The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Speakers: John Martinez, Director of Public Cloud R&D at Palo Alto Networks; Matthew Todd, Compliance ExpertRecorded: Mar 19 201963 mins
Too often, organizations make the move to the cloud without considering the impact to compliance. Whether compliance serves regulatory or business obligations, it is best to move into the cloud with these requirements in mind. In this webinar, our experts will discuss common cloud compliance misconceptions, practical advice about how to get your cloud compliance program in the best shape possible.
Nimrod Vax, BigID Head of Product & Bill Reid, AWS Senior Manager, Leader, Security and Compliance Solution ArchitectuRecorded: Mar 19 201958 mins
Protection & Privacy in the Cloud: Operationalizing Privacy in AWS Environments
New privacy regulations like GDPR and CCPA make finding and protecting personal information more critical than ever. This means being able to identify both PII and contextual PI by person at scale. This Webinar featuring BigID’s Head of Product and AWS's Leader of Security and Compliance Solution Architecture will examine best practices for finding, protecting and automating PI/PII-centric privacy tasks at scale.
What You Will Learn:
- How to find PII/PI across AWS
- The difference between Protection and Privacy
- How to actualize privacy tasks like DSAR
- The role of ML in cloud-first privacy engineering
- Nimrod Vax, BigID Head of Product
- Bill Reid, AWS Senior Manager, Leader, Security and Compliance
Dr. Anne Lewis, Head of Product Development, VaultexRecorded: Mar 19 201940 mins
What determines how people pay for their goods and services? How might using cash instead of a debit card reflect your personality? Are you a utilitarian or hedonistic shopper?
This webinar looks at how the way people behave could affect their choice of payment. Dr. Anne Lewis argues that an economic model is not enough to fully predict future consumer payment habits, and social factors have an important influence on whether people reach for notes or cards.
David Fagleman, Head of Policy & Research, Cash ServicesRecorded: Mar 19 201943 mins
The cashless society has been talked about for decades and with the increased use of digital payments some believe it’s closer than ever. Despite this cash remains a popular method of payment for consumers and businesses, and is forecast to continue to play an important role in the payments landscape for years to come.
Join this session for a discussion on the future of cash. This will include:
· Data and forecasts on cash and non-cash payment methods
· Research on the drivers behind consumer payment behavior
· Analysis on the future of cash – it’s role as both a transactional and continuity method of payment
· Country-specific examples
Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf NetworksRecorded: Mar 19 201942 mins
A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).
In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:
- Business drivers for a SIEM
- What is/is-not included in a SIEM
- SIEM deployment options
- Outsourcing considerations – MSSP vs MDR
Todd Bernhard, CloudCheckr Product Marketing ManagerRecorded: Mar 19 201919 mins
Just as traditional Managed Service Providers (MSP) businesses are evolving with the rapid adoption of the cloud, the Amazon Web Services (AWS) MSP Partner Program criteria is always changing. The program recognizes highly skilled AWS Partner Network (APN) Consulting Partners that provide full lifecycle solutions to customers. AWS recently released Version 4.0 of its Validation Checklist, and is requiring all APN Partners to meet requirements by April 1, 2019.
Achieving AWS MSP Partner Program Validation is possible and easy with the right preparation. In this webinar, attendees will hear a summary of the new requirements, how CloudCheckr helps MSPs meet those checklist items, and areas where MSPs can increase cloud growth and profit going forward.
Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, ForresterRecorded: Mar 19 201955 mins
Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.
Join us on this webinar with Robert Arandjelovic from Symantec and guest speaker Heidi Shey from Forrester Research as they discuss;
- The inherent security challenges of cloud
- Security strategies and imperatives
- How organizations are approaching and need to approach cloud security today.
Alex Holden, CISO Hold Security, LLCRecorded: Mar 19 201961 mins
One of the toughest fights in information security is the fight for your budget. The most integral part of your budget are your employees. We will discuss how strategic investments into the human capital can make or break your security posture. How to get the right talent, and also how to retain it. The human side of economics is usually the most unpredictable one and you need to know how to navigate it.
