Hi [[ session.user.profile.firstName ]]

IT Security

  • [SPANISH WEBINAR] La entrega de aplicaciones acaba de volverse más eficiente
    [SPANISH WEBINAR] La entrega de aplicaciones acaba de volverse más eficiente Yovani Piamba, Manager, Systems Engineering - NOLA, at A10 Networks Live 60 mins
    Adoptar una estrategia híbrida y en múltiples nubes para la entrega de su aplicación también puede llevar a perder la percepción del rendimiento de su aplicación. Compartiremos y demostraremos las últimas funciones de análisis centradas en la aplicación en Harmony Controller 4.1. Nuestro controlador más nuevo ayuda a las organizaciones a obtener información útil sobre el rendimiento de las aplicaciones, la experiencia del usuario final y los problemas de seguridad, y permite una resolución de problemas más rápida y fácil.

    El controlador Harmony de múltiples nubes brinda inteligencia conectada a través de múltiples servicios de aplicaciones seguras A10: ADC / balanceo de carga, inspección SSL, Gi-Firewall y NAT de grado de operador.

    Al unirse al seminario web, aprenderá cómo:
    * Simplificar y agilizar sus operaciones de TI
    * Asegurar la disponibilidad de la aplicación
    * Desglosar fácilmente a datos contextuales y rápidamente identificar las áreas problemáticas
    * Acceder a aplicaciones centralizadas, redes y análisis de seguridad desde un único panel de cristal
    * Habilitar el análisis de autoservicio para varios propietarios de aplicaciones
  • Targeted Search on Live Remote Systems with AD Enterprise
    Targeted Search on Live Remote Systems with AD Enterprise Steve Sunday, Senior Sales Engineer, AccessData Recorded: Sep 21 2018 30 mins
    AD Enterprise 6.5 introduced new, enhanced targeted search capabilities on live remote systems. Come join us for a short introduction to the new ability. Use it to search and preview data including keywords, hash values, email, security events, etc. These capabilities can be used for any event from post-breach analysis and threat hunting, to searching for unauthorized data and file content.
  • Solving Mobile Security: Peer-tested Strategies That Work
    Solving Mobile Security: Peer-tested Strategies That Work Brian Duckering,Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC Recorded: Sep 21 2018 61 mins
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?

    - What is your advice to your peers who are starting their mobile security journey?

    - What are the most important requirements of a mobile security solution?

    By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • Dans la foulée de Wannacry - nouvelles techniques & méthodes des cyber criminels
    Dans la foulée de Wannacry - nouvelles techniques & méthodes des cyber criminels Hervé Doreau, Directeur Technique, Symantec France Recorded: Sep 21 2018 37 mins
    Les cyber criminels continuent d'utiliser des méthodes éprouvées, en 'identifiant de nouveaux vecteurs d'infection pour augmenter le taux de réussite de leurs attaques ciblées. Dans la continuité de WannaCry, l'utilsation de vers connait un regain au sein des réseaux d'entreprise. Les vulnérabilités au niveau du poste de travail devenant néanmoins moins courantes, les attaquants doivent trouver de nouveaux vecteurs et plateformes d'infection : l'IoT est une option de plus en plus intéressante pour eux.

    Lors de ce webcast, vous en saurez plus sur :

    • la diversification des méthodes d'attaque vs leur profitabilité
    • les nouveaux modes de propagation, véritables casse-têtes pour les entreprises
    • les menaces IoT next-gen
    • les récentes campagnes d'attaques ciblées
  • How to Give Your Patient Experience Scores a Boost
    How to Give Your Patient Experience Scores a Boost Adam Mahmud, Healthcare Manager, Jamf; Nick Thompson, Jamf Recorded: Sep 20 2018 38 mins
    Improving the patient experience is a critical priority in today’s healthcare landscape. But how can you engage patients in new ways and positively impact HCAHPS scores at the same time? One option is to invest in a mobile technology initiative that delivers faster, more personalized care to patients, while also improving care team communication and clinical workflow efficiency.

    In our webinar, How to Give Your Patient Experience Scores a Boost, we will discuss mobility trends in healthcare, explain security and automation implications to consider, and provide a methodology to ensure a successful technology deployment that positively impacts patients and clinical staff.

    You’ll learn how:

    - iPad and Apple TV can be deployed to patient rooms to empower patients in new ways
    - iPhone and iPad can be used to streamline the delivery of care
    - Healthcare specific solutions can automate IT processes
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
    Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Dinah Davis, VP Research & Development - Arctic Wolf Networks Recorded: Sep 20 2018 38 mins
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
  • Data Breaches under GDPR - What you need to know
    Data Breaches under GDPR - What you need to know Marc French, Chief Trust Officer and Data Protection Officer, Mimecast Recorded: Sep 20 2018 22 mins
    Whether you're just starting your compliance journey or feel your house is in order, there's still much to learn and understand about GDPR.

