Hi [[ session.user.profile.firstName ]]

IT Security

  • [Webinar] Shifting Left Without Sacrificing Security and Compliance
    [Webinar] Shifting Left Without Sacrificing Security and Compliance Maya Ber Lerner, VP of Product, Quali Recorded: Dec 15 2017 25 mins
    Deliver Production-like Environments Early in the Dev/Test Lifecycle
    As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
  • Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack
    Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack Bob Adams, Mimecast Cybersecurity Expert; David Hood, Mimecast Director of Product Marketing Recorded: Dec 15 2017 62 mins
    Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Join us for Anatomy of an Email-Borne Attack where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live “hack.”
  • Security Review & 2018 Predictions for Financial Services
    Security Review & 2018 Predictions for Financial Services Adam Hamm, Managing Director, Protiviti Global Consulting Recorded: Dec 15 2017 62 mins
    The regulators are coming regarding cybersecurity. Are you ready?

    Join this interactive webinar to learn more about:
    - The NYDFS Part 500 cyber regulations, including insights on implementation and auditing
    - Review the NAIC's new Insurance Data Security Model Law adopted on October 24, 2017

    About the Presenter:
    Adam Hamm is a Managing Director at Protiviti Global Consulting who serves financial services industry clients across the country regarding risk, compliance, and cybersecurity matters. He has deep knowledge of financial services regulation with hands on experience in all insurance supervision and policy related matters. Before he joined Protiviti in January 2017, he was a former President of the National Association of Insurance Commissioners (NAIC), Chairman of the NAIC’s Cybersecurity Task Force, Principal on America’s Financial and Banking Information Infrastructure Committee (the primary national regulatory cybersecurity committee for the financial services sector), Principal on the United States Financial Stability Oversight Council (FSOC), and North Dakota’s elected insurance commissioner from 2007-2016. Adam also spent ten years as a violent crimes prosecutor and civil litigator.
  • How Cryptocurrencies are Changing the Face of Financial Services
    How Cryptocurrencies are Changing the Face of Financial Services Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy Recorded: Dec 15 2017 61 mins
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • The 2018 Cyber Threat Predictions from FortiGuard Labs
    The 2018 Cyber Threat Predictions from FortiGuard Labs Derek Manky, Global Security Strategist, Fortinet Recorded: Dec 15 2017 6 mins
    Join Derek Manky, Global Security Strategist at Fortinet, to learn about the top Threat Predictions for 2018, as identified by FortiGuard Labs' 200 expert threat researchers, and gain the latest intelligence on the threat landscape and our predictions for every critical area including malware, botnets, mobile threats and more.

    You can also access our 2018 Threat Prediction Report attached to understand what cybercriminals have in store for us and what you, as an IT security professional, should be most prepared to address.
  • Paysage des menaces : tendances cyber sécurité 2017 et au-delà
    Paysage des menaces : tendances cyber sécurité 2017 et au-delà Laurent Heslault, Directeur des Stratégies de Sécurité, Symantec France Recorded: Dec 15 2017 56 mins
    L’année qui s’achève a été essentiellement marquée par des attaques coûteuses, des fuites de données retentissantes et plusieurs cas de ransomwares et d’espionnage économique. La cyber criminalité a gagné en ampleur et en audace, avec des retombées financières bien plus élevées. Les cyber attaques sont désormais régulièrement citées dans les médias.
    Ce webcast aborde les points suivants :
    • Le paysage des menaces en 2017
    • Les personnes ou les erreurs qui ont conduit à ces incidents
    • Les enseignements à tirer de cette année pour les professionnels de la sécurité comme vous
    • Les solutions qui peuvent renforcer votre sécurité à l’approche de 2018
    Inscrivez-vous
  • Combata las amenazas avanzadas con SonicWall Hosted Email Security
    Combata las amenazas avanzadas con SonicWall Hosted Email Security Maria Garcia Recorded: Dec 15 2017 41 mins
    Participe en nuestro seminario virtual sobre la seguridad de correo electrónico hospedada Combata las amenazas avanzadas con SonicWall Hosted Email Security el viernes, 15 de diciembre a las 11:30 h CET.

