Hi [[ session.user.profile.firstName ]]

IT Security

  • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout Recorded: Dec 11 2018 58 mins
    The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

    With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

    Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

    • The current threat landscape and unique security challenges healthcare organizations face
    • Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
    • How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
  • Deception Technology: Fad or Fashion for 2019 and Beyond
    Deception Technology: Fad or Fashion for 2019 and Beyond
    Carolyn Crandall, Attivo Networks, Chief Deception Officer Recorded: Dec 10 2018 46 mins
    Deception technology adoption soared in 2017 and 2018. Was this simply a fad or is deception coming into fashion as the de facto in-network detection security control?

    Carolyn Crandall, Chief Deception Officer at Attivo Networks will explore how deception has evolved, how it is impacting dwell times and how adversary intelligence gathering is being used to change the asymmetry of an attack and for more confident and automated incident response.

    During this informative speaking session attendees will learn:

    - How to differentiate deception solutions
    - Why and where to deploy deception
    - What the key factors fueling adoption are
    - What’s deception for Active Defense
    - What’s in store next for deception technology
  • CEO Insights: 2019 Cybersecurity Predictions
    CEO Insights: 2019 Cybersecurity Predictions
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Recorded: Dec 10 2018 35 mins
    Cybercriminals continued on their rampage in 2018 stealing millions of records from Department of Homeland Security and successfully hacked into name brand companies like Adidas, Twitter, Cathay Pacific, and Ticketmaster. The pace is not expected to slow in 2019. With porous on-premises infrastructure, new cloud assets, and not enough people with cybersecurity skills to detect and respond to threats, 2019 should be a lively year.

    The cybersecurity experts at Arctic Wolf Networks (AWN), a leading Security Operation Center (SOC)-as-a-Service provider have seen all types of attacks that have attempted to sneak through many a company’s perimeter and endpoint defenses.

    In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf will walk through the top predictions for 2019, based on what our security services team has seen across more than 500 customers.

    Here is a preview of the top 3 predictions that is bound to surprise you.

    - The new approach cybercriminals will employ to get into target organizations
    - Which industries will be most attractive to 2019’s hackers
    - Whether new security technologies can live up to their expectations
    - And much more!

    To hear from this security expert and to learn what to look for in 2019, register now.
  • Secure By Design: Ensuring That Security Is Built In
    Secure By Design: Ensuring That Security Is Built In
    Chris Wysopal, Chief Technology Officer and Co-Founder at CA Veracode Recorded: Dec 10 2018 45 mins
    As software becomes a bigger component of the value delivered by companies in every industry, it is no exaggeration to say that every company is becoming a software company that is competing with software.

    Companies are pushing the envelope on how to tool up their internal software factory to make software better, faster and more efficiently. By necessity, developers more often assemble software than create it from scratch, as they are more frequently incorporating open source libraries to speed up time-to-market. However, as open source libraries increase, so do the number of vulnerabilities, resulting in increased risk.

    In this session, Chris Wysopal, Chief Technology Officer and Co-Founder at CA Veracode discusses what it means to build software secure by design. He will describe how to build a software development process that has continuous security, is measurable, and is transparent.
  • The 2019 Security Strategy from the former CSO of Facebook and Uber
    The 2019 Security Strategy from the former CSO of Facebook and Uber
    Joe Sullivan, Chief Security Officer of Cloudflare & Tim Fong, Head of Security Solutions Recorded: Dec 10 2018 42 mins
    How are you planning to secure your employees, your company, and your customers in 2019?

    Prior to joining Cloudflare as its Chief Security Officer (CSO) in 2018, Joe Sullivan spent 5+ years as CSO for Facebook and 2.5 years as CSO for Uber. He also previously held security and legal roles at PayPal and eBay and served on the Obama Administration as a member of the Commission on Enhancing National Cybersecurity.

    With over a decade of experience from some of the world’s most influential companies, Joe will share the core strategies he is taking to help protect Cloudflare and, as a result, its 12M domains who rely on its services for security and performance.