    In this video interview, Mimecast Chief Trust Officer and Data Protection Officer (DPO) Marc French explores issues related to data privacy and breach compliance and how requirements under GDPR impact processes and procedures for organizations across the globe.

    Topics explored include:

    * How aspects of GDPR including data breach notifications and the right to be forgotten actually work

    * The role of the Data Protection Officer under GDPR and their responsibilities

    * What your vendors can do to ease pressures related to organizational GDPR compliance
  • Legacy IT Evolves: How Cloud Choices like Microsoft Azure Can Conquer the VMware
    Legacy IT Evolves: How Cloud Choices like Microsoft Azure Can Conquer the VMware David Linthicum, C.C.S.O. ,Deloitte - Tim Crawford, CIO, AVOA - David Grimes, V.P. of Engineering, Navisite Recorded: Sep 20 2018 58 mins
    Can organizations gain a future-proof path to hybrid computing that simplifies architecture and makes the most total economic sense?

    Watch this webcast panel discussion which addresses these pressing issues with guests David Linthicum, Chief Cloud Strategy Officer at Deloitte Consulting; Tim Crawford, CIO Strategic Advisor at AVOA; and David Grimes, Vice President of Engineering at Navisite, moderated by Dana Gardner, Principal Analyst at Interarbor Solutions.

    The panel explored the likely evolution of IT platforms from a VMware legacy, and reviewed how cloud providers like Microsoft Azure are addressing hybrid cloud models. The discussion provided a great primer to help IT leaders define the right tradeoffs and best rationale for making the strategic decisions key to your organization’s digital transformation.

    Focused on hybrid cloud technology, managed cloud services, VMware, and Microsoft Azure, experts shared:
    •Major issues organizations must grapple with as they face a crossroads on their infrastructure's future
    •Best metrics for success, defining the right factors for major decisions, and how to execute well
    •Best options for leading adopters as they invest in life after VMware ESX
    •Key benefits of moving to Azure versus AWS and other public cloud providers

    Sign up today to hear a great discussion and learn best practices from industry experts.
  • Ace the Audit with Total Compliance
    Ace the Audit with Total Compliance Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Sep 20 2018 24 mins
    Total Compliance is the newest CloudCheckr module, and it’s free for all of our Security customers. It has three main functions. First, it automatically and continuously monitors your infrastructure for compliance with 35 different standards, such as HIPAA, PCI DSS, CIS, NIST, SOC2 and more. Second, if a problem is found, our software can often fix the issue for you upon your command, or automatically, thanks to Self-Healing Automation. Third, it provides a detailed log for third-party auditors with historical details and remediation notes.

    Attendees will learn the in’s and out’s of this new, valuable feature, with the added advantage of asking questions along the way. Join our experts and find out how Total Compliance can advance your organization.

    Attendees will learn:
    - Best Practice Checks
    - *New* Total Compliance module
    - Automated “Fix Now” capabilities that can save time and effort
    - Leverage Change Monitoring and Logs to Ace the Audit!
  • Into a Dark Realm: The Evolution of Ransomware
    Into a Dark Realm: The Evolution of Ransomware Darrel Rendell, Principal Intelligence Analyst, Aaron Riley, Intelligence Analyst, at Cofense Recorded: Sep 20 2018 43 mins
    While ransomware might not be dominating the headlines, it is still a persistent threat that continues to evolve. Weaponized emails still make it past the gateway and ransomware infections happen. Today, variants of ransomware offer “customer support” offered by the cybercriminal for communication and negotiation with the victim. Ransom amounts can vary depending on the perceived wealth of the victim. Ransomware operators also offer flexible payment methods using forms of payment other than Bitcoin and even structured payment/decryption plans. As ransomware evolves, so must your response to these threats.

    This session will help you understand:

    - The impact of what happens if your users are not trained on email scrutiny
    - The multiple effects it can have on your enterprise
    - Techniques to mitigate incidents and bolster your network’s protection against future attacks
  • A Zero Trust Approach to Decoupling Intent from Implementation
    A Zero Trust Approach to Decoupling Intent from Implementation Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon Recorded: Sep 20 2018 60 mins
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.
  • GDPR Compliance for Contact Centers: Using PCI DSS as a Proven Framework
    GDPR Compliance for Contact Centers: Using PCI DSS as a Proven Framework Jay Trinckes, Principal Security Consultant for Risk Management & Governance, NCC; Aaron Lumnah, Semafone Recorded: Sep 20 2018 47 mins
    On May 25, 2018, the European Union's General Data Protection Regulation (GDPR) went into effect, becoming the world's strictest and most comprehensive data protection legislation. Companies around the world, regardless of whether they are physically located within EU borders, had to meet compliance requirements if they process the data of EU citizens, creating a huge headache for any organization running a call or contact center.

    For contact centers that have troves of sensitive customer information, GDPR compliance can easily become a massive undertaking. However, using preexisting tried-and-true frameworks like the PCI DSS, companies can relieve the burden of meeting compliance obligations.