    El correo electrónico continúa siendo vital para los negocios. Sin embargo, a medida que crece el volumen de correos electrónicos, aumenta también la cantidad de ataques de ransomware, phishing, compromiso del correo electrónico de negocio (BEC), spoofing, spam y virus.

    Los cibercriminales falsifican direcciones de remitentes de correo electrónico para engañar a los destinatarios, dañando así a marcas legítimas sin que éstas lo sepan. Las organizaciones pueden sustituir sus soluciones antiguas por la solución de seguridad de correo electrónico basada en la nube asequible y fácil de usar de SonicWall, que ofrece protección contra el dinámico y cambiante panorama de las amenazas de correo electrónico.

    En este seminario virtual, obtendrá información sobre los siguientes temas:
    •Protección contra las amenazas de correo electrónico avanzadas
    •Cómo la seguridad de correo electrónico hospedada de SonicWall mejora MS Office 365
    •Otras ventajas del servicio de suscripción de seguridad de correo electrónico basado en la nube
  • Votre proxy gagne en agilité grâce à l’isolation web
    Votre proxy gagne en agilité grâce à l’isolation web Hervé Doreau, Directeur Technique, Symantec France Recorded: Dec 15 2017 27 mins
    Saviez-vous que des millions d’hôtes (domaines, sous-domaines ou adresses IP) apparaissent chaque jour et que, dans bien des cas, leur durée de vie ne dépasse pas 24 heures ?
    De nombreuses entreprises choisissent d’instaurer des politiques de passerelles web sécurisées afin d’empêcher les utilisateurs d’accéder à des sites non classifiés à cause du risque qu’ils représentent, même si la plupart sont tout à fait légitimes dans le cadre d’un usage professionnel.
    De la même façon, beaucoup d’entreprises décident de bloquer des sites dès lors que le niveau de risque est fort, sans être totalement avéré.
    En découle un blocage excessif des sites web qui nourrit l’insatisfaction des utilisateurs.
    Certains sites sont réputés pour leur fiabilité, d’autres pour leur dangerosité. Les sites qui posent vraiment problème sont ceux qui se situent entre les deux, lorsqu’il n’y a pas suffisamment de recul ou d’informations.
    Principaux thèmes abordés :
    - Découvrez le plus grand réseau civil d’intelligence sur les menaces au monde et la protection qu’il peut vous apporter face aux attaques de malware.
    - Apprenez à définir des politiques permettant d’isoler tout le trafic dont le risque est indéterminé ou non classifié par le Global Intelligence Network.
    - Sachez comment booster la productivité de l’entreprise sans créer de risques supplémentaires.
    Inscrivez-vous dès aujourd'hui.
  • Combattre les menaces avancées avec SonicWall Hosted Email Security
    Combattre les menaces avancées avec SonicWall Hosted Email Security Sylvain Stahl Recorded: Dec 15 2017 33 mins
    Rejoignez-nous le vendredi 15 décembre à 10h00 CET pour le webcast consacré à la sécurité de messagerie hébergée : Combating Advanced Threats with (Combattre les menaces avancées avec SonicWall Hosted Email Security).

    La messagerie reste essentielle pour l’entreprise. Mais l’augmentation en volume des messages électroniques entraîne parallèlement la prolifération des ransomwares, du phishing, des menaces de type BEC (Business Email Compromise), du spoofing et autres attaques de virus.

    Les cybercriminels falsifient les adresses e-mail des expéditeurs pour tromper les destinataires et portent par là même préjudice aux marques légitimes. Les entreprises ont tout intérêt à remplacer leurs solutions actuelles par la solution Cloud conviviale et économique SonicWall de sécurisation de la messagerie afin de se protéger d’un paysage de menaces dynamique et changeant.

