Hi [[ session.user.profile.firstName ]]

IT Security

  • Reducing the Cost of a Breach with SD-WAN
    Reducing the Cost of a Breach with SD-WAN Jack Miller, CISO & Martin Bosshardt, CEO of Open Systems Recorded: Apr 25 2018 49 mins
    This webinar will provide an in-depth review of how software-defined wide-area network or SD-WAN can be used to:
    - Improve your cyber security posture and reduce the chances of a breach
    - Decrease your detection time to reduce the hackers time in your network and reduce response costs
    - Use dynamic segmentation to prevent the spread of a breach, thus reducing financial impact

    About the Presenters

    Jack Miller, CISO, Open Systems

    Jack Miller is a well know cybersecurity veteran with over 16 years of CISO experience at 4 multi-billion dollar organizations. He currently serves as the Chief Information Security Officer for Open Systems, Switzerland’s largest Secure SDWAN and Cloud delivered Security-As-A-Service solution provider.

    Martin Bosshardt, CEO, Open Systems

    Martin Bosshardt has been CEO of Open Systems AG since 2002. Martin Bosshardt studied at the ETH in Zurich and Todai University in Tokyo. He has a master's degree in electrical engineering from the Swiss Federal Institute of Technology (ETH). In 2011, Martin Bosshardt was awarded with the SVC Entrepreneurs Award. Since 2013, he has been a member of the Advisory Board of PwC Switzerland.
  • Can You Afford A Data Breach?
    Can You Afford A Data Breach? Nathan Rowe, Chief Product Officer & Co-Founder, Evident Recorded: Apr 25 2018 43 mins
    3.7 million personal data records are stolen every day. That’s 44 every second.

    The number increases every year, while at the same time we are digitizing even more about ourselves. Despite intense attention and new regulations, cybersecurity simply isn’t improving at an acceptable rate. Businesses are unable to keep up with the barrage of attacks. Even companies with deep expertise in data, such as Equifax, Deloitte and Yahoo have suffered significant data breaches.

    When everyone including the experts are falling behind, you have to ask yourself: Isn’t something fundamentally wrong with the way we handle personal data? How is it that attackers can act with near impunity, while well meaning companies and regular users cannot keep anything secret?

    Join this webinar to learn more about:
    - Solutions to mitigate the increasing threats to digital identity theft
    - The economic factors that perpetuate the underground industry capitalizing on those threats
    - The challenges for companies dealing with personal data related issues
    - Best practices, real world examples and lessons learned as businesses look to increase their access to the answers they need, while reducing their risk and liability
  • 5 Best practices to secure the extended enterprise with Box
    5 Best practices to secure the extended enterprise with Box Joel de la Garza, Chief Security Officer, Box Recorded: Apr 25 2018 37 mins
    Businesses today exchange more information than ever inside and outside their organization, often through ubiquitous cloud content management and collaboration solutions. However, concerns around the security of sensitive business information still remain as content in the cloud travels across numerous organizations, devices, and applications.

    In this on-demand webinar from the recent Box Virtual Summit, you'll learn:
    - The top 5 cloud security best practices, straight from our Chief Security Officer, Joel de la Garza
    - Critical controls and capabilities required to address concerns about enterprise data loss, prevention of unauthorized access, customer privacy, and more!
    - Our security philosophy of Zero Trust, Zero Knowledge, and Zero Tolerance

    Watch this webinar to learn how to better protect your content wherever your business goes.
  • Making Sense of Fileless Malware
    Making Sense of Fileless Malware Guy Propper, Security researcher at Deep Instinct Recorded: Apr 25 2018 20 mins
    Threat actors are constantly searching for new and sophisticated ways in which to avoid detection in order to successfully perform malicious attacks.
    During the past year there has been an extreme increase in the amount of fileless malware attacks. Fileless malware attacks pose a threat to organizations and a challenge for security vendors, due to the use of various nonexecutable file formats for infection, and the ability to execute parts of the malicious logic of the attack in-memory only.

    This phenomenon has encouraged cyber criminals to more extensively adopt fileless attack techniques, which were once mostly used by nation-states, leading to a rise in the amount of fileless attacks.

