The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.
Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:
•Gain visibility and granular, context-based control of SaaS applications.
•Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
•Protect against new insertion and distribution points for malware.
•Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.
The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
Mancano pochi mesi alla scadenza del GDPR, e non c’è tempo da perdere. Che cosa puoi fare, praticamente, in questo momento per prepararti al meglio? Organizzato dagli esperti in sicurezza Symantec, il webinar “90 giorni al GDPR” è ricco di suggerimenti e consigli essenziali.
A prescindere dal tuo livello di preparazione, questo webinar ti aiuterà a capire la tua posizione, offrendoti consigli pratici e concreti da attuare prima della scadenza di maggio.
Non affidarti al caso: registrati ora.
Se non lo hai già fatto, prima di seguire il webinar completa il modulo di valutazione d el tuo stato di preparazione al GDPR (GDPR Readiness Assessment) di IDC: ti permetterà di capire a che punto sei nella tua pianificazione per realizzare la compliance al GDPR.
Handeln Sie jetzt – und stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung
Verlieren Sie keine Zeit – die DSGVO kommt schon in einigen Monaten. Aber wie können Sie sich aktiv darauf vorbereiten? Im Webinar
‘Noch 90 Tage bis zur DSGVO’ geben Ihnen die Symantec Experten v iele praxisnahe Tipps für die Umsetzung.
Ganz egal, wie weit Sie mit Ihrer Vorbereitung heute sind: Im Webinar erfahren Sie, wo Sie aktuell stehen, und erhalten rechtzeitig vor dem Stichtag im Mai klare, handlungsrelevante Tipps.
Gehen Sie kein Risiko ein – melden Sie sich noch heute an.
Vor der Teilnahme am Webinar sollten Sie, wenn es noch nicht gesche hen ist, auch das GDPR Readiness Assessment von IDC
absolvieren. Es hilft Ihnen einzuschätzen, wie weit Ihre Vorbereitung vorangeschritten ist.
Zum Assessment •http://symantecgdpr.idcready.net/de/?utm=aI638CIsFU
Faltan pocos meses para que el nuevo RGPD entre en vigor, por lo que no hay tiempo que perder. ¿Sabe qué puede hacer desde ahora mismo para prepararse debidamente? Organizado p or los expertos de Symantec, el seminario web «90 días para el RGPD» incluye numerosos consejos y técnicas al respecto.
Independientemente de la etapa de preparación en la que se encuentre su organización, este seminario web le ayudará a entender el nivel de preparación de su organización y, además, le ofrece pasos prácticos y ejecutables para cumplir con la fecha límite de mayo.
No se la juegue e inscríbase ahora mismo.
Pero antes de asistir al seminario web, si no lo ha hecho aún, sería muy útil que realizara la evaluación de preparación para el RDPG preparada por IDC. Esta le ayudará a determinar en qué etapa se encuentra su plan de preparaci ón para el RGPD.
Realice la evaluación INSCRÍBASE YA
The General Data Protection Regulation (GDPR) comes into effect May 25, 2018, and it impacts organizations throughout the world who sell, market to, and even collect any personal data of EU citizens. It has far reaching operational and IT impacts. Critical to GDPR compliance are security, data-access governance, and transparency in the collection and use of personal data for EU citizens, including use-based consent, self-service personal data management, and data encryption in every state (at rest, in motion, in use).
As organizations look for efficient ways to check the compliance boxes, article by article, it is important to note that compliance is only a step towards strengthening your engagement with customers and preserving their data privacy.
One of the key components for GDPR compliance is the need for strong authentication and identity management. Join this webinar to learn about the Secure Authentication requirements of GDPR, how to meet those requirements, and strengthen security at the same time.
