes effective many organisations have a view on what needs to be done to achieve compliance. However, many more organisations are still evaluating how they are going to address the technology and process challenges. This webinar will explore:

    -Key considerations at the six month mark.
    -Approaches using innovative technologies to help address compliance challenges.
  • APTs - Cómo funcionan y cómo protegerse
    APTs - Cómo funcionan y cómo protegerse Ferran Orosola, Solutions Architect FireEye; Alvaro Culebras Sanchez & Noa Blanco Fernandez, Cybersecurity Engineers, Minsait Nov 23 2017 3:30 pm UTC 45 mins
    Crees que estas protegido frente a las APTs? Te explicamos cómo funcionan y como protegerse

    Los ataques de hoy en día se han vuelto cada vez más sofisticados, lo que ha provocado que las medidas de seguridad tradicionales ya no sean eficaces. Las organizaciones deben adoptar nuevas estrategias de Ciberseguridad que permitan una mayor protección, adaptándose a estas nuevas amenazas.

    En este webinar FireEye y Minsait, la unidad de negocio de Indra encargada de la transformación digital de las empresas, muestran qué son las Amenazas Persistentes Avanzadas (Advanced Persistent Threats), cómo funcionan y qué medidas se deben implementar en las organizaciones para protegerse ante las APTs que utilizan el correo electrónico como principal vector de ataque.
  • [Video]A Celebration of the Female Tech Entrepreneur: Finding the Founder in You
    [Video]A Celebration of the Female Tech Entrepreneur: Finding the Founder in You Emily Forbes (Seenit), Devika Wood (Vida Care), Jude Ower MBE (Playmob), Zoe Peden (Iris Speaks) Nov 23 2017 7:00 pm UTC 90 mins
    One way we can encourage more females into tech and tech entrepreneurship is to raise the profile and visibility of female role models.

    This live meet-up event will take place at BrightTALK's London offices and is an opportunity to celebrate female tech founders and to learn from their experience. We’ll be finding out how they’ve overcome the key challenges they’ve faced along the way, as well as the practical advice they’d offer to aspiring female founders. The panel will be filmed, livestreamed, and will be be made available on-demand.

    We’ll be talking about:
    •Key challenges our tech founders have faced and how they’ve overcome them
    •The advantages of being a female in the tech start up world
    •The best and the worst things about being an entrepreneur
    •Taking a business concept from idea stage, to realisation
    •Raising funding – our founders experience of finding - and pitching - to investors
    •Our founders’ attitudes to failure
    •Establishing a brand – both business and personal
    •The relationships that have been vital to our founders success
    •What our founders know now, that they wish they knew when they were starting out

    Panelists:
    Emily Forbes - Founder, Seenit
    Devika Wood - Co-Founder, Vida
    Jude Ower MBE - Founder and CEO, Playmob
    Zoe Peden - Founder & CEO, Iris Speaks
  • SafeNet Authentication Service Live Product Demo
    SafeNet Authentication Service Live Product Demo Ms. Mukta Gupta - Technical Consultant Engineer, Identity & Data Protection, India & SAARC, Gemalto Nov 24 2017 5:30 am UTC 30 mins
    SafeNet Authentication Service (SAS) delivers fully-automated, highly secure strong authentication-as-a service. A new product demo webinar is now available.

    Register now for our 30 minute demo and see how easy and simple it is to:
    - Set up a strong authentication account on SAS
    - Add users to an account
    - Assign tokens to users
    - Generate reports

    Please email us at InfoAPAC@gemalto.com if you have any questions or problems registering.
  • Rôle crucial du proxy dans la protection de votre entreprise
    Rôle crucial du proxy dans la protection de votre entreprise Hervé Doreau, Directeur Technique, Symantec France Nov 24 2017 1:00 pm UTC 60 mins
    Pour relever les défis de sécurité les plus complexes, il vous faut une approche avancée bâtie sur une architecture proxy.
    Une telle approche vous permet de vous appuyer sur les meilleures technologies pour offrir sécurité et confiance aux utilisateurs cloud et réseau.
    Symantec Secure Web Gateway vous apporte une solution de sécurité optimale sous la forme qui vous convient le mieux : appliance sur site, appliance virtuelle, solution dans le cloud ou une architecture hybride unifiée.
    L'architecture proxy unique de cette solution lui permet de surveiller, contrôler et sécuriser le trafic pour offrir une expérience sécurisée sur le Web et dans le cloud.
    Ce webcast vous explique :
    - Pourquoi l’architecture proxy est plus importante que jamais dans la composition de votre sécurité réseau
    - Comment un proxy web peut servir de plate-forme de détection des menaces et de protection des données
    - En quoi un filtrage en amont du sandbox via l’architecture proxy permet d’optimiser votre SOC sans grever votre budget

