Hi [[ session.user.profile.firstName ]]

IT Security

  • Stay Audit Ready with Continuous Cloud Compliance
    Stay Audit Ready with Continuous Cloud Compliance
    Speakers: John Martinez, Director of Public Cloud R&D at Palo Alto Networks; Matthew Todd, Compliance Expert Recorded: Mar 19 2019 63 mins
    Too often, organizations make the move to the cloud without considering the impact to compliance. Whether compliance serves regulatory or business obligations, it is best to move into the cloud with these requirements in mind. In this webinar, our experts will discuss common cloud compliance misconceptions, practical advice about how to get your cloud compliance program in the best shape possible.
  • Scaling PII/PI Discovery, Protection & Privacy in the Cloud - BigID, AWS, & CSA
    Scaling PII/PI Discovery, Protection & Privacy in the Cloud - BigID, AWS, & CSA
    Nimrod Vax, BigID Head of Product & Bill Reid, AWS Senior Manager, Leader, Security and Compliance Solution Architectu Recorded: Mar 19 2019 58 mins
    Protection & Privacy in the Cloud: Operationalizing Privacy in AWS Environments

    New privacy regulations like GDPR and CCPA make finding and protecting personal information more critical than ever. This means being able to identify both PII and contextual PI by person at scale. This Webinar featuring BigID’s Head of Product and AWS's Leader of Security and Compliance Solution Architecture will examine best practices for finding, protecting and automating PI/PII-centric privacy tasks at scale.

    What You Will Learn:
    - How to find PII/PI across AWS
    - The difference between Protection and Privacy
    - How to actualize privacy tasks like DSAR
    - The role of ML in cloud-first privacy engineering

    Speaker:
    - Nimrod Vax, BigID Head of Product
    - Bill Reid, AWS Senior Manager, Leader, Security and Compliance
    Solution Architecture
  • Personal Shopper: Social Factors Behind Payment Choice
    Personal Shopper: Social Factors Behind Payment Choice
    Dr. Anne Lewis, Head of Product Development, Vaultex Recorded: Mar 19 2019 40 mins
    What determines how people pay for their goods and services? How might using cash instead of a debit card reflect your personality? Are you a utilitarian or hedonistic shopper?

    This webinar looks at how the way people behave could affect their choice of payment. Dr. Anne Lewis argues that an economic model is not enough to fully predict future consumer payment habits, and social factors have an important influence on whether people reach for notes or cards.
  • What is the Future for Cash?
    What is the Future for Cash?
    David Fagleman, Head of Policy & Research, Cash Services Recorded: Mar 19 2019 43 mins
    The cashless society has been talked about for decades and with the increased use of digital payments some believe it’s closer than ever. Despite this cash remains a popular method of payment for consumers and businesses, and is forecast to continue to play an important role in the payments landscape for years to come.

    Join this session for a discussion on the future of cash. This will include:

    · Data and forecasts on cash and non-cash payment methods
    · Research on the drivers behind consumer payment behavior
    · Analysis on the future of cash – it’s role as both a transactional and continuity method of payment
    · Country-specific examples
  • To SIEM, Not to SIEM? Find Out Your Options
    To SIEM, Not to SIEM? Find Out Your Options
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Mar 19 2019 42 mins
    A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).

    In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:

    - Business drivers for a SIEM
    - What is/is-not included in a SIEM
    - SIEM deployment options
    - Outsourcing considerations – MSSP vs MDR

    Save your seat now to learn more!
  • How to Meet AWS MSP Partner Program Version 4.0 Requirements and Pass Your Audit
    How to Meet AWS MSP Partner Program Version 4.0 Requirements and Pass Your Audit
    Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Mar 19 2019 19 mins
    Just as traditional Managed Service Providers (MSP) businesses are evolving with the rapid adoption of the cloud, the Amazon Web Services (AWS) MSP Partner Program criteria is always changing. The program recognizes highly skilled AWS Partner Network (APN) Consulting Partners that provide full lifecycle solutions to customers. AWS recently released Version 4.0 of its Validation Checklist, and is requiring all APN Partners to meet requirements by April 1, 2019.

    Achieving AWS MSP Partner Program Validation is possible and easy with the right preparation. In this webinar, attendees will hear a summary of the new requirements, how CloudCheckr helps MSPs meet those checklist items, and areas where MSPs can increase cloud growth and profit going forward.
  • Cloud Security: Thinking Beyond the Perimeter
    Cloud Security: Thinking Beyond the Perimeter
    Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, Forrester Recorded: Mar 19 2019 55 mins
    Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.

    Join us on this webinar with Robert Arandjelovic from Symantec and guest speaker Heidi Shey from Forrester Research as they discuss;

    - The inherent security challenges of cloud

    - Security strategies and imperatives

    - How organizations are approaching and need to approach cloud security today.