    Register now to learn:

    - Major security risks to prepare for in 2019
    - The three areas Cloudflare is using its own products to secure the company
    - The plan to improve internal discipline around “incident response”
    - The critical shift in thinking and strategy around the world becoming “borderless”
    - The “security maturity model” to evaluate and plan the security roadmap

    If you and your team are in the middle of planning how to maintain and improve your security posture for 2019, sign up to attend now. Registrants will also get a copy of the actual Security Maturity Model you can use with your own team.
  • Achieve NERC CIP Compliance with FireMon
    Achieve NERC CIP Compliance with FireMon
    Robert Rodriguez, Senior Sales Engineer | Brian Dixon, Sales Engineer | Elisa Lippincott, Director of Product Marketing Recorded: Dec 10 2018 12 mins
    Utilities need scalable solutions to help them adapt and comply with the constantly changing NERC CIP requirements. FireMon can partner with utilities to automate their security policy workflows, optimize their vulnerability management efforts, and get their networks under control with complete visibility, real-time monitoring and continuous compliance checks.
  • Trending Attacks from Inside the Cyber Forensics Lab
    Trending Attacks from Inside the Cyber Forensics Lab
    Ondrej Krehel, CEO/Founder CISSP, CEH, CEI, EnCE LIFARS LLC Recorded: Dec 10 2018 46 mins
    Current forensic evidence is indicating that Ransomware, Extortion, and Phishing Attacks are the top attack vectors penetrating companies today. Although not as wide-spread, intellectual property theft and disgruntled employees is causing significant loss for many organizations as well. Given the scarcity of talent and resources, learn tips and actionable insights from the forensic lab on what you can do to protect your organization from these most prevalent threats.
  • 2018 – The year in cyber crime
    2018 – The year in cyber crime
    Orla Cox, Director Security Response, Symantec Recorded: Dec 10 2018 49 mins
    Cyber criminals today are relentless, and they only need to be successful once. With each passing year, not only does the sheer volume of threats increase, but the threat landscape becomes more diverse.

    From the explosion of coinmining activity in 20181, to the 600% rise in targeted activity against IoT devices1, attackers are still working relentlessly to discover new avenues to infect networks and steal data, while also covering their tracks.

    Join Orla Cox, Director of Security Response at Symantec for this insight-packed webinar, including:

    • How targeted attacks are evolving to exploit new technologies like IoT.
    • The increasing diversity of cyber attacks, and the new method that hackers are using to infect networks and steal information
    • A roundup of the year’s most high-profile attacks, and a look at what to expect in the year to come
  • Trust No One Part 3 - User Authentication for a Zero Trust Security Model
    Trust No One Part 3 - User Authentication for a Zero Trust Security Model
    Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Josh Green, Richard Archdeacon, Duo Recorded: Dec 10 2018 59 mins
    During episode 1 in our Trust No One Series, we heard about the origins of Zero Trust. Episode 2 showed us how Banco Santander started their Zero Trust journey.

    In this Part 3, Duo will demonstrate how they deliver Zero Trust models to their customers.
    You’ll leave with a hands-on basic understanding of how to deploy Duo to a cloud-based web-application.

    Duo has been a pioneer in bringing Zero Trust models to the commercial market, allowing organisations to protect themselves quickly and easily.

    Josh Green, Solutions Engineer, Duo Security
    Richard Archdeacon, Advisory CISO, Duo Security
  • Invest in Your Staff in 2019, They Are Your Greatest Asset Against Cyber Attacks
    Invest in Your Staff in 2019, They Are Your Greatest Asset Against Cyber Attacks
    Daryl Flack, CIO & Co-Founder, BLOCKPHISH Recorded: Dec 10 2018 44 mins
    Analysis shows that human actions are overwhelmingly at the heart of many data breaches, and cyber attackers are actively seeking to exploit this to compromise target systems.

    If global organisations and nation states with their considerable resources and budgets are struggling to stem the flow of data breaches from this threat, what hope do ordinary businesses have of protecting themselves in 2019 and beyond?

    Join us for a comprehensive and insightful webinar from Daryl Flack, CIO and Co-Founder of BLOCKPHISH, who will use examples drawn from real attacks to reveal why, if you invest in your staff, you can be more confident in your ability to be resilient to cyber-attacks.
  • Mobile Threat Management: Addressing endpoint security’s biggest blind spot
    Mobile Threat Management: Addressing endpoint security’s biggest blind spot
    Phil Hochmuth, Program Director, Enterprise Mobility at IDC Recorded: Dec 10 2018 41 mins
    Lookout invited a special guest, Phil Hochmuth, Program Director, Enterprise Mobility at IDC to talk about the rising implications of employees accessing business data and apps with smartphones.