    Inscrivez-vous dès aujourd'hui
  • Maîtriser le chaos du cloud
    Maîtriser le chaos du cloud Hervé Doreau, Directeur Technique, Symantec France Nov 24 2017 2:00 pm UTC 45 mins
    Sécuriser l’accès au web et protéger les données avec une solution de sécurité mise en œuvre dans le cloud.

    L’accroissement de l’adoption du cloud, l’usage du mobile et la croissance spectaculaire du télétravail met les infrastructures de sécurité existantes sous pression.
    Dans un tel environnement, les équipes de sécurité de l’entreprise doivent faire face aux préoccupations suivantes :
    - Comment harmoniser l’application des politiques encadrant l’usage du web et du cloud ?
    - Comment protéger efficacement les utilisateurs des menaces web ?
    - Comment sécuriser les données sensibles et respecter les réglementations ?
    Pour relever ces défis, les entreprises se tournent vers une solution de sécurité mise en œuvre dans le cloud.

    Assistez à ce webcast pour apprendre à tirer parti de Symantec Cloud Security Services pour protéger les utilisateurs, les données et les terminaux, et relever les défis de la génération cloud.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities
    Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Nathaniel Ford, Moderator, (ISC)² EMEA, Membership Services Team, (ISC)² EMEA Nov 27 2017 12:00 pm UTC 60 mins
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • UK Enterprise Security Maturity: How Does Your Organisation Stack Up?
    UK Enterprise Security Maturity: How Does Your Organisation Stack Up? Jarad Carleton, Principle Consultant at Frost & Sullivan & Hadi Hosn, Global Consulting Solutions Lead at Secureworks Nov 27 2017 2:00 pm UTC 60 mins
    During March/April 2017, Secureworks and Frost & Sullivan partnered to conduct security readiness research amongst 201 IT leaders within large UK enterprises to determine how realistic their perceived level of security maturity is. The end result is the white paper, Measuring Cybersecurity Preparedness: Illuminating Perception vs Reality in UK Enterprise.

    In this webcast, Jarad Carleton, Principle Consultant at Frost & Sullivan, will present key findings from the research, which benchmarks UK enterprises against the Security Maturity Model (SMM), co-developed by Secureworks and Frost & Sullivan.

    Hadi Hosn, Global Consulting Solutions Lead at Secureworks, will then explain the Secureworks point of view on some of the challenges UK enterprises are currently facing on their quest for greater security maturity, and how organisations can take positive steps to tackle them.

    During this live webcast we will cover:

    - How you rate against the UK’s Security Leaders
    - The top aspects of security Underprepared organisations should focus on
    - The key security weakness where even Security Leaders are vulnerable
    - Steps you can take to improve the security posture of your organisation
  • In-house or Outsourced Security Operations Center?
    In-house or Outsourced Security Operations Center? Oliver Rochford, VP of Security Evangelism - DFLabs, Sebastian Hess, AIG Cyber Risk Exec Nov 27 2017 3:00 pm UTC 45 mins
    The need to have a Security Operations Center (SOC) is becoming increasingly evident with each passing day, with data breaches being a common occurrence for many organizations around the globe. But, when organizations start thinking about setting up a SOC, they face a big dilemma - whether to build one in-house, or go with an outsourced or managed services model.

    This webinar offers a deeper look into the factors that should play a role in deciding which option is a better fit for organizations, based on their needs and the resources at their disposal.