    Please Join Us, Register Today
  • Information Security – Building the Right Team – Success Stories
    Information Security – Building the Right Team – Success Stories
    Alex Holden, CISO Hold Security, LLC Recorded: Mar 19 2019 61 mins
    One of the toughest fights in information security is the fight for your budget. The most integral part of your budget are your employees. We will discuss how strategic investments into the human capital can make or break your security posture. How to get the right talent, and also how to retain it. The human side of economics is usually the most unpredictable one and you need to know how to navigate it.
  • Docker and IDC: Containers in Production
    Docker and IDC: Containers in Production
    Gary Chen, Research Manager at IDC and Jenny Fong, Director of Product Marketing at Docker Recorded: Mar 19 2019 40 mins
    Containers have evolved into a transformative technology for application development and portability, but containers alone are not sufficient for meeting today’s enterprise requirements. In IDC’s recent Container Infrastructure Survey, over 76% of enterprises surveyed stated they use containers in production for mission critical apps, with 83% of container deployers using containers on multiple public clouds.

    In this webinar, Docker and guest speaker IDC Research Manager Gary Chen will discuss why companies are turning to container platforms to support increasingly diverse IT environments, bolster security and governance, and power digital transformation initiatives - from cloud migration and application modernization to microservices.
  • How to Develop and Implement an Effective Cloud Assurance Program for Government
    How to Develop and Implement an Effective Cloud Assurance Program for Government
    Ron Bushar, Vice President & CTO - Government Solutions Recorded: Mar 19 2019 59 mins
    As departments and agencies move business operations to the cloud, protecting assets and data remains top priority. Identifying the steps and actions needed to structure, develop, and implement effective security controls in this new environment is the critical first step.

    Where should you start? How do you prioritize activities? How can you leverage existing IT programs, processes, and policies that are already in place?

    Join FireEye’s Ron Bushar, Vice President & CTO - Government Solutions, as he shares steps and best practices to building a cloud assurance program, including:

    - Identifying roles and responsibilities of government, service provider, and third-party stakeholders
    - Adapting existing data classification scheme for cloud services and establishing a cloud-adapted risk assessment process
    - Implementing requirements baselines, risk assessments, and approaches to addressing unique risk scenarios
    - Selecting a cloud service delivery and deployment model
  • Fireside Chat with OneLogin’s CEO & CPO
    Fireside Chat with OneLogin’s CEO & CPO
    Brad Brooks, Chief Executive Officer at OneLogin and Venkat Sathyamurthy, Chief Product Officer at OneLogin Recorded: Mar 19 2019 59 mins
    You’re invited to an exclusive, OneLogin customer-only webinar that gives a sneak peak into the future of work, 2019 market trends and what you and your company can expect from OneLogin in 2019 and beyond.

    What does the future of work look like and how does security and access management fit into this bigger vision? How will OneLogin provide the right tools to support the changing workforce at your company?

    Tune into this special webinar to learn the workplace changes predicted by CIOs from around the world and how OneLogin is evolving to support this rapidly approaching future. This webinar will be hosted by OneLogin’s Chief Executive Officer, Brad Brooks and Chief Product Officer, Venkat Sathyamurthy on March 19, 2019 at 11am PST/2pm EST.

    During this webinar, we will be covering the following topics:

    • 2018 Lookback
    • Trends We’re Seeing
    • OneLogin Customer Feedback and Learnings
    • Future Vision: 2025
  • Key Application Security Strategies for your Cloud Migration
    Key Application Security Strategies for your Cloud Migration
    Rohit Gupta, Global Segment Leader; Surag Patel, Chief Strategy Officer Recorded: Mar 19 2019 52 mins
    Cloud computing is one of the major shifts in technology that is gaining rapid traction and is helping fuel the growth in today’s digital transformation. As leading organizations modernize their hardware and software environments, they are demanding flexibility, business agility and operational efficiencies. This ultimately equates to tangible cost savings, loyal customers and higher profits, as organizations leverage the cloud to compete more effectively and differentiate their digital service and product offerings.

    As a real-world example, you will hear from Chris Perkins, Senior Security Architect at a major Fortune 500 medical technology and solutions company on:

    - Key drivers and use cases in migrating from traditional legacy technologies and embracing modern hybrid cloud computing approaches.
    - Application Security threat landscape, testing pipelines and native integrations.
    - Major hurdles and lessons learned (organizationally, culturally, technology) and how to reduce friction and increase collaboration between Dev & Ops teams
    in order to optimize resources and ensure a secure Cloud migration.
    - The cost curve for remediation of defects enabling a safer speed to market and growth

    You’ll also hear from Rohit Gupta, Global Segment Leader, Security: Amazon Web Services (AWS) highlighting key tenets for security for AWS and the framework required to help their customers meet compliance, regulation and security objectives and Surag Patel, Chief Strategy Officer, Contrast Security, underscoring modern approaches to automate, integrate and scale Application Security.