In this webinar, Yubico and Ping Identity will discuss:
● How Customer Identity and Access Management (Customer IAM) solutions provide key capabilities that help meet GDPR requirements ‘out of the box’
● Architectural best practices of Customer IAM that make compliance more cost effective and efficient
● How organizations can turn the GDPR compliance challenge into an opportunity by providing a single, unified view of the customer, building trust, and enabling secure, seamless and personalized customer engagement
Alex Yakubov, Senior Director - Ecosystem (Yubico)
It’s always nice to find a kindred spirit — someone who knows what you know and likes what you like. The problem today is that kindred spirit whom you think is your friend might well be your worst enemy. One of the most effective tools attackers use to breach everything from high-security networks and physical installations to your most closely held secrets is social engineering. This webinar looks at how social engineering works, why it works as well as it does, how to identify an attack and what to do if you think you’ve been compromised.
For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core.
Join us as we discuss how organizations can meet the GDPR requirements and the security implications for your organization.
Join us to hear how to:
• Discover and classify personal data.
• Protect all personal data by developing and implementing appropriate security controls.
• Enhance security controls by monitoring, detecting, responding, and reporting on all policy violations and external threats.
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018.
What you will learn:
- What breach response will look like under the GDPR
- What tools and processes a data privacy officer will rely on in case of a breach
- What departments and entities will be involved beyond IT
- What activities are currently happening within organizations to prepare for the GDPR
- What the consequences of the breach could be
Your biggest security risk may be inside your organization. Today’s most damaging threats don’t originate from criminal outsiders or malware but from insiders - both malicious and careless. So, are there preventative options?
Join this candid discussion of cybersecurity experts – featuring David Duncan, VP Security Marketing at CA Technologies – as they reveal best practices to protect your organization and review key findings from the latest 2018 Insider Threat Report, including:
• Why 90% of organizations feel vulnerable to insider attacks
• How the use of behavior and data monitoring is accelerating
• What popular technologies can help detect, deter and prevent insider attacks
All registrants will receive a full copy of the new 2018 Insider Threats Report.
This Panel Discussion is hosted by Cybersecurity Insiders
The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?
Join this panel of world-class experts:
Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.
Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.
Martyn Hope: Founder of the EU-GDPR Institute.
In this session you will learn:
- What will happen if I'm not Compliant by May 25, 2018
- Where do I Begin to start my compliance effort
- Who should I trust to advise me through my compliance program
If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
Have you ever wondered how to build momentum for your data governance program? Join us for this informative webinar to hear how the Chief Data Officer at the Bank of Ireland is enabling cross-functional collaboration and helping his team to embrace a ‘data culture’. You’ll learn how, through his innovative methods, CDO Barry Green is adopting a smart approach to breaking down silos between disciplines and business functions, fostering a shift in data management culture based on collaboration and knowledge transfer across the enterprise.
Through these new processes and solutions, the Bank of Ireland is now linking data and technology to the value chain. This shift ensures transparency and controls are in place and can support both regulatory requirements (GDPR, BCBS239, etc.) and accelerate their data-driven digital transformation. In fact, the ‘data culture’ is allowing Bank of Ireland to identify opportunities to increase customer satisfaction, re-engineer process and streamline for cost efficiency.
During the webinar, you will hear:
•The importance of collaboration
•The need for executive sponsorship
•How to get the organization moving in the same direction
•How your program can support compliance such as GDPR and BCBS239
Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on G Suite.
During this session, we’ll cover threats to data within G-Suite:
• Email-based phishing, spoofing, and malware
• Account takeover, insider threats, compromised Google credentials
•Controlling sensitive data within G-Drive and Gmail and GSuite Apps
Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?
Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:
- How to monitor services and apps built on top of containers
- The benefits of transparent instrumentation for metric collection
- Using dashboards to quickly see and share performance data
- How to quickly determine the what and the why of what’s happening in your environment
When it comes to endpoint security, the playing field has changed. Threats are more dangerous and prevalent than ever before. Global security standards are more rigid, and the penalties for non-compliance more severe. Yesterday’s security strategy isn’t going to protect you from tomorrow’s attacks.
Register now for this important webinar that takes a deep dive into the four essential strategies for endpoint security and protection. Featuring Richard Henderson, Global Security Strategist at Absolute, you’ll learn how to:
• Get ahead of threats and prevent incidents before they happen
• Implement continuous assessment for regulatory compliance
• Dramatically minimize risk through effective technologies and processes should an incident occur
Learn the key strategies for building and maintaining a comprehensive ecosystem of management and security controls for all of your endpoints. Register to watch this webinar now.