Gary Chen, Research Manager at IDC and Jenny Fong, Director of Product Marketing at DockerRecorded: Mar 19 201940 mins
Containers have evolved into a transformative technology for application development and portability, but containers alone are not sufficient for meeting today’s enterprise requirements. In IDC’s recent Container Infrastructure Survey, over 76% of enterprises surveyed stated they use containers in production for mission critical apps, with 83% of container deployers using containers on multiple public clouds.
In this webinar, Docker and guest speaker IDC Research Manager Gary Chen will discuss why companies are turning to container platforms to support increasingly diverse IT environments, bolster security and governance, and power digital transformation initiatives - from cloud migration and application modernization to microservices.
Ron Bushar, Vice President & CTO - Government SolutionsRecorded: Mar 19 201959 mins
As departments and agencies move business operations to the cloud, protecting assets and data remains top priority. Identifying the steps and actions needed to structure, develop, and implement effective security controls in this new environment is the critical first step.
Where should you start? How do you prioritize activities? How can you leverage existing IT programs, processes, and policies that are already in place?
Join FireEye’s Ron Bushar, Vice President & CTO - Government Solutions, as he shares steps and best practices to building a cloud assurance program, including:
- Identifying roles and responsibilities of government, service provider, and third-party stakeholders
- Adapting existing data classification scheme for cloud services and establishing a cloud-adapted risk assessment process
- Implementing requirements baselines, risk assessments, and approaches to addressing unique risk scenarios
- Selecting a cloud service delivery and deployment model
Brad Brooks, Chief Executive Officer at OneLogin and Venkat Sathyamurthy, Chief Product Officer at OneLoginRecorded: Mar 19 201959 mins
You’re invited to an exclusive, OneLogin customer-only webinar that gives a sneak peak into the future of work, 2019 market trends and what you and your company can expect from OneLogin in 2019 and beyond.
What does the future of work look like and how does security and access management fit into this bigger vision? How will OneLogin provide the right tools to support the changing workforce at your company?
Tune into this special webinar to learn the workplace changes predicted by CIOs from around the world and how OneLogin is evolving to support this rapidly approaching future. This webinar will be hosted by OneLogin’s Chief Executive Officer, Brad Brooks and Chief Product Officer, Venkat Sathyamurthy on March 19, 2019 at 11am PST/2pm EST.
During this webinar, we will be covering the following topics:
Rohit Gupta, Global Segment Leader; Surag Patel, Chief Strategy OfficerRecorded: Mar 19 201952 mins
Cloud computing is one of the major shifts in technology that is gaining rapid traction and is helping fuel the growth in today’s digital transformation. As leading organizations modernize their hardware and software environments, they are demanding flexibility, business agility and operational efficiencies. This ultimately equates to tangible cost savings, loyal customers and higher profits, as organizations leverage the cloud to compete more effectively and differentiate their digital service and product offerings.
As a real-world example, you will hear from Chris Perkins, Senior Security Architect at a major Fortune 500 medical technology and solutions company on:
- Key drivers and use cases in migrating from traditional legacy technologies and embracing modern hybrid cloud computing approaches.
- Application Security threat landscape, testing pipelines and native integrations.
- Major hurdles and lessons learned (organizationally, culturally, technology) and how to reduce friction and increase collaboration between Dev & Ops teams
in order to optimize resources and ensure a secure Cloud migration.
- The cost curve for remediation of defects enabling a safer speed to market and growth
You’ll also hear from Rohit Gupta, Global Segment Leader, Security: Amazon Web Services (AWS) highlighting key tenets for security for AWS and the framework required to help their customers meet compliance, regulation and security objectives and Surag Patel, Chief Strategy Officer, Contrast Security, underscoring modern approaches to automate, integrate and scale Application Security.
As a result of this webinar, you will hear about the major benefits in migrating to a secure, compliant cloud environment and learn from a customer’s experience on how to successfully automate and secure your applications. There will also be a Q&A session at the end of the webinar.