    Key takeaways:
    - A SOC must strike a proper balance between people, processes and technology
    - People are the key to any SOC, but are scarce due to a skills shortage
    - The right technologies are a key enabler for any SOC, but can often also be remotely delivered
    - Getting processes right in an outsourced SOC model can be challenging, but the unavailability of skilled resources may be the bigger challenge

    Join us on this webinar as we try to answer the question of how best to handle your security needs, by explaining the pros and cons of both an in-house SOC and an outsourced one, so you can make an informed decision that would be best suited for your organization.
  • Are you Prepared for the General Data Protection Regulations?
    Are you Prepared for the General Data Protection Regulations? Ilias Chantzos, Senior Director EMEA and APJ, Global CIP and Privacy Advisor, Government Affairs, Symantec Corporation Nov 28 2017 5:00 am UTC 60 mins
    On 25 May 2018, the European General Data Protection Regulation (GDPR) will come into effect – and while it is an European Union’s regulation, it may still affect your organisation here in the Asia Pacific.

    But how do you know if your organisation needs to comply with the GDPR, and what is required for compliance? With top level fines of over $20 million for non-compliance, it is better to be safe and sure than sorry.

    Join us at our webinar as we discuss:

    • How to find out if your company will be impacted by the GDPR
    • What is needed to comply with the GDPR
    • How the GDPR will be enforced in Asia Pacific
    • Capitalising on the GDPR to improve your business
    • Real-life issues faced by organisations and how technology can help fix them

    Don’t be caught unaware by the GDPR. Register for our webinar today and learn how Symantec technologies help to facilitate GDPR compliance.
  • What's New: The Latest Proofpoint Email Security Release
    What's New: The Latest Proofpoint Email Security Release Jeff Burstein, Sr. Director, Product Management Nov 28 2017 11:00 am UTC 45 mins
    Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.

    The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:

    * Email Authentication
    * Attachment Sandboxing
    * Data Loss Prevention
    * Encryption
  • The Forrester Total Economic Impact of Palo Alto Networks Traps
    The Forrester Total Economic Impact of Palo Alto Networks Traps Bob Cormier, VP, Principal Consultant at Forrester Consulting & Dal Gemmell, Head of Endpoint Marketing at Palo Alto Networks Nov 28 2017 12:00 pm UTC 45 mins
    Guest Speaker Bob Cormier, VP & Principal Consultant of Forrester, will discuss the results of The Total Economic Impact™ of the Palo Alto Networks Traps solution, an October 2017 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks. Watch this Webinar to see how companies:

    • Attained economic total benefits with Traps
    • Realized a ROI and the payback period.
    • Prevented malicious executables (malware) and prevented vulnerability exploits.

    Deep dive with Forrester to discover the findings of how Palo Alto Networks Traps achieved the above benefits, and how Traps advanced endpoint protection replaced antivirus solutions and secured endpoints with a multi-method approach.
  • 5 practical steps to implement your GDPR project
    5 practical steps to implement your GDPR project Robert O'Brien and Shane Fuller Nov 28 2017 2:00 pm UTC 45 mins
    There is so much material out there claiming to be the ultimate guide to your GDPR project, but a lot of this is complex jargon that doesn’t offer a pragmatic solution to the GDPR conundrum.

    Ensuring a successful GDPR project requires financial investment as well as time. With the May 2018 deadline getting closer, there is an increasing unease within organisations regarding their ability to mitigate the risk and demonstrate compliance.

    With this Webinar, we will provide you with 5 practical steps to implement your GDPR project. By the end of the Webinar you will be in possession of structured and practical solutions that lead to GDPR compliance.

    As a bonus for attending the Webinar, you will also receive a copy of the official GDPR for Dummies guide. We understand that GDPR is a complex issue, that’s why we worked with subject matter experts and the Wiley brand to create the official GDPR for Dummies guide that offers a practical approach to GDPR.
  • How Securing SaaS Applications Contributes to GDPR Compliance
    How Securing SaaS Applications Contributes to GDPR Compliance Danielle Kriz and Anuj Sawani from Palo Alto Networks Nov 28 2017 2:00 pm UTC 45 mins
    In less than a year (May 28, 2018) the General Data Protection Regulation (GDPR) becomes law in Europe. With the exponential rise in the use of SaaS applications, organizations that process the personal data of EU residents need to be able to maintain compliance with the GDPR while keeping data secure in the cloud.

    We invite you to join us for a live webinar on Monday, September 11 in which we zoom in on how our platform, with its SaaS Security service, Aperture, can help your organization meet the upcoming requirements.