    On the agenda:

    - The latest research in enterprise mobility adoption

    - Security and the top challenges sourced by IDC

    - How mobile threat management fits into an enterprise endpoint security architecture
  • How to protect your organisation in a digital world: Panel discussion and launch
    How to protect your organisation in a digital world: Panel discussion and launch
    Carolyn Williams, Director of Corporate Relations Recorded: Dec 10 2018 59 mins
    11 a.m Carolyn Williams, Director of Corporate Relations,
    Institute of Risk Management
    Introduction to the new Certificate and support from the
    WMG Cyber Security Centre at the University of Warwick
    and the University’s Department of Politics and
    International Studies,

    11.10 Panel discussion into: What are senior
    risk managers detecting in their businesses/macro/micro
    environment that underlines the need for digital upskilling.

    Steve Treece, CFIRM,
    Head of Corporate Risk, Corporate Portfolio Office, NHS Digital

    Steve O'Neill,
    Credit Risk Skills & Risk Academy, Barclays

    Stefano Capodagli, IRM Technical Specialist, Strategic Advisor & Group CRO


    11.30 Trudi Mellon, Specialist Consultant – Qualifications
    Projects, Institute of Risk Management

    Syllabus development, key learning outcomes,
    partnership with Warwick University

    11.40 James McCarthy , Student Admissions, Engagement &
    Support Manager,
    Institute of Risk Management

    Questions, advice and guidance on the practicalities of enrolment, studying and exams

    11.50 Questions and answers
  • IT Service Transformation: How to Make Work Flow Across the Enterprise
    IT Service Transformation: How to Make Work Flow Across the Enterprise
    Mike Johnson, Ryan Mulvaney, Mike Bollman, Pulin Bhatt Recorded: Dec 10 2018 59 mins
    We want you to be a part of the 2018 IT service transformation virtual event!

    Join us for the live event to learn how IT teams are modernizing IT service management, automating key processes across their organizations, and breaking down silos that stand in the way of progress.

    Can’t make the webcast? Register anyway and we will send you the on-demand recording.
  • Part III: New Hands-On Cloud/Cyber Security Certification
    Part III: New Hands-On Cloud/Cyber Security Certification
    Dr. V. N. Berlin, CEO Mission Critical Institute Recorded: Dec 8 2018 33 mins
    New Hands-On Cloud Cyber Security Certification: Learn how to qualify and fast-track your cyber career in this 3 part series

    CCRMPs receive Free 50 hour CISSP Adaptive Exam Prep course.

    In this three part webinar series you will learn about the new Certified Cloud Risk Management Professional (CCRMP) certification—
    • How the CCRMP helps you fast-track your cloud security career
    • Employers who hire CCRMPs
    • Cybersecurity jobs CCRMPs are getting
    • How veterans have benefited
    • How to qualify for the CCRMP
    • Why the free CISSP Adaptive Exam Prep is offered to CCRMPs

    CCRMP Rationale
    Employers seek cloud risk management professionals who are job-ready to utilize the NIST Risk Management Framework (RMF) and FedRAMP– the de facto U.S. standards for cloud security risk management. FedRAMP employs the NIST RMF as the tool of choice and requires all Cloud Service Providers for the federal government to comply with FedRAMP, and thus the NIST RMF. Similarly, cloud risk management professionals seek a certification which validates they are job-ready to implement the NIST RMF and FedRAMP. To meet the needs of employers and candidates Mission Critical Institute (MCI) has launched the only performance-based NIST RMF certification, the Certified Cloud Risk Management Professional (CCRMP) to address:
    • Accelerating cybersecurity staffing shortages
    • Scarcity of “job-ready” NIST RMF/FedRAMP specialists
    • Need for performance-based certifications, as opposed to exam-based certifications