    As a result of this webinar, you will hear about the major benefits in migrating to a secure, compliant cloud environment and learn from a customer’s experience on how to successfully automate and secure your applications. There will also be a Q&A session at the end of the webinar.
  • If Cloud is the Problem DataOps is the Solution
    If Cloud is the Problem DataOps is the Solution
    Kirit Basu - VP of Product - StreamSets Recorded: Mar 19 2019 44 mins
    According to research firm Gartner, at least 75% of large and global organizations will implement a multicloud-capable hybrid integration platform by 2021. Join StreamSets Head of Product Management, Kirit Basu, and Head of Product Marketing, Clarke Patterson as they discuss how StreamSets customers are taking a DataOps approach to hybrid-cloud integration.

    We explore how Fortune 500 customers are using StreamSets to streamline Apache Kafka and Data Lake projects using principles adopted from DevOps.

    During this webinar, we will discuss:

    -Pitfalls to avoid for any hybrid-cloud project
    -Key requirements to ensure continuous movement of data across any cloud
    -How StreamSets customers are using the platform to drive real value from DataOps
  • Take Back Control of Your DNS Traffic
    Take Back Control of Your DNS Traffic
    Bryan Lee, Martin Walter, and Stan Lee, with host Zoltan Deak Recorded: Mar 19 2019 43 mins
    DNS is wide open for attackers. Security teams are under pressure to enforce consistent protections for millions of new malicious domains while keeping up with advanced tactics like DNS tunneling. How can you take back control of your DNS traffic and prevent these threats?

    Join Palo Alto Networks experts to see:
    • How real-world threats found by Unit 42 use DNS for command-and-control and data theft.
    • Challenges in addressing DNS-based attacks faced by the Palo Alto Networks SOC team.
    • Best practices for protecting DNS traffic to keep your organization safe.

    You’ll also get your questions answered in our live Q&A when you join us for this interactive session. Learn what you should be doing to protect your DNS traffic today—and how to stay ahead of emerging tactics.
  • Network Automation: Getting from Automatable to Automated
    Network Automation: Getting from Automatable to Automated
    James Kelly Recorded: Mar 19 2019 50 mins
    Technology is constantly moving on, and business is constantly moving on with it. Automation is the key to keeping your enterprise on pace, not only with disruptive innovations, but with emerging security threats to your infrastructure, too.

    Now in the multicloud era, automation is an imperative to drive operational reliability, security and speed without tradeoffs.

    In this webinar, you’ll learn:

    -Why network automation is not the same as automated networks
    -How network reliability engineering can enable operational simplicity
    -The five-step journey towards automated NetOps
  • Outside the Network: Protecting People and Customers Against Digital Threats
    Outside the Network: Protecting People and Customers Against Digital Threats
    Roman Tobe, Senior Product Marketing Manager, Proofpoint Recorded: Mar 19 2019 52 mins
    Bad actors do not just target employee inboxes - they also target the brand itself, key employees and customers on digital channels.

    Social media, web domains and the deep and dark web pose areas of risk where companies are not directly in control of their communication security. Despite their value, these properties are often left unsecured against fraudulent activity.

    Since these are emerging threats, digital risks can be blind spots of focus for security teams.

    Join this webinar to learn about trends in digital risk including:

    -Executive impersonations targeting your people on LinkedIn
    -Social media protection on Instagram, Facebook and Twitter
    -Credential threats on the dark web
    -Physical threats to key locations
    -Counterfeit domains in the retail space
    -Visibility into the digital threat landscape
    -How to protect against these threats
  • Demystifying Cyber for the Board and Beyond
    Demystifying Cyber for the Board and Beyond
    Griff James, Director, Damrod Analysis Ltd Recorded: Mar 19 2019 40 mins
    Successful security programs explain the situation, the risks, and the options available in a way that is both simple and true. Damrod draws on military analytical frameworks to develop map models that accurately depict the cyber terrain and guide the generation of a series of overlays. These build to create an Effects based plan suitable for Governance, Risk, and Compliance needs.

    Join this webinar for an introduction to the cyber-as-conflict model developed by Damrod.
  • In Pursuit of the Comprehensive SD-Branch with Secure SD-WAN
    In Pursuit of the Comprehensive SD-Branch with Secure SD-WAN
    Nirav Shah, Sr. Director, Product & Solutions, Fortinet; Stephen Watkins, Principal Security Architect, Fortinet Recorded: Mar 19 2019 49 mins
    Join the discussion and learn about the full advantages of implementing an SD-WAN solution that enables both digital transformation and comes with critical cybersecurity.

    Our Fortinet experts will guide you through a variety of use cases including how creating an SD-Branch can extend SD-WAN capabilities to enterprise branches, plus key insights about what your peers are weighing in on about the current landscape of SD-WAN solutions.