    This webinar will present a comprehensive overview of fileless malware, enabling individuals and organizations to better understand and deal with the threat posed by fileless malware.
  • Stop Fileless Malware with SonicWall Capture Client
    Stop Fileless Malware with SonicWall Capture Client Brook Chelmo, SonicWall | Daniel Bernard. SentinelOne | Raj Rajamani SentinelOne Recorded: Apr 25 2018 62 mins
    Over the past few years, hackers are increasingly choosing to utilize fileless malware as a highly effective alternative to malware attached to files. See how you can use modern technology to monitor the behavior of a system for malicious abnormalities and rollback systems to a previous uninfected state.

    Join SonicWall & SentinelOne experts to learn how to stay safe from advanced threats like fileless malware.

    1.Learn how the threat landscape has changed in the past three years.
    2.Learn what fileless malware is and how to stop it.
    3.Discover the difference behavior-based security makes.
  • Zero Trust Security: Reduce Breaches, Complexity, and Cost
    Zero Trust Security: Reduce Breaches, Complexity, and Cost Torsten George, Product Evangelist at Centrify Recorded: Apr 25 2018 36 mins
    More than 5 million data records are lost or stolen worldwide every single day, according to the Breach Level Index. That’s a staggering 59 records every second. According to the Ponemon Institute, to recover from these incidents, organizations spent on average $3.6 million per breach. It’s also worth remembering the potential for reputational damage that can create a downswing in an organization’s fortunes. For example, Yahoo!’s data breach proved very costly, wiping out $350 million off Verizon’s acquisition payment.

    Thus, it has become critical for organizations to find ways to reduce the risk of falling victim to a breach, as well as reduce complexity and cost in securing applications, devices, and infrastructure ― both on-premise and in the cloud.

    Join this webinar to learn:

    • How to assess the full impact of data breaches, ranging from direct costs, reputation damage, and customer loss to declines in revenue.
    • How misperceptions linked to the root cause of hacking-related breaches skew IT security spending and how to align your security investments to achieve higher effectiveness.
    • How the Zero Trust Security model can help shield your organization and its reputation from devastating and long-term financial consequences of a breach.
  • Pulse: Digital Workplace
    Pulse: Digital Workplace Aruba, a Hewlett Packard Enterprise company Recorded: Apr 25 2018 3 mins
    Are BYOD and IoT stressing your network? See how Aruba can help you build the mobile-cloud network of the future.
    The Pulse series is a quick introduction to how Aruba’s end-to-end solutions can help solve your toughest business challenges.
  • On-premises Archives: Are They A Breach Waiting To Happen?
    On-premises Archives: Are They A Breach Waiting To Happen? Martin Tuip - Senior Information Archive Strategist Recorded: Apr 25 2018 48 mins
    The world is changing and so are the targets cyber criminals are going after. On-premises archiving solutions have been around for almost 2 decades but there also come these days with some inherit increasing risks. Join this webinar and learn about:

    -Why cyber criminals might be targeting your archive
    -The top security risks of on-premises archives
    -How to reduce your risk
  • Hybrid Security is on the Rise: Insights from 2018 Cyberthreat Defense Report
    Hybrid Security is on the Rise: Insights from 2018 Cyberthreat Defense Report Mark Bouchard, COO, CyberEdge Group and Sara Pan, Sr. Product Marketing Manager, Imperva Recorded: Apr 25 2018 58 mins
    With more companies moving their data and apps to the cloud, do you know what security approaches your peers are taking? You know the threat landscape is constantly evolving, but do you know how your current cyber security defensive posture stacks up against those of your peers? In this live webinar, CyberEdge and Imperva will discuss the extent cybersecurity solutions are deployed in the cloud, on-premises or hybrid and other key insights from the 2018 Cyberthreat Defense Report.

    Attend this webinar and learn answers to your most pressing questions:
    •Do we have gaps in our cyberthreat defenses?
    •How are my peers thinking differently about cyberthreats and the options for defending against them?
    •How does our security spend compare to other organizations?
    •Which security technologies should we be investing in next?
  • Small Business, Big Cyber Risk
    Small Business, Big Cyber Risk Mike Ward, Co-founder and CEO of Turtle Creek Concepts Recorded: Apr 25 2018 46 mins
    Small businesses are the low-hanging fruit of the cybercrime world. Operating a small business is tough work and requires the small business owner to be skilled in many areas of business, finance, tech, customer service, sales, fulfillment, and so on. Cybersecurity is only a part of what SMB owners needs to know about in order to successfully run their business. However, the cybersecurity portion is often overlooked. As hackers and attackers are looking for people to scam and steal from, they look for the easiest targets first.