Kirit Basu - VP of Product - StreamSetsRecorded: Mar 19 201944 mins
According to research firm Gartner, at least 75% of large and global organizations will implement a multicloud-capable hybrid integration platform by 2021. Join StreamSets Head of Product Management, Kirit Basu, and Head of Product Marketing, Clarke Patterson as they discuss how StreamSets customers are taking a DataOps approach to hybrid-cloud integration.
We explore how Fortune 500 customers are using StreamSets to streamline Apache Kafka and Data Lake projects using principles adopted from DevOps.
During this webinar, we will discuss:
-Pitfalls to avoid for any hybrid-cloud project
-Key requirements to ensure continuous movement of data across any cloud
-How StreamSets customers are using the platform to drive real value from DataOps
Bryan Lee, Martin Walter, and Stan Lee, with host Zoltan DeakRecorded: Mar 19 201943 mins
DNS is wide open for attackers. Security teams are under pressure to enforce consistent protections for millions of new malicious domains while keeping up with advanced tactics like DNS tunneling. How can you take back control of your DNS traffic and prevent these threats?
Join Palo Alto Networks experts to see:
• How real-world threats found by Unit 42 use DNS for command-and-control and data theft.
• Challenges in addressing DNS-based attacks faced by the Palo Alto Networks SOC team.
• Best practices for protecting DNS traffic to keep your organization safe.
You’ll also get your questions answered in our live Q&A when you join us for this interactive session. Learn what you should be doing to protect your DNS traffic today—and how to stay ahead of emerging tactics.
Technology is constantly moving on, and business is constantly moving on with it. Automation is the key to keeping your enterprise on pace, not only with disruptive innovations, but with emerging security threats to your infrastructure, too.
Now in the multicloud era, automation is an imperative to drive operational reliability, security and speed without tradeoffs.
In this webinar, you’ll learn:
-Why network automation is not the same as automated networks
-How network reliability engineering can enable operational simplicity
-The five-step journey towards automated NetOps
Roman Tobe, Senior Product Marketing Manager, ProofpointRecorded: Mar 19 201952 mins
Bad actors do not just target employee inboxes - they also target the brand itself, key employees and customers on digital channels.
Social media, web domains and the deep and dark web pose areas of risk where companies are not directly in control of their communication security. Despite their value, these properties are often left unsecured against fraudulent activity.
Since these are emerging threats, digital risks can be blind spots of focus for security teams.
Join this webinar to learn about trends in digital risk including:
-Executive impersonations targeting your people on LinkedIn
-Social media protection on Instagram, Facebook and Twitter
-Credential threats on the dark web
-Physical threats to key locations
-Counterfeit domains in the retail space
-Visibility into the digital threat landscape
-How to protect against these threats
Griff James, Director, Damrod Analysis LtdRecorded: Mar 19 201940 mins
Successful security programs explain the situation, the risks, and the options available in a way that is both simple and true. Damrod draws on military analytical frameworks to develop map models that accurately depict the cyber terrain and guide the generation of a series of overlays. These build to create an Effects based plan suitable for Governance, Risk, and Compliance needs.
Join this webinar for an introduction to the cyber-as-conflict model developed by Damrod.
Nirav Shah, Sr. Director, Product & Solutions, Fortinet; Stephen Watkins, Principal Security Architect, FortinetRecorded: Mar 19 201949 mins
Join the discussion and learn about the full advantages of implementing an SD-WAN solution that enables both digital transformation and comes with critical cybersecurity.
Our Fortinet experts will guide you through a variety of use cases including how creating an SD-Branch can extend SD-WAN capabilities to enterprise branches, plus key insights about what your peers are weighing in on about the current landscape of SD-WAN solutions.
Watch this webinar to discover:
- How to enable enterprise branches by creating an SD-Branch
- Third Party analysis and outlook for the future of SD-WAN
- How Fortinet’s SD-Branch stacks up against the competition
Medical Devices are continually increasing in use and popularity, with the advent of so many new technologies in the healthcare space. They could pose several security and privacy risks. Learn from a leading hospital Chief Information Security Officer (CISO) about Medical Device Risk Assessments.
