The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Les nouveaux usages de consommation et les nouvelles pratiques marketing favorisent la multiplication des données renseignées, collectées, analysées, et utilisées. Où sont ces données ? Comment les récupérer ? Peut-on les effacer ? Sont-elles exposées ?
Le contrôle de leurs données échappe aux citoyens.
Les entreprises font face à un paradoxe : nécessité d’ouvrir leur système d'information pour répondre aux besoins du marché et obligation de protéger les données exposées.
Les différentes réglementations (RGPD, DSP2, Loi de Programmation Militaire) imposent aux entreprises de mettre en place les mesures nécessaires pour :
•Protéger de manière proactive l'accès aux données personnelles,
•Être en mesure de détecter les fuites de données et réagir rapidement.
Pour renforcer la sécurité de son SI, et également se mettre en conformité, il est indispensable d'identifier, gérer et contrôler les accédants aux SI. Il est également indispensable pour les entreprises que ces obligations de sécurité n’impactent pas les efforts déployés pour optimiser et fluidifier l’expérience utilisateur.
Dans ce webcast, nous vous proposons d’aborder les points suivants :
1.Focus sur les différentes réglementations en lien avec les données personnelles : RGPD, LPM, DSP2
2.Impact de ces réglementations sur les DSI
3.Identification et contrôle des portes d'entrées aux données critiques
Quelles sont les différentes portes d’entrées au SI
Quels sont les risques associés à chacune d’entre elles
Comment répondre à ces risques
It’s a bird, it’s a plane, no it’s just your legacy SIEM. Did you know your SIEM might be weakening your security powers? Your legacy SIEM could be:
• Limiting your ability to collect, store and use security-relevant unstructured and structured data
• Making it difficult to maintain your SIEM and requiring skilled staff to work around the clock just to keep the lights on
• Burdening your security operations team by forcing them to chase false alarms while missing critical alerts
• Failing to detect modern threats and putting your entire business at risk
But have no fear, Splunk’s security experts are here to make you a security super hero again. Put on your cape and join us for this webinar to learn how Splunk can be used as a modern SIEM to solve a range of security use cases and more.
Splunk’s security experts will share common SIEM replacement and migration scenarios and discuss how a department store, a financial services firm and a luxury retailer successfully migrated from their legacy SIEM to Splunk.
Girish Bhat, Splunk director of security product marketing
Risi Avila, Security professional services consultant
10 mins – The challenges of having a legacy SIEM
15 mins – The options to migrate
15 mins – Customer success stories
5 mins – Resources to guide and help you
10mins – Q&A
Hunt teams are relative newcomers within the security operations domain. Many companies say they are doing “hunt” but when we dig deeper, we find the capabilities are ad hoc, with no measurable indicators of success nor formal organizational support. That means hunt teams are growing in popularity and use, but there is no “gold standard” yet for how they work. With increasing scarcity of skilled resources in cyber security and lack of efficient tools, it is challenging to build successful hunt practices inside an organization.
Join this webcast to:
•Gain a clear understanding of the current challenges of hunt and investigation procedures
•Learn how to build “hunt” capabilities that search for security breaches
•Increase speed, simplicity and effectiveness across the entire workflow of hunt and investigation with ArcSight’s new solution
Mary Writz is a seasoned professional with more than 15 years of experience in cyber security and, under her services leadership role, her team filed 9 patents and built a successful hunt practice with a focus on Big Data, machine learning and visualization. Alona Nadler is a senior product manager for ArcSight with a background in Big Data analytics platform.
The nation's first state-mandated cybersecurity regulations regarding banking and financial services companies went into effect in New York state on March 1st. However, many businesses subject to the regulations are asking, what are these rules and how will they affect my business operations.
SecureWorks invites you to join us on April 27th for a webcast designed to help you understand these new mandates and develop an approach to ensure that your organization has a mature and effective security program in place that will not only help you achieve compliance but will improve your overall information security posture.
What you will learn:
• Which entities are covered by the mandate and what type of data needs protecting.
• The five core elements needed to establish a comprehensive cybersecurity program.
• Critical questions you should be asking your security program partner.
Stop attacks such as ransomware and get HIPAA compliant for Healthcare. Understand the top 3 attacks in Healthcare, how to stop them using simple cloud-based tools and ensure HIPAA compliance for business continuity.
