Hi [[ session.user.profile.firstName ]]

IT Security

  • Rapid7 InsightIDR Product Demo - EMEA Rapid7 InsightIDR Product Demo - EMEA Eric Sun and Pat Haley Mar 23 2017 1:00 pm UTC 60 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    - How to cut through the noise to detect attacks
    - How to investigate incidents faster
    - How to end the drudgery of security data management
    - Q&A
    - And more!
  • 5 things you didn’t know you could do with a security policy management solution 5 things you didn’t know you could do with a security policy management solution Edy Almer, VP Product Management at AlgoSec Mar 23 2017 2:00 pm UTC 60 mins
    Today’s enterprises are continuously evolving to support new applications, business transformation initiatives such as cloud and SDN, as well as fend off new and more sophisticated cyber-attacks on a daily basis. But security and network staff are struggling to keep up – which not only impacts business agility, but exposes your enterprise to risk and hampers its ability to address the modern threat landscape.

    Many professionals believe that they need latest and greatest new tools to address these challenges. But what if you already have what you need, up and running in your organization: your security policy management solution?
    Today’s security policy management solutions do a far more than automate traditional change management tasks. In this technical webinar, Edy Almer, VP of Products at AlgoSec will highlight 5 key security management challenges facing enterprise organizations today, and will explain how AlgoSec’s solution can help you manage security, reduce risk and respond to incidents, while maximizing business agility and ensuring compliance across your disparate, ever-changing, hybrid networks.

    In this technical webinar Edy will focus on:

    •Managing security policies end-to-end across public and private cloud including Microsoft Azure, Amazon Web Services AWS, Cisco ACI and VMWare NSX
    •Mapping security vulnerabilities to their applications to assess and prioritize risk
    •Enable SOC engineers to tie cyber-attacks to business processes
    •Migrating Firewall policies between firewall brands
    •Performing a fully automated, zero-touch security policy change
  • IoT Device Management IoT Device Management Charles J. Lord, PE, President & Chief Trainer, Blue Ridge Advanced Design and Automation Mar 23 2017 3:00 pm UTC 60 mins
    In our final class, we will look at the “Things” of the IoT – our nodes and devices – and how we can effectively commission, monitor, and detect problems in them throughout their lifecycle. We will look at methods for adding device management capabilities in our devices from the design stage as well as ways to add these capabilities in the legacy devices we looked at in the previous class. One topic we will look at is effective commissioning and decommissioning of devices in the network – how can we add or remove a node from the network without adversely impacting the rest of the network? Another area we will look at is security assurance and testing: how can we be sure of the device security – and how can we test it? And lastly we will look at maintenance. What methods can we use for testing devices or paths within the network and how can we effectively and safely perform system updates? To conclude our class, we will review our checklist and see what other issues we may need to be aware of in our IoT design. Day 3 sponsored by Wind River
  • Litigating Open Source – Lessons learned from Hellwig and McHardy Litigating Open Source – Lessons learned from Hellwig and McHardy Mark Radcliffe, DLA Piper; Bernd Siebers, DLA Piper, Phil Odence, Black Duck Mar 23 2017 3:30 pm UTC 60 mins
    The next wave of open source compliance challenges is upon us. Historically, enforcement has been a community based effort with an emphasis on “doing the right thing”. In recent years, however, we have seen the emergence of private enforcement and enforcement driven by entities and individuals for purposes of economic gain. In some cases these actions are to enforce legitimate interests arising from, for instance, dual licensing models. In other cases, copyright “trolls” are pressing an agenda. In this webinar, Mark Radcliffe and Bernd Siebers will review some of the current litigation trends, evaluate how the different elements of the open source community are reacting to these trends and offer insights and strategies for avoiding the cross-hairs. This includes taking a closer look at open source cases litigated in 2016 in Germany, including the following questions:

    - Are we experiencing a shift in jurisprudence?
    - What should users and developers of open source software do to protect themselves?
    - What's the contribution of the open source community?
  • Machine Learning Can Address the Most Pressing Security Challenge Machine Learning Can Address the Most Pressing Security Challenge Kasey Cross, Director of Product Management at LightCyber Mar 23 2017 4:00 pm UTC 60 mins
    Noise is the enemy of breach detection and response. After a major data breach it is often the case that signs of an attacker existed, but were buried in thousands of other security alerts that were mainly false positives.