    Watch this webinar to discover:

    - How to enable enterprise branches by creating an SD-Branch
    - Third Party analysis and outlook for the future of SD-WAN
    - How Fortinet’s SD-Branch stacks up against the competition
  • Medical Device Risk Assessments - HIPAA Happenings
    Medical Device Risk Assessments - HIPAA Happenings
    24By7Security, Inc. Recorded: Mar 19 2019 60 mins
    Medical Devices are continually increasing in use and popularity, with the advent of so many new technologies in the healthcare space. They could pose several security and privacy risks. Learn from a leading hospital Chief Information Security Officer (CISO) about Medical Device Risk Assessments.

    Featured Speaker: Mauricio Angee, CISO of Mount Sinai Medical Center

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • Join the Cyber Elite - Get a $30K+ Raise Before Your Degree - CISSP Exam Voucher
    Join the Cyber Elite - Get a $30K+ Raise Before Your Degree - CISSP Exam Voucher
    Dr. V. N. Berlin, CEO, Mission Critical Institute Recorded: Mar 19 2019 29 mins
    In this series, learn how to join the Cyber Elite and earn a $30K+ raise and a $500 CISSP Exam Voucher, even before you finish your cyber degree.

    You will learn what to add to your resume to get cyber employers to recruit you for top positions, even if you have not finished your degree. Then you will learn how to get employers to hire you.

    To motivate you to work to join the Cyber Elite in 2019, MCI offers qualified candidates CISSP Exam vouchers --- a $500 savings.

    In this series you will learn how employers pick candidates for $30K pay raises.
    •What project experience do they want?
    •What certifications must you have?
    •What additional credentials do you need?
    •How to motivate employers to hire you before you finish your degree

    You will also learn about the rapidly growing cyber sector: cloud security risk management.

    During these webinars you will also review profiles of candidates who have actually gotten $115K+ cyber positions and why they were able to get those jobs.

    Plan to join the cyber elite in 2019. Use this valuable information to guide your cyber career planning decisions now.
  • Aporeto + Digital Anarchist: RSA Conference 2019 Interview with Jason Schmitt
    Aporeto + Digital Anarchist: RSA Conference 2019 Interview with Jason Schmitt
    Jason Schmitt Recorded: Mar 19 2019 9 mins
    Aporeto CEO, Jason Schmitt discusses cloud security trends and risk management with Digital Anarchist at RSA Conference 2019 in San Francisco.
  • Live Webcam Panel: Operationalizing Cybersecurity
    Live Webcam Panel: Operationalizing Cybersecurity
    Michelle Drolet, Towerwal, Amy McLaughlin, Oregon State University and Ariful Huq, Aporeto Recorded: Mar 19 2019 56 mins
    Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.

    Join us for an interactive Q&A panel with security leaders to learn more about how to operationalize cybersecurity.

    Topics up for discussion:
    - Making information security relatable
    - Building security programs
    - Defining your cybersecurity strategy
    - Translating your cybersecurity strategy into a risk management plan
    - Operationalizing your cybersecurity strategy
    - Using the maturity capability model for measuring success

    Moderator:
    Michelle Drolet, CEO, Towerwall
    Panelists:
    Amy McLaughlin, Director of Information Services, Oregon State University
    Ariful Huq, Director of Product Management, Aporeto
  • The Email Security Goal: ONE Single Solution
    The Email Security Goal: ONE Single Solution
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Mar 19 2019 50 mins
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
  • 2019 年インターネットセキュリティ脅威レポート(ISTR): 新しい脅威の状況
    2019 年インターネットセキュリティ脅威レポート(ISTR): 新しい脅威の状況
    滝口 博昭, CISSP, マネージドセキュリティサービス 日本統括, 株式会社シマンテック Mar 20 2019 6:00 am UTC 60 mins
    ランサムウェアが減少の兆候を見せる中で、それに代わり新たな攻撃方法が出現してきています。ステルス性の高い手法により、攻撃者は気づかれないまま行動を起こすことが可能になり、企業のリスクが高まっています

    このウェビナーでは、このような傾向と、以下の内容について説明します。

    • クリプトジャッキングとランサムウェアが減少の兆候を見せる中、2018 年にはフォームジャッキングが急増しました。一方で、企業は引き続き標的型ランサムウェアの問題に直面しています。

    • ツールの現地調達およびサプライチェーン攻撃が新しい脅威の状況を代表するものになりました。

    • クラウドユーザーは、クラウドストレージからのデータ漏えいや下位チップの脆弱性によって複数の面で課題に直面しています

    • 標的型攻撃グループは攻撃活動の対象に対する関心を高めており、破壊的なマルウェアを採用するグループが増加しています。

    今すぐ登録し、是非ご参加ください。
  • Best Practices in Securing DNS
    Best Practices in Securing DNS
    Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox Mar 20 2019 6:00 am UTC 60 mins
    NGFWs, IDS, sandboxes, DLP, etc are important - but increasingly, DNS is a major security weakness, allowing hackers to exfiltrate & infiltrate confidential data. This is a known issue because DNS was initially designed very simple and this attracts hackers to abuse the protocol. How do we protect our internal data and prevent hacker attacking the service?

