The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
While cyber threats are exponentially increasing in volume, diversity and sophistication, they are rapidly outstripping our ability to safeguard critical data, applications and systems. Join this webinar to hear SA Morgan explain how the FBI addresses the cyber threat, discuss the cyber threat landscape in K-12, and provide prevention and mitigation techniques that you can implement on your campus.
In this webinar, Lockpath’s Sam Abadir and Community Health System’s Scott Breece will discuss the unique IT landscape of the healthcare industry and the challenges this presents for IT risk management.
Abadir and Breece will discuss common strategies for identifying and managing IT risks including risk assessment methodologies, best practices for assessing business associates and third parties, incident response plans, and available toolsets to support these activities.
Fact: only a quarter of organizations are focusing on a digital transformation strategy even though more than 85% of CEOs believe technology will transform their business more than any other global trend.
Join Rajesh Thukral, Director of Digital Business Transformation for our latest webinar as he explores the digital imperative – why every business needs to think “digital” and embrace new ways of working with their customers and employees – or risk being disrupted.
Digital technologies are defining and disrupting how we think and do business.
Come away with industry insights and tools that will let you assess your company’s digital mindset and help chart your own transformation journey.
Wael Elrifai shares his experience working in the IoT and AI space; covering complexities, pitfalls, and opportunities to explain why innovation isn’t just good for business—it’s a societal imperative.
Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.
Learn how Citrix networking solutions for hybrid cloud can deliver:
•Contextual and secure access to applications
•Website and application protection from internal and external threats
•Application and network visibility and intelligent analytics
•Flexibility and performance
These and other trending vulnerabilities from our Quarterly Threat Report. Cyber threats are as unpredictable as the weather, which can make preparing and planning for them daunting and full of uncertainty.
Join our fourth installment of in-depth threat research where our security strategy expert walks you through the top trends, such as IoT botnets targeting System-on-Chip (SoC) devices, fileless malware and -cha-ching! - the mining of digital currency.
The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:
In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.
Implementing a digital identity strategy can be complicated. Let CA help.
What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?
Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
Financial services have always done identity management. It began as the teller or manager knowing each customer. Next came signature matching, passbooks, and – if you had a lock box in a vault – a key. These systems were inflexible and inconvenient on purpose. With the advent of the computer age, these organizations simply adopted the digital analogs of these physical systems: PINs and passwords. These increased flexibility – a customer or employee could access an account at any time from practically anywhere – but sacrificed security for the sake of convenience. To be secure, PINs and passwords need to be long, complex, and changed regularly: Three things customers have no interest in.
Today, identity management is undergoing a revolutionary change as biometrics allow companies to combine the convenience people want with the security that both people and organizations need. Learn how three financial services companies from across the world, a private investment firm, a prominent Swiss bank, and a major trading organization, have deployed a biometric authentication platform as part of their identity and access management strategy. Veridium’s Chief Product Officer, John Spencer, will explore the key factors that make up a secure biometric authentication platform, and Global Head of Sales Engineering, Ross Penny, will discuss the details of deploying within different environments.
In this webinar we’ll discuss:
• Using enterprise-ready solutions to replace passwords with multi-factor biometric authentication – including 4 Fingers TouchlessID, face recognition, and touch recognition – for employee and customer access.
• Maintaining a highly secure-yet-convenient user experience across any channel: ATM, app, and personal computer.
• Providing users with fast, easy, and seamless enrollment and verification.
The NIST Cybersecurity Framework (CSF) is the chosen path for thousands of organizations. Why? Because resilience is their most critical need in the face of changing threats, ever-present vulnerabilities, and a sprawling attack surface. NIST CSF provides a blueprint for cyber resilience. But turning theory into reality can be a challenge.
In this webinar, you’ll drop in on a conversation between our featured guest, Forrester’s Renee Murphy, Principal Analyst for Security and Risk; and Absolute’s Josh Mayfield, Director of Solutions. They will discuss the clear and tangible steps at work within leading organizations pursuing NIST CSF.
You will gather insights and avoid the pitfalls with your rollout of NIST CSF, including how to:
1- Identify endpoint devices: on and off network
2- Validate configurations for optimal data protection
3- Detect compliance drift within your endpoint population
4- Respond to endpoint security incidents
5- Recover from security incidents and iterate for continuous compliance
- Renee Murphy | Principal Analyst for Security and Risk Professionals | Forrester
- Josh Mayfield | Director of Solutions | Absolute
You know 81% of hacking-related breaches involve stolen or weak credentials (Verizon Data Breach Investigation Report, Verizon, 2017). You know your users are targeted by more phishing attacks than ever before. You even know Multi-Factor Authentication (MFA) is your best weapon in defending against cybercrime.