    Benefits of the CCRMP
    The benefits of earning the CCRMP include:
    • 100% hands-on—no exam
    • NIST RMF/FedRAMP virtual internship
    • Earn 15 graduate credits for your accredited cloud security MSIS or MBA
    • Validation you are NIST RMF/FedRAMP job-ready
    • Cyber career development support to help you find a top cyber job
    • NIST RMF/FedRAMP project experience employers seek
    • Recognition of curriculum by Department of Homeland Security
    • Pay increase potential even while earning your CCRMP
  • Who should setup access in the ERP (Financial Application)?
    Who should setup access in the ERP (Financial Application)?
    Donald E. Hester; Robert DeRoeck; Ron Puccinelli Recorded: Dec 7 2018 64 mins
    As an IT auditor for local governments, one of the most often asked I get during audits is who should setup user access in the financial application. There is a debate of whether it should be IT or finance staff that create accounts and setup access. As with any professional my answer is it depends. It depends upon other controls that might be in place. What I like to do with clients is walk them through the needs and risks to help them design and understand the process they come up with. Let’s walk thought the logic and see what might be the best answer for your organization. Plus, we will answer a question from a listener on hacking Instagram accounts.
  • RSA #3 - Transforming Secure Access to be Intelligent
    RSA #3 - Transforming Secure Access to be Intelligent
    Ayelet Biger-Levin, CISSP, Senior Consultant, Product Marketing, RSA Recorded: Dec 7 2018 54 mins
    When it comes to making access decisions, it’s all about being smart. In the speed of today’s business agility requirements, we cannot stop users at the door all the time and ask for their ID. We need to know them. Intelligent Authentication provides the benefit of reducing friction AND adding security to protect applications and data that are critical to the business. It provides security and convenience, considering the needs of the modern workforce. In this session we will discuss a simple process to gain visibility into the right listening posts, derive actionable insights and then drive action to protect the organization’s most valuable assets from rogue access and drive Identity Assurance.
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Recorded: Dec 7 2018 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • Customer Data Management: Strategische Herausforderungen und Lösungen
    Customer Data Management: Strategische Herausforderungen und Lösungen
    Dr. Heiko Klarl, CMO / iC Consult Group Recorded: Dec 7 2018 36 mins
    In diesem Webinar erfahren Sie mehr über die strategischen Herausforderungen, die mit der Einführung von Customer Data Management-Lösungen einhergehen, und wie diese angegangen werden können.
  • IoTに迫るセキュリティ脅威に備えるには~シマンテックが提供するIoTソリューション~
    IoTに迫るセキュリティ脅威に備えるには~シマンテックが提供するIoTソリューション~
    山内 正, テクニカルディレクター, 株式会社シマンテック Recorded: Dec 7 2018 52 mins
    適用範囲が広まるIoTは、サイバー攻撃者にとっては格好のターゲットとなり、すでに社会インフラ全体にサイバー攻撃の影響が及ぶ事態が生じています。セキュリティ対策担当者は、自組織がIoTによるサイバー攻撃を受けた場合の対策だけでなく、自組織が攻撃に加担してしまわないための対策も必要となっています。

    本ウェビナーでは、こうしたIoT環境におけるセキュリティ上のリスクを明らかにするとともに、こうしたリスク対処への考え方やシマンテックが提唱する具体的な対策例をご紹介いたします。

    今すぐ登録
  • Securing the Future of Work: Best Practices by Dropbox Business
    Securing the Future of Work: Best Practices by Dropbox Business
    Charles Thornton, Product Marketing Manager, Dropbox; Scott Sowers, Solutions Architect, Dropbox Recorded: Dec 6 2018 27 mins
    Dropbox Business is an easy-to-manage tool that delivers enterprise-grade security. See how our unmatched usability leads to best-in-class adoption and a tight control over your data. Learn how our exabyte-scale architecture provides ultimate sync collaboration capabilities, and discover how to integrate with the most partner apps.

    Join our live webcast and learn about:

    - Security through adoption: Dropbox has 500M users and 300K paid business customers
    - Collaboration: Best-in-class sync with user-centric design
    - Our strong platform: Unify your fragmented environment with a robust partner ecosystem
  • 7 Common IAM Mistakes
    7 Common IAM Mistakes
    Adrian Pinderhughes Recorded: Dec 6 2018 48 mins
    Identity and Access Management (IAM) is a key factor in managing security: it helps manage access to applications and systems, but falls short when applying that same solution to enterprise data. How can you address the shortfalls – and get the most out of your IAM?
  • SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    Dr. Jim Metzler and Joel Christner Recorded: Dec 6 2018 43 mins
    The WAN has been fundamentally upended by SD-WAN and IT decision makers now have to reconsider what the branch of today and tomorrow looks like. Do you choose a best-of-breed solution or do you settle on a solution that includes SD-WAN and other capabilities?

    Join our webinar to learn the pros and cons of each and which dimensions should power your decision.