Buying a GRC platform isn’t so much about sizing up the options as it is about analyzing your company’s needs. After that, it’s about knowing which questions to ask vendors and how to evaluate their offerings while keeping business processes front and center. In this webinar, we’ll share how to self assess needs and benchmark your GRC maturity. Throughout the hour, we’ll offer buyer’s tips and empower you to buy the GRC platform that’s right for your company.
In this webinar, you will discover:
• How to assess your organization and determine what type of platform is right for you
• What questions to ask when evaluating GRC vendors
• Tips for building a business case for a GRC platform and estimating potential ROI
In our increasingly competitive and digital world, organizations need to evolve to be more competitive. For many, an untapped resource is GRC and its role in increasing efficiency and organizational resiliency. Explore what’s possible in this educational webinar.
Mobility management can be a complex undertaking. In this Q&A session, you’ll learn best practices from a panel of your peers including CJ Wiemer, Information Systems Security Engineer at kCura; Kelsey van Haaster, Product Owner, Identity at ThoughtWorks; and Owen Fuller, Systems Administrator at The Weitz Company on how to make mobile management stress-free for IT while getting end-users to even like it. Come prepared to participate in this interactive session.
With the proliferation of single-point security solutions, many IT teams are struggling to efficiently monitor the security of their environments, and respond quickly to threats. It can be a real challenge to juggle multiple tools that weren’t designed to work together, which wastes time and resources that small IT security teams can’t afford to lose.
Watch this webcast to learn how one of AlienVault's customers was able to build a security operations center (SOC) on a budget with the AlienVault toolset, and extend security capabilities via the AlienApps ecosystem.
In this webcast, we'll cover:
Essential security capabilities that all IT teams should have, regardless of size
Challenges of integrating and maintaining multiple security tools
How AlienVault customer Guy Dulberger operates his "One Man SOC" with the AlienVault toolset
A demo of how AlienVault Unified Security Management speeds threat detection and incident response
Principal Product Marketing Manager
Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
The year of 2018 may very well be the year of ‘smart malware’. As sophisticated threat-actors continue to bolster their toolkits, it is only a matter of time before we see weaponized AI targeting our organizations. Simultaneously, cyber security companies are racing to implement new AI technologies into their cyber defense strategies. We now find ourselves in an AI arms race. Defenders and attackers alike are rushing to stay one step ahead before machines fight machines on the battleground of corporate networks.
Amidst this new threat landscape, cyber defense has become a confusing terrain to navigate. What are the actual risks of AI-based attacks? What would an AI attack look like? And how can effectively implementing AI proactively defend against this new era of threat?
Join Dave Palmer, Director of Technology at Darktrace, on February 22nd at 9AM PST for a discussion on how AI will shape the next age of cyber defense.
In this webinar, you will learn:
•How AI will enhance the sophistication of cyber-threats
•Why organizations should prepare for AI-based attacks
•How cyber security companies are responding to advances in AI
•How Darktrace has leveraged AI to spearhead a fundamentally new approach to cyber defense
The introduction of GDPR is set to bring data protection to the top of businesses’ priority lists. So how can businesses ensure they are compliant and what steps do they need to take?
In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:
1) Understand the GDPR legal framework
2) Create a Data Register
3) Classify your data
4) Start with your top priority
5) Assess and document additional risks and processes
6) Revise and repeat
In order to properly control privacy data under GDPR, you need a plan for both classifying and understanding where that info is kept. Regulation-specific standards are often insufficient, and trying to apply multiple standards is difficult and confusing to employees. In this webcast. Greg Forest from Contoural will discuss how to create a single comprehensive yet workable data security classification standard that both ensures compliance and is intuitive and easier for employees to follow. Topics include:
• An overview of key data classification frameworks including HIPAA, ISO, FIPS and others, their strengths and their weaknesses
• Key attributes that should go into your standard including privacy, confidentiality, IP and other types of sensitive information
• How to create a hybrid standard
• Sampling your standard with content, and using this to drive adjustments and fine tuning
• How to integrate data classification with record retention
With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.
Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.
Don’t leave it to chance – register now.
Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.
Take Assessment >> https://symantecgdpr.idcready.net/?utm=JO0yR5ukvt
We all know that the EU General Data Protection Regulation (GDPR) will bring a massive change in the way businesses operate and handle personal data. This short discussion will give you to tips to jumpstart your GDPR programme and some easy approaches to take to achieve success in a short space of time.
1) GDPR short summary
2) Focus on the goals not vendors
3) ICO & Data subject expectations - May 2018 onwards
4) GDPR practical approach
About the Presenter:
Tarun Samtani is the Group GDPR Lead for Vectura Group Plc, & SkyePharma. Tarun holds over 18+ years of experience across various sectors like Telecommunications, ISP's, Financial Services, Gambling, Retail and most recently Pharmaceuticals. Tarun has worked across UK, Europe, Asia & Middle East on different assignments. He has a wealth of experience in Cyber security & Data privacy and is passionate about securing business information landscape. During the course of his career Tarun has been involved in the strategy & planning, design, architecture and implementation of a significant number of information security programmes.
Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.
Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
It’s clear that targeted and zero day attacks aren’t going away any time soon. So what do these attacks have in common?
Endpoints were compromised.
In fact, according to a 2017 analysis of financial services attacks by our threat research team Unit 42, 96% of cyberattacks were delivered by email in the financial services industry.
Register for our webinar and learn:
•How cyberattackers bypassed legacy security solutions in recent attacks
•What you can do to reliably reduce the risk of successful attacks
•How to prevent unknown threats from compromising your systems, even unpatched ones
How to address the unknown of Zero-day threats and cryptoware variants.
Anti-virus and anti-malware has a fundamental flaw that’s becoming more and more obvious: it needs a catalog of all the malicious software in the world in order to work effectively. Building this catalog is an impossible task; new exploits (“zero-day exploits”) are created every day and often go undetected for months at a time. The gap between the release and the discovery of malicious software is where the real threat to your organization lies. DriveLock addresses this gap with application whitelisting, and with DriveLock Smart AppGuard, maintaining that whitelist is easier than ever before.
Anti-virus and anti-malware software is fundamentally flawed. A time lag will always exist between release of an exploit and its discovery; that time lag can mean your systems are vulnerable to that exploit for weeks or even months at a time.
Application whitelisting addresses this flaw by taking the opposite approach of anti-malware: instead of providing a list of software the system is NOT allowed to run, it provides a list of software it IS allowed to run. Zero-day exploits never even have a chance to run because they aren’t on the approved list of software.
By using a cryptographic hash function to positively identify software files, attackers can’t impersonate an entry on the whitelist. File name, file location, and file owner whitelist rules can all be easily circumvented.
With DriveLock’s Smart AppGuard, the work that goes into maintaining an application whitelist database is effectively cut to zero. Enjoy the security of application whitelisting without the headaches of whitelist database maintenance.
2017 was a Ransomware nightmare. If you've been in the IT trenches over the past year, you've probably noticed that ransomware attacks are accelerating, damages are more severe and there is no end in sight for 2018
Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide”. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and advise what to do when you are hit with ransomware.
Erich will cover these topics:
* What are new scary ransomware features in the wild?
* I’m infected, now what?
* Proven methods of protecting your organization
* Why the “human firewall” is so effective
Every cybersecurity organisation is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.
New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.
How does your Security Operations Center (SOC) keep up?
Join us to learn how to scale and extend the capabilities of your SOC.
We’ll review topics such as:
- Automated security event analysis
- Human security event analysis and prioritisation
- Threat visibility across key on-premise and cloud control points
- Consumption of technical and strategic threat intelligence
Auf der Wunschliste für tägliche Aufgaben steht Hunting bei Sicherheitsanalysten, SOC Mitarbeitern und Administratoren häufig ganz oben. Die fehlenden Möglichkeiten, Aufgaben sinnvoll und effizient zu priorisieren und dabei die Sicht aufs Ganze zu behalten sorgt aber oft dafür, dass dieser Wunsch selten erfüllt wird und stattdessen die tägliche Routine in der Analyse von false positive Alarmen und Alarmen mit geringer Kritikalität liegt.