But how do you wrap your head around an MFA project at enterprise scale? What product capabilities are essential? And how do you cut down on the time it takes to scope, deploy, and operationalize a solution?
Join Jeffrey Broberg, Sr. Director of Mobile Product Management at OneLogin and Michael Gleason, Sr. Manager, Product Marketing at OneLogin for a webinar where you will learn:
- Why a successful MFA deployment represents the ultimate effort-to-impact security project
- Why choosing an Identity Provider with built-in MFA functionality is the ultimate IT + Security twofer
- How to smash the security vs. productivity paradigm with dynamic authentication
- How to deploy and operationalize in hours or day instead of months by deploying MFA in front of your Single Sign-On (SSO) solution
For healthcare providers that receive Medicare and Medicaid reimbursements, managing exclusion risk is critical. Employees, business associates, suppliers, and more who land on state exclusion lists while employed or engaged by a provider can result in severe regulatory penalties. In this educational webinar, Lockpath and Kinney Services will guide you through the world of exclusion risk and point out what you need to know.
Attendees will learn:
* A definition of exclusion risk with real-world examples
* Challenges encountered with managing exclusion risk
* Strategies for implementing a consistent, repeatable review process
* Technology's role in streamlining exclusion risk management
Are you continually reviewing the exclusion status of employees and business entities? If not or reviews are conducted haphazardly, you run the risk of regulatory penalties and a potential crisis in the reimbursement process. Discover what you need to know to managing exclusion risk in this educational webinar.
Join us for a 30 minute overview and Q&A session with our Teradici Cloud Access Software Product Manager Mirela Cunjalo. We will share the use cases and benefits of delivering desktops and workstations with Cloud Access Software and its latest features, including the new brokering and provisioning service.
Once again, our newest Hub release is packed with features requested by you – our customer! Lead Product Managers for Hub, Hal Hearst and Jeff Michael, will share all the new features. We will dive into:
-Bulk snippet confirmation
-BoM hierarchy tree display
-BoM policy violation comments
-Cross-project BoM difference comparison
-Ability to map Hub projects to external application IDs
The email threat landscape is changing. Impersonation attacks and malicious URLs are becoming more popular.
This FireEye webinar features Ken Bagnall, VP Email Security, FireEye and Levi Lloyd, Senior Manager, Detection Services, FireEye who will address changes in email attack tactics:
• How phishing and impersonation attacks are evolving.
• How online/email scams develop.
• What the future of impersonation is.
• What has the best chance of winning against these attacks.
• What techniques are used to detect and stop phishing and impersonation attacks.
Attendees will receive the new FireEye report Changes in Email Attack
Tactics: Based on Data from July to December of 2017.
Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.
In this webinar you will learn about:
•What is the best network fit for virtualized encryption
•How to implement a virtual network encryption appliance in software-defined network
•What are the cost, operational and performance benefits of virtual encryption
•What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4
Is your team stretched too thin? You aren’t alone. 67% of organizations admit that finding qualified cybersecurity professionals is a struggle. At the same time, attacks are escalating at an alarming rate. In 2017, the number of ransomware attacks increased by 30x and the number of breaches increased by 40%.
Join us for a live webinar with Brian Gladstein, Security Market Strategist, Carbon Black, who will share how next-generation endpoint security in the cloud can improve your protection and simplify your operations.
- Learn how cloud-based security platforms are solving 10 common problems IT and security professionals are facing
- Get your questions answered about replacing traditional antivirus with a cloud-based security
- Discover how Cb Defense can help you prevent non-malware attacks and simplify your stack
Defining Process & Metrics to Demonstrate Policy awareness and adherence.
Policies are no good if they are left to be documents that are written and forgotten, stored on a physical or electronic shelf collecting real or digital dust. Organizations need policies that are correctly written, but also clearly understood and enforced in the environment. This webinar looks at the key metrics and process to effectively communicate policies in the environment, track awareness, enforce policies, and monitor metrics of policy adherence.