    Join Infoblox and (ISC)² on Mar 20, 2019 (Wed) at 14:00 (GMT +8) to learn the best practices in securing DNS.

    Presenter: Rio Sibuea, Sr. Pre-Sales Systems Engineer, Infoblox
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • IDを使用して組織の内と外を防御する
    IDを使用して組織の内と外を防御する
    中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies; 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー; Akamai Technologies Mar 20 2019 8:00 am UTC 60 mins
    ID は、セキュリティと生産性を両立するようなセキュリティプランを立てるための重要な要素です。このウェビナーでは、ID 管理による組織内外の防御について考察します。

    • ゼロトラスト・アーキテクチャの考え方についてはすでに取り上げてきましたが、ゼロトラスト・ネットワークを設計する際に利用できるオプションはたくさんあります。その 1 つが Identity Aware Proxy(IAP)です。 このウェビナーの前半では、IAP を実装する際のベストプラクティスを説明します。IAP を使用することで、ネットワークレイヤーではなくアプリケーションレイヤーで ID とアクセスルールを適用し、必要最小限のアクセス権の原則に基づいて確実にアクセスを制御します。

    • 後半では、アジア太平洋および日本における Credential Stuffing (ボットによる不正ログイン)犯罪の増加について取り上げます。このセッションでは、Credential Stuffing が生じる原因、攻撃による経済的損失、攻撃者が利用する手法、ボットによる自動化などについて解説します。また、ボットがもたらすリスクの緩和について、さまざまな業界での成功事例も紹介します。

    Presenter: 中西 一博, プロダクト・マーケティング・マネージャー, Akamai Technologies
    Presenter: 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    Moderator:小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Séminaire en ligne: Plan d'action pour la segmentation de votre réseau
    Séminaire en ligne: Plan d'action pour la segmentation de votre réseau
    Nicolas Liard, Pre Sales Engineer France, Benelux Mar 20 2019 9:00 am UTC 60 mins
    Un réseau segmenté opérationnalise votre politique de sécurité, permet un état de conformité continue avec un minimum d'effort et fournit des options d'atténuation des cyberattaques. Mais la segmentation du réseau n’est pas une tâche facile !

    Rejoignez les experts de Tufin le 20 février pour partager des conseils pratiques sur la segmentation du réseau, notamment :

    • Les pièges à éviter lors de la création d’une stratégie de segmentation
    • Cadre de segmentation
    • Lignes directrices pour appliquer et maintenir un réseau segmenté
  • Cost of Data Breach: An Ounce of Prevention is Worth a Pound of Cure
    Cost of Data Breach: An Ounce of Prevention is Worth a Pound of Cure
    Athar Awan, Cyber Security Professional Mar 20 2019 9:00 am UTC 60 mins
    In this webinar, we will be talking about not only the cost of data breaches but also impact of breaches and lesson learned for businesses, trends to reduce the risks and finally conclusion about how to prevent data breaches.
  • Rafforza la tua infrastruttura di sicurezza con i firewall virtuali SonicWall
    Rafforza la tua infrastruttura di sicurezza con i firewall virtuali SonicWall
    Antonio Cancellara Mar 20 2019 10:00 am UTC 60 mins
    Con l’adozione del cloud in continuo aumento, le funzionalità dei firewall di nuova generazione sono essenziali per proteggere i carichi di lavoro nel cloud dalle minacce avanzate mediante il rilevamento e la protezione in tempo reale automatizzati.

    Partecipa a questo webinar esclusivo per scoprire dagli esperti di SonicWall come i firewall della serie SonicWall Network Security virtual (NSv) possono aiutarti a rafforzare la strategia di sicurezza per i tuoi ambienti cloud ibridi e multi-cloud. Argomenti del webinar:

    •Principali tendenze del settore e minacce
    •Funzionalità della serie NSv per proteggere efficacemente tutti i componenti critici degli ambienti cloud privati o pubblici
    •Protezione da movimenti laterali e strategia di protezione coerente
    •Blocco di minacce avanzate
    Dimostrazione in diretta
  • 2019 Global Threat Report: Adversary Tradecraft and The Importance of Speed
    2019 Global Threat Report: Adversary Tradecraft and The Importance of Speed
    Adam Meyers: VP of Intelligence; Jennifer Ayers: VP of OverWatch and Security Response Mar 20 2019 10:00 am UTC 65 mins
    The 2019 CrowdStrike® Global Threat Report offers one the industry’s most comprehensive reports on today’s top cyber threats. The report combines CrowdStrike’s comprehensive global observations with real-world case studies. delivering deep insights on modern adversaries, and their tactics, techniques, and procedures (TTPs).