FireEye Helix stellt eingehende Alarme in Kontext dar, bewertet diese und bietet Ihnen so die Möglichkeit, schnell zu priorisieren und bei den wenigen, entscheidenden Fällen in der gleichen Oberfläche mit dem Hunting zu beginnen.
Dieses Webinar gibt einen kurzen Überblick über die Möglichkeiten der FireEye Helix Plattform gefolgt von einer leicht verständlichen Hunting-Demonstration.
So bleiben Sie vor den neuesten Cyber-Bedrohungen geschützt
Erfahren Sie in unserem Cybersecurity-Jahresupdate für 2018, wie aktuelle Angriffe aussehen und wie Sie Ihr Unternehmen vor diesen neuen Bedrohungen schützen. Informieren Sie sich unter anderem, über
- Vorhersagen für die Bedrohungslandschaft 2018 mit besonderem Fokus auf Europa
- Wichtige Maßnahmen, die Sie ergreifen können, um Ihr Unternehmen zu schützen
- Top-Ressourcen zur Unterstützung Ihrer Sicherheitsanstrengungen
Digitising Customer Onboarding: How to improve the customer experience without compromising on compliance and risk
Today’s consumers, accustomed to receiving smart and convenient digital services from companies such as Uber, Apple and Amazon, and are beginning to demand personalised, interactive and immediate services from their banks.
A recent report revealed 42% of UK consumers have adopted FinTech services (EY 2017 FinTech Adoption Survey), so it’s no surprise banks want to adapt to the fast-moving digital marketplace where new and disruptive competitors are already circling. What’s stopping them though, is risk.
Creating an environment that drives the productivity, speed and compliance essential to sell financial services via digital channels is paramount to survival.
This webinar will explore how banks can digitise the customer onboarding process without compromising on risk, satisfying customers, regulators and shareholders alike.
SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps.
Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about:
•A real-world customer journey for complete data security in SaaS.
•Common threats leading to data leaks from popular SaaS apps.
•Benefits of adopting a platform approach to SaaS security.
There is plenty to consider when building your cloud strategy and for many organisations this journey has only just started. If you’re thinking of moving your IT workloads to a cloud environment, you should also consider security in the cloud. Public cloud providers have always operated under a shared-responsibility model, where the provider controls the foundational infrastructure and the customer controls everything above that. But during the past year, in particular, it has shifted to add services that root out security threats higher up the stack. Is this enough to cover the full breadth of things? Find out and join our webinar facilitated by Dan Pitman, Senior Solution Architect, who will dispense tangible insights and best security practices that will put any cloud security dilemma into perspective.
•Understanding your cloud provider’s security model and where you need to assume security responsibility
•Cloud providers introduce new security services and tools that provide more information, but why this isn’t enough?
•Best practice ideas for ensuring security in any cloud environment
This is part one of a three-part webinar series focussed on your security journey to the cloud. Stay tuned for part two coming soon.
The constant barrage of application connectivity and network security policy change requests, while fighting a relentless battle against cyber-attacks, means your security management efforts need to be focused on what matters most - ensuring that your business applications continue to run smoothly while remaining secure and compliant.
During this technical webinar, Asher Benbenisty, Director of Product Marketing at AlgoSec, will discuss how taking an application-centric approach to security policy management will improve both your security and operational efficiency.
In the webinar, you will learn how to:
•Gain insight into your company’s security policy management maturity level
•Understand your business applications’ network connectivity - including discovering and mapping the connectivity flows
•Identify security risks across your enterprise network and prioritize them based on business criticality
•Securely migrate business application connectivity and security devices to a new data center
We’ve got clearer rules around data protection and we’re spending more money than ever on preventing breaches,* so it’s logical to expect the number of reported incidents would at least plateau or, in an ideal world, decline.