    In this webinar, you will learn:

    * The similarities and differences between best-of-breed SD-WAN and all-in-one systems
    * Which challenges and complexities are either presented or remedied by each model
    * How best-of-breed SD-WAN and all-in-one systems affect long-term remote office architecture
    * And most importantly, which provides the most value in different circumstances

    SPEAKERS
    Dr. Jim Metzler is the Founder and Vice President at Ashton, Metzler & Associates. Dr. Metzler has worked in many positions in the networking industry. His current interests include Application Delivery, Software Defined Networking and Network Functions Virtualization.

    Joel Christner is the VP of Marketing at CloudGenix and has two decades of experience in building distributed systems, infrastructure, and application delivery.
  • Master the Art of Zero-Touch Deployments
    Master the Art of Zero-Touch Deployments
    Jim Grandbois, Solutions Architect, Jamf Recorded: Dec 6 2018 24 mins
    With imaging taking a back seat to the new era of zero-touch deployment, IT can now successfully deploy Mac, iPad and iPhone to users directly without ever having to open the box. Apple’s deployment programs enable zero-touch deployment by automating enrollment and configuration from a central location — eliminating the need to ever physically touch the device.

    In our webinar, Master the Art of Zero-Touch Deployments, we will demystify Apple’s deployment programs and walk through what it takes to implement these programs in your organization.

    We’ll cover:
    •An overview of Apple’s deployment programs
    •The benefits of zero-touch deployment
    •How to accomplish zero-touch deployment for macOS and iOS
  • Let's Talk About Security IT: Why 24x7 Monitoring is Critical
    Let's Talk About Security IT: Why 24x7 Monitoring is Critical
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Recorded: Dec 6 2018 52 mins
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • The Hacker You Don’t Know – Uncovering Active Cyberattacks
    The Hacker You Don’t Know – Uncovering Active Cyberattacks
    Ahmed Hussein, Systems Engineer and Eric Kampling, Systems Engineer Recorded: Dec 6 2018 26 mins
    If an active attacker were operating inside your network right now, could you see them? IT security professionals today are challenged with detecting active attackers in addition to stopping malware & risky behavior. Learn how to leverage the power of machine learning to stop active cyberattacks before it’s too late.
  • Advanced Application Defence Against Advanced Threats
    Advanced Application Defence Against Advanced Threats
    David Warburton - Senior Threat Research Evangelist, F5 Networks Dec 11 2018 9:00 am UTC 70 mins
    Web application attacks are the #1 source of data breaches. A Web Application Firewall (WAF) provides critical security controls to protect web apps. However, not all WAF solutions are the same. While many can help an organisation protect their apps from common and known threats, most are inadequate against the myriad of attacks across the evolving risk landscape.

    F5 is announcing Advanced WAF, a new category of app protection that introduces unique capabilities to the WAF market. In this webinar you will learn how Advanced WAF can:

    • Provide strong, adaptable security for every app, whether on-premises or in the cloud
    • Defend web and mobile apps against malicious bots and exploits
    • Prevent account takeover and stop large scale credential theft and abuse
    • Protect apps from layer 7 denial of service attacks

    By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • Trends in the Industry: Setting the Stage on Open Source Trends
    Trends in the Industry: Setting the Stage on Open Source Trends
    Mark Curphey, VP of Strategy, Veracode Dec 11 2018 10:30 am UTC 42 mins
    Open source is here to stay. Iconic brands like Google, Facebook, and Twitter have pioneered the practice of building their platforms on a core of code that is shared with the public and free for anyone to use. Rather than build applications from scratch, today’s developers first look to third-party code to kick start their innovation in the form of open source libraries. Unfortunately, reusable code also means reusable vulnerabilities, and the bad guys are increasingly turning to attacking open-source. In a recent study by Veracode, a whopping 88% of Java applications had at least one flaw in an open-source library, leaving application security managers faced with the challenging question: how can we keep innovating quickly without introducing vulnerabilities into our code base?

    The solution is multi-faceted – part education, part technology, part process change. Join us for our Virtual Summit, The Open Source Conundrum: Managing your Risk, as we dig into all the pieces of this solution.
  • Delivering Complete Endpoint Security with Symantec
    Delivering Complete Endpoint Security with Symantec
    Robert Arandjelovic, Product Marketing Director ; Gavin Fulton, Endpoint Security Expert Dec 11 2018 11:00 am UTC 62 mins
    Today’s threat landscape continues to evolve, with attackers using increasingly stealthy techniques that are difficult for traditional security controls to detect. New point solutions are emerging to stop one specific means of attack, but it’s impossible to deploy them all without incurring significant cost and complexity.

