Hi [[ session.user.profile.firstName ]]

IT Security

  • Decoding the Matrix: Deception-Borne Threat Intelligence
    Decoding the Matrix: Deception-Borne Threat Intelligence John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies Live 45 mins
    Deception-based solutions can provide a wealth of information about how adversaries behave as they attempt to complete their mission. Depending on the level of engagement organizations desire to setup in their deception solution, information gleaned can include basic network connection information or every keystroke, command and action taken when a system is accessed. Understanding where in the attack life-cycle your deception information is coming from is critical to knowing how to utilize that information to strengthen your SOC / IR Operational Workflows. This webinar will discuss the types of information that can be gathered by Deception Solutions based on different levels of engagement and how that information can be used in the most effective manner with your Threat Intelligence and Security Analytics platforms.

    About the Speaker:

    John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies, has more than 25 years of experience in the Cyber Security industry focusing on advanced, targeted threats. He held senior leadership roles at Mandiant, ArcSight, Internet Security Systems, Lastline, and UUNET.
  • Once Upon a Network
    Once Upon a Network Kate MacLean Sr. Product Marketing Manager Cisco Cloud Security Live 60 mins
    We don’t think having the best security for your users, data and apps should have to be a fairy tale. If you’re looking for speed, reliability and the best threat intelligence to see and stop attacks before they happen, look no further. Cisco Umbrella provides the first line of defense against threats on the internet, anywhere your users go. And we can prove it.
  • Fighting Blind: Why Vulnerability Management Demands More Than Scan-and-Patch
    Fighting Blind: Why Vulnerability Management Demands More Than Scan-and-Patch Alastair Williams, EMEA Technical Director, Skybox Security Recorded: Jul 18 2018 49 mins
    Too many vulnerability management programs operate on incomplete or out-of-date scan data. What’s more, this data is rarely if ever correlated to their host’s place in the network, meaning efforts can be wasted on remediating already protected vulnerabilities while ignoring those left exposed to attack.

    To have a real impact on lowering your risk of cyberattack, organizations need to centralize and analyze data from their entire attack surface to narrow focus on the vulnerabilities most likely to be used in a cyberattack.

    In this webinar, you will learn:
    -What scanners miss in discovery, prioritization, remediation and oversight processes and how to fill in the gaps
    -How the intersection of your assets, networks, business and the threat landscape impact vulnerability risk
    -Why context-based approaches target remediation at your riskiest vulnerabilities and help identify patching alternatives
    -Insights from Skybox’s 2018 Vulnerability and Threat Trends Report mid-year update

    Join Alastair Williams, EMEA technical director for Skybox Security, as he explores how to get more value out of your data, visualize your attack surface and centralize vulnerability management to systematically reduce your risk of cyberattack.
  • 1/3 Get the Exact Identity Solution You Need - In the Cloud - Overview
    1/3 Get the Exact Identity Solution You Need - In the Cloud - Overview Warren Strange, ForgeRock and Steve Giovannetti, Hub City Media Recorded: Jul 18 2018 58 mins
    Containerized IAM on Amazon Web Services - Overview

    Discover how running your IAM on AWS gives you the exact solution that you want with the operational model of a SaaS.

    ForgeRock and Hub City Media have partnered together to deploy flexible and scalable IDaaS solutions using:
    Docker for containerization
    Kubernetes for orchestration

    Join speakers Warren Strange, Engineering Director at ForgeRock and Steve Giovannetti, CTO & Founder of Hub City Media to learn how you can deploy IAM using this model.

    Don’t fear the move from on-premise Identity to the cloud.

    Don’t settle for an Identity solution that is anything less than exactly what you need.

    In this webcast you'll learn:

    Why AWS is a powerful environment for running containerized IAM solutions and how it can meet all of your business needs

    How ForgeRock is leveraging Docker (containerization) and Kubernetes (orchestration) to prepare their platform for the cloud

    Why clients are choosing this path and how they’re using containerization today to:
    Reduce costs
    Implement complex use cases in the cloud

    *By registering for this webcast you agree ForgeRock will maintain and process your personal information for communicating with you. (https://www.forgerock.com/privacy-policy)

    The following partner(s) of the the above webcast(s) will have access to the list of registrants, including your contact information.

    Hub City Media (https://www.hubcitymedia.com/privacy-policy)
  • Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint
    Protecting IoT Endpoint Devices and Communications – Mocana TrustPoint Srinivas Kumar, Vice President of Engineering, Mocana and Keao Caindec, Vice President of Marketing, Mocana Recorded: Jul 18 2018 40 mins
    Part 1 - Securing the Boot Process

    When people think about cybersecurity today, they typically think about securing data in motion and at rest or analyzing threats. But when you move into this new IoT connected world, you need to think about more than just the data and monitoring hackers. How do you ensure you can trust the actual IoT endpoint device? This 3-part webinar series will focus on approaches for making devices trustworthy and enabling secure device-to-cloud communications.
  • NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED Ulf Mattsson, Dick Morrell, Juanita Koilpillai Recorded: Jul 18 2018 60 mins
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT

    Financial Services and GDPR: The next 60 days….