    Join Semafone and NCC for this informative session, where you'll learn:
    - How to achieve GDPR compliance in your call or contact center
    - How to use existing data security frameworks like the PCI DSS to simplify compliance efforts
    - How to improve data security inside your contact center while enabling a more seamless customer experience

    Additionally, registrants will receive a free copy of Semafone's GDPR Guide for Contact Centers.

    Reserve your space now!

    About Jay Trinckes:

    John ‘Jay’ Trinckes, Jr., CISSP, CISM, CRISC, HITRUST CSF Practitioner leads NCC Group’s healthcare practice by assisting clients in managing their IT risk to ensure they are not subject to cyber-attack along with helping them validate their compliance with IT regulations such as HIPAA. Jay is the author of three books, “How Healthcare Data Privacy Is Almost Dead…and What Can Be Done to Revive It! (2017), "The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules" (2012), and "The Executive MBA in Information Security" (2009), and has a wide range of experience in computer networks, vulnerability and penetration testing, security, compliance, and risk assessment.
  • Enterprise-Wide Kubernetes - Episode 1
    Enterprise-Wide Kubernetes - Episode 1 Paulo Renato, Principal Cloud Architect at Microsoft and Jim Bugwadia , CEO at Nirmata Recorded: Sep 20 2018 49 mins
    In this our first episode of the Enterprise-wide Kubernetes series, we will introduce what an enterprise-wide Kubernetes stack consists of, and will look at the compute, networking, and storage infrastructure requirements. Our featured guest will be Paulo Renato, a Principal Cloud Architect with the Microsoft Azure team. Some of the questions we will cover are:

    1. What are the enterprise options for selecting Kubernetes distributions?
    2. When should an enterprise choose a managed Kubernetes service?
    3. How should enterprises evaluate managed Kubernetes services from the top cloud providers?
    4. What else matters for Kubernetes infrastructure?
  • Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7
    Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7 NNT Recorded: Sep 20 2018 4 mins
    For the first time ever, ServiceNow customers are able to reconcile changes that occur with the IT environment with the actual changes approved in ServiceNow.

    NNT has integrated its award-winning Change Tracker Gen7™ with ServiceNow's service management tool to enable a closed-loop environment for change management. This integration provides zero tolerance to changes –leaving no place to hide for unwanted changes or breach activity. To further help reduce change noise, NNT Change Tracker leverages the worlds largest whitelisting service to automatically analyze changes in real-time using NNT's File Assured Safe Technology (FAST).

    See how NNT Change Tracker Gen 7 ™ delivers "closed loop" SecureOps, reconciling all actual changes made with ServiceNow® change requests.
  • DDoS Attack and Bot Protection: Defending your Applications
    DDoS Attack and Bot Protection: Defending your Applications Chad Lavoie, Senior Support Engineer Recorded: Sep 20 2018 52 mins
    We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise Edition is able to perform the real time behavioral analysis that mitigating today’s threats demands. Rather than being caught off guard, join this webinar to see how you can use HAProxy Enterprise Edition to create an effective, high performance threat protection solution.

    In this webinar we will present how to:

    •Protect against application-based DDoS attacks such as HTTP request flooding
    •Protect against bot threats such as web scraping, brute forcing, and vulnerability scanning
    •Implement an advanced threat response policy with Antibot and Google reCAPTCHA
    •Implement cluster wide threat protection with a Stick Table Aggregator
    •Enhance bot threat protection with WAF and Fingerprint modules
    •Dynamically maintain cluster wide whitelists and blacklists
    •Monitor threat protection status
  • OpenDemo: Network Automation with Ansible
    OpenDemo: Network Automation with Ansible Eric McLeroy, Senior Solution Architect, Red Hat Recorded: Sep 20 2018 56 mins
    Ansible's simple automation framework means that previously isolated network administrators can finally speak the same language of automation as the rest of the IT organization, extending the capabilities of Ansible to include native support for both legacy and open network infrastructure devices. Network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
    The original airdate of this demo was Sept. 18.
  • Is Security the Achilles' Heel of IoT?
    Is Security the Achilles' Heel of IoT? Prith Banerjee, Sr. Client Partner, Korn Ferry; Willy Leichter, Virsec Recorded: Sep 20 2018 45 mins
    New Security Strategies to Keep Up with IT/OT Convergence

    With the explosion of IoT and increased convergence between IT systems and industrial Operational Technology (OT), is security an afterthought? While the potential of IoT seems limitless, inadequate security could significantly dampen growth and put much of our industrial infrastructure at risk.

