Hi [[ session.user.profile.firstName ]]

IT Security

  • Own Your Keys to the Cloud
    Own Your Keys to the Cloud Rich Mogull, CEO, Securosis; Ken Beer, GM AWS; Jon Fan, Dir of Enterprise Products, Box Recorded: Mar 24 2017 59 mins
    As organizations, like yours, move their data to the cloud file sharing and collaboration solutions, there may be a limit to what type of data can be moved there without controlling your own encryption keys. With recently announced Box KeySafe (formerly Box EKM), you can now take advantage of content collaboration in the cloud while maintaining independent control over the encryption keys that protect their content. How?

    Box has partnered with Amazon Web Services to provide on-demand management of keys through AWS KMS (Key Management Services). This is a perfect option for organizations that require a simple solution configurable in 30 minutes to address advanced security needs.

    Join Rich Mogull, Industry Analyst and CEO of Securosis with Ken Beer, General Manager of Amazon Web Services and Jon Fan, Dir of Enterprise Products at Box to learn how to:

    - Identify whether you need customer-managed encryption
    - Evaluate options and identify requirements
    - Real-world case studies from different industries and company sizes
    - How organizations justify the investment
    - How to deploy fast without compromising usability and governance at scale
  • Demo - New Box Provider Solution
    Demo - New Box Provider Solution Missy Krasner, Box Recorded: Mar 24 2017 42 mins
    Are you looking for ways to digitize your paper-based workflows at your hospital? Faxing, scanning and burning CDs are labor intensive and require infrastructure costs? To address this, Box, the leading HIPAA compliant collaboration platform for providers and payors has launched a new Provider Solution that helps healthcare organizations digitize paper-based workflows. This new solution includes our core Box collaboration service with our new Box DICOM Viewer (an FDA cleared Class II Medical device), Box Governance to help with data retention and content security, and some new partner integrations that includes messaging into and out of EHRs.

    View this on-demand webinar to see how the new Box Provider Solution helps hospitals:

    - Digitize paper based workflows - Integrate with faxing services to minimize manual paper-based workflows and improve document capture.
    - View and share medical images - Store, view and share clinical imaging studies securely in the cloud or on any mobile device. Share imaging studies across facilities, with patients and with referring doctors. Enable remote diagnosis or 2nd opinion workflows and wet reads and consults on-the-go.
    - Communicate securely with EHR/PHRs - Using the government sponsored Direct secure messaging protocol, Box can send and receive medical records from EHRs/PHRs in the form of CCDs or CDAs.
    - Stay secure and HIPAA compliant - Set data retention policies and content security rules with the new Box Governance service. Box signs HIPAA Business Associate Agreements with its healthcare customers and offers the best-in-class security, auditing and reporting.
  • The Total Economic Impact of Box
    The Total Economic Impact of Box Michelle S. Bishop, Principal Consultant of Total Economic Impact™ Practice, Forrester; Jeremy Wood, Sr Director of PM, Box Recorded: Mar 24 2017 62 mins
    Looking to better understand your return on investment from using Box – and how you can use the same ROI­analysis techniques to make smarter IT decisions within your own organization?

    Today's workforce demands the ability to work securely from anywhere, at any time, on any device. These highly mobile­centric employees need robust tools to collaborate among diverse teams, yet sophisticated cybersecurity threats have placed new demands on IT – and on the applications they're choosing to deploy. Although cloud solutions have revolutionized the way we get work done, many businesses are still struggling to understand the true cost benefit of deploying these invaluable solutions.

    Box has commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study, creating a detailed financial analysis of the cost, benefit, flexibility and risk factors associated with deploying Box.

    Watch this webinar to learn why the Forrester TEI study can be the key to your organization's digital evolution:
    - Become more familiar with Box and its functionality
    - Hear a detailed ROI analysis of Box deployment, as outlined in the -
    Forrester TEI study for Box
    - Discover the methodology Forrester uses to develop the study
    - Gain insight into how you can apply the Forrester methodology to your own company
  • The Simple, Smart Way to Move to the Cloud with Box
    The Simple, Smart Way to Move to the Cloud with Box Aaron Kramer, Head of Consulting, Box; Greg Cannan, Divisional Informational Officer, Toyota USA​ Recorded: Mar 24 2017 51 mins
    Considering the move to cloud but facing challenges getting there?

    Companies of all sizes and in all industries have recognized the productivity gains and cost benefits of moving to the cloud, but many often end up inadvertently using migration methods that are inefficient and insecure. After all, moving massive amounts of sensitive data to the cloud isn't a simple undertaking!

    At Box, we believe businesses across the globe should be able to make a smooth and seamless transition to the cloud so they can start reaping its benefits faster. That's why we're excited to announce a new service called Box Shuttle: the simple, smart way to migrate large amounts of content to Box.