    With machine learning, meaningful signs of an attack are more easily detected and isolated, so a security operator can focus on precisely the right issue.

    This session will examine:
    - The problem of noise
    - The role of machine learning in sifting through vast amounts of data to get to the fidelity needed to detect an attacker
    - Best practices for including machine learning in your security operations

    About the Presenter:
    Kasey Cross is a Sr. Product Marketing Manager at Palo Alto Networks, joining this month through the acquisition of LightCyber. She has over 10 years of experience in marketing positions at cybersecurity companies including Imperva, A10 Networks, and SonicWALL. She was also the CEO of Menlo Logic and led the company through its successful acquisition by Cavium Networks. She graduated from Duke University.
  • Are Your Security Solutions Simple and Efficient to Use? Are Your Security Solutions Simple and Efficient to Use? David Morris, Ulf Mattsson and Alex Pezold Mar 23 2017 4:00 pm UTC 60 mins
    As the adoption of cloud computing increases across many business sectors, your applications ingest and share data generated and stored within and beyond the limits of your firewall. This makes your data blind spots more dangerous than ever—both for your internal data and how customers and clients handle their vital information outside your cloud systems. To protect your business, you need a balanced approach to security—combining compliance, responsiveness, and engineering without sacrificing usability and agility.

    Join this presentation to learn how your security solutions measure up when it comes to simplicity and efficacy.
    - Do you know what data you have, where it is, and how to protect it?
    - Do your data security solutions work seamlessly inside your environment? Are you able to secure multiple business units, ERP’s, etc.?
    - Does it play nice with fraud prevention, analytics, data sharing, etc?
    - Does your data security solution achieve PCI compliance as promised?
    - Does your data security solution secure ALL data sets that are a threat to your organization?
  • Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Charlie Hodges, Storage Switzerland Mar 23 2017 5:00 pm UTC 60 mins
    If your organization is embarking on a refresh of your primary storage system this year, this is the one webinar that you will want to attend. IT evaluators that haven't looked at storage in a few years, will be impressed the use of flash to improve performance, while many claim to integrate file (NFS, SMB) and block (iSCSI, Fibre) protocols. These features though are now table stakes for the modern storage solution.

    While all of these features are important (and not created equal), IT professionals should demand capabilities that solve today's organizational challenges like eliminating shadow IT, improving multi-site productivity and long term data retention as well as meeting increasingly strict compliance standards. IT professionals should look for not only high performance and universal protocol support but also enterprise file sync and share, inter-data center sync and secure archive with compliance.
  • Top Reasons Why Your Antivirus Isn’t Working Anymore Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Mar 23 2017 5:00 pm UTC 75 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • The New Threshold of Comprehensive Security – Why Self-Healing is Imperative The New Threshold of Comprehensive Security – Why Self-Healing is Imperative Kim Ellery, Director, Product Marketing, Absolute Mar 23 2017 5:00 pm UTC 60 mins
    Traditional strategies for protecting endpoints are failing as attacks increase in relentlessness and sophistication. This reality has elevated the demands on security professionals and requires that organizations adopt new security paradigms that unlock the power of self-healing systems. To stop security breaches at the source, we must become faster at intelligently detecting and responding to threats. This timely webinar from Absolute explores how to realize self-healing systems in your own organization and ensure preparedness in the face of evolving threats.
  • Zero-Day Attacks and What To Do About It? Zero-Day Attacks and What To Do About It? Chris Candaffio, System Engineer, Symantec Mar 23 2017 5:00 pm UTC 30 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 3 of 5: Zero-Day Attacks and What To Do About It?