Featured Speaker: Mauricio Angee, CISO of Mount Sinai Medical Center
CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
Dr. V. N. Berlin, CEO, Mission Critical InstituteRecorded: Mar 19 201929 mins
In this series, learn how to join the Cyber Elite and earn a $30K+ raise and a $500 CISSP Exam Voucher, even before you finish your cyber degree.
You will learn what to add to your resume to get cyber employers to recruit you for top positions, even if you have not finished your degree. Then you will learn how to get employers to hire you.
To motivate you to work to join the Cyber Elite in 2019, MCI offers qualified candidates CISSP Exam vouchers --- a $500 savings.
In this series you will learn how employers pick candidates for $30K pay raises.
•What project experience do they want?
•What certifications must you have?
•What additional credentials do you need?
•How to motivate employers to hire you before you finish your degree
You will also learn about the rapidly growing cyber sector: cloud security risk management.
During these webinars you will also review profiles of candidates who have actually gotten $115K+ cyber positions and why they were able to get those jobs.
Plan to join the cyber elite in 2019. Use this valuable information to guide your cyber career planning decisions now.
Michelle Drolet, Towerwal, Amy McLaughlin, Oregon State University and Ariful Huq, AporetoRecorded: Mar 19 201956 mins
Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.
Join us for an interactive Q&A panel with security leaders to learn more about how to operationalize cybersecurity.
Topics up for discussion:
- Making information security relatable
- Building security programs
- Defining your cybersecurity strategy
- Translating your cybersecurity strategy into a risk management plan
- Operationalizing your cybersecurity strategy
- Using the maturity capability model for measuring success
Michelle Drolet, CEO, Towerwall
Amy McLaughlin, Director of Information Services, Oregon State University
Ariful Huq, Director of Product Management, Aporeto
Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEyeRecorded: Mar 19 201950 mins
FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:
-Get a brief overview on the latest email threat trends
-Learn about the must haves for email security solutions and the benefits of having one provider
-Find out about additional email security capabilities that can help you have an adaptable solution
-Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
Rio Sibuea, Sr. Pre-Sales Systems Engineer, InfobloxMar 20 20196:00 amUTC60 mins
NGFWs, IDS, sandboxes, DLP, etc are important - but increasingly, DNS is a major security weakness, allowing hackers to exfiltrate & infiltrate confidential data. This is a known issue because DNS was initially designed very simple and this attracts hackers to abuse the protocol. How do we protect our internal data and prevent hacker attacking the service?
Join Infoblox and (ISC)² on Mar 20, 2019 (Wed) at 14:00 (GMT +8) to learn the best practices in securing DNS.
Presenter: Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox
Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
Nicolas Liard, Pre Sales Engineer France, BeneluxMar 20 20199:00 amUTC60 mins
Un réseau segmenté opérationnalise votre politique de sécurité, permet un état de conformité continue avec un minimum d'effort et fournit des options d'atténuation des cyberattaques. Mais la segmentation du réseau n’est pas une tâche facile !
Rejoignez les experts de Tufin le 20 février pour partager des conseils pratiques sur la segmentation du réseau, notamment :
• Les pièges à éviter lors de la création d’une stratégie de segmentation
• Cadre de segmentation
• Lignes directrices pour appliquer et maintenir un réseau segmenté
Athar Awan, Cyber Security ProfessionalMar 20 20199:00 amUTC60 mins
In this webinar, we will be talking about not only the cost of data breaches but also impact of breaches and lesson learned for businesses, trends to reduce the risks and finally conclusion about how to prevent data breaches.
Con l’adozione del cloud in continuo aumento, le funzionalità dei firewall di nuova generazione sono essenziali per proteggere i carichi di lavoro nel cloud dalle minacce avanzate mediante il rilevamento e la protezione in tempo reale automatizzati.