    Join us for an interactive discussion with renowned security and IoT expert Prith Banerjee, Senior Client Partner at Korn Ferry and former EVP and CTO at Schneider Electric.
  • Tools for Email Fraud Defense | Live demo
    Tools for Email Fraud Defense | Live demo Alex Fryback, Product Manager @ Proofpoint Recorded: Sep 20 2018 47 mins
    Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • Securing AWS Fargate from Build to Runtime
    Securing AWS Fargate from Build to Runtime Kevin Lewis, Principal Solution Architect, Twistlock Recorded: Sep 20 2018 24 mins
    Since the announcement of AWS Fargate at AWS re:Invent 2018, enterprises have been working with their development and devops teams to explore how this new technology aligns with their application modernization strategy. With this new CaaS platform comes new operational concerns and security threats.

    Join Principal Solution Architect Kevin Lewis to learn more about:
    • How enterprises are beginning to leverage AWS Fargate
    • Potential risk and security concerns from this emerging paradigm
    • Different security approaches and how Twistlock looks to provide runtime protection for applications using Fargate
  • Top Priorities as New Cyber Threats Plague Healthcare
    Top Priorities as New Cyber Threats Plague Healthcare Anthony Giandomenico, Sr. Security Strategist & Researcher, FortiGuard Labs Recorded: Sep 20 2018 48 mins
    Join our FortiGuard Labs expert to learn more about the unique vulnerabilities in the healthcare sector that make it a desired target for hackers, plus some of the surprising reasons of why attacks have skyrocketed in healthcare more than any other vertical.
  • Cloud–delivered Security: Why It’s Your Best Bet
    Cloud–delivered Security: Why It’s Your Best Bet Greg Mayfield of Tenable Recorded: Sep 20 2018 48 mins
    On-prem vs Cloud-based security? It’s an ongoing debate that SecOps teams face daily.

    With cloud adoption continuing to be a top business initiative, SecOps teams must adapt or risk falling behind. As most on-prem security tools don’t work in the cloud and suffer limitations, SecOps teams are faced with a myriad of new technologies and tools to implement to protect their critical assets. This can be overwhelming as numerous options abound.

    As the attack surface evolves and expands in the cloud, understanding the current state of assets and assessing their risk is an essential first step. Achieving continuous visibility and protection is then the following challenge. This webinar will discuss the opportunities and benefits that SecOps teams face by utilizing cloud-delivered security solutions vs. traditional on-prem solutions.
  • Keys of Success to Full Lifecycle API Management
    Keys of Success to Full Lifecycle API Management Chirag, Sr. Director, Product Management at MuleSoft and Sanjna Verma, Manager, Product Marketing at MuleSoft Recorded: Sep 20 2018 52 mins
    One emerging API best practice involves treating APIs like products. Similar to products, APIs should be designed with a specific purpose and teams should also deliver APIs using a Software Development Lifecycle (SDLC) framework. Join us for this webinar to get a walkthrough of Anypoint Platform's capabilities, and learn how the platform addresses the full API lifecycle––from design and implementation to security and governance of APIs.
  • CIO Insights: Bridging Security Gaps with a Risk-based Approach
    CIO Insights: Bridging Security Gaps with a Risk-based Approach Julie Cullivan, CIO & Sr. VP Business Ops, ForeScout; Nir Gertner, Chief Security Strategist, CyberArk Recorded: Sep 20 2018 49 mins
    Embedding security into business processes and employee awareness, particularly outside of information security teams, can be especially challenging. Yet security operations is vital to protecting the health, safety and intellectual property of any organization and therefore cannot operate in a silo. Learn how to apply a risk-based approach that leverages continuous visibility of devices and privileged accounts on heterogenous networks to enhance organizational trust and business success.

    Speakers:
    Julie Cullivan, Chief Information Officer and Senior Vice President, Business Operations, ForeScout
    Nir Gertner, Chief Security Strategist, CyberArk
  • Live Webinar: Enabling complete privacy protection from legacy to modern IT
    Live Webinar: Enabling complete privacy protection from legacy to modern IT Simon Wilkinson, Anna Russell, Daniel Clift, Brendan Rizzo Recorded: Sep 20 2018 27 mins
    During this session, we’ll introduce you to modern-day data security challenges.

    You’ll learn how Micro Focus Voltage can help you to overcome these challenges, while also improving operational efficiency, compliance, and revenue generation.

    We’ll also share real-world examples of how Voltage has enabled the world’s leading organisations to:

    •Scale big data security, by protecting big data streaming into and beyond the data lake, allowing secure analytics to be enabled on protected data at massive scale

    •Reduce high cost of compliance for data protection regulations, by protecting card data immediately after capture and minimising PCI audit scope

    •Secure workloads to the cloud, by seamlessly protecting data consistently across hybrid IT infrastructure, accelerating new business models

    This live webinar will be presented by:

    - Simon Wilkinson, EMEA Cyber & Security Strategist, Micro Focus
    - Anna Russell, Head of Data Security Consulting, Micro Focus
    - Daniel Clift, Senior Sales Engineer, Micro Focus
    - Brendan Rizzo, Senior Sales Engineer, Micro Focus
  • [SPANISH] Cómo proteger y consolidar su negocio cibernético de los ataques DDoS?
    [SPANISH] Cómo proteger y consolidar su negocio cibernético de los ataques DDoS? Bruno Carvalho, Arquitecto de soluciones, EMEA Recorded: Sep 20 2018 56 mins
    Dado que los ataques dirigidos a las aplicaciones web son cada vez más frecuentes, es más importante que nunca que las organizaciones comprendan cómo protegerse contra los atacantes que apuntan a todos los niveles de la infraestructura. Los malintencionados están utilizando tecnologías, herramientas y conocimiento para explorar dónde eres más susceptible al ataque. Aunque eres susceptible de atacar, no tienes que ser vulnerable.
    Si usted es como la mayoría de las organizaciones, ya tiene una solución DDoS implementada, pero eso podría no ser lo suficientemente bueno. Cada vez más, los expertos recomiendan alejarse de los puntos únicos de falla, duplícalos o a veces triplicar, las soluciones de mitigación DDoS.
    Al adoptar una estrategia de mitigación DDoS híbrida (capacidad local y nube), las organizaciones tienen la mejor ruta hacia la resiliencia y eficiencia operativa en el evento de un ataque DDoS.

    Consideraciones adicionales
    • ¿Cómo estás definiendo la mitigación?
    • Si está utilizando una compañía de mitigación DDoS, ¿cuál es el mejor momento de mitigar?
    • ¿Tiene solución de nube como opción de failover?
    • ¿Estás haciendo todo lo que puedes para proteger a tu organización contra el próximo ataque?
    • NSFOCUS Holistic Hybrid Security
    • NSFOCUS Threat Intelligence

    Reserve su asiento hoy mismo para comprender cómo proteger y consolidar su negocio cibernético frente a los ataques DDoS
  • Back to School Cybersecurity Checklist
    Back to School Cybersecurity Checklist Casey Ulaky, Product Marketing Manager, Cisco Umbrella Sep 21 2018 5:00 pm UTC 27 mins
    As summer vacations draw to an end, and kids return to school, we’re hoping you have more time to focus on how to improve your organization’s security posture. Cisco cloud security product expert Casey Ulaky will walk you through our Back to School Cybersecurity Checklist, where you will learn how to:

    - Know if you are experiencing a targeted attack.
    - View unsanctioned cloud services and gain a better understanding of your internet activity across all devices, on and off the network.
    - Highlight some of our new features, like iOS protection, cryptomining security category, app discovery and more!
  • CISSP Exam Prep Clinic #4: Pass the CISSP the 1st Time - Best Answer Selection
    CISSP Exam Prep Clinic #4: Pass the CISSP the 1st Time - Best Answer Selection Mission Critical Institute Sep 22 2018 3:15 pm UTC 45 mins
    Learn how to analyze exam answer choices so you can select the best answers.

    In Clinic #4, you will learn tactics for analyzing the answer choices and then selecting the “best answer”. Often there is no “right” answer and you need to eliminate the less likely answers.

    If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    These five Clinics include tips for all 8 CISSP domains covered in the exam.

    Register today and move closer to your goal!

    SPONSORED BY: Mission Critical Institute
  • What is the EU NIS Directive… and how can a Security Operating Platform help?
    What is the EU NIS Directive… and how can a Security Operating Platform help? Danielle Kriz, Senior Director Global Policy, Palo Alto Networks & Greg Day, VP & CSO EMEA, Palo Alto Networks Sep 24 2018 8:00 am UTC 45 mins
    The NIS Directive calls for technical and organisational security measures with regard to the state of the art and appropriate measures to prevent and minimise the impact of incidents. Legacy security systems made up of cobbled-together point products have proven inadequate to provide the level of visibility and control required to prevent the rising volume and sophistication of cyberattacks.

    In this webinar Danielle Kriz, Senior Director Global Policy, and Greg Day, VP & CSO EMEA, discuss how the Palo Alto Networks® Security Operating Platform can help organisations along their road to compliance. The Security Operating Platform prevents successful cyberattacks through data-driven automation and takes advantage of precise analytics to streamline routine tasks so that security teams can focus on the threats that really matter. Visibility into all traffic, classified by application, user and content, provides the context to enforce dynamic security policy to prevent known and unknown threats throughout the attack lifecycle.
  • Las nuevas formas de propagación de amenazas causan estragos a las empresas
    Las nuevas formas de propagación de amenazas causan estragos a las empresas Ramses Gallego, Strategist, Symantec Sep 24 2018 12:00 pm UTC 60 mins
    Los nuevos métodos de la propagación de amenazas que están causando dolores de cabeza a las organizaciones

    Los cibercriminales y los grupos de ataques dirigidos continúan aprovechando los métodos actuales e identificando nuevos canales de infección para llevar a cabo su cometido. Siguiendo los pasos de WannaCry, los Worms están experimentando un resurgimiento y se están extendiendo con agresividad en las redes corporativas. Por otra parte, a medida que los equipos de oficina son cada vez más escasos, los atacantes necesitan buscar nuevos canales y plataformas de infección, como por ejemplo el IoT, que cada vez resulta ser una opción más tentadora.