    In this webinar, audiences will learn more about:
    - The risks and real costs of ignoring your data security
    - How it can cause you to go out of business
    - Simple steps to take immediately to help improve your security

    Be sure that you have a good grip on understanding what you need to do when it comes to protecting your small business from these threats.

    And as an added bonus, you'll receive some valuable resources that you'll be able to use in the future as you discover, plan, and implement new security strategies in your own small business. Be #SmallBizCyber smart about your small business!
  • Threat Hunting Versus Compromise Assessments: What’s the Difference?
    Threat Hunting Versus Compromise Assessments: What’s the Difference? Andrew Cook, Delta Risk + Chris Gerritz, Infocyte Recorded: Apr 25 2018 62 mins
    Stop Worrying, You’re Already Hacked: Threat Hunting Experts Show How to Spot Network Attackers Faster to Limit the Damage

    Organizations must take a proactive approach to look for attackers on their network, because malicious hackers and criminals are always refining their techniques to avoid security tools and controls.Threat hunting and compromise assessments are terms that are used interchangeably to describe this activity, but there are some distinct differences.

    Join our experts for a live webinar with Q&A to learn why you need to devote resources to threat hunting and compromise assessments, whether it’s through dedicated teams or third-party services.

    What you’ll learn:
    •A clear definition of threat hunting and compromise assessments
    •How to convince the C-Level or executive team to buy in
    •What’s changed with the move to cloud apps and services
    •Common mistakes and misconceptions
    •Consequences for delaying hunting and assessments

    About the Speakers
    Chris Gerritz, founder of Infocyte, is a retired Air Force officer and service-disabled veteran who is a pioneer in defensive cyberspace operations, having established and led the U.S. Air Force's first enterprise-scoped hunt team. Infocyte is the result of Chris’ experience hunting adversaries within some of the largest and most targeted defense networks in the world.

    Andrew Cook, CISSP, is the Manager of Delta Risk's ActiveResponse service. Drawing from his Air Force background, he is one of the firm's leading subject matter experts in cyber threat hunting and incident response. With more than six years of experience in cyber security operations, research, and development, Andrew is adept at managing technical teams and skilled in host forensics, network security analysis, malware reverse engineering and enterprise security assessments.
  • [Breach Prevention Week] Best Practices for Effective Endpoint Security
    [Breach Prevention Week] Best Practices for Effective Endpoint Security Joel Boyd, Sr. Product Marketing Manager Recorded: Apr 25 2018 63 mins
    There’s a sequence of events attackers must go through to successfully deploy ransomware or steal information. And although most organizations have some form of endpoint protection in place, infections are still common.

    Palo Alto Networks® and Cloud Harmonics will show you how to secure your endpoints against increasingly sophisticated cyberattacks.

    In this webinar, you’ll learn:
    •Why so many attacks succeed and how to stop them
    •Effective techniques to protect against malware, exploits and ransomware
    •Next steps for successful endpoint protection
  • CMD+CTRL Peek & Play
    CMD+CTRL Peek & Play Mike Cooper, Sr. Security Manager Recorded: Apr 25 2018 28 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

    For every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

    We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

    Sign up to test drive CMD+CTRL!
  • TLS 1.3 and What It Means for Data Center Visibility
    TLS 1.3 and What It Means for Data Center Visibility Matt Cauthorn, VP of Security at ExtraHop and Tyson Supasatit, PMM at ExtraHop Recorded: Apr 25 2018 45 mins
    On March 21, the IETF approved the TLS 1.3 standard, which requires forward secrecy. This poses a problem for passive monitoring solutions because they will not be able to decrypt the traffic. In this webinar, you will learn about TLS 1.3's implications for enterprise performance and security monitoring, and how ExtraHop offers a novel method of decrypting traffic using ephemeral session keys without an inline deployment.
  • True Detective – Autopsy of latest O365 and AWS threats
    True Detective – Autopsy of latest O365 and AWS threats Brandon Cook, Thyaga Vasudevan, and Sandeep Chandana of McAfee Recorded: Apr 25 2018 60 mins
    How does your organization defend against the latest O365 and AWS threats including KnockKnock and Ghostwriter?