    In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.
  • Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications
    Operationalizing DevSecOps: 7 Best Practices for Cloud Native Applications Keith Mokris, Product Marketing Lead, Twistlock Recorded: Jul 18 2018 30 mins
    Modern enterprises are implementing both the tools and the cultural changes required to embrace a DevSecOps mindset and approach.

    This webinar will highlight:

    •Risks you can avoid by embracing DevSecOps
    •DevSecOps as it relates to your container development pipeline
    •How to integrate and automate key steps of the process

    Join Twistlock Product Marketing Manager Keith Mokris for a presentation and platform demonstration.
  • Proofpoint Email Protection Demo - See it Live
    Proofpoint Email Protection Demo - See it Live John Daley - Sr Engineer Recorded: Jul 18 2018 46 mins
    Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information. This event focuses on both.

    Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:

    •Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
    •Approaches for identifying suspicious messages
    •The latest in security software to fight against advanced threats
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive Mike Cooper, Sr. Security Manager Recorded: Jul 18 2018 24 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

    Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

    We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

    Sign up to test drive CMD+CTRL!
  • Flexible Cyber Threat Intelligence at the Network’s Edge
    Flexible Cyber Threat Intelligence at the Network’s Edge Ken Hosac, VP of IoT Strategy, Cradlepoint Recorded: Jul 18 2018 58 mins
    Network security needs are changing right before our eyes. Digital transformation is shifting workloads to the cloud, increasing mobile workforces, and expanding IoT footprints — and network on-ramps.

    From branch locations to in-vehicle networks and IoT devices, cyberattacks become more advanced by the day. Today’s diverse network architectures and security needs make scalable solutions and flexible cyber threat intelligence essential. Many organizations want the cost savings and efficiencies of the cloud without having to sacrifice the level of security to which they’re accustomed.

    Join Cradlepoint's Ken Hosac, VP of IoT Strategy, for this live webinar to explore the blending of legacy and next-generation measures to keep enterprise networks secure.

    Hosac has helped drive Cradlepoint’s growth and development through roles in strategic planning, product management, solution strategy and thought leadership. He frequently represents the company at industry conferences and events, and served on the original Advisory Board for the IoT/M2M Evolution Magazine. Hosac has 25 years of experience in marketing, sales, R&D and manufacturing. Prior to joining Cradlepoint, he served as VP of Marketing for Casabyte (later acquired by JDS Uniphase). He also served as VP of Business Development for GoAhead Software (later acquired by Oracle). Hosac earlier spent 10 years at Hewlett Packard with cable modems and head-ends, set-top boxes, and personal computers in a variety of engineering and engineering management roles. He holds a B.S. degree in Electrical Engineering and an M.S. degree in Manufacturing Engineering, both from Stanford University.
  • Best Practices for Managing Open Source in an Organization and Throughout M&A
    Best Practices for Managing Open Source in an Organization and Throughout M&A Mark Radcliffe, Partner, DLA Piper/General Counsel OSI; Anthony Decicco, Shareholder, GTC Law Group & Affiliates Recorded: Jul 18 2018 58 mins
    The use of open source has surpassed the occasional and solidified itself as the standard. In fact, the Black Duck by Synopsys 2018 Open Source Security and Risk Analysis found that 96% of the applications we scanned last year contained open source components.

    It’s increasingly difficult to properly manage open source in an organization to ensure compliance with the over 2,000 different licenses in use today and defend against new vulnerabilities, which surface frequently.

    Join this webinar with top open source legal experts Mark Radcliffe (partner at DLA Piper and general counsel for the Open Source Initiative) and Tony Decicco (shareholder, GTC Law Group & Affiliates) as they discuss best practices for managing open source in an organization and throughout an M&A transaction:

    - How do you conduct an open source / third-party software audit?
    - How do you get the most out of your Black Duck code scan?
    i.e. Handling license compliance issues and managing security vulnerabilities
    - What are key aspects of an effective open source / third-party software policy for both inbound use and outbound contributions?
    - What are key success factors for effectively releasing code as open source?
  • Threat Hunter: Implications of an Active Cyber Defense
    Threat Hunter: Implications of an Active Cyber Defense Griff James (Damrod Analysis) | Wyatt Hoffman (CEIP) | Will Lymer (Loki Labs) | Philip Thomas (Reed Smith) Recorded: Jul 18 2018 62 mins
    It is beyond the ability or willingness of the world’s governments to protect and secure information technology. What role then can the private sector play in making cyberspace safer? Can private enterprises do anything to strike back at attackers, curtailing their freedom of action and raising the costs of malicious activity?

    Consisting of academics and industry experts, this panel will explore the potential for active cyber defence to impede and deter malicious activity and the conditions under which it could be conducted responsibly.

    Speakers