    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223
  • Overcoming eTail Challenges to Deliver Exceptional Customer Experiences Overcoming eTail Challenges to Deliver Exceptional Customer Experiences Michael Milligan, Sr. Director Product & Solution Marketing and Charlie Kraus, Sr. Product Marketing Manager Mar 23 2017 6:00 pm UTC 60 mins
    Online retailing is no longer as simple as duplicating the in-store experience. It is about so much more. Online retailers are expected to deliver fast, personalized shopping experiences featuring rich media and video, to customers on any device, wherever and whenever they choose.

    These realities have introduced a host of challenges for retailers, but they also offer significant opportunities to improve customer conversion and retention.

    What does this mean for retailers trying to deliver exceptional online experiences that maximize revenue and build customer loyalty?

    Join us as we review the technical challenges that impact your ability to deliver exceptional e-tail customer experiences, and strategies for overcoming them.

    Some of the topics that will be covered, include:
    · What customers expect from their online shopping experience;
    · What it takes to deliver a compelling omnichannel experience to reach customers;
    · How to support traffic spikes and seasonal demand;
    · Why website performance is key to improving conversion rates;
    · How best to safeguard your website against malicious attacks.
  • Rapid7 InsightIDR Product Demo Rapid7 InsightIDR Product Demo Eric Sun and Pat Haley Mar 23 2017 6:00 pm UTC 60 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    - How to cut through the noise to detect attacks
    - How to investigate incidents faster
    - How to end the drudgery of security data management
    - Q&A
    - And more!
  • Rapid7 InsightIDR Product Demo - APAC Rapid7 InsightIDR Product Demo - APAC Eric Sun and Pat Haley Mar 24 2017 1:00 am UTC 60 mins
    Rapid7 InsightIDR delivers trust and confidence: you can trust that any suspicious behavior is being detected, and have confidence that with the full context, you can quickly remediate.

    Developed side-by-side with incident response teams, InsightIDR eliminates data complexity, reduces alert fatigue, and makes analytics accessible to all. You see only what you need to see – from endpoint to cloud.

    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.

    Watch this video to learn how InsightIDR can help you:

    - How to cut through the noise to detect attacks
    - How to investigate incidents faster
    - How to end the drudgery of security data management
    - Q&A
    - And more!
  • Rapid7 AppSpider Product Demo Rapid7 AppSpider Product Demo Hollis Howell Mar 24 2017 6:00 pm UTC 45 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • Internet of Things: Smarter Security and Visibility in Manufacturing Internet of Things: Smarter Security and Visibility in Manufacturing Barbara Giamanco, Kimberly Knickle & Patricia Panchak Mar 24 2017 6:00 pm UTC 60 mins
    Manufacturing is evolving worldwide and IoT is supporting better manufacturing processes.

    New information technologies make managing manufacturing operations more efficient and the work smarter. The Internet of Things (IoT) has the potential to radically improve visibility throughout the manufacturing process.

    Join this dynamic discussion with Barbara Giamanco, CEO, Social Centered Selling, Kimberly Knickle, Research Vice President, IDC Manufacturing Insights, and Patricia Panchak, Editor-in-Chief, Industry Week and Group Content.

    In this webcast you will:

    - Learn how smart manufacturing impacts all areas of the business
    - See how new technologies enable the tracking of assets, processes and resources
    - Learn what it takes to make sure machines work together
    - See how teams of knowledge workers will orchestrate the process
    - Learn how to construct your security roadmap
  • Learn: SANS CyberTalent Women's Immersion Academy (Cybersecurity Training) Learn: SANS CyberTalent Women's Immersion Academy (Cybersecurity Training) Sonny Sandelius, SANS CyberTalent Division Mar 27 2017 9:00 pm UTC 60 mins
    Join the SANS Institute and WSC for an insightful presentation about the SANS CyberTalent Women’s Immersion Academy. This academy is designed to help qualified women receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in six to eight months, depending upon program selected. The program is at NO COST to the selected women who attend and includes training and certification.

    Applications are due by April 5th, 2017.