    En este seminario web descubrirá:
    • Cómo se están diversificando los cibercriminales para seguir generando beneficios.
    • Los nuevos métodos de la propagación de amenazas que están causando dolores de cabeza a las organizaciones.
    • La nueva generación de las amenazas contra el IoT.
    • Las campañas de ataques dirigidos más recientes.
  • Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbH Sep 24 2018 12:00 pm UTC 75 mins
    Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
    Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
  • Data Security in the Cloud, with Ivionics and SkOUT Secure Intelligence
    Data Security in the Cloud, with Ivionics and SkOUT Secure Intelligence Lee Noriega, SkOUT Co-Founder and Cyber Strategist; Pierre Radecki, Ivionics Director of Service Delivery Sep 24 2018 3:00 pm UTC 45 mins
    This webinar will touch on the critical and emerging threats in the cloud that organizations a struggling to manage. Join experts from Ivionics and SkOUT, featuring former government hacker and cyber strategist Lee Noriega and Ivionics Director of Service Delivery Pierre Radecki.

    Pierre is responsible for overseeing the design, implementation, and support of all IT solutions, as well as establishing and refining processes to ensure consistent delivery of the highest level of customer service. He oversees the employees involved in the delivery process and assesses client feedback to develop quality improvement processes.

    Pierre has been designing and implementing networking hardware and software solutions for the legal market in New York, Florida, North Carolina, and Washington DC. Pierre has authored several articles, and been a featured speaker and participant on panel discussions for industry events nationally.
  • Identity of Trusted Things: How Identity and Trust became the Center of Security
    Identity of Trusted Things: How Identity and Trust became the Center of Security Pan Kamal, Vice President, HID Global and Rao Cherukuri, CTO, Device Authority Sep 24 2018 3:00 pm UTC 60 mins
    In the new mobile, cloud and social enabled world, the corporate perimeter has dissolved. Experts agree that Identity now has become the new perimeter. However, in an environment where IoT devices are growing at a rate that will soon outpace the number of humans, it is important to not only manage the identity lifecycle of users, but to establish a verifiable identity model that can scale across billions of devices.

    Join this webinar to learn why IT and OT must collaborate to create a comprehensive identity management program that includes digital identities, physical identities and device identities to deliver a holistic view of security.

    To be successful with any IoT implementation, scalable trusted identities which are easy to manage throughout the lifecycle are required.

    Key takeaways

    1. Learn how to establish identities to IoT Devices with unique characteristics and manage those identities at IoT Scale without human intervention
    2. Learn how integrating identity and access management across IT, Physical and Operational boundaries can help close security gaps that are hard to detect
    3. Learn about modern encryption techniques to establish a verifiable device identity and ensure that devices do not get compromised
    4. Learn how enterprise device management can be used to operationalize trust and manage the provisioning of millions of devices with zero human intervention at IoT scale.
    5. Learn how IoT Security is redefining Cyber security to enable Digital Enterprise. Understand the comprehensive IAM (Physical, Digital, Things) model.
  • Managed Defense – Schützt auch vor gut getarnten Hackeraktivitäten
    Managed Defense – Schützt auch vor gut getarnten Hackeraktivitäten Florian Siebert, Senior Systems Engineer, Global Services & Intelligence Sep 25 2018 8:00 am UTC 60 mins
    FireEye Managed Defense greift auf langjährige Erfahrung aus unseren Mandiant Incident Response Einsätzen zurück: wir nutzen die Daten und Erkenntnisse aus der Abwehr realer Angriffe, um Bedrohungen schneller zu erkennen und abzuwehren. Dadurch können wir Ihnen einen unternehmensweiten Überblick von Bedrohungen in Ihrem Netzwerk in Echtzeit geben und die Fähigkeit Ihres bestehendes CERT, Security Operation Center oder Sicherheitsteams ergänzen oder erweitern.
  • Pilotez vos programmes de transformation
    Pilotez vos programmes de transformation Jean-Bernard Adda, CA Technologies et Richard Bouchereau, ISPA Consutling Sep 25 2018 8:00 am UTC 55 mins
    Votre entreprise innove en améliorant ses services, en intégrant de nouvelles technologies et de nouveaux usages portés par la digitalisation.
    Dans cette dynamique, votre entreprise se transforme sans cesse et doit s’adapter aux nouvelles attentes métiers et à l’optimisation des programmes de transformation.

    •Organisation, règles, visibilité, prise de décisions, quelle gouvernance adopter pour ces programmes de transformation ?
    •Entre méthodologie classique et Agile, quelles facilités l'outillage peut-il apporter afin de négocier adroitement le virage de la digitalisation ?