Cyber extortion is on the rise, and the public sector is particularly vulnerable. A study conducted by a leading cybersecurity threat management firm reported that state and local government networks are twice as likely as their commercial counterparts to be infected with either ransomware or malware.
Why are ransomware perpetrators increasingly setting their sights on the public sector? First, many agencies and public institutions rely on legacy systems that are challenged to meet all of today’s cybersecurity threats. Second, the proliferation of devices and technology platforms, including smartphones, tablets and mobile apps, are giving hackers more points of entry into public sector networks. Are you prepared for such an attack?
Join Bil Harmer, Strategist, Office of the CISO, Zscaler Inc., for a compelling webcast highlighting how ransomware can impact your organization and steps you can take to secure your network and systems.
Bil will also cover:
- How ransomware has evolved
- Lessons learned from recent attacks
- Why cloud sandboxing is so important
- Tips for mitigating ransomware
For more information about Zscaler, go to www.zscaler.com
Bil Harmer leads Zscaler’s Office of the CISO for the Americas, where he advises organizations on best practices for implementing cloud-based cybersecurity solutions. A veteran of the IT industry, he has helped startups, governments, and financial institutions design and implement security programs. Bil pioneered the use of the SAS70 coupled with ISO, to create a trusted security audit methodology used by the SaaS industry. A highly sought-after speaker, Bil frequently presents on security and privacy-related topics at conferences such as RSA, ISSA, GrrCon and the Cloud Security Alliance.
Considered the gold standard for cybersecurity, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is being utilized by the Federal Government agencies to reduce risk.
Key Learning Objectives:
•Overview of the NIST CSF
•How the NIST CSF is currently being used by the Federal Government to compliment The Federal Information Security Management Act (FISMA )
•Possible future use cases
Join this webcast for a review on best practices for the NIST CSF being utilized by Federal, State and Local Government
The good news: Microsoft Office 365 allows your people to work anywhere, anytime, on any device. The not-so-good news: That freedom creates security issues. As valuable a tool as Microsoft Office 365 is, it lacks forensics and insights to efficiently identify and understand threats. Plus, it’s not designed to help you efficiently respond and remediate threats.
That’s where our Threat Protection for Microsoft Office 365 comes in.
Join us for a live demo and see firsthand how our solution can help you:
•Protect against advanced malware-based threats delivered through URLs and attachments and non-malware threats
•Keep your email service connected even during Office 365 email server outages
•See at a glance the campaigns targeting your organization
•Quickly reduce the attack surface
External penetration testing, also known as ethical hacking, is an independent engagement that can help pinpoint common attack vectors and patterns hackers look for in your network. Delta Risk research has identified the attack vectors bad actors most commonly use to get initial access to a network and spread across the rest of the organization. In this 45-minute webinar, our pen testers offer recommendations on how to combat various scenarios and outline the key mistakes defenders must avoid when protecting their security operations.
WHAT YOU’LL LEARN:
• Lessons learned from our 2016 external assessments
• Common weaknesses our testers exploited such as kerberoasting and password reuse
• Methods our testers use to quickly locate high value assets
• Vendor-neutral solutions for protecting sensitive information
• Why third-party penetration testing is in demand
About the Presenters:
Paul Brandau is the Managing Consultant with Delta Risk LLC. He has more than 10 years of experience in the cyber security domain providing a unique perspective on cyber exercises, operational (red team) assessments, and training in offensive network operations. He has helped design and lead a Red Team for the United States Department of Homeland Security. Prior to Delta Risk, his duties included reverse engineering malware and threat profile creation.
Mike Warren is VP of Cyber Resiliency Services for Delta Risk LLC. He has more than 14 years of experience in the cyber security domain providing a threat perspective, operational (red team) assessments, enterprise vulnerability assessments (blue team), and training in defensive and offensive network operations. Prior to Delta Risk, he was an active duty Air Force Communications and Information Engineer Officer.