    Join us for a webcast featuring CrowdStrike VP of Intelligence Adam Meyers and VP of Falcon OverWatch™ Jennifer Ayers as they explore the global trends and observations revealed in the report. They will also offer actionable recommendations you can use to ensure your organization is ready to anticipate and defend against the most dangerous threats of tomorrow.

    Join this webcast to learn:

    - The most favored TTPs observed throughout 2018 as seen through the lense of MITRE ATT&CK™framework

    - Updates on global “breakout” time statistics, including observations on which adversaries showed the fastest tradecraft in 2018

    - How nation-state adversaries continue to target dissidents, regional adversaries and foreign powers to collect intelligence for decision-makers

    - How cybercriminals combine advanced, targeted attack techniques with ransomware to achieve massive financial payoffs via “Big Game Hunting”

    - How the eCrime ecosystem continues to evolve and mature, showing increased collaborations between highly sophisticated criminal actors
  • Fix your Leaky Onboarding Funnel with Online Identity Verification
    Fix your Leaky Onboarding Funnel with Online Identity Verification
    Dean Nicolls, VP of Marketing, Jumio Corp. Mar 20 2019 10:00 am UTC 26 mins
    Customer acquisition is top of mind for most financial service organizations and their boards. Normally, when banks and other financial service institutions think customer acquisition, they think about launching a new advertising campaign with the hope of driving more online or in-branch traffic -- but these campaigns are iffy at best.

    Instead, why not rethink your online account opening process where FSIs lose about 20% of their prospects through abandonment. If you can plug that leaky funnel, you will see an immediate improvement in customer acquisition.

    Join us for this informative “how-to” webinar and discover how to…

    - Dissect the abandonment problem
    - Reduce the number of identity verification screens & clicks
    - Cast a wider net with omni-channel verification
    - To say “no” to verification “maybes”
  • Reducing Operational Costs with Better Network Management in the Cloud
    Reducing Operational Costs with Better Network Management in the Cloud
    Guido Kragten, Sales Enablement Cloud Platforms, EMEA Mar 20 2019 10:30 am UTC 60 mins
    Whether you’re expanding a network to support new initiatives, navigating through growing security challenges, or planning a refresh of older technology; keeping costs down and saving time for your IT Team is key.

    Join our webinar and learn how Aruba delivers the industry’s most robust and reliable networking solutions for small and midsize businesses - help reduce planning, deployment and operational costs with features such as:

    •Zero-Touch Provisioning
    •Comprehensive Alerting
    •Integrated User Analytics
    •Scheduled and On-Demand Reporting
    •Automated Firmware Updates
    •All from a single interface
  • Cybercrime: The Rise Of Information Theft And Its Cost
    Cybercrime: The Rise Of Information Theft And Its Cost
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Mar 20 2019 11:00 am UTC 60 mins
    Cybercriminals have never been so interested in the theft, trading and monetisation of data before. Information stealing malware is rapidly increasing, and the design of this malware and the way stolen data is used are both seeing great criminal innovation.

    Join Webroot’s Threat expert as he discusses topics such as:

    · Top reasons data is stolen from businesses
    · Direct and indirect costs of a breach and steps to mitigate this threat
    · The shifting of targets in phishing and other data theft in recent times
    · The rise of banking trojans, modular malware and other info stealers
    · Darkweb trading
    · GDPR and legal repercussions of a breach
  • Software at the Heart of Any Vehicle
    Software at the Heart of Any Vehicle
    Per-Olof Persson, Security Advisor, Synopsys Mar 20 2019 11:00 am UTC 90 mins
    As vehicles get smarter, security in the automotive industry is an increasing concern. Cars are being turned into Wi-Fi hotspots and contain many millions of lines of code for autonomous driving. As a result, they are more vulnerable than ever to bugs, hackers, and data theft.

    At the heart of the vehicles of tomorrow is software with artificial intelligence and powerful silicon chips all working together. Learn how these technologies will transform the traditional automotive supply chain from a mechanical-driven world to a digital one.
  • Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
    Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
    Flavio Di Cosmo, Pre-Sales Engineer SEEMEA Mar 20 2019 1:30 pm UTC 60 mins
    Una rete segmentata rende operativa le policy di sicurezza, consente uno stato di compliance continua con il minimo sforzo e offre opzioni di mitigazione per gli attacchi informatici. Ma la segmentazione della rete non è un compito facile!