Partecipa a questo webinar esclusivo per scoprire dagli esperti di SonicWall come i firewall della serie SonicWall Network Security virtual (NSv) possono aiutarti a rafforzare la strategia di sicurezza per i tuoi ambienti cloud ibridi e multi-cloud. Argomenti del webinar:
•Principali tendenze del settore e minacce
•Funzionalità della serie NSv per proteggere efficacemente tutti i componenti critici degli ambienti cloud privati o pubblici
•Protezione da movimenti laterali e strategia di protezione coerente
•Blocco di minacce avanzate
Dimostrazione in diretta
Adam Meyers: VP of Intelligence; Jennifer Ayers: VP of OverWatch and Security ResponseMar 20 201910:00 amUTC65 mins
The 2019 CrowdStrike® Global Threat Report offers one the industry’s most comprehensive reports on today’s top cyber threats. The report combines CrowdStrike’s comprehensive global observations with real-world case studies. delivering deep insights on modern adversaries, and their tactics, techniques, and procedures (TTPs).
Join us for a webcast featuring CrowdStrike VP of Intelligence Adam Meyers and VP of Falcon OverWatch™ Jennifer Ayers as they explore the global trends and observations revealed in the report. They will also offer actionable recommendations you can use to ensure your organization is ready to anticipate and defend against the most dangerous threats of tomorrow.
Join this webcast to learn:
- The most favored TTPs observed throughout 2018 as seen through the lense of MITRE ATT&CK™framework
- Updates on global “breakout” time statistics, including observations on which adversaries showed the fastest tradecraft in 2018
- How nation-state adversaries continue to target dissidents, regional adversaries and foreign powers to collect intelligence for decision-makers
- How cybercriminals combine advanced, targeted attack techniques with ransomware to achieve massive financial payoffs via “Big Game Hunting”
- How the eCrime ecosystem continues to evolve and mature, showing increased collaborations between highly sophisticated criminal actors
Dean Nicolls, VP of Marketing, Jumio Corp.Mar 20 201910:00 amUTC26 mins
Customer acquisition is top of mind for most financial service organizations and their boards. Normally, when banks and other financial service institutions think customer acquisition, they think about launching a new advertising campaign with the hope of driving more online or in-branch traffic -- but these campaigns are iffy at best.
Instead, why not rethink your online account opening process where FSIs lose about 20% of their prospects through abandonment. If you can plug that leaky funnel, you will see an immediate improvement in customer acquisition.
Join us for this informative “how-to” webinar and discover how to…
- Dissect the abandonment problem
- Reduce the number of identity verification screens & clicks
- Cast a wider net with omni-channel verification
- To say “no” to verification “maybes”
Whether you’re expanding a network to support new initiatives, navigating through growing security challenges, or planning a refresh of older technology; keeping costs down and saving time for your IT Team is key.
Join our webinar and learn how Aruba delivers the industry’s most robust and reliable networking solutions for small and midsize businesses - help reduce planning, deployment and operational costs with features such as:
•Integrated User Analytics
•Scheduled and On-Demand Reporting
•Automated Firmware Updates
•All from a single interface
Kelvin Murray, Sr. Threat Research Analyst, WebrootMar 20 201911:00 amUTC60 mins
Cybercriminals have never been so interested in the theft, trading and monetisation of data before. Information stealing malware is rapidly increasing, and the design of this malware and the way stolen data is used are both seeing great criminal innovation.
Join Webroot’s Threat expert as he discusses topics such as:
· Top reasons data is stolen from businesses
· Direct and indirect costs of a breach and steps to mitigate this threat
· The shifting of targets in phishing and other data theft in recent times
· The rise of banking trojans, modular malware and other info stealers
· Darkweb trading
· GDPR and legal repercussions of a breach
Per-Olof Persson, Security Advisor, SynopsysMar 20 201911:00 amUTC90 mins
As vehicles get smarter, security in the automotive industry is an increasing concern. Cars are being turned into Wi-Fi hotspots and contain many millions of lines of code for autonomous driving. As a result, they are more vulnerable than ever to bugs, hackers, and data theft.
At the heart of the vehicles of tomorrow is software with artificial intelligence and powerful silicon chips all working together. Learn how these technologies will transform the traditional automotive supply chain from a mechanical-driven world to a digital one.