The seismic jolt in the Threat Landscape caused by the success of threats like ransomware combined with the geometric rise of so-called zero-day malware (i.e. malware for which no AV signature defenses exist) has given rise to all manner of innovation in the Cybersecurity industry. But a lot of what is being said and presented in the market is really confusing and that’s a problem for practitioners. One of the most-frequently-used phrases in security today is “Machine Learning” or “Math-Based” and “Artificial Intelligence” or “AI”. These phrases are entering the security conversation to describe capabilities, approaches, and strategies, but in reality, they are confusing a great many people. Which begs the question: “What on Earth does it mean?” and “How can Machine Learning be used in Enterprise Security?” Join McAfee and (ISC)2 on April 27, 2017 at 1:00PM Eastern as we clear the confusion, explore the answers to these questions and discuss what this means for dealing with threats.
Every day, we test popular SaaS like Office365 and GSuite against the latest zero-day threats.
In this webinar we will answer the questions that CISOs regularly ask:
• Which SaaS offer the best built-in protection?
• Is it worth paying more for Microsoft's Advanced Threat Protection?
• Is there a difference in protection between email and file sharing?
• Should I scan both inbound and outbound? What about internal email and sharing?
• How do I add more security if I need it?
Avanan's Cloud Security Platform is uniquely positioned to understand the security profile of most every cloud provider. Integrated with all major SaaS and partnering with over 70 security vendors, Avanan constantly monitors for the latests security threats and measures the risk profile of each cloud provider.
We will discuss recent attacks and the speed of each cloud vendor's response. We will compare each SaaS window of vulnerability and adaptation to the changing threat vectors.
Before and after the webinar, real time vulnerability information will be available at https://avanan.com/gauge
With phishing attacks accounting for over 90% of all breaches and the cost of cybercrime rising, is your company doing all it can to prevent a phishing attack and costly breach?
The results are in and PhishMe’s suite of anti-phishing solutions can help protect you against attacks. Forrester Consulting has analyzed the Total Economic Impact (TEI) of implementing PhishMe’s Human Phishing Defense Solutions and the results are outstanding!
Join this webcast, featuring Rohyt Belani, PhishMe’s CEO and Dean Davison, Forrester Principal Consultant to learn more about PhishMe Solutions and the benefits Forrester identified such as:
- Return on Investment (ROI) of 336%
- Payback in less than 3 months
- Time required to address phishing threats reduced by 30%
- Employee click rate reduced on average by 80%.
Welcome to the last mile of security hardware disruption.
Join iboss and 451 Research analyst Dan Cummins to learn actionable strategies for overcoming the technical and operational challenges of securing modern networks with remote offices and mobile workers.
You’ll hear in-depth, real-world customer success stories detailing their move from traditional, appliance-based secure web gateways to a distributed gateway platform.
No change to network topology. No more buying hardware. No more private network links.
Network security is no longer about firewalls and related perimeter protection. It extends all the way to endpoints and the information assets they process and store. At any given time, do you really know what’s on your network, how they got there, and if they might be creating quantifiable business risks? With the complexity of today’s wired and wireless networks, this is becoming an increasingly-difficult question to answer.
Join information security veteran and writer of 12 books including the highly-popular Hacking For Dummies, Kevin Beaver, along with experts from Aruba and Intel for a discussion on the technical and operational security concerns impacting modern networks. You’ll hear real-world stories and obtain practical insight into what it takes to have a resilient environment that can withstand today’s threats and risks.
Inflexible infrastructure and management capabilities make it difficult to transform IT infrastructure into a cloud-service-model. These IT limitations keep organizations from building a scale-out IaaS cloud environment that supports the range of application workloads organizations need to grow.
In order to transform, agencies need to consolidate compute, storage, networking, and management capabilities into a single solution. Turning to human computer interaction as an option provides advanced capabilities yet opens the door to a number of security concerns. New research results reveal DoD and other federal agencies struggle to make these changes while managing costs, legacy systems and more.
Join us to learn how Red Hat and Intel can enable you to:
• Evolve your current infrastructure
• Enhance IT operations at the tactical edge
• Accelerate service delivery
• Maximize existing resource investments
Privileged accounts can be some of the most serious threats your company can face. As more and more processes are digitalized and activities externalized, the number of accounts accessing critical and strategic information escalates, extending the cyber threat across continents. Meanwhile, companies and individuals are becoming increasingly aware that any data or server can be accessed with the right privileges; it is therefore imperative to know who accesses critical resources, as well as when and why they do so to avoid any leak. By monitoring the users holding the keys to the kingdom - the privileged users, we are able to know what exactly happened on a system at any given time and how. Whether malicious or negligent, incidents caused by internal or external threats can be avoided quickly if visibility over the IS is restored. Session monitoring and recording dissuades malicious or negligent users while offering real-time alerts, traceability, and post-mortem analysis. Discover how some of the most dramatic cyberattacks to date could have been prevented had there been a Privileged Access Management solution in place to protect and secure target systems.