Attendees will specifically learn how to:
•Write policies that are clearly understood
•Develop a policy communication and awareness plan
•Demonstrate understanding of policies by individuals
•Enforce policy compliance/adherence
•Measure and monitor effectiveness of policies
77% of CISOs working with BT are actively moving to the cloud or planning to adopt cloud services. Of these, 71% said they have some policies, but 30% stated they don't understand what they are in reality.
If you’re thinking about cloud or multi-cloud environments you will need to take a deeper look at your security. Yes, it’s quicker, and agile model and therefore cheaper but it does come with an extra level of risk that previous data centre options mitigated. You’ll need to validate your cloud vendor to make sure your company’s data is separated from other data, that you are getting the context rich information back and that the right people and devices are accessing it. The big thing is to put the necessary and sufficient security and compliance controls in place, and to keep checking that they’re appropriate, effective, and moving forward while you take up the cloud (and beyond).
Join our live discussion with BT’s Security CTO to find out what’s required to identify, manage and control threats across your hybrid estate and multiple clouds. We’ll look at how to discover where your data is, who can see it or access it or process it, and how to avoid data sovereignty violations. The webinar will also cover how vital it is to know what we are all responsible for and how can you mitigate for the risks and new threats in order to stay secure..
Open source management is a key part of any application security toolkit. But with so many different tools and techniques on the market, how can you decide what other tools you need to fully address the security risks of your applications? In this webinar, you’ll learn the benefits and limitations of several application security tools, including SAST, SCA, DAST, IAST, and fuzzing, as well as how they differ, so you can make informed decisions as you build your AppSec toolkit.
Rejoignez les experts en sécurité de SonicWall à l’occasion d’un webinaire exclusif, « Identifiez et stoppez les logiciels malveillants rapidement et efficacement ».
Découvrez comment la technologie RTDMI™ (Real-Time Deep Memory Inspection) de SonicWall permet à la solution SonicWall Capture Advanced Threat Protection de :
•capturer davantage de logiciels malveillants plus rapidement que les stratégies de sandboxing reposant sur les comportements, avec un nombre limité de fausses alertes
•bloquer des attaques très élaborées en étudiant le code empaqueté dans la mémoire au sein d’un environnement sécurisé de sandbox
•stopper rapidement les menaces embarquées dans les documents Microsoft Office et les fichiers PDF Adobe
Nehmen Sie an unserem exklusiven Webinar „Identifizieren und stoppen Sie Malware so schnell und präzise wie möglich“ teil.
Erfahren Sie von unseren Sicherheitsexperten, wie SonicWall Capture Advanced Threat Protection mit SonicWall Real-Time Deep Memory Inspection(RTDMI™)-Technologie:
•mehr Malware erfasst als verhaltensbasierte Sandboxing-Methoden und dabei schneller ist und eine geringere Falsch-Positiv-Rate erzielt.
•raffinierte Angriffe blockiert, indem im Speicher komprimierter Code in einer sicheren Sandbox-Umgebung entpackt wird.
•in Microsoft Office- und Adobe PDF-Dateien eingebettete Bedrohungen schnell stoppt.
E-Mail-Betrug, auch CEO-Fraud oder BEC (Business Email Compromise) ist weit verbreitet und kostet Unternehmen Milliarden. Dabei ist ein Großteil dieser E-Mail-Angriffe vermeidbar. Diese Bedrohungen beginnen meist mit einer E-Mail, die von einer hochrangigen Führungskraft, aber auch von Partnern oder Lieferanten zu stammen scheint. Diese E-Mail weist Mitarbeiter an Gelder zu überweisen oder sensible Daten zur Verfügung zu stellen. Die Empfänger erfüllen pflichtbewusst die übertragenen Aufgaben, überweisen zb das angeforderte Geld – und lernen erst später, dass sie betrogen worden sind.
Erleben Sie in unserem Webinar anhand eines CEO Fraud Live Hack, wie leicht Ihre Mitarbeiter dazu gebracht werden, die betrügerischen Anfragen auszuführen. Anschließend zeigen wir Ihnen auf, wie Proofpoint Ihre Mitarbeiter und Ihr Unternehmen anhand eines mehrstufigen Schutzkonzeptes vor derartigen Angriffen schützen kann.
Escuche a los expertos en seguridad de SonicWall en nuestro seminario virtual exclusivo “Cómo identificar y bloquear malware de la forma más rápida y precisa posible”.