    Join CSA and McAfee to see an autopsy of two recent cloud threats: KnockKnock (O365) and Ghostwriter (AWS) uncovered CSA by our Cloud Threats Lab. We’ll share practical guidance on how to address the rapidly evolving cloud threat landscape, starting with user behavior analysis
    and leveraging the “network effect”.

    Specifically, we will discuss how Information Security teams can:
    • Catch third parties logging into corporate cloud service using stolen or misplaced login credentials to steal valuable corporate data
    • Detect malicious or negligent insider stealing or unintentionally exposing data from O365 and AWS
    • Identify malicious administrators accessing data out of policy, intentionally degrading security settings, or creating dummy accounts for unauthorized third party access
  • The Smart, Sustainable Middleprise
    The Smart, Sustainable Middleprise Jarrett Wendt, EVP – CityNOW, Panasonic; Ken Sandfeld, President, SOLiD Americas Recorded: Apr 25 2018 25 mins
    This NMG hosted panel will discuss the opportunities for commercial real estate companies as connectivity can be the bridge to a myriad of smart building solutions that reduce OPEX in the long-run as well as provide added incentives for tenants who want to be green.
  • Virtual to Universal- The Evolution of the CPE Within Open Telco Cloud Architect
    Virtual to Universal- The Evolution of the CPE Within Open Telco Cloud Architect Susan Johnson, EVP – Global Supply Chain, AT&T Rakesh Kumar, Partner, Deloitte Sanjay Bhatia, VP – Solutions Marketing,Ribbon Recorded: Apr 25 2018 22 mins
    The point of demarcation between a telco operator’s network and the end-user has been rife with innovation as operators have invested heavily in network functions virtualization (NFV), all in an effort to provide more agile delivery of virtual network functions (VNFs), such as routers, firewalls, and more.

    On this NMG hosted panel will discuss how telcos continue to pursue innovation at the customer edge via the deployment of universal CPEs or edge based NFV infrastructures comprised of white box hardware and open source software. 
  • Micro Data Center Services- How Extending Compute Infrastructure at the Edge Wil
    Micro Data Center Services- How Extending Compute Infrastructure at the Edge Wil Renu Navale, Director – Network Platforms Group, Intel Ty Schmitt, Vice President & Fellow – Extreme Scale Infrastructure, De Recorded: Apr 25 2018 23 mins
    Low-latency IoT applications, such as autonomous vehicles, smart cities, and virtual reality are all building the use case for further extending compute infrastructure towards the network edge.

    This NMG hosted panel will discuss the rationale for placing pools of compute infrastructure further out into the network and the applications that will require new cloud computing topologies, such as multi-access edge computing and fog computing.
  • How Box streamlines your GDPR readiness journey
    How Box streamlines your GDPR readiness journey Crispen Maung, VP Compliance, Box & James Davies, Sr. Solutions Architect, Box Consulting Recorded: Apr 25 2018 63 mins
    With the General Data Protection Regulation (GDPR) just around the corner, we're committed to being GDPR-ready by May 25, 2018, so that all of our customers can use Box with GDPR compliance in mind. To help you on your GDPR readiness journey, this webinar focuses on key considerations and helpful steps to meet GDPR obligations.

    Watch this webinar to learn:
    - Critical questions to ask your vendors related to the GDPR
    - How to easily execute your self-serve Data Processing Addendum (DPA)
    - How the Box Consulting and Compliance teams help make compliance easy
  • Visibility for the Extended Enterprise
    Visibility for the Extended Enterprise Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc. Recorded: Apr 25 2018 39 mins
    How do you manage the explosive growth and diversity of devices connecting to your network? How do you handle those devices when the vast majority are IoT devices and operational technologies (OT), most of which cannot be managed via traditional agent-based security systems? Accurate device visibility is paramount for solving security use cases such as network access control, device compliance, asset management, network segmentation and incident response.