However, we all know that isn’t what we’re experiencing. In fact, the most recent statistics published in The Breach Level Index show that there were as many records breached in the first six months of 2017 as there were in the whole of 2016.
Backing up the idea that buying information security tech alone won’t solve this issue, further analysis of the Breach Level Index shows that 86% of breached records were directly caused by accidental loss as a result of human error or employee negligence.
During this webinar the speakers will share strategies for understanding user behaviour and look at how technology can work effectively with staff to provide a combined approach to tackling the insider threat, covering:
•Analysis of the latest statistics to evaluate the threat your staff present to sensitive data
•The psychology behind the insider threat, how people behave when handling sensitive data and their responses to data breaches, using real human error data breach examples
•The level of reliance placed on pure technology to combat data breaches, compared with a blended approach focused on securing the user and their behaviour
•Steps that can be taken to embed data protection into organisational culture in a way that’s meaningful for both staff and the wider business
•Examine the insider threat from IT and Compliance’s viewpoint to discuss the real challenges you face
95% of companies have adopted cloud services but the 2018 Global Cloud Data Security Survey found there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. This is disturbing since only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using,
The reality is cloud creates challenges in knowing where your data resides and what or who has access to it. In 2018, breaches like Uber and Accenture occurred because of improperly configured security for web and cloud applications that were connected to a company’s network. A major catalyst to address this is upcoming regulations and compliance, which are trying to catch up with cloud adoption. Over the next few years, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.
During this webinar, Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jason Hart, CTO of Data Protection, will walk attendees through the research methodology, key findings and how things have changed over the past couple of years. Join us to learn more about:
-2018 Global Cloud Data Security Findings
-Compliance and cloud security: How will this work?
-A shift in the budget: Where is IT spending their money?
-Country breakdown of IT cloud security: Who is doing the best?
-What can you do to secure the cloud and comply with regulations?
Recent research, conducted by the Ponemon Institute, into cyber automation technologies revealed that cyber automation reduces the hours spent dealing with security exploits and as a result can save organizations an average of more than $2.3 million annually.
Over 1,500 IT security practitioners, globally, were surveyed. The research looked at how organizations are deploying cyber automation technologies such as artificial intelligence and machine learning; their cost-effectiveness and other benefits of automation.
Attend this webinar to find out more about:
- How your peers are deploying cyber automation technologies
- The benefits of adopting security tools with Automation
- Why automation is the answer
- Attendees to the webinar will get a copy of the full research report.
Incidents are fast-paced, dynamic events, forcing responders in to stressful and unfamiliar situations. Ineffective or delayed response to an incident can potentially lead to millions of dollars in lost revenue and damages. Even seasoned response teams require structure and leadership to respond effectively to an incident.
This webinar offers a deeper look into the Incident Management System (IMS) and explains how when combined with a properly designed and implemented incident response process, the IMS can help organizations achieve a more effective and efficient incident management process, translating directly to a decrease in financial loss and reputational damage from incidents.
- One of the core requirements of an IMS is that it must remain both flexible and scalable.
- The first and most crucial step in implementing an IMS is integrating it into current organization processes and procedures.
- Incorporating an IMS can elevate incident management to a level which is simply not possible with a more ad hoc system.
- Utilizing an IMS for every incident large and small alike, will ensure that stakeholders remain proficient and in control of the process.
Join us on this webinar as we try to answer the common questions surrounding how to increase the effectiveness of incident management, including the best set up of an Incident Management System, its structure and roles, when it should be used, as well as how an organization should go about implementation.
Microservices are a mainstay in the development of most modern applications as the shift to developing several small software components versus a single large application has been popular for a while. Yet even the best teams have trouble integrating security into their implementation. While many organizations see the benefits of the microservice architecture, questions continually arise on its impact on application security programs, especially with the rapid development that goes hand-in-hand with microservices.