Descubra cómo la tecnología de Inspección de memoria profunda en tiempo real (RTDMI) de SonicWall permite a nuestra plataforma Cloud “Capture Advanced Threat Protection”:
•Detectar más ataques de malware con mayor rapidez que otros métodos de sandboxing de la competencia, basados en comportamiento, y ratio de falsos positivos inferior.
•Bloquear ataques sofisticados desempaquetando el código comprimido en memoria en un entorno seguro de sandboxing
•Detener de forma inmediata las amenazas incrustadas en archivos de Microsoft Office y Adobe PDF
Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.
Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:
--Threats: credential phishing, email fraud, targeted attacks etc
-- Enabling secure digital transformation: people centric security at the heart of the transformation
-- Solutions: regulatory compliance and tools to implement
As eCrime has evolved over the past decade, Nigerian cybercriminals have evolved too. 419 scammers or 'Yahoo Boys' running simple Nigerian prince scams have graduated to criminal confraternities conducting sophisticated business email compromise (BEC).
In 2017 CrowdStrike Services were repeatedly called in to organisations affected by BEC. Although non-technical in nature, the operations yield highly effective results.
In this webinar we'll share CrowdStrike Intelligence outlining:
- The techniques, tactics and procedures of these threat actors
- How BEC affects all geographical regions, involving fraud on multiple continents
- Steps you can take to protect your organisation
Você já superou os desafios de levar as suas aplicações para a nuvem, o próximo passo é se proteger de ataques de cyber e ameaças internas. A única coisa que necessitamos são os seus logs. Nos acompanhem em um webinar no no dia 26 de Junho às 10h onde especialista em segurança analítica e UEBA da Securonix irão indicar como minimizar o risco no seu ambiente na nuvem.
Laut dem SonicWall Cyber Threat Report 2018 haben Ransomware-Angriffe im Jahresvergleich insgesamt deutlich abgenommen. Allerdings geht der Trend bei der Anzahl der Ransomware-Varianten konstant nach oben und ist 2017 um 101,2 % gestiegen. Damit ist Ransomware nach wie vor eine große Bedrohung für kleine und große Unternehmen!
Nehmen Sie an diesem gemeinsamen, exklusiven Webcast von SonicWall und StorageCraft teil und lernen Sie effiziente Methoden kennen, um diese gefährliche und potenziell kostspielige Bedrohung zu bekämpfen. Erfahren Sie
•wie Cyberkriminelle Schwachstellen in Ihrem Netzwerk ausnutzen.
•wie Sie Ransomware verhindern und stoppen können.
•wie Sie Ihre wertvollsten Daten optimal schützen können.
Join Tom Bain, VP of Marketing at Morphisec, as he has a candid discussion with Adrian Asher, CISO of the London Stock Exchange Group, on industry trends, challenges, and recommendations for moving forward.
Digital technology dramatically improves the economics and capabilities of every business, but only if you master the rules and systems that govern digital experiences, digital operations, digital ecosystems, and digital innovation. When business leaders see technology as a business asset that’s central to their success, they are in a position to transform. The benefits are immense – those who succeed find it 10 times cheaper and faster to engage customers, create offerings, harness partners, and operate their businesses.
Our featured guest for this original webcast is Forrester Research Vice President and Principal Analyst Ted Schadler, who will connect the dots between business and technology, and introduce the elements of modern application architecture that all business leaders should know about – the cloud, APIs, microservices, analytics, IoT, and automation. Business leaders will learn how to:
· Master digital’s new rules of business
· Embrace the role that technology plays in business success
· Invest in modern application architecture to accelerate business development
· Work better with IT to bring your digital initiatives to market faster
All registrants will also benefit from a complimentary copy of Forrester’s Digital Rewrites the Rules of Business report.
Guest Speaker: Ted Schadler, Vice President and Principal Analyst, Forrester Research
Email is the most commonly targeted attack vector. While many solutions have been introduced over the years, the invention of new evasion techniques means companies are still highly exposed. A new approach is urgently needed in order to ensure this channel is fully fortified for today and the future.
Join our CEO and CTO to learn more about:
1. How hackers are now easily bypassing traditional solutions like AVs, sandboxes, and more
2. How moving email to the cloud is an opportunity for much stronger, more efficient security
3. How to finally end the cat-and-mouse game with attackers with future-ready prevention techniques
Securing cloud environments is a shared responsibility between your organization and your cloud service provider. But upholding your end of the bargain can be a challenge in these dynamic, complex environments — especially when dealing with a mix of physical networks and public and private clouds. In this webinar, we will discuss issues and strategies for handling Cloud Services and Enterprise Integrations. Amongst the topics covered we will attempt to address the issues of:
- How do cloud services impact security implementations?