    Join us to learn how the ForeScout platform solves the device visibility problem across the extended enterprise. Get insight into the new capabilities of CounterACT 8, including:
    • Passive-only discovery and profiling in sensitive OT and industrial network zones without requiring agents
    • Support for cloud-based network management systems
    • A customizable web dashboard for device intelligence across campus, data center, cloud and OT networks
  • Reducing Breach Costs with Early Detection and Rapid Response
    Reducing Breach Costs with Early Detection and Rapid Response Harlan Carvey Director of Intelligence Integration, at Nuix Recorded: Apr 25 2018 28 mins
    It takes minutes to get inside. Days to exfiltrate. Detection can take weeks, maybe months. The impact is huge: lost revenue, increased costs, and damage to your organization’s brand.

    You can’t completely stop breaches from happening, but you can remediate the direct and indirect costs they can have on your organization. By taking a proactive stance, you can properly plan and budget for the costs associated with a breach. Through early detection and rapid response, you can obviate the need to notify affected customers and reduce the costs associated with notification.

    This webinar will cover:
    • How a “data breach” is defined, legislated, and how they occur
    • Direct and indirect costs facing organizations that are breached
    • Differences between “left of breach” (proactive approach) and “right of breach” (reactive approach) by exploring real-world examples
    • How early detection and rapid response can drive down the cost of a breach.

    About the presenters:

    Harlan Carvey, Director of Intelligence Integration
    Harlan began his career in information security 28 years ago. After serving on active duty with the United States military, he transitioned to planning, coordinating, and executing vulnerability assessments. He then went on to digital forensics and incident response, which in turn led to targeted threat hunting and response.
  • Arming IT security teams with U.S. Secret Service tactics
    Arming IT security teams with U.S. Secret Service tactics Martin Zugec, Senior Architect, Security and Automation, Citrix; Eric Beiers, Lead Security Architect, Citrix Recorded: Apr 25 2018 53 mins
    The U.S. Secret Service has been protecting the leaders of the United States, their families and visiting VIPs for over 100 years with an extraordinary record of success. Attend this webinar to learn about the secret behind their success, the methodology they are using, how you can design your IT environment to achieve the same level of protection and why Citrix is the right partner for this task.

    In the session, you will learn how to:

    • Architect security for a workforce on the move
    • Implement defense-in-depth
    • Deploy best practices for securing your infrastructure, apps, and data
  • Attackers Enter Here → Endpoint Devices
    Attackers Enter Here → Endpoint Devices Cisco Security Product Experts, Meg Diaz, Joe Malenfant, and Neil Patel, Recorded: Apr 25 2018 62 mins
    70% of breaches start on endpoint devices. Unfortunately, gaps in protection exist when users and endpoints are off-network, often leaving AV as the only form of protection. And reacting to malicious communications and code after attacks launch is simply too late. It’s time to prevent, detect and respond to attacks targeting endpoints, both on and off your network before damage occurs.

    Join Cisco security product experts, Meg Diaz, Joe Malenfant, and Neil Patel, to learn how you can not only stop attacks before they occur, but contain and remediate threats that evade front-line defenses, anywhere your users travel.
  • New Solutions for a New Paradigm of Edge Services
    New Solutions for a New Paradigm of Edge Services Rajesh Gadiyar, CTO – Network Platforms Group, Intel; Ian Hood, Chief Technologist – Telco Vertical, Red Hat Recorded: Apr 25 2018 28 mins
    With the emergence of new technologies such as augmented and virtual reality, autonomous cars, drones and IOT with smart cities, data is increasingly being produced at the user end of the network. These use cases demand real-time processing and communication between distributed endpoints, creating the need for efficient processing at the network edge.

    On this NMG hosted panel will explore the change in value chain with Edge Compute and will bring different perspectives on this major industry transformation.
  • Technischer Deep Dive: Planung und Konzeption Ihres drahtlosen Netzwerks
    Technischer Deep Dive: Planung und Konzeption Ihres drahtlosen Netzwerks Stephan Kaiser Apr 26 2018 8:00 am UTC 60 mins
    Mit besonderem Augenmerk auf Sicherheit und eine positive Benutzererfahrung, nutzt die SonicWall SonicWave Access Point Series die neueste Wave 2-Technologie und bietet eine sichere End-to-End-Lösung.