    Our policy team expert, Danielle Kriz, and our product team expert, Anuj Sawani, team up to provide an overview of the GDPR—in particular its provisions related to securing personal data- and how Aperture can be used to address potential compliance issues. We will also provide a quick overview of how Aperture fits with EU compliance requirements when processing personal data. .

    After the presentation, we will have some time for questions and answers with our experts.
  • Creating a movement: Inspiring girls to shape the future with technology
    Creating a movement: Inspiring girls to shape the future with technology Isabelle Ringnes, founder TENK, #Shesgotthis, podcast 20-30 Nov 28 2017 3:00 pm UTC 45 mins
    A few years ago no one was talking about the impact of technology in Norway. When I moved back from New York in 2014, I felt like I was the only woman interested. Knowing that technology would disrupt and change virtually every industry and facet of our society, I felt like I needed to take action.

    This led to founding TENK: the Technology network for women. Through TENK I have written and spoken for thousands of people on the impact of technology with a special focus on the importance of diversity and inclusion in the industry.

    TENK has worked to inspire women of all ages to lean in and see the opportunities in technology as opposed to shying away from the new and unknown. Girls have been given arenas in which they have been inspired to learn hands on about the many opportunities technology provides from a human centric and creative point of view. TENK believes that the only way to increase girls' interest and participation in technology is by giving it to them on their own terms.

    Isabelle has also helped found #Shesgotthis (#hunspanderer) which twice became a successful national campaign reaching more than 2 million people online. This campaign worked on addressing subtle discrimination and gender stereotypes in the workplace.

    Join this webinar to learn how to create a movement, set the agenda and how to spike girls' interest in technology.
  • Simplifying Security across your Universal I.T. Infrastructure
    Simplifying Security across your Universal I.T. Infrastructure Alan Conboy, Scale Computing, Office of the CTO | James LaPalme, WinMagic, VP of Business Development | Scott Van Woudenberg Nov 28 2017 3:30 pm UTC 60 mins
    The future lies in turnkey cloud solutions like hyper-convergence, which is set to displace traditional server and storage models. Join leaders from Scale Computing, WinMagic and Google as they unravel some of the most critical considerations for establishing a high performance IT infrastructure that is not only flexible, fluid, and affordable, but provides the consistent security and simplicity needed across your entire environment – so that you can keep compliant within increasing data privacy regulations.

    Key Learnings:

    • Simplicity: Discover why managing infrastructure and security across a disparate array of platforms doesn’t need to be difficult
    • Scalability: Learn how you can start with a small deployment, and then flexibly and securely scale out to support dynamic workloads and evolving business needs
    • Portability: Virtualization and cloud offer a whole new realm of possibilities, so why limit your business to a single platform? Learn how to securely and efficiently move data from node to node, cluster to cluster, cloud to cloud.
    • Availability: Identify best practices for using and managing the data security within local, remote, and cloud-based backups to achieve high-availability and resiliency
    • Affordability: Find out how to achieve enterprise-grade hyper-convergence and data security on an SMB budget
  • Bringing Security to DevOps with Veracode Integrations
    Bringing Security to DevOps with Veracode Integrations Austin Britt, CA Veracode Solution Architect Nov 28 2017 5:00 pm UTC 30 mins
    Keep in pace with the speed of DevOps and reap the benefits.

    Developers and security teams are both challenged to meet security goals in complex environments. Developers already need to manage many separate tools; new AppSec tools that do not integrate well or lack flexible APIs and customizable integrations are met with low adoption, high distraction and a steep learning curve.

    Join this 20 minute webinar to see how the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use. Get a first-hand look at how our flexible API allows you to create your own custom integrations or use community integrations. Make security developer-friendly so you can go faster, without sacrificing security.
  • Protect and Prevent: 3 strategies for blocking fileless attacks and exploits
    Protect and Prevent: 3 strategies for blocking fileless attacks and exploits Jack Danahy, CTO, Barkly Nov 28 2017 6:00 pm UTC 60 mins
    Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and most companies aren't protected.

    Learn the three strategies Avidia Bank implemented to shut out today's sophisticated threats and how you can apply them to protect your own organization:

    Register now to learn more on:

    - How ransomware is going fileless to get past protection
    - What makes everyone a target
    - Three protection strategies to minimize the risk to your organization


    Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.