    Découvrez lors de ce webinar animé par les experts de CA Technologies et d’ISPA Consulting, comment répondre à ces 2 défis en 45 minutes le jeudi 31 mai à 11h.
  • Lightboard Lessons: Explaining the GitHub DDoS Attack
    Lightboard Lessons: Explaining the GitHub DDoS Attack John Wagnon - Senior Solution Developer, DevCentral Sep 25 2018 8:30 am UTC 15 mins
    On Feb 28, 2018 the popular website GitHub was the victim of the largest Distributed Denial of Service (DDoS) attack in recorded history. The attackers used open memcached servers to launch an amplification attack that pushed traffic at the rate of 1.35 Tbps. Fortunately, GitHub was prepared with a DDoS scrubbing service and was able to mitigate the attack, and the attackers stopped after about 20 minutes. The unfortunate part, though, is that many thousands of open memcached servers are still out there on the Internet and could be used for a similar attack at any time. Watch the video below to learn about the details of the attack and the mitigation steps.
  • Be More Avocado
    Be More Avocado Yogi Chandiramani Sep 25 2018 9:00 am UTC 60 mins
    Most security gateways are like a coconut, once you're through the hard shell, you have access to everything.
    Zscaler is different. We give you security all the way through the stacks for known and unknown threats, on all devices.
    Like an Avocado
  • Architectures for deploying SD-WAN and Security
    Architectures for deploying SD-WAN and Security Ronen Shpirer, Security Solutions Architect, Fortinet Sep 25 2018 9:00 am UTC 60 mins
    Security plays a major role in SD-WAN deployments due to the direct internet connectivity inherent to SD-WAN. Any SD-WAN solution and architecture must be considered at both the networking/WAN level AND the security level.

    This session will focus on the alternative architectures for deploying SD-WAN and security in view of Gartner’s suggested architectures and NSS Labs SD-WAN test report – the 1st independent SD-WAN group test report.
  • Predicting Failures Before They Happen With Machine Learning
    Predicting Failures Before They Happen With Machine Learning Nate Smalley, Principal Sales Engineer and Andrew Stein, Staff Business Analytics & IoT Practitioner Sep 25 2018 9:00 am UTC 45 mins
    Imagine a world without outages. Glorious, isn’t it? We’d like to help you get there. So how do you stop IT events before they escalate into outages? With a little help from machine learning.

    The predictive capabilities from the Splunk Machine Learning Toolkit (MLTK) combined with the Event Analytics capabilities in Splunk IT Service Intelligence (ITSI) give operations teams like yours the opportunity to proactively act on an event before it becomes an outage. Whether your current IT state is reactive or you’re already in a somewhat proactive state, these predictive capabilities will be something you’ll want to take note of!

    Join our webinar to learn how to:

    ● Predict a service health score
    ● Proactively take action based on those predictions
    ● Employ novel tactics for better incident management using advanced search commands
  • Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung
    Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung Ivonne Ehle, DACH Sales Engineer - SCME, Certified Trainer Sep 25 2018 9:00 am UTC 60 mins
    Das Wachstum virtualisierter Anwendungen, immer kleinere Backup-Fenster und ein explosionsartiges Datenwachstum haben die Anforderungen an die Datensicherheit und die Speicherinfrastruktur enorm belastet. Backup- und sekundäre Speicherinfrastrukturen kommen oft von mehreren Anbietern, was die Kosten erheblich steigert, betriebliche Ineffizienzen erhöht und zu Datensilos führt, wodurch die zentrale Verwaltung immer komplexer wird.

    Registrieren Sie sich für unseren Webcast und erfahren Sie, wie Sie mit der neuen konvergenten Datenplattform StorageCraft OneXafe Ihre Daten in heterogenen Umgebungen besser schützen und verwalten
  • The Cyberattack Horizon
    The Cyberattack Horizon Kelvin Murray, Sr. Threat Research Analyst, Webroot Sep 25 2018 9:00 am UTC 60 mins
    Get an in-depth look at the newest threats.

    More and more, cybercriminals are targeting small- and medium-sized businesses with increasingly sophisticated attacks. And with more regulations and costly fines for non-compliance, a single data breach could spell the end for an SMB.

    To stay safe, businesses and MSPs who serve them need to know the lay of the land. Join our 30 minute informative webinar to get details about the latest trends in cyber threats.


    Topics in this webinar include:

    • Current threat trends hitting SMBs
    • Ransomware, phishing, Trojans, cryptomining , cryptojacking
    • How to stay ahead of the latest cyberattacks
  • How to create the self belief and self confidence to sell brilliantly
    How to create the self belief and self confidence to sell brilliantly Leigh Ashton Sep 25 2018 10:00 am UTC 30 mins
    Key Takeaways:

    This webinar is for you if you struggle with sales or specific sales activities and will open the door to understanding how you get in your own way of sales success...and how to develop a winning sales mindset that attracts success!