    Lernen Sie Best Practices zur Planung und Implementierung Ihres drahtlosen Netzwerkes kennen, darunter:
    • Wireless-Grundlagen und die Bedeutung der 802.11ac Wave 2-Technologie
    • Überblick über das SonicWave-Produktportfolio
    • Site Survey für optimale AP-Platzierung und Reichweitenanalyse
    • Einrichtung, Überwachung und Konfiguration Ihrer Access Points
  • Análisis técnico en profundidad: Planifique y diseñe su red inalámbrica
    Análisis técnico en profundidad: Planifique y diseñe su red inalámbrica Alex Vazquez Apr 26 2018 9:00 am UTC 60 mins
    La serie de puntos de acceso SonicWall SonicWave incluye la última tecnología Wave 2. Diseñada teniendo en cuenta la seguridad y la experiencia de usuario, la serie SonicWave proporciona una solución extremo a extremo segura.

    Descubra las mejores prácticas para planificar e implementar su red inalámbrica. Le proporcionamos:
    • Los conceptos fundamentales de la RF e información sobre la importancia de la tecnología 802.11ac Wave 2
    • Una visión general de la cartera de productos SonicWave
    • Un análisis del emplazamiento para optimizar la colocación de los puntos de acceso y los análisis de cobertura
    • Instrucciones para instalar, monitorizar y configurar sus puntos de acceso
  • The hackers are winning: Deploy your secret weapon
    The hackers are winning: Deploy your secret weapon Rob Shapland, Principal Cyber Security Consultant, First Base Technologies Apr 26 2018 10:00 am UTC 45 mins
    How to make your staff your first and last line of defence.

    Learn how to:
    •Identify your enemy and their tactics
    •Discover why technological defences will lose to hackers
    •Learn how to make staff genuinely care about security

    About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies

    Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
    He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
    He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
  • The Board's Role in Balancing Risk & Reward
    The Board's Role in Balancing Risk & Reward Steve Durbin, Managing Director, ISF LTD Apr 26 2018 11:00 am UTC 45 mins
    Cyber has become a strategic issue and for many companies is now a business enabler and increasingly a form of competitive advantage. However it is clear that it remains difficult for Board's to get the “right” management information to support their cyber risk discussions and decision making.

    So how can Board's ensure that they are asking the right questions when it comes to an organisation’s cyber posture and how can CISOs maintain and improve the Board’s attention in this fast-moving space? This webinar will look at the challenges faced by CISOs and Board members and offer insights into how to successfully approach cyber security at Board level.

    About the presenter:
    Steve Durbin is Managing Director at the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Driving Behavioural Change Through Phishing Simulation and Security Training
    Driving Behavioural Change Through Phishing Simulation and Security Training Brett Shaw, Sr. Product Marketing Manager, Proofpoint and Chris Thielet, Account Executive, Wombat Apr 26 2018 1:00 pm UTC 45 mins
    Today’s cyberattacks target individuals, not infrastructure, and phishing is one of the most successful and enduring types of attack.

    Join this webinar to see how the newest member of Proofpoint family - Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, reduces phishing risk by enabling phishing simulation and training to change end-user behaviour.

    You’ll learn how to:

    •Assess your users’ susceptibility to phishing and spear phishing attacks
    •Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    •Allow your employees to report suspicious messages with a single mouse click

    All your questions will be answered via email after the webcast, alternatively, you can email us: infouk@proofpoint.com

    Disclaimer: part of this webinar has been pre-recorded.
  • [Ep.2] Next Generation Leaders: Failure and Rejection: How to bounce back
    [Ep.2] Next Generation Leaders: Failure and Rejection: How to bounce back Caritta Seppa (Tespack), Ina Yulo (BrightTALK), Lauren Quigley (London & Partners), Yesika Aguilera (Tespack) Apr 26 2018 1:00 pm UTC 60 mins
    The road to success is often a bumpy one, whether you're an entrepreneur launching your own business, or a young professional looking to make yourself known within an organisation.

    Join this second episode of our Next Generation Leaders series where panelists will share their stories of rejection and failure, reveal how they bounced back after bad situations, and will also provide tips that you can use if you find yourself in a similar situation.
  • Agentless Windows logging
    Agentless Windows logging Istvan Molnar, Craig Finnan Apr 26 2018 2:00 pm UTC 60 mins
    With syslog-ng Premium Edition, you can collect Windows event logs without installing any third party application on your Windows-based computer.

    The benefits are obvious:

    - You don’t need to install any additional application (reducing administrative overhead and possible security risk).
    You can manage the subscription from Windows Group Policy (permission, certificates, destination).