    Dans ce webcast, vous en saurez plus sur les thèmes suivants :
    •Protection contre les menaces avancées véhiculées par e-mail
    •Comment la sécurité de messagerie hébergée SonicWall améliore MS Office 365
    •Autres avantages du service Cloud de sécurisation de messagerie par abonnement
  • What Your Vulnerability Scanner is Not Telling You
    What Your Vulnerability Scanner is Not Telling You Anand Paturi and Barry Cogan Recorded: Dec 14 2017 41 mins
    A recent, significant data breach in 2017 has caused people to take a deeper look into Apache Struts vulnerabilities. This weakness emphasized the impending risks for Apache Struts-based applications. Even today, scanners do not detect all known vulnerabilities. As of November 2017, the leading scanners still missed 14 total unique Common Vulnerabilities and Exposures (CVEs).

    In this webinar, we will analyze Apache Struts-related vulnerability weaponization patterns spanning the last decade. We will also provide insight into exploit patterns through a live exploit demonstration and explain how these patterns can define an organization’s risk management strategy.

    Hear from RiskSense’s Anand Paturi (VP of Research and Development) and Barry Cogan (Senior Security Analyst) as they guide us through the live demonstration and provide insights into exploit patterns
    and how attacks can be avoided.
  • How to Maintain Visibility in Hybrid Multi-Cloud Environments
    How to Maintain Visibility in Hybrid Multi-Cloud Environments Brad Casemore - Research Director for Datacenter Networks, IDC and Eric Thomas - Director of Cloud Solutions, ExtraHop Recorded: Dec 14 2017 50 mins
    In the early days of aviation, flight instrumentation made it safer to fly in bad weather. Today, cloud computing is taking off and revolutionizing how applications are built and delivered. But while these technologies offer new possibilities, they also can obscure visibility and make it much more difficult for IT Operations teams to detect security threats and diagnose the root cause of performance issues.

    There is hope: the network remains the common denominator for all applications and provides a source of real-time insight across hybrid, multi-cloud environments.

    In this webinar, IDC Research Director Brad Casemore and ExtraHop’s Director of Solutions Architecture, Eric Thomas, discuss how organizations can tap into network communications and maintain visibility for security and performance.
  • 2018 Cyber Security Predictions: The Identity-Aware Perimeter Comes to the Fore
    2018 Cyber Security Predictions: The Identity-Aware Perimeter Comes to the Fore Chris Sullivan (SecureAuth+Core Security) & Garrett Bekker (451 Research) Recorded: Dec 14 2017 61 mins
    Join 451 Research and SecureAuth+Core Security for a peek into the emerging trends in cyber security and identity in 2018. Register today and learn how these trends will impact your strategy, organization, and job in the coming year.

    Security experts Garrett Bekker, 451 Research and Chris Sullivan, SecureAuth+Core Security will share insight on these trends and more:

    •Why network-based approaches to security are no longer sufficient in the age of cloud and IoT
    •Why identity is the new gating factor for access to sensitive resources
    •How various methods for securing cloud resources – CASB and IDaaS - need to converge
    •The need for risk-based approaches to authenticating users – and machines
  • Cyber Threat Predictions & Security for 2018
    Cyber Threat Predictions & Security for 2018 Diana Kelley | Mark Weatherford | Jon Green | David McGuire | Ashton Mozano Recorded: Dec 14 2017 61 mins
    With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.

    This interactive Q&A panel with security industry experts will explore:
    - The biggest threats on the horizon
    - Key vulnerabilities and how to protect against them
    - Measures for breach prevention, detection and response
    - Which areas to focus on in 2018
    - Recommendations for CISOs

    Speakers:
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - David McGuire, CEO, SpecterOps
    - Ashton Mozano, CTO, Circadence
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Jon Green, VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company
  • DriveLock: Secure Your Critical Infrastructure!
    DriveLock: Secure Your Critical Infrastructure! Alfred Ortiz (Director, Americas) and Jason Rose (Senior Security Consultant) Recorded: Dec 14 2017 53 mins
    The DriveLock Endpoint Protection Platform is helping you to secure, control, and protect your critical infrastructure from internal and external threats. DriveLock achieves this through a comprehensive, layered security approach that includes application control, device control, and drive encryption. DriveLock combines this with advanced AI and a security awareness system that, as a whole, provides the highest level of security for your critical data and users.