    Join us as we demonstrate how Symantec’s Complete Endpoint Security can enable you to deliver comprehensive endpoint security to your customers – featuring an array of state-of-the-art capabilities like the newly-introduced Deception as well as advanced detection and response – all within a single agent.
  • People Risk
    People Risk
    Grant Kennedy & Dr Aarti Anhal Dec 11 2018 11:00 am UTC 75 mins
    People are the single most important asset in any organisation, yet they can often be the most vulnerable. The opportunities and threats people present to the operations and strategic objectives of their organisations constitute “people risk” – an area of risk often ignored because of the perceived complexities involved in managing it effectively. This webinar will focus on “risk intelligence”, which refers to the way in which an individual’s values, risk competences and behaviours come together to drive their perception of risk, approach to risk-based thinking and decision-making. Th webinar will introduce the diagnostic tools that can be used by organisations to evaluate the “risk intelligence” of staff, whether in the operational 1st Line, the 2nd line’s risk and compliance functions or senior management.
  • Cyber Security & Data Centre Modernisation: Prevent, Identify, Resolve
    Cyber Security & Data Centre Modernisation: Prevent, Identify, Resolve
    David Woolger & Luke Jeffries Dec 11 2018 11:00 am UTC 60 mins
    So after building the business case for Data Centre Modernisation you've discovered moving away from traditional, inefficient IT can help you reduce costs & reinvest in the services that matter. But will adopting cloud help you improve your security?

    Join our webinar hosted by Director of Technology David Woolger & Principal Cloud Support Engineer Luke Jeffries as we guide you through how moving from away from Legacy IT impacts your cyber security

    You'll learn
    - What the biggest threats are to your organisation
    - What to consider when modernising your Data Centre
    - How UKCloud can help

    By clicking through this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • How to Ensure Your Applications are Secure by Design
    How to Ensure Your Applications are Secure by Design
    Chris Wysopal, Co-Founder and CTO, Veracode Dec 11 2018 11:30 am UTC 46 mins
    As software becomes a bigger component of the value delivered by companies in every industry, it’s no exaggeration to say that every company is becoming a software company.

    We find our customers pushing the envelope on how to tool up their internal software factory to make software better, faster and more efficiently. By necessity, software is more often assembled than it is created from scratch, as developers are more frequently incorporating open source libraries to speed up time-to-market. But as open source libraries increase, so do the number of vulnerabilities, resulting in increased risk.

    In this session, Veracode CTO Chris Wysopal talks about what it means to be secure by design, and why businesses need to focus on prevention. The days of detect-and-respond tactics are a thing of the past – we’re living in an age when the attacks will happen before you have the time to find and respond to them. Attendees will also learn about why an application security program is imperative to data protection, how to mitigate open source risk and ensure secure coding practices are in place to prove that security is a top priority for your organisation.
  • Dissecting XSS Flaw In Commercial Code: Why Open Source Isn't Your Only Concern
    Dissecting XSS Flaw In Commercial Code: Why Open Source Isn't Your Only Concern
    Matt Runkle, Application Security Consultant, Veracode Dec 11 2018 12:30 pm UTC 49 mins
    It’s no secret that open source security is a hotly debated topic. However it’s important to keep in mind that commercially licensed third-party software carries much of the same risk as open source software. While helping a customer attain a Verified certification, one of Veracode’s application security consultants uncovered a cross-site scripting flaw in the popular Telerik Reporting project. The flaw has since been patched but it’s these types of unknown risks that organizations take when introducing third party code into their environment.

    During this talk, you’ll hear from Matt Runkle, the AppSec Consultant who uncovered the XSS flaw, to get insight into the mind of a hacker and hear how vulnerabilities like XSS are commonly exploited in third party software and how you can take action to prevent attacks like this in your own environment.
  • Emerging Cyber Threats for 2019
    Emerging Cyber Threats for 2019
    Steve Durbin, Managing Director, ISF LTD Dec 11 2018 1:00 pm UTC 45 mins
    Organisations in 2019 will be increasingly faced with a hyper-connected world where the pace and scale of change – particularly in terms of technology – will accelerate substantially. Business leaders need to develop cutting-edge ways to deal with new regulation, advanced technology and distorted information.