    - The Windows Event Collector (WEC) acts as a log collector and forwarder tool for the Microsoft Windows platform. Unlike the syslog-ng Agent for Windows, WEC is a standalone tool that does not require installing on the Windows-based host itself. This can be an advantage when your organization's policies restrict or do not allow the installation of third-party tools.
  • Vendor Management is Risky Business
    Vendor Management is Risky Business Jennifer Anderson, Jeff Avery, Ben Fagan Apr 26 2018 3:00 pm UTC 60 mins
    Do you struggle with truly understanding your risk with your vendors? Are you relying solely on static, self-assessments to understand vendor risk? This can put your company at a greater level of exposure. Join Verterim's Jennifer Anderson and Jeff Avery with BitSight Technology's Ben Fagan BrightTalk for an informative discussion on the changes in vendor management programs and a demonstration of the BitSight and Archer Integration. Our plug and play BitSight - RSA Archer integration provides dynamic risk information to augment your existing vendor assessment process, pointing you to specific areas that may be at risk, reducing your time on vendor risk analysis and proactively alerting you to potential issues real time.
  • Gamification and Security: The Role of Competitions in Readiness and Defense
    Gamification and Security: The Role of Competitions in Readiness and Defense Lisa Jiggetts, Founder, President & CEO of the Women's Society of Cyberjutsu Apr 26 2018 3:00 pm UTC 60 mins
    Security operations face intensifying pressures along numerous fronts, including a constantly shifting threat landscape, an increasingly complex environment to defend, and an extreme shortage of skills. This panel of distinguished security experts will discuss the role that competitions – at the primary school, collegiate and professional levels – can play in attracting workers to the security arena, growing their skills, and developing methods to identify and defend against the greatest threats and risks of the day.

    Lisa Jiggetts, the Founder & CEO of the Women's Society of Cyberjutsu, one of the fastest growing nonprofits dedicated to women in cybersecurity, will spearhead this panel of experts is cyber security and competitions.

    Other panelists include Mika Devonshire, Director of Forensics and Cyber Risk Analytics at SSIC; Marcelle Lee, Threat Researcher at LookingGlass Cyber Solutions; and Dan Manson, Professor of Computer Information Systems at Cal Poly Pomona.
  • Automation on Fire: Tufin New Release Update for R18-1
    Automation on Fire: Tufin New Release Update for R18-1 Hadas Lahav, Senior Product Manager,Automation, Tufin and Maya Malevich,Director of Product Marketing, Tufin Apr 26 2018 3:00 pm UTC 45 mins
    Are you using automation from Tufin yet? Are you still wondering how automation can make your life easier?

    Join Hadas Lahav, Product Management lead for automation, and Maya Malevich, Director Product Marketing, to learn about the latest and greatest in Tufin Orchestration Suite R18-1:
    •Automated process for rule recertification
    •End-to-end change automation for Cisco Firepower (and a new migration solution)
    •New automation triggers for advanced customizations
    •And much more…
  • Accelerate Your Digital Transformation with Box and Microsoft
    Accelerate Your Digital Transformation with Box and Microsoft Eric Ren, Product Marketing & Business Development, Box & Rakesh Shah, Cloud Solution Architect, Azure Apr 26 2018 3:00 pm UTC 45 mins
    Did you know our partnership with Microsoft continues to grow? Box now integrates with Microsoft's global-scale Azure cloud platform, bringing your people, information and applications together to transform your workflows.

    Box using Azure is the first product milestone in the expanded partnership between Box and Microsoft. Now customers can benefit from combining our Cloud Content Management platform with Microsoft's global-scale Azure cloud platform to:

    • Simplify cross-company collaborative processes between employees and external stakeholders
    • Securely manage content for the enterprise through integrations with 1,000+ best-of-breed apps, including Office 365
    • Deliver new digital experiences and streamline business processes by bringing Box capabilities to their own custom apps
  • Offensive security with Ansible
    Offensive security with Ansible Christopher Grimm, consulting architect, Red Hat and Greg Tinsley, consultant, Red Hat Apr 26 2018 3:00 pm UTC 60 mins
    Cybersecurity has increasingly become an area of concern across every organization today. Automation tools are growing within the enterprise and security testers can use these tools to their advantage. Advanced solutions focus on malware and identifying malicious code, which results in attackers finding ways to operate without downloading specialized malicious tools. As security testers, we need to be doing the same and using already-in-place tools, such as Ansible, that help our testing be as authentic and as successful as possible.