    Unisciti agli esperti di Tufin il 20 Marzo 14:30 mentre condividono consigli utili per la segmentazione della rete, tra cui:

    •Insidie da evitare durante la creazione di una strategia di
    segmentazione
    •Framework per la segmentazione
    •Linee guida per l'applicazione e il mantenimento di una rete
    segmentata
  • Cyber Security Brief: DE data leak, dodgy IoT devices, and PewDiePie hackers
    Cyber Security Brief: DE data leak, dodgy IoT devices, and PewDiePie hackers
    Cyber Security Brief Podcast Mar 20 2019 2:00 pm UTC 22 mins
    We discuss the fact that most people don’t trust their internet of things devices, but also aren’t that willing to pay extra for improved security. We also chat about the major leak of personal data of high-profile politicians and others in Germany, and developments in the campaign of the hackers taking over printers and Chromecasts to express their support for PewDiePie (and highlight security issues). Finally, we take a look at some research highlighting the fact that facial recognition on smartphones still isn’t foolproof.
  • Panel: Network Security and Compliance best practices for Financial Institutions
    Panel: Network Security and Compliance best practices for Financial Institutions
    Asher Benbenisty, Director Product Marketing; Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) Mar 20 2019 2:00 pm UTC 30 mins
    Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.

    There’s a better way to manage your network security!

    Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.

    Topics include:

    •How to overcome security management complexities with automation
    •How to pass compliance audits in the face of demanding regulations
    •Key industry metrics that compare security environments within and beyond the finance industry
    •Real financial customers case studies
  • IRP and SIEMs: How to beat the volume vs. visibility
    IRP and SIEMs: How to beat the volume vs. visibility
    Andy Yeates, Solutions Architect, IBM Resilient Mar 20 2019 2:00 pm UTC 60 mins
    Combining an IRP solution with a SIEM makes security operations more mature in order to triage, reduce the time to respond, improve SOC efficiencies, and gain overall a significantly improved accuracy.
  • ICS threats in H2 2018: deep dive into attack statistics and security weaknesses
    ICS threats in H2 2018: deep dive into attack statistics and security weaknesses
    Kirill Kruglov, senior security researcher at Kaspersky Lab ICS CERT Mar 20 2019 2:00 pm UTC 90 mins
    The webinar will be helpful for those who wish to know more about current ICS cyberthreats.

    The webinar’s speaker Kirill Kruglov, senior security researcher at Kaspersky Lab ICS CERT, will talk about major threats relevant to industrial control systems that Kaspersky Lab ICS CERT identified in H2 2018. In addition to discussing general statistics on malicious attacks that were detected and prevented by Kaspersky Lab products on industrial computers globally, he will offer a deeper dive into the attacks we saw, TTPs used by attackers, and root cause analysis of major security weaknesses we discovered. In addition, Kirill will discuss the methodology used to collect and analyze the data, which will help the webinar participants to better understand what these figures mean.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Mar 20 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Verizon Insider Threat Report and the current cybersecurity threat landscape.

    We'll cover:
    •The time it takes to discover a breach after the first action
    •5 insider threat types identified by our caseload
    •Top 3 insider threat motivations
    •Top industries suffering sensitive data breaches

    Our Verizon Threat Research Advisory Center presenters will be:
    •John Grim, Senior Manager, Investigative Response - America
    •Domingo Jesus Alvarez-Fernandez, Senior Dark Web Hunter, Threat Intelligence
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Safe, Secure, Convenient: The 30-Minute Enterprise File Sharing Buyer’s Guide
    Safe, Secure, Convenient: The 30-Minute Enterprise File Sharing Buyer’s Guide
    Nick Scholz, Robin Redgrave and Devadas Kovilakath, Micro Focus Mar 20 2019 3:00 pm UTC 60 mins
    As companies undergo digital transformations—with a laser focus on simplifying operations and boosting productivity—users are being asked to get more done faster and with fewer resources.

    In this climate, it’s not surprising that employees independently turn to cloud file sharing services they may already be using at home to help them sync and share their files and get their work done.

    But these consumer-grade services lack the security, control, and management features that many organizations need to protect themselves from data loss, breaches, and business continuity failures, so many IT leaders are stuck: how do they enable productivity and ease the sharing of critical files without compromising their security and compliance needs?

    Join Nick Scholz, Robin Redgrave and Devadas Kovilakath to see what experts are saying about what to look for in an EFSS solution, and how to figure out which one fits your needs.

    You’ll learn:
    • What features help users adopt
    • The state of the EFSS landscape
    • The benefits and shortfalls of Cloud vs. On Premises solutions
    • How to maximize security AND collaboration
    • And more!
  • Creating a Cybersecurity Culture
    Creating a Cybersecurity Culture
    Heather Stratford, CEO of Stronger.tech Mar 20 2019 3:00 pm UTC 44 mins
    For the last 2 decades, technology security was delegated to the IT team. It was role specific and designated for one small subsection of the IT team. That mentality and way of thinking must change.

    A paradigm shift is required for the whole organization. Every part of the organization contributes to the success or failure of the organization. Creating a security culture is not a one-time event, it is a new way of talking and acting.