- Who is responsible for defining security and how does one implement a security management program in an integrated enterprise cloud service environment?
- What transitional issues may occur during your migration? How do you audit a cloud service?
Register for the webinar to see the issues and benefits of handling cloud services and enterprise integration.
During this presentation, you'll learn about deep learning, the history of artificial intelligence, the history of malware management, and the current approach to eliminating malware threats to the enterprise using AI.
Cognitive systems solve problems the way humans solve problems, by thinking, understanding, reasoning, reacting and interacting. Through simulation of human thought processes, the goal of cognitive computing is to create automated IT systems that are capable of solving problems without requiring human assistance.
This webinar will explore the application of cognitive computing techniques within the energy sector: increasing the accuracy of outage predictions, optimizing uptime, and enabling customers to monitor and control their monthly energy consumption.
Everyone is excited about the vision and promise of IoT. In reality, it's prohibitively difficult for most of us to design, build, deploy and manage an IoT solution.
When compared with software, IoT tools and platforms are fragmented, manufacturing costs are high, and iteration cycles are long. From a go-to-market and wireless connectivity perspective, it's difficult to build once and deploy globally.
Once an IoT app is deployed, security vulnerabilities and monitoring challenges can quickly derail an entire project.
*A Better Way to Build for IoT *
2018 represents an inflection point for 'wide area' IoT connectivity, with operators around the world embracing 3GPP standards for low power IoT devices.
IoT app developers can now take control of how their software connects around the world, from a central management location.
Utilizing these tools along with a development process that emphasizes security, identity, and global coverage is the way to build a successful IoT app in 2018.
Join Evan Cummack, Principal Product Manager at Twilio, for an immersive demonstration moderated by Mehdi Medjaoui, ReadWrite API expert and founder of the APIDays Conference.
*What’s in it for you?*
In this immersive webinar, you will learn:
- How to decide on the best connectivity technology to use for your use case and for your businesses
- How to ensure your app will connect in the countries you want it to connect in
- How to route around provider outages or service disruptions before they ever impact your customers
Intent-based networking is generating interest as a next-generation method for automating network changes and validating network policies. What's really feasible today, what benefits does it offer and where can it be deployed? We will show how it can be used to verify network designs and configurations in a fraction of the time. And it's easily deployed today.
Most security solutions are locked into an out-of-date mindset, looking for known malware that has been constructed by hackers and delivered already weaponized – ready to do damage. But today’s advanced hacks are increasingly bypassing conventional security systems by delivering benign-looking data that only gets weaponized when applications are live, in runtime memory. By subverting interpreters and manipulating legitimate processes and memory, these attacks can assemble benign components to create dangerous weaponized code that can derail applications, expose sensitive data, or damage critical infrastructure.
Join experts from Virsec for an interactive webinar discussing the emergence of WRT attacks and new strategies organizations need to use to protect applications in memory in real time.
As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.
Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.
- Find out why traditional vendor risk management programs don’t work
- Learn how to perform quantifiable vendor security analyses
- Discover how to build a scalable VRM program
In the past few years, with the proliferation of IoT devices, IoT security becomes a hot topic. Earlier this year, researchers at NSFocus put together a “2017 Annual IoT Cybersecurity Report”, surveying the IoT landscape and the new threats from them. In this webinar, we will highlight the important findings and opinions in this report. Topics include:
•Survey of the exposed IoT devices.
•Various vulnerabilities in these IoT devices.
•Threat analysis from these IoT devices.
•How to protect the IoT devices.
Cyber threat intelligence – when properly gathered, refined, and applied – can help organizations identify business risks and target both protections and mitigations. But what distinguishes high-quality and actionable threat intelligence from low-quality security "noise"? How are cutting edge CISOs and IT security teams applying threat intelligence to respond to incidents and slam shut windows of compromise?
Find out in this webinar moderated by Paul Roberts, the Editor in Chief at The Security Ledger. Paul will be joined by LookingGlass’ Brandon Dobrec, and an industry speaker. Together they will review the value of threat intelligence to organizations, discuss how cutting edge firms are using threat intelligence to their advantage, and review how to orchestrate threat intelligence to automate mitigation and combat third party risk.