    Reasons to Attend:

    -Discover how your thoughts impact on your sales results
    -Learn how to identify your inner barriers...and how to eliminate them
    -Create your personal way of generating consistently great sales

    Many people feel uncomfortable selling. Part of it is to do with rejection – people saying “no” to you.

    Another part of it is to do with ethics – we don't want to be seen to be taking people's money!

    However, selling is not what it used to be.

    You can only succeed – in the long term - if you give value and help customers.
  • Tieniti informato sui recenti attacchi mirati e le minacce IoT di nuova generazi
    Tieniti informato sui recenti attacchi mirati e le minacce IoT di nuova generazi Sunil Venanzini, Symantec Sep 25 2018 10:00 am UTC 60 mins
    Le nuove metodologie per la propagazione delle minacce mettono le aziende sotto pressione

    Per garantirsi il successo, hacker e gruppi criminali che lanciano attacchi mirati continuano ad affinare le armi e identificare nuovi canali di infezione. Sulla scia di WannaCry, i worm riprendono virulenza e si diffondono aggressivamente nelle reti aziendali. Con le vulnerabilità sui computer desktop che si fanno sempre più rare, i criminali vanno in cerca di nuovi canali e nuove piattaforme da cui lanciare le infezioni: l’IoT diventa un bersaglio sempre più allettante.

    In questo webinar apprenderai:
    • Le strategie di diversificazione adottate dai criminali informatici per mantenere la redditività
    • Le nuove metodologie per la propagazione delle minacce, che mettono le aziende sotto pressione
    • La nuova generazione di minacce IoT
    • Le recenti campagne di attacchi mirati
  • How to Leverage Tools that Support Innovation and Differentiation
    How to Leverage Tools that Support Innovation and Differentiation Gary Middleton: Group Networking Senior Practice Director DCN,Networking &Chris Wolf: CTO, Global Field & Industry,VMWare Sep 25 2018 2:00 pm UTC 45 mins
    Organisations will lose their competitive edge if they maintain the status quo. They must embrace innovation and enable their developers by providing them with the tools and flexibility to create new business models and applications.
    Join the discussion with Gary Middleton, Group Networking Senior Practice Director, Dimension Data; and Chris Wolf, CTO, Global Field and Industry, VMware, as they uncover how to:

    • Use containerisation to transform your cloud capabilities.
    • Empower IT to embrace the solutions and services needed to evolve.
    • Build applications that streamline and transform business success.
    • Move with speed and agility while maintaining a strong infrastructure.
    • Exploit the software as a service (SaaS) revolution.
  • High performance log streaming to HDFS with syslog-ng
    High performance log streaming to HDFS with syslog-ng István Molnár, Prooduct Marketing Manager and James Bonamico, presales- engineer. Sep 25 2018 2:00 pm UTC 60 mins
    Hadoop is one of the most popular MapReduce solutions. Many organizations choose Hadoop as their big data store. syslog-ng Store Box allows seamless integration with Hadoop Distributed File System (HDFS), providing high performance log collection, distribution and pre processing.

    In our upcoming webinar, we will demonstrate how to directly stream any text-based log into HDFS while keeping a high performance rate using syslog-ng Store Box.
  • 7 cybersecurity improvements resulting from an EDR project
    7 cybersecurity improvements resulting from an EDR project Oleg Glebov, Senior Product Marketing Manager, Kaspersky Lab Sep 25 2018 2:00 pm UTC 75 mins
    EDR technology has been an unceasing topic of conversation over the past 3 or 4 years. Meanwhile, we at Kaspersky Lab have become aware, in our interactions with enterprise organizations, of serious levels of overall dissatisfaction with the outcomes of investment in EDR. Let's try now to understand the main reasons for this, while looking at typical use cases and key enterprise scenarios. The webinar will cover:
    •Drivers of EDR implementation
    •EDR vs Next Generation EPP vs Advanced EPP
    •Key benefits and advantages
    •Use cases of EDR functionality: Integrated Endpoint Protection, Augmentation of the Incident Response process, Automation of the anti-APT solution reaction phase
    •EDR project business justification
  • Can We Rein in the Global Cybersecurity Crisis?
    Can We Rein in the Global Cybersecurity Crisis? Troels Oerting, Head of Global Centre for Cybersecurity, World Economic Forum; Usama Fayyad, CIO OODA Health Sep 25 2018 3:00 pm UTC 60 mins
    The World Economic Forum has elevated cyberattacks as one of the top global risks in terms of likelihood and impact, ahead of all other types of technological, economic, political or terrorist risks. The easy availability of advanced hacking tools combined with our aging infrastructure and outdated security models is a recipe for disaster. To tackle this looming crisis, we need to rethink our approach to security and develop new strategies to protect our most critical applications and infrastructure.

    Join renowned security experts Troels Oerting, CIO of the World Economic Forum for an interactive discussion on new strategies to preempt this global crisis.