    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • Hear from a recent graduate who will share her experience
    • How this training academy and related certifications can help your career
  • Prevention Week Pt 1: Stop Credential Theft and Abuse Prevention Week Pt 1: Stop Credential Theft and Abuse Brian Tokuyoshi, Senior Solutions Analyst at Palo Alto Networks Mar 28 2017 2:00 am UTC 60 mins
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.
  • Prevention Week Pt 1: Stop Credential Theft and Abuse Prevention Week Pt 1: Stop Credential Theft and Abuse Brian Tokuyoshi, Senior Solutions Analyst at Palo Alto Networks Mar 28 2017 8:00 am UTC 60 mins
    Prevent Phishing and the Abuse of Stolen Credentials

    In this session, we will present the unique attack life-cycle for credential-based attacks. Using real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse.
  • Detecting Network Threats: What Can Endpoint Data Tell You? Detecting Network Threats: What Can Endpoint Data Tell You? Greg Foss, Security Architect, LogRhythm & Chris Berninger, Senior Systems Engineer, Carbon Black Mar 28 2017 9:00 am UTC 60 mins
    Data-driven security is the future, but alarm fatigue and data overload continue to hold Security Operations teams back. Fortunately, there are some easy ways to organise and correlate data so you can simplify the threat hunting process and free up your resources to better detect, respond and neutralise advanced threats.

    In this webcast, Greg Foss, Security Architect at LogRhythm, and Chris Berninger, Senior Systems Engineer at Carbon Black, discuss how to proactively search for and detect threats in your network.

    You’ll learn:

    • To use endpoint data to gain visibility into your network and understand what’s really going on in your network
    • How LogRhythm SmartResponse can help orchestrate security operations
    • Threat hunting techniques using Carbon Black within LogRhythm

    Register now to discover how to use insights from endpoint data to best protect your organisation from advanced attacks.
  • 7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace 7 domande da farsi se si è alla ricerca di una soluzione Endpoint efficace Daniele Nicita, Consulting Systems Engineer, FireEye Italia Mar 28 2017 9:30 am UTC 45 mins
    Oggi tutti parlano di Endpoint, il panorama è piuttosto confuso, i messaggi marketing sembrano essere tutti uguali indipendentemente dal vendor che li propone.
    Quali sono le domande da porsi per fare chiarezza?
    Partecipa ad un webinar live dove Daniele Nicita analizzerà le 7 domande che più spesso si è sentito fare e che aiutano a chiarire questo mondo degli Endpoint in rapidissimo cambiamento.
  • Under The Hoodie: Actionable Research from Penetration Testing Engagements-EMEA Under The Hoodie: Actionable Research from Penetration Testing Engagements-EMEA Tod Beardsley and Andrew Whitaker Mar 28 2017 1:00 pm UTC 45 mins
    Join Andrew Whitaker and Tod Beardsley in a webcast overview of Rapid7's recently published paper, "Under the Hoodie: Actionable Research from Penetration Testing Engagements." In this webcast, Andrew and Tod will cover the major findings from our latest research, including the vulnerabilities and misconfigurations most often found on our engagements, the effects of account lockouts and two-factor authentication on pen testers, and the most effective countermeasures you can take to detect and prevent criminal hackers from breaking into your network.
  • What You Need To Know To Manage a Cyber SOC What You Need To Know To Manage a Cyber SOC Brad Bierman, Manager of Security Engineering; Sridhar Karnam, Director of Product Marketing Mar 28 2017 5:00 pm UTC 45 mins
    People - the most important aspect of a Security Operations Center (SOC) that is a dynamic integration of people, process, and technology. It's not the toolset or processes that keep your IT secure, but the experience and expertise. Let's discuss about how we can build, maintain, and update skills needed to effectively manage a cyber SOC.

    About the Presenters: Sridhar Karnam is director of product marketing at Arctic Wolf Networks. Joining Sridhar in this webcast is Brad Bierman, who manages the Arctic Wolf concierge security engineering team.