Join Brian Pitta, Senior Solutions Architect at CA Veracode who will discuss:
•The need to keep up with the speed of DevSecOps and how to automate and integrate security testing with rapid feedback loops;
•How to run and measure an effective AppSec program at scale and maintain a holistic view of all your applications given the shift to a more “decentralized” application environment to which the microservice architecture lends;
•The importance of staying current with technology trends to equip an agile development team and continually enhance support for additional frameworks, languages and integration points
Bringing the benefits of Software-Defined WAN To LTE mobile networks for first responders, transit operators and other fleet-based organizations, Cradlepoint announced this week its all-inclusive solution services for mobile networking. This is the third major product announcement from Cradlepoint under its new NetCloud Solution Packages services model.
First responders, transit operators, utility crews, and insurance disaster teams - as well as many other organizations that depend on distributed field forces and fleets to deliver products, provide services, and get work done - need reliable and secure mobile networks with always-on 4G LTE connectivity including seamless communication through the new FirstNet emergency service. They need their people and passengers to access mission-critical applications and the Internet from anywhere, and to keep data flowing from onboard telemetry, sensors, surveillance cameras, and other devices. However, managing and securing these roving communications hubs has become a challenge for IT teams, since traditional mobile solutions fall short in providing the enterprise-class visibility, security, and control capabilities of fixed branch networks.
Join Cradlepoint's Todd Krautkremer, CMO, and Jake Smith, product manager for network security services, for a live webinar on Tuesday, Feb. 27, at 9am PT. They will discuss mobile networking challenges and opportunities and introduce a new NetCloud Solution Package for mobility that includes the COR IBR1700, NetCloud services - including NetCloud Manager and NetCloud Perimeter- and comprehensive 24x7 support.
Replacing multiple standalone "boxes" with an all-in-one mobile networking solution, the IBR1700 is designed for installations within a wide range of vehicles, including police, fire, ambulance, and other first responder vehicles; tractor-trailers; school and metro transit buses; light-rail and commuter trains; river and coastal ships; and mobile command trailers.
We are all concerned about Privacy. Every day there we hear about multiple PII breach announcements. Our current solution – lets create laws to require announcements and levy fines to encourage proper activities and protections. With GDPR looming on the horizon, as the most recent and perhaps the most comprehensive regulation yet, we find ourselves wondering if others will adopt similar regulations. If so, do we as security professionals need to be concerned about our ability to perform forensic analysis, and gather information outside of our realm of direct influence to identifier a hacker? Do elements of GDPR create a situation in which hunting for a hacker might violate their privacy rights? In the end will companies still be able to monitor and protect their assets as they do today, or will it require a change? This webinar will provide insight into the Privacy vs Security Debate.
Security Automation can significantly improve investigations, reduce tedious busy work, and strengthen defenses. However, it is not always clear where to start, and which use cases to apply automation to.
In this webinar, we will provide a primer and discuss best practices. Topics discussed will include:
- What is security automation and orchestration?
- Different automation models
- Examples of how automation has helped others
- Assessing your automation readiness
- Steps to get started - picking your first use cases
The discussion will be led by Kumar Saurabh, a 15 year veteran of Security Operations, and CEO & Co-founder of LogicHub.
Learn how you can simplify and strengthen your container security posture by combining deep kernel-level container visibility with metadata from your container orchestration tools to define your policies.
We'll cover how the security landscape is changing, the architecture of Sysdig Secure, we will show you live how to instrument your containerized environment and then do something you'll never see from any other security tool!
During the live demo will walk you through what Sysdig Secure can do:
-Implement application and service aware policies
-Block incoming attacks and container break-ins
-Audit executed commands
-Intrusion forensics: pre and post attack investigation
-Unify monitoring & security workflows
While many network security technologies by themselves promise complete security, the only real protection against advanced threats in today's risk-laden environment is a multi-layered defense comprised of
different network, end-point and gateway technologies.
Learn how each of these different technologies offers different layers of protection against threats, and why it’s not a prudent risk to go without any of them, especially the Secure Web Gateway.
The Secure Web Gateway adds the proxy-based layer of defense needed for web-borne threats, generally considered one of the two most likely mechanisms for threat transmission into organizations today
(the other being e-mail).