    Watch now to learn about how our content migration services can help you move to Box.

    - Justify the investment – and return on investment – of content management in the cloud
    - Learn how Box can help you do the heavy lifting with customizable migration service offerings
    - Hear how Toyota moved hundreds of millions of files to Box and got up and running in a week

    It's your move. Register now for the webinar to learn how Box can help you accelerate your shift to the cloud.
  • The Next Wave of Content Management
    The Next Wave of Content Management Cheryl McKinnon, Principal Analyst, Forrester Research; Rand Wacker, VP of Enterprise Product Management, Box Recorded: Mar 24 2017 49 mins
    You're now thinking about moving your content management to the cloud, and the tools you need are finally here. Jumpstart the transition by joining this conversation with Forrester's Principal Analyst, Cheryl McKinnon and Box's VP of Enterprise Product Management, Rand Wacker where they'll cover the changing ECM landscape and reveal exclusive trends in the space.

    Plus, you'll hear from Box on how it offers a simple, modern approach to content management, bringing you the key capabilities from your legacy ECM system without compromising user experience or security.

    Join this webinar to hear about:
    - The recent evolution of the ECM landscape
    - The future of ECM and how to implement successful change management
    - Box's modern approach to content management and what it means for the enterprise
  • Rapid7 AppSpider Product Demo
    Rapid7 AppSpider Product Demo Hollis Howell Recorded: Mar 24 2017 23 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • Internet of Things: Smarter Security and Visibility in Manufacturing
    Internet of Things: Smarter Security and Visibility in Manufacturing Barbara Giamanco, Kimberly Knickle & Patricia Panchak Recorded: Mar 24 2017 63 mins
    Manufacturing is evolving worldwide and IoT is supporting better manufacturing processes.

    New information technologies make managing manufacturing operations more efficient and the work smarter. The Internet of Things (IoT) has the potential to radically improve visibility throughout the manufacturing process.

    Join this dynamic discussion with Barbara Giamanco, CEO, Social Centered Selling, Kimberly Knickle, Research Vice President, IDC Manufacturing Insights, and Patricia Panchak, Editor-in-Chief, Industry Week and Group Content.

    In this webcast you will:

    - Learn how smart manufacturing impacts all areas of the business
    - See how new technologies enable the tracking of assets, processes and resources
    - Learn what it takes to make sure machines work together
    - See how teams of knowledge workers will orchestrate the process
    - Learn how to construct your security roadmap
  • Rapid7 InsightIDR Product Demo - APAC
    Rapid7 InsightIDR Product Demo - APAC Eric Sun and Pat Haley Recorded: Mar 24 2017 48 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    - How to cut through the noise to detect attacks
    - How to investigate incidents faster
    - How to end the drudgery of security data management
    - Q&A
    - And more!
  • Avoiding IT and Operational Technology Convergence Pitfalls
    Avoiding IT and Operational Technology Convergence Pitfalls Dan Ortega - Vice President of Marketing Recorded: Mar 23 2017 4 mins
    In this video, we discuss pitfalls to avoid when consolidating IT and Operational Technologies

    A key technology convergence impacting the mainstream adoption of the Internet-of-Things (IoT) is the coming together of Information Technology (IT) and Operational Technology (OT).
    Below we explore five potential pitfalls to avoid when considering unified IT and OT:
    1.Visibility: Improving visibility across unified IT/OT infrastructure has some benefits such as enabling a single service desk to handle both IT and OT domains, and being able to use common management tools.

    2.Security: We have discussed how operational technology can create a risk for IT. There is, however, an upside of converging IT and OT. The converged technology infrastructure can be subject to the same security policies and can use common compliance controls.

    3.Scalability: By operating OT and IT in separate silos, you miss out on opportunities to procure complimentary technology for both. Purchasing can negotiate better discounts if they are buying technology in high volumes and IT gets to buy IT and OT technology that works together because it can be pre-integrated.

    4.Administration: By keeping IT and OT separated, an organization cannot benefit from being able to lower administration costs through streamlining and centralizing management.