Flavio Di Cosmo, Pre-Sales Engineer SEEMEAMar 20 20191:30 pmUTC60 mins
Una rete segmentata rende operativa le policy di sicurezza, consente uno stato di compliance continua con il minimo sforzo e offre opzioni di mitigazione per gli attacchi informatici. Ma la segmentazione della rete non è un compito facile!
Unisciti agli esperti di Tufin il 20 Marzo 14:30 mentre condividono consigli utili per la segmentazione della rete, tra cui:
•Insidie da evitare durante la creazione di una strategia di
•Framework per la segmentazione
•Linee guida per l'applicazione e il mantenimento di una rete
Cyber Security Brief PodcastMar 20 20192:00 pmUTC22 mins
We discuss the fact that most people don’t trust their internet of things devices, but also aren’t that willing to pay extra for improved security. We also chat about the major leak of personal data of high-profile politicians and others in Germany, and developments in the campaign of the hackers taking over printers and Chromecasts to express their support for PewDiePie (and highlight security issues). Finally, we take a look at some research highlighting the fact that facial recognition on smartphones still isn’t foolproof.
Asher Benbenisty, Director Product Marketing; Yitzy Tannenbaum, Product Marketing Manager (AlgoSec)Mar 20 20192:00 pmUTC30 mins
Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.
There’s a better way to manage your network security!
Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.
•How to overcome security management complexities with automation
•How to pass compliance audits in the face of demanding regulations
•Key industry metrics that compare security environments within and beyond the finance industry
•Real financial customers case studies
Andy Yeates, Solutions Architect, IBM ResilientMar 20 20192:00 pmUTC60 mins
Combining an IRP solution with a SIEM makes security operations more mature in order to triage, reduce the time to respond, improve SOC efficiencies, and gain overall a significantly improved accuracy.
Kirill Kruglov, senior security researcher at Kaspersky Lab ICS CERTMar 20 20192:00 pmUTC90 mins
The webinar will be helpful for those who wish to know more about current ICS cyberthreats.
The webinar’s speaker Kirill Kruglov, senior security researcher at Kaspersky Lab ICS CERT, will talk about major threats relevant to industrial control systems that Kaspersky Lab ICS CERT identified in H2 2018. In addition to discussing general statistics on malicious attacks that were detected and prevented by Kaspersky Lab products on industrial computers globally, he will offer a deeper dive into the attacks we saw, TTPs used by attackers, and root cause analysis of major security weaknesses we discovered. In addition, Kirill will discuss the methodology used to collect and analyze the data, which will help the webinar participants to better understand what these figures mean.
John Grim, David KennedyMar 20 20192:00 pmUTC90 mins
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Verizon Insider Threat Report and the current cybersecurity threat landscape.
•The time it takes to discover a breach after the first action
•5 insider threat types identified by our caseload
•Top 3 insider threat motivations
•Top industries suffering sensitive data breaches
Our Verizon Threat Research Advisory Center presenters will be:
•John Grim, Senior Manager, Investigative Response - America
•Domingo Jesus Alvarez-Fernandez, Senior Dark Web Hunter, Threat Intelligence
•David Kennedy, Managing Principal, Open Source Intelligence
Nick Scholz, Robin Redgrave and Devadas Kovilakath, Micro FocusMar 20 20193:00 pmUTC60 mins
As companies undergo digital transformations—with a laser focus on simplifying operations and boosting productivity—users are being asked to get more done faster and with fewer resources.
In this climate, it’s not surprising that employees independently turn to cloud file sharing services they may already be using at home to help them sync and share their files and get their work done.
But these consumer-grade services lack the security, control, and management features that many organizations need to protect themselves from data loss, breaches, and business continuity failures, so many IT leaders are stuck: how do they enable productivity and ease the sharing of critical files without compromising their security and compliance needs?
Join Nick Scholz, Robin Redgrave and Devadas Kovilakath to see what experts are saying about what to look for in an EFSS solution, and how to figure out which one fits your needs.