    Join this webinar to learn how Ansible is a great automation tool for the administrator. We'll cover:

    - The highlights of Ansible as an automation tool.
    - The benefits of Ansible as an offensive tool.
    - How an attacker might use Ansible against us.
    - Some defensive methodologies to protect ourselves.
  • DigiCert Monthly Threat Briefing - April 2018
    DigiCert Monthly Threat Briefing - April 2018 Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Apr 26 2018 3:00 pm UTC 60 mins
    Stay updated on April’s threats within the SSL, TLS, PKI, IoT, encryption, identity and digital certificate space. From DigiCert.
  • M-Trends 2018 - Understanding Today's Cyber Attack Trends
    M-Trends 2018 - Understanding Today's Cyber Attack Trends Chris Nutt, Managing Director, Mandiant Consulting; Russell Teague, Vice President, Mandiant Consulting Apr 26 2018 3:00 pm UTC 60 mins
    Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarized in the annual M-Trends report, which explores changes in the cyber threat landscape.

    During this webinar, Managing Director Chris Nutt and Vice President Russell Teague will discuss:

    - Longer-term trends in today's threat landscape
    - Sophisticated and harmful APT groups to look out for
    - Which organizations are most likely to be retargeted by attackers
    - The difficulty of finding skilled personnel and how it affects the security function
    - How weaknesses in security fundamentals contributed to successful compromises
    - Best practice red teaming tactics for improved security defense
  • The Road to Intelligent Authentication Journeys
    The Road to Intelligent Authentication Journeys ForgeRock's Jessica Morrison, Andy Hall and Simon Moffatt Apr 26 2018 3:00 pm UTC 60 mins
    The pressure is on. You need to build a great customer login experience that is secure but doesn’t burden your customers with complicated password requirements. But wait, there’s more – you also need to personalize the login experience and provide metrics back to the business. Legacy authentication has you boxed in. What are you to do?

    Solutions like multi-factor authentication (MFA) are replacing traditional login methods but its limitations are often static and offer up inconsistent customer experiences, leading to abandonment. Organizations need an intelligent authentication approach that strikes a balance between usability, security, and customer choice.

    In this webcast you will learn what Intelligent Authentication is and how it enables you to:

    Easily configure, measure, and adjust login journeys using digital signals including device, contextual, behavioral, user choice, and risk-based factors

    Leverage user login analytics to increase user adoption rates, and improve the customer experience

    Automatically redirect suspicious users for further monitoring
    Quickly consume out-of-the-box authenticators, utilize existing authenticators, and integrate with cyber security solutions — all in one place
  • How to Find the Real Threat Lurking in Security Events
    How to Find the Real Threat Lurking in Security Events Damon Fleury, CTO, Chris Rogers, Virtual SOC Leader Apr 26 2018 4:00 pm UTC 45 mins
    For most security pros, the challenge isn’t not having enough data about potential security events. The problem is so much data coming from millions of endpoints that the real threat is buried and undetectable. The companies that have recently experienced high profile breaches have learned it’s easy for a real threat to go unrecognized and wreak devasting havoc on your systems, your customers and your business. Ray Bradbury was right when he said, “Too much of anything isn’t good for anyone.”

    Is it possible to efficiently sift through the mountains of security alert data collected daily to hone in on what indicates a real incident? And even more importantly, is it possible to accomplish this quickly enough to be able to immediately mitigate the potential damage?

    Fortunately, the answer to these questions is “Yes, it is possible.” Join CyberDefenses CTO Damon Fleury for a webinar in which we explore the threat hunting methodologies and tools that enable you to identify the true threats lurking in your security alerts, and to recognize them early enough to take effective action. We’ll cover:
    •Setting up a process that works to isolate the potential threats
    •The skillset needed to determine what warrants immediate attention
    •The typical structure of an incident and tell-tale markers
    •Best practices for threat hunting and detection
    •Effective incident response workflows and resources
  • Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks
    Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research Apr 26 2018 4:00 pm UTC 60 mins
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us on April 26 as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.