Hybrid Clouds are expected to gain prominence for hosting diverse enterprise workloads due to a variety of needs. For this model of cloud deployment, there exist broader security and specific privacy concerns driven primarily by data loss, data privacy and compliance to regulatory needs. Although Hybrid Clouds offer a degree of control and security of IT infrastructure, there is a need for unified cloud security management which offers a more holistic view of risk categorisation and standard security policies. How can working with a service provider, who can offer an optimized mix of technology and controls to seamlessly manage Security and Compliance, change the game for the enterprise?
For decades, your operations center has been trapped by “insights” from the wall of charts. Meanwhile, your operations teams are flooded with alerts that lack context and a problem is emerging. You soon find yourself sitting in war rooms, watching siloed tools, navigating event storms and running scripts to extract “relevant” logs for triage. This just does not scale.
Splunk IT Service Intelligence (ITSI) brings a unique approach to monitoring and troubleshooting with detailed swim lanes, logical drill-downs and meaningful and contextual insights into events.
Watch this webcast to learn how to:
-Speed up investigations by organizing and correlating relevant metrics and events
-Analyze real-time performance in relation to past trends
-Identify and alert on notable events by creating predefined correlation searches
-Navigate through event storms easily and quickly and make informed decisions to focus your attention on what matters
Speaker: David Millis, Staff Architect of IT Markets, Splunk
15 min - Key Concepts of Splunk ITSI
30 min - Demo: Deep Dives, Multi-KPI Alerts and Notable Events
15 min - Q&A
There’s no shortage of educational content on ransomware. This webinar takes an end-to-end look at the crime’s inner workings. Hear from a security researcher who built a ransomware operation from the ground up to gain a better understanding of its origins, how it works, and why we can expect exponentially more attacks. Then, get practical advice and prevention techniques from an expert in advanced threat detection and research. You’ll learn strategies for building a holistic IT security program and preventative methods your organization can implement today with near zero business impact.
Moderated by: Ben Johnson, Security Executive, Carbon Black Co-Founder
Ben Johnson is currently working on his next move in the cyber security space. Previously, Ben co-founded Carbon Black, a next-generation endpoint security company, where as CTO he helped drive technology vision, product effectiveness, and security evangelism while the company grew from 2 to 750 employees. Ben serves on the boards of several security start-ups and is routinely sought out for advice regarding security strategy, product strategy, or to help venture capitalists with due diligence.
Presenter: Michael Haag, Director of Advanced Threat Detection and Research, Red Canary
Michael has over a decade of experience across the security spectrum, from architecting security programs to overseeing day-to-day tuning and operations. His expertise includes advanced threat hunting, investigations, technology integrations, and hands-on development of tools, processes, and frameworks to drive efficient security operations.
Presenter: Jamison Utter, Cyber Security Researcher
A lifetime technologist and enthusiast, Jamison has 20 years of experience as an engineer, security consultant, and thought leader. Natural curiosity has taken Jamison beyond the technical hack into the workings of the criminal industry: how and why malware is written, how people make money at it, and what their motivations are.
As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.
Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.
The webinar will cover:
• Overview of the VM-Series next-generation firewall
• How the VM-Series prevents cyberattacks in the public cloud
• Key differences between the VM-Series and other cloud security offerings
You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility—and it’s a big one.
Watch ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, for a lively discussion on how to evolve your security strategy to account for innovation at cloud speeds. Our panel of experts will discuss:
- Why conventional security approaches falter in highly dynamic and elastic environments
- Key steps to eliminate choke points, keep pace with elastic workloads, and how to deploy security controls in minutes
- How to keep your internal and external customer’s applications and workloads secure while meeting compliance requirements
- Why a Security-as-a-Service can help you strike the optimum balance between risk, cost and cloud speed.