• What features help users adopt
• The state of the EFSS landscape
• The benefits and shortfalls of Cloud vs. On Premises solutions
• How to maximize security AND collaboration
• And more!
Heather Stratford, CEO of Stronger.techMar 20 20193:00 pmUTC44 mins
For the last 2 decades, technology security was delegated to the IT team. It was role specific and designated for one small subsection of the IT team. That mentality and way of thinking must change.
A paradigm shift is required for the whole organization. Every part of the organization contributes to the success or failure of the organization. Creating a security culture is not a one-time event, it is a new way of talking and acting.
Join this webinar with Heather Stratford, CEO of Stronger.tech to:
- Understand the steps that need to happen to create this culture
- See where your organization is on the scale of creating a Strong Security Culture
- Learn why creating a security-minded culture is an essential part of the "new" requirements for a CIO.
BT's Security experts: Steve Benton, Hila Meller, Juni Yan, and Gary SymesMar 20 20193:00 pmUTC30 mins
Join four of our top security experts to hear their point of view and their vision for security across the globe. Our vice presidents from Asia, Middle East, Australia and Africa, America, Europe and the UK will share their frontline experience of dealing with some of the security challenges in their region.
Cybersecurity is a truly global concern with attacks and threats emanating from all over the world. The way each region tackles the cyber threat is subtly different. Our experts will take you through some effective security strategies and programmes that you can put in place to protect your "crown jewels" against the evolving global threats.
Whether you're a multinational organisation with worldwide operations, or based in one particular region, our webinar will give you a local and global view on how to find your way around the security minefield.
- Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes
- Hila Meller, Vice President, Security, Europe
- Juni Yan, Vice President, Security, Asia Middle East, Australia and Africa
- Gary Symes, Vice President, Security, Americas
Joe Schreiber, Technical Director, Business Development, Tufin & Karen Crowley, Sr. Product Marketing Manager, TufinMar 20 20194:00 pmUTC60 mins
Join automation expert Joe Schreiber on March 20th as he shares his experiences automating himself out of a job (in a good way), and discusses where to start and how to avoid risk.
Joe will present his five steps and answer questions from the audience on how to:
Collaborate with the rest of your team on automation
Organize your multi-vendor toolbox and use APIs to ensure success
Empower your teams to write reusable, value-driven code
Leverage modern applications in containers, microservices, and serverless environments
Got questions? Send them to Joe ahead of time to be included in the discussion.
Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:
•What configuration compliance management encompasses
•Who should care about secure configuration management
•Why organizations are not doing this today and how this impacts the business beyond IT
Discover the future for configuration compliance management by attending this educational webinar. Register now!
Kristen Tyrrell, COO, CatchMar 20 20194:00 pmUTC60 mins
Managing your safety net has gotten harder. Having enough money set aside for emergencies, saving for retirement, and even getting the right insurance is confusing and expensive. Why is that? How can we build solutions that help provide stability in the face of increasing income volatility, short-circuited reward systems, and systemic challenges? In this webinar our guest Kristen Tyrrell will highlight the challenges of the current savings crisis and dive deep into framing behavioral economic solutions for new ways to build financial security and grow wealth.
In this webinar, you’ll learn:
oWhat is a financial safety net?
oWhat is the savings crisis?
oWhy is it so hard to save?
oWhat can we do to make it easier?
Jay Dobies, Red Hat & Dave Meurer, SynopsysMar 20 20194:00 pmUTC60 mins
OpenShift 4 represents the culmination of a number of new technologies. One key feature of this release is CRI-O, the new container runtime that is optimized for OpenShift. But a new runtime doesn’t have to be scary. Black Duck OpsSight for OpenShift still provides the same security intelligence and visibility into all the third-party open source software that composes your containers.
Join experts from Synopsys and Red Hat as we explore the following topics:
• Upcoming features in Red Hat OpenShift 4, including the drivers and benefits of the Operator Framework
• How Black Duck and Clair complement each other • The Synopsys application security portfolio
• Black Duck OpsSight for OpenShift architecture
• OpenShift 4 Black Duck OpsSight demonstration on a CRI-O container