    5.Collaboration: Higher up the food chain, since OT is normally more closely aligned with how the business makes money, a converged IT and OT solution can improve the partnership between business and IT.
    Blazent focuses on providing near real-time insights that can be gained by being able to ingest and analyze large numbers of IT and IoT data streams, correcting data gaps and inconsistencies before the data is consumed.
  • RSA 2017 — Security and Availability
    RSA 2017 — Security and Availability Bryan Embrey, Senior Product Marketing Manager, Cradlepoint Recorded: Mar 23 2017 1 min
    At RSA 2017, Cradlepoint Senior Product Marketing Manager Bryan Embrey discusses security and five-nines availability that is cloud-monitored and cloud-managed through a single pane of glass.
  • RSA 2017 — SDN for IoT
    RSA 2017 — SDN for IoT Todd Kelly, SVP for Emerging Technologies, Cradlepoint Recorded: Mar 23 2017 2 mins
    At RSA 2017, Cradlepoint SVP for Emerging Technologies Todd Kelly discusses the influx of the Internet of Things, and how a Software-Defined Perimeter approach can foster single-pane-of-glass management of networks, applications, and workloads.
  • RSA 2017 — All-in-One Solutions in Branches & Vehicles
    RSA 2017 — All-in-One Solutions in Branches & Vehicles Kevin Johnson, Solution Architect, Cradlepoint Recorded: Mar 23 2017 2 mins
    At RSA 2017, Cradlepoint Solution Architect Kevin Johnson talks about all-in-one network connectivity and security through Cradlepoint routers — both at the branch and in vehicles.
  • FireEye Government Forum: The Hill Perspective
    FireEye Government Forum: The Hill Perspective FireEye Recorded: Mar 23 2017 22 mins
    Keynote: The Hill Perspective
    Senator Mark Warner, Virginia
  • FireEye Government Forum: The DoD Perspective
    FireEye Government Forum: The DoD Perspective FireEye Recorded: Mar 23 2017 27 mins
    Keynote: DOD Perspective
    Rear Admiral Gene F. Price, Deputy Commander, U.S. Navy
  • FireEye Government Forum: A Federal to Private Sector Perspective
    FireEye Government Forum: A Federal to Private Sector Perspective FireEye Recorded: Mar 23 2017 25 mins
    Keynote: A Federal to Private Sector Perspective
    Rear Admiral Sam Perez, U.S. Navy (RET) Managing Director, SBD Advisors
  • FireEye Government Forum: Enabling the Government CISO to Command and Protect
    FireEye Government Forum: Enabling the Government CISO to Command and Protect FireEye Recorded: Mar 23 2017 48 mins
    Along with compliance requirements, agency Chief Information Security Officers oversee the security of the government’s networks and critical infrastructure from domestic and foreign attacks. The monitoring and fortification of these systems is critical to protecting the public’s health, safety and economic prosperity. Potential oversights can put the nation at risk to insider threats and those seeking to gain access to sensitive data, intelligence or possibly launch malicious programs into our systems and networks. This session will take a deep-dive into the immediate and long-term hurdles facing CISOs across all levels of government missions from providing security for information systems that support operations and assets to the expansion of responsibility for whole agency cyber accountability.
  • FireEye Government Forum: Opening Keynote
    FireEye Government Forum: Opening Keynote FireEye Recorded: Mar 23 2017 49 mins
    In order to protect themselves, federal, state and local governments and their partners need a clearer picture of the rapidly-evolving threat landscape that has drastically changed with new rules of engagement. Nation-state actors, cyber criminals and hackers have become less predictable. The attack surface continues to grow with the rise in connectivity, data loads and access to industrial control systems. To identify, assess, respond and mitigate threats such as ransomware, extortion, espionage and zero-day attacks, as well as predict and prevent the “unknown threat,” agencies need to build intelligence-led security operations. CIOs and CISOs are drowning in their own security stack while analysts are exhausted by “alert fatigue.” Operationalizing security enables security professionals to rapidly collect, analyze and disseminate threat intelligence across the enterprise, assess risk based on an adversary’s motivation and capability and align resources to the most impactful threats.
  • Overcoming eTail Challenges to Deliver Exceptional Customer Experiences
    Overcoming eTail Challenges to Deliver Exceptional Customer Experiences Michael Milligan, Sr. Director Product & Solution Marketing and Charlie Kraus, Sr. Product Marketing Manager Recorded: Mar 23 2017 55 mins
    Online retailing is no longer as simple as duplicating the in-store experience. It is about so much more. Online retailers are expected to deliver fast, personalized shopping experiences featuring rich media and video, to customers on any device, wherever and whenever they choose.

    These realities have introduced a host of challenges for retailers, but they also offer significant opportunities to improve customer conversion and retention.

    What does this mean for retailers trying to deliver exceptional online experiences that maximize revenue and build customer loyalty?

    Join us as we review the technical challenges that impact your ability to deliver exceptional e-tail customer experiences, and strategies for overcoming them.