Join Jonathan Glass, Cloud Security Architect, Turner Broadcasting System, Chris Geiser, CTO of the Garrigan Lyman Group, and Allison Armstrong, VP of Technology and Product Marketing at Alert Logic, for a discussion on ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, and learn how it can. Register now!
Today’s endpoint security products do what they were designed to do, but they still leave gaps in protection. Comprehensive endpoint protection requires prevention, AV, endpoint detection and response (EDR) and other capabilities. Even when organizations adopt multiple point products, there are still gaps in their endpoint protection.
Some companies tout “next-generation endpoint security,” but what does that mean? Jim Waggoner, Sr. Director of Endpoint Product Management at FireEye will tell you how to make sure your next-generation endpoint security solution is delivering a comprehensive. In this webinar, you will:
> Learn about the current endpoint security landscape and the challenges it poses
> Find out what makes EDR capabilities valuable
> Understand why threat intelligence is important and how it affects endpoint threat detection and prevention
> Discover why a single endpoint agent should include (1) Multiple detection and prevention engines, (2) Integrated workflows from detection to investigation to remediation, and (3) Scalable, multiple form factors and breadth of OS support
Manually turning data on cyber attacks, vulnerabilities, and exploits into actionable threat intelligence requires a significant investment of time and resources.
With security talent and budget in short supply, you need to get more from your data, faster.
Join Dr. Dhia Mahjoub, Principal Engineer of Cisco Umbrella Research, and Daniel Hatheway, Senior Technical Analyst at Recorded Future, to see how you can gain a more complete view of the threat landscape through a new, exciting integration.
Attendees will learn how to accelerate incident response and streamline security operations, now. Learn how:
-Cisco Umbrella Investigate provides access to a live view of domains, IPs, ASNs, and malware file hashes, enabling incident responders to pinpoint attackers’ infrastructures and predict potential threats.
-Recorded Future expands upon the Investigate data from technical, open and dark web sources to further reduce the risk of attackers in the shortest amount of time.
-Together, they automate threat intelligence across the broadest set of sources to provide the single best defense against threats.
Register today to see how you can make more informed decisions, faster.
Active Directory is an organization's greatest asset - and weakness. Attackers target this valuable database to access all users, credentials, computers, servers, applications, resources of the ENTIRE organization. Protecting it is required. Doing it from the endpoint before the attacker enters the network is essential.
Your AD risk can be eliminated. Listen to an easy and efficient way to protect what no other security technology is doing or can do today. Javelin AD Protect was built by former 'Red Team' government trained attackers and will educate you on why Active Directory is easy for hackers to gain the 'keys to the kingdom.'.
The shifts in attackers’ tactics are easy to miss and will catch many organizations off-guard. Attackers have discovered new ways to re-engineer older tactics that are easier to execute and are perceived to be less risky by targeted users. Combined with targeting platforms that organizations falsely consider more secure, these new attacks are proving very damaging to unprepared organizations.
Palo Alto Networks Michael Moshiri hosts colleagues Rinki Sethi, Senior Director of Information Security, and Bryan Lee, Unit 42 Threat Intelligence Analyst, in an exclusive webinar focusing on:
- Vulnerabilities threat actors are now targeting most intensely
- New tactics and techniques hackers are using against endpoints
- Best practices Palo Alto Networks uses to secure its own endpoints
Security 101: Don't ignore those prompts to patch, learn about how cybercriminals exploit vulnerabilities in unpatched environments. Throughout the VIPRE Security 101 series, speakers have come back to the importance of patching. Im many cases, prompts to update Adobe, Java, Chrome, iTunes, Skype and others are to fix newly discovered security vulnerabilties in those products. Cyberminimals exploit those vulnerabbiliteies to open a backdoor onto your systems to drop malware and infect your network. Learn how to address these issues with steps to protect and product considerations.
Consumers want more mobile-friendly financial services, and they want them now -- without any security or privacy compromises. These expectations create tension in the delivery of mobile financial services and apps. What’s the best way to strike a balance between a frictionless mobile experience and the security diligence customers demand?
Learn how to answer this question for your enterprise during a webinar with Ted Eull, NowSecure VP of Risk and Privacy. Ted will apply insights from mobile security engagements with NowSecure customers in the financial services industry, explain best practices, and provide guidance on topics such as:
-- Where do you draw the line between frictionless mobile UX and authentication?