    Takeaways:

    * DriveLock provides a layered approach to system security that is both comprehensive and flexible.
    * Device and Drive Protection prevent malicious applications from being brought into your infrastructure and prevent sensitive data from getting out.
    * Application Control with AI allows more flexible, intelligent control over the applications allowed on your infrastructure without weakening your security posture.
    * Disk Encryption lets you ensure the security of the confidential data after it has left your infrastructure.
    * Web Security prevents known threats from infecting your network.
    * Security Awareness lets you seamlessly train users on information security best practices without interrupting their work.
  • Let's talk about OSSTMM with Pete Herzog from inside out
    Let's talk about OSSTMM with Pete Herzog from inside out Pete Herzog, Managing Director at ISECOM Recorded: Dec 14 2017 60 mins
    In early 2000, the Open Source Security Testing Methodology Manual (OSSTMM) was released with the primary objective of improving how the enterprise conducted security testing. Key sections of this methodology include operational, human, physical, wireless, telecommunication, and data network security testing. Today, OSSTMM is widely regarded as a methodology for penetration testing world-wide, offering a standard approach to conducting security testing. Frank Shirmo of ITPG Secure Compliance, a Cyber Security Boutique in Northern Virginia will be joined by Pete Herzog, the creator of OSSTMM, to answer key questions, and provide clarifications on OSSTMM for CTOs, CISOs, CIOs, Security Engineers and Analysts, and all other stakeholders interested in the topic of security testing.
  • Automating VM-Series deployments on AWS and Azure with Terraform and Ansible
    Automating VM-Series deployments on AWS and Azure with Terraform and Ansible Vinay Venkataraghavan - Senior Solution Architect, Technical Business Development Recorded: Dec 14 2017 46 mins
    In some organizations, the theme of “can’t we all just get along” accurately describes the relationship between DevOps and network security. DevOps operates at a rapid and dynamic pace, leveraging the cloud to create and deploy; security teams exercise industry best practices of policy change control to eliminate potential security holes. Inevitably, deployment challenges arise. The ideal solution is one where security becomes part of the DevOps fabric.

    In this session our Cloud Automation Experts will discuss and demonstrate how customers can automate the deployment of the deployment of VM-Series next generation firewall to protect DevOps environments on AWS and Azure. Based on current customer examples, the topics covered in this session will include:

    • “Touchless” deployment of a fully configured firewall utilizing a combination of native and 3rd party automation tools such as Terraform and Ansible
    • Consuming Tags to execute commit-less policy updates

    The session will wrap up with a discussion of sample templates and scripts to get started and a video demonstration of a fully automated VM-Series deployment.
  • Lean Cloud Security: Your Guide to SecOps Efficiency in the Cloud
    Lean Cloud Security: Your Guide to SecOps Efficiency in the Cloud Chris Gervais, VP of Engineering at Threat Stack, Sabino Marquez, CISO, at Allocadia Recorded: Dec 14 2017 42 mins
    You’re a security professional, or not, but sometimes get asked to sort of be one? You don’t have enough people, you don’t have enough budget, and you don’t have enough time. But you know that’s not an acceptable excuse now that we are all running fast in the cloud.

    Tune into our webinar to learn how you can make the most of your people, processes, and technology:
    - Despite security talent shortage, leverage your small team and other resources most effectively.
    - Make sure automated processes handle 99% of the noise, so you’re left to manage real threats.
    - Buy and manage the least amount of tools to do the most
  • Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model
    Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model Ananda Rajagopal, VP, Products, Gigamon, Dan Watson, Managing Consultant CyberSecurity, IBM, Glenn Hernandez, Frm USCG CISO Recorded: Dec 14 2017 61 mins
    Public clouds provided by services like AWS and Azure continue to surge in popularity with organizations small and large. However, the security of these services and how the responsibility for it is shared can be murky. Organizations want to assure that the public cloud is being used properly by everyone in the enterprise and to run mission-critical applications while meeting compliance and security controls. Join Gigamon and (ISC)2 on Thursday, December 14, 2017 at 1:00PM Eastern for a roundtable discussion on public clouds and the shared responsibility model and how that can help to secure and protect your organization.