    In this webinar, Steve Durbin, Managing Director, ISF will discuss the threats organisations will be facing in 2019 and how business leaders and their security teams can address them. The emerging cyber threats to lookout for include:

    -The increased sophistication of cybercrime and ransomware
    -The impact of legislation
    -The myth of supply chain assurance
    -Smart devices challenge data integrity

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Can you protect against what you can’t see?
    Can you protect against what you can’t see?
    Richard Leadbetter, EMEA Security Technical Sales Specialist Dec 11 2018 2:00 pm UTC 14 mins
    This webinar discusses how multiple levels of visibility are essential to the digital transformation process.
  • A View from the IT Practitioner: End User Predictions for 2019
    A View from the IT Practitioner: End User Predictions for 2019
    Michael Flouton - VP Security Strategy, Barracuda; Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd Dec 11 2018 3:00 pm UTC 60 mins
    2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.

    We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.

    Join this webinar with Barracuda’s, VP Security Strategy, Michael Flouton and Erebus Technology's Jez Back, Founder & Principal, to find out:

    - What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
    - How their priorities have changed over the last 15 years and where they will focus for the next 15 years
    - Which cyber security trends have impacted their cyber security strategy
    - How to prepare your organisation for these new trends

    Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.
  • Extending Network Security Visibility and Control into AWS
    Extending Network Security Visibility and Control into AWS
    Avishai Wool, CTO (AlgoSec) & Scott Ward, Principal Solutions Architect (Amazon Web Services) Dec 11 2018 4:00 pm UTC 60 mins
    Enterprises are taking advantage of the vast capabilities Cloud Computing offers, rapidly migrating data and applications to Public Cloud, such as Amazon Web Services (AWS). However, great new capabilities also expose organizations to new security risks.

    In order to maintain an effective security posture while deploying applications across complex and hybrid network environments, security professionals need holistic visibility and control from a single source.

    In this special panel discussion, Prof. Avishai Wool (AlgoSec CTO) and Scott Ward (AWS Principle Solutions Architect) will cover best practices for maintaining corporate security governance as enterprises extend business applications into the cloud.

    Join us to learn how to:

    • Extend full visibility from the on-premise network into AWS with a single pane of glass view
    • Proactively uncover gaps in security and compliance
    • Quickly apply on-premise network security policy to AWS
    • Automatically optimize security policy change management across the complex network
  • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout Dec 11 2018 4:00 pm UTC 60 mins
    The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

    With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

    Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

    •The current threat landscape and unique security challenges healthcare organizations face
    •Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
    •How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
  • The Rise of Targeted Ransomware
    The Rise of Targeted Ransomware
    Michelle Drolet, CEO, Towerwall Inc. Dec 11 2018 4:00 pm UTC 45 mins
    What is targeted ransomware?
    Are you susceptible?
    What can you do to defend against it?
  • Sunset of Windows Server 2008: Migrate with Docker Enterprise
    Sunset of Windows Server 2008: Migrate with Docker Enterprise
    David Hamdani Dec 11 2018 5:00 pm UTC 33 mins
    The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.

    Attend this webinar to learn how Docker can help you meet migration deadlines by providing a validated methodology for containerizing legacy Windows applications, quickly. The combination of the Docker Enterprise container platform and purpose-built tools, allow you to upgrade and improve application security and reliability; all while cutting costs by up to 50%.
  • The 8 Biggest Mistakes IT Practitioners Make and How to Avoid Them
    The 8 Biggest Mistakes IT Practitioners Make and How to Avoid Them
    Kara Gillis Dec 11 2018 5:00 pm UTC 34 mins
    You’ve heard about the top trends in IT - but how do you use this information to take meaningful action? How do you encourage collaboration between the business, developers, and operations? How do you up-level IT as a service provider that reduces manual processes and troubleshooting without context to focus on strategic initiatives that impact important KPIs? By avoiding these 8 mistakes IT practitioners makes!

    In this webinar, we’ll talk through avoiding:

    -Friction between IT and the business
    -Cumbersome and difficult root cause analysis
    -Not preparing for Incident response
    -And many others!

    You’ll walk away with an understanding of how to apply lessons learned to your own organization and operate maximum scale, and maybe how Splunk can help!
  • Around the World with Privacy and Your Business
    Around the World with Privacy and Your Business
    Victoria McIntosh, Information and Privacy Professional, MLIS,CIPT, Information in Bloom Management Services Dec 11 2018 6:00 pm UTC 60 mins
    Planning on doing business overseas? Establishing a new office in a foreign land, or selling online to consumers in a new country? When going over company requirements for working in your new neighbourhood, don’t forget to review corporate privacy practices.