    Some of the topics that will be covered, include:
    · What customers expect from their online shopping experience;
    · What it takes to deliver a compelling omnichannel experience to reach customers;
    · How to support traffic spikes and seasonal demand;
    · Why website performance is key to improving conversion rates;
    · How best to safeguard your website against malicious attacks.
  • Rapid7 InsightIDR Product Demo
    Rapid7 InsightIDR Product Demo Eric Sun and Pat Haley Recorded: Mar 23 2017 51 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    - How to cut through the noise to detect attacks
    - How to investigate incidents faster
    - How to end the drudgery of security data management
    - Q&A
    - And more!
  • Prevent, Detect, and Respond – Securing Government and Education Onsite and in t
    Prevent, Detect, and Respond – Securing Government and Education Onsite and in t Panel of 11 experts moderated by PSTE Recorded: Mar 23 2017 72 mins
    The Public Sector Technology Exchange (PSTE), an independent venue that hosts national thought leadership forums on the challenges of government, education, and technology, hosts a webinar entitled “Prevent, Detect, and Respond – Securing Government and Education Onsite and in the Cloud.”

    Hear this leadership forum on demand to gain insights on:
    •Security best practices for government and education
    •Strategies for rapid response to breaches
    •Reducing your departmental cyber attack surface
    •Preparing for the “powder keg” situation in your organization
    •What hackers love about the cloud
    •Threat research trends on the future of cyber warfare

    Webinar Panelists:

    Chris Hill - Acting Deputy Chief Information Security Officer
    State of Illinois

    John Matelski - Chief Innovation and Information Officer
    DeKalb County, Georgia

    Rick Howard - Chief Security Officer
    Palo Alto Networks

    Matt Morton - Chief Information Security Officer and Assistant Chief Information Officer
    University of Nebraska Omaha

    Elayne Starkey - Chief Security Officer
    State of Delaware

    Lars Schmekel - Chief Security Officer
    Miami Dade County, Florida

    Gary Hayslip - Chief Information Security Officer
    City of San Diego, California

    Walter Tong - Director, Cyber Intelligence
    State of Georgia

    Duane Kuroda - Sr. Manager, Advanced Technologies
    Proofpoint

    Bob Leek - Deputy Chief Information Officer
    Multnomah County, Oregon

    Palo Alto Networks and Proofpoint are the sponsors of this leadership forum.
  • Top Reasons Why Your Antivirus Isn’t Working Anymore
    Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Recorded: Mar 23 2017 68 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • Zero-Day Attacks and What To Do About It?
    Zero-Day Attacks and What To Do About It? Chris Candaffio, System Engineer, Symantec Recorded: Mar 23 2017 32 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 3 of 5: Zero-Day Attacks and What To Do About It?

    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223
  • Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't)
    Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Charlie Hodges, Storage Switzerland Recorded: Mar 23 2017 59 mins
    If your organization is embarking on a refresh of your primary storage system this year, this is the one webinar that you will want to attend. IT evaluators that haven't looked at storage in a few years, will be impressed the use of flash to improve performance, while many claim to integrate file (NFS, SMB) and block (iSCSI, Fibre) protocols. These features though are now table stakes for the modern storage solution.

    While all of these features are important (and not created equal), IT professionals should demand capabilities that solve today's organizational challenges like eliminating shadow IT, improving multi-site productivity and long term data retention as well as meeting increasingly strict compliance standards. IT professionals should look for not only high performance and universal protocol support but also enterprise file sync and share, inter-data center sync and secure archive with compliance.
  • The New Threshold of Comprehensive Security – Why Self-Healing is Imperative
    The New Threshold of Comprehensive Security – Why Self-Healing is Imperative Kim Ellery, Director, Product Marketing, Absolute Recorded: Mar 23 2017 30 mins
    Traditional strategies for protecting endpoints are failing as attacks increase in relentlessness and sophistication. This reality has elevated the demands on security professionals and requires that organizations adopt new security paradigms that unlock the power of self-healing systems. To stop security breaches at the source, we must become faster at intelligently detecting and responding to threats. This timely webinar from Absolute explores how to realize self-healing systems in your own organization and ensure preparedness in the face of evolving threats.
  • Are Your Security Solutions Simple and Efficient to Use?
    Are Your Security Solutions Simple and Efficient to Use? David Morris, Ulf Mattsson and Alex Pezold Recorded: Mar 23 2017 57 mins
    As the adoption of cloud computing increases across many business sectors, your applications ingest and share data generated and stored within and beyond the limits of your firewall. This makes your data blind spots more dangerous than ever—both for your internal data and how customers and clients handle their vital information outside your cloud systems. To protect your business, you need a balanced approach to security—combining compliance, responsiveness, and engineering without sacrificing usability and agility.

    Join this presentation to learn how your security solutions measure up when it comes to simplicity and efficacy.
    - Do you know what data you have, where it is, and how to protect it?
    - Do your data security solutions work seamlessly inside your environment? Are you able to secure multiple business units, ERP’s, etc.?
    - Does it play nice with fraud prevention, analytics, data sharing, etc?
    - Does your data security solution achieve PCI compliance as promised?
    - Does your data security solution secure ALL data sets that are a threat to your organization?