-- What constitutes good two-factor authentication for financial services apps that doesn’t hinder adoption or inconvenience users?
-- How can FFIEC guidance help enterprises develop secure financial services apps?
According to a recent SANS report, more than 60 percent of large-company CISOs brief the board at least annually and by the end of 2018, 70 percent of all boards will require CISOs to brief them quarterly.^
Deciding to what degree your security operations should be in-house vs outsourced is a major decision with significant cost and resource ramifications. Currently organizations globally face persistent security challenges, which collectively require people, process, technology, and strategy to address. This collection of challenges are further complicated by evolving business needs; expanding toolsets and platform options; and staffing retention and attrition. Join us to learn how a modern approach to security operations can help address these challenges.
SecureWorks Principal Cyber Security Operations Consultant and former Security Operations Center (SOC) manager, Travis Wiggins, will discuss how security leaders and practitioners can leverage his experience to more clearly define the requirements and make informed decisions about protecting your organization.
You Will Learn:
• Why making the right security operations decisions is critical to reduce business risk
• What to consider when planning a SOC and how to position the plan to leaders
• How to address talent retention, accountability, and scalability
• Why strategy and proper tools are key components in a successful SOC implementation
^ Cyber Security Trends: Aiming Ahead of the Target to Increase Security in 2017 - https://www.sans.org/reading-room/whitepapers/analyst/cyber-security-trends-aiming-target-increase-security-2017-37702
Kick-Start a Radical Change in the Evolution of Cybersecurity
Senior government and education officials are prime for the next evolution in cybersecurity. Although network defenders remain lockstep in outdated best practices, CIOs and CSOs are moving away from the coveted defense-in-depth strategies of the past and looking forward to more effective measures to implement the Cyber Kill Chain™ model.
In this C-level webinar, the CSO of Palo Alto Networks®, Rick Howard, will discuss how CIOs and CSOs can more effectively orchestrate their enterprise security posture. Rick will review the state of enterprise cyber defense and provide insight for executives on:
• Why the defense-in-depth model failed.
• Why its replacement, the Cyber Kill Chain, hasn’t realized its full potential.
• How to shift focus to automatic enterprise security orchestration.
• How to influence the board and radically change thinking from the top down.
Join us to learn more about this new and necessary direction in the evolution of cybersecurity.
Perimeterless IT infrastructure and its security is now an integral part of the operational strategies of India’s financial institutions. But the number, frequency, and impact of cyber attacks on Indian financial institutions have increased substantially, underlining the urgent need for banks to develop robust cyber security measures, and assess their security posture on a continuous basis.
The RBI Guidelines for Cyber Security assist financial institutions to achieve this through a new-era preventative security baseline.
During this webcast, Shailesh Athalye, Qualys Senior Manager, Compliance Research and Analysis, will discuss how financial institutions can easily address both the technical & procedural elements of the RBI Guidelines for Cyber Security in an automated manner using the highly scalable Qualys Cloud Platform.
La gestion des vulnérabilités est nécessaire pour réduire les failles et les risques de sécurité dans votre environnement.
Beaucoup d’organisations luttent encore pour mettre en place une solution efficace de gestion des vulnérabilités et des processus inhérents, et ce, en accord avec les contraintes de conformité de sécurité et réglementaire.
Dans la plupart des cas, le contrôle des trois fonctions essentielles du cycle de gestion des vulnérabilités reste un challenge: découverte, analyse et prioritisation, et correction.
Dans ce webinaire, vous allez découvrir comment:
*Tirer le meilleur parti de votre solution de gestion des vulnérabilités avec les outils Flexera Software
*Associer gestion des vulnérabilités de sécurité avec vos processus ITSM en place
*Améliorer efficacement votre sécurité informatique
Cybersecurity is one of the most important, yet misunderstood and underappreciated professions in the world. It has near-zero unemployment and a worker shortfall that grows every year—a gap projected to reach 1.8 million by 2022. Given the talent shortfall, and the apparent attention, it is difficult to understand why more women are not attracted to the field. If they were, the workforce gap could be reversed.
A panel of thought leaders will discuss concrete steps to close the workforce gap, the role that women should play in achieving that goal, the equality challenges facing women in the profession, and quantitative key performance indicators that organizations must implement to create a gender-balanced workforce that offers equal opportunities for all professionals.