    When it comes to privacy, expectations, safeguard minimums and rights of the data subject can vary between jurisdictions. From Canada and the United States, the European Union with its new GDPR, Japan, Australia, even between China and Hong Kong, there’s no single set of global standards. Fortunately however, many privacy legislations do contain common ground. There are also ways to proactively account for the differences.

    Information and Privacy Professional Victoria McIntosh presents a taste of privacy across the globe, with some of the ways businesses can prepare in dealing with data across borders.
  • Threat Detection in TLS: The Good, the Bad, and the Ugly
    Threat Detection in TLS: The Good, the Bad, and the Ugly
    Ian Farquhar, Distinguished Sales Engineer, Gigamon Dec 11 2018 6:00 pm UTC 59 mins
    While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to encrypted attacks, hidden command and control threats and data exfiltration exploits that go undetected.

    To make this situation even more complex, the TLS 1.3 draft 28 proposal, ratified at the IETF 101 conference in London and now moving toward official RFC status, has actually removed the visibility which was widely deployed for threat identification in TLS 1.2.

    Once again, InfoSec teams find themselves at the fulcrum of a delicate balancing act. On one hand, encryption is moving toward ubiquity but on the other, we need to detect when threat actors use it too. And in detecting that misuse, we need to acknowledge and address critical management, troubleshooting, legal, regulatory, ethical and technical concerns. For example, we can’t decrypt just at the edge of our networks if we believe “perimeter security is dead.” Proxies on the network edge are a step backwards.

    What can you do? “Threat Detection in TLS: The Good, the Bad and the Ugly” will discuss the necessity of deploying TLS decryption in the core of networks and will explore innovative architectures that deliver that capability while maintaining availability and reliability.

    Learn how organizations can manage growing SSL/TLS traffic volumes by creating a centralized “decryption zone” to decrypt traffic once and give security tools newfound visibility into formerly encrypted traffic and threats.
  • Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Kevin Haley, Director Security Response, Symantec Dec 11 2018 6:00 pm UTC 60 mins
    Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.

    Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.

    Key Learning Objectives:

    • Insights on cryptojacking, fileless threats and ransomware
    • Capabilities you need to protect yourself from these threats
    • Best practices for more efficient and effective endpoint security

    Please Join Us, Register Today
  • Enterprise Archive with Proofpoint - See How it Works
    Enterprise Archive with Proofpoint - See How it Works
    Tom Mahoney - Senior Archive Specialist, Terry McMahon Sr Systems Engineer Dec 11 2018 6:00 pm UTC 60 mins
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • How smart companies use voice and bots to get and keep more customers
    How smart companies use voice and bots to get and keep more customers
    Bharath Kadaba, Chief Innovation Officer, Intuit Dec 11 2018 6:00 pm UTC 60 mins
    The landscape of voice and chatbot-to-customer interactions is blowing up. Whether it’s a trusted AI assistant like Alexa or Google Home, or an integrated voice or chatbot tool within a brand interface like Kayak’s customer service experience, customers are increasingly willing to engage with brands via voice chat.

    AI assistants are getting smarter, and becoming capable of helping consumers sort through the avalanche of choices available in every decision, from buying phone plans to toothbrushes. And your marketing efforts will have to shift priorities in a major way to capture the attention of these newly connected customers as assistants get smarter and customers learn they can rely on their results.

    To hear about actual voice chat use cases, the differences between integrated bots and AI assistants, and how to leverage voice and bots for amaze-and-delight experiences right now, don’t miss this VB Live event!

    Register here for free.

    Attend this webinar and learn:
    * How bots and voice are uniquely positioned to help customers make purchasing decisions
    * How brands can address the advantages of integrated bots and an AI trusted assistant like Alexa
    * The best ways to leverage voice and bots to optimize the customer experience
    * What's next for voice and bots

    Speakers:

    * Bharath Kadaba, Chief Innovation Officer, Intuit
    * Ryan Lester, Director, Customer Engagement Technologies, LogMein
    * Matthias Keller, Chief Scientist & SVP Technology, Kayak
    * Russ Tar, VP EMEA, Artificial Solutions
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Bold360 by LogMeIn