    Join this webinar with Heather Stratford, CEO of Stronger.tech to:
    - Understand the steps that need to happen to create this culture
    - See where your organization is on the scale of creating a Strong Security Culture
    - Learn why creating a security-minded culture is an essential part of the "new" requirements for a CIO.
  • Live global security roundtable: perspectives, threats and risks per region
    Live global security roundtable: perspectives, threats and risks per region
    BT's Security experts: Steve Benton, Hila Meller, Juni Yan, and Gary Symes Mar 20 2019 3:00 pm UTC 30 mins
    Join four of our top security experts to hear their point of view and their vision for security across the globe. Our vice presidents from Asia, Middle East, Australia and Africa, America, Europe and the UK will share their frontline experience of dealing with some of the security challenges in their region.

    Cybersecurity is a truly global concern with attacks and threats emanating from all over the world. The way each region tackles the cyber threat is subtly different. Our experts will take you through some effective security strategies and programmes that you can put in place to protect your "crown jewels" against the evolving global threats.

    Whether you're a multinational organisation with worldwide operations, or based in one particular region, our webinar will give you a local and global view on how to find your way around the security minefield.

    Speakers:
    - Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes
    - Hila Meller, Vice President, Security, Europe
    - Juni Yan, Vice President, Security, Asia Middle East, Australia and Africa
    - Gary Symes, Vice President, Security, Americas
  • Expert Q&A 5 Steps to Implementing Security Automation
    Expert Q&A 5 Steps to Implementing Security Automation
    Joe Schreiber, Technical Director, Business Development, Tufin & Karen Crowley, Sr. Product Marketing Manager, Tufin Mar 20 2019 4:00 pm UTC 60 mins
    Join automation expert Joe Schreiber on March 20th as he shares his experiences automating himself out of a job (in a good way), and discusses where to start and how to avoid risk.

    Joe will present his five steps and answer questions from the audience on how to:

    Collaborate with the rest of your team on automation
    Organize your multi-vendor toolbox and use APIs to ensure success
    Empower your teams to write reusable, value-driven code
    Leverage modern applications in containers, microservices, and serverless environments
    Got questions? Send them to Joe ahead of time to be included in the discussion.
  • Configuration Compliance Management for 2020 and Beyond
    Configuration Compliance Management for 2020 and Beyond
    Sam Abadir, Lockpath Mar 20 2019 4:00 pm UTC 60 mins
    Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:

    •What configuration compliance management encompasses
    •Who should care about secure configuration management
    •Why organizations are not doing this today and how this impacts the business beyond IT


    Discover the future for configuration compliance management by attending this educational webinar. Register now!
  • Behavioral Economics and the Savings Crisis
    Behavioral Economics and the Savings Crisis
    Kristen Tyrrell, COO, Catch Mar 20 2019 4:00 pm UTC 60 mins
    Managing your safety net has gotten harder. Having enough money set aside for emergencies, saving for retirement, and even getting the right insurance is confusing and expensive. Why is that? How can we build solutions that help provide stability in the face of increasing income volatility, short-circuited reward systems, and systemic challenges? In this webinar our guest Kristen Tyrrell will highlight the challenges of the current savings crisis and dive deep into framing behavioral economic solutions for new ways to build financial security and grow wealth.

    In this webinar, you’ll learn:
    oWhat is a financial safety net?
    oWhat is the savings crisis?
    oWhy is it so hard to save?
    oWhat can we do to make it easier?
  • Micro-segmentation is achievable. What's stopping you?
    Micro-segmentation is achievable. What's stopping you?
    Joe Onisick, CTO, Xentaurs Mar 20 2019 4:00 pm UTC 30 mins
    Yes, micro-segmentation (uSeg) is complex and seems expensive. But, the barriers are finally breaking down. True uSeg is now achievable, and we’ll tell you how. In 30 minutes, we’ll define:

    1. The scope of uSeg
    2. uSeg models that really work
    3. Requirements for successful implementation
    4. Why this approach is defining modern cybersecurity strategies

    Join us Wednesday, March 20, at 11 a.m. for our webinar, Micro-segmentation is achievable. What's stopping you?
  • OpenShift 4 and Black Duck: New Runtime, Same Secure Containers
    OpenShift 4 and Black Duck: New Runtime, Same Secure Containers
    Jay Dobies, Red Hat & Dave Meurer, Synopsys Mar 20 2019 4:00 pm UTC 60 mins
    OpenShift 4 represents the culmination of a number of new technologies. One key feature of this release is CRI-O, the new container runtime that is optimized for OpenShift. But a new runtime doesn’t have to be scary. Black Duck OpsSight for OpenShift still provides the same security intelligence and visibility into all the third-party open source software that composes your containers.

    Join experts from Synopsys and Red Hat as we explore the following topics:
    • Upcoming features in Red Hat OpenShift 4, including the drivers and benefits of the Operator Framework
    • How Black Duck and Clair complement each other • The Synopsys application security portfolio
    • Black Duck OpsSight for OpenShift architecture
    • OpenShift 4 Black Duck OpsSight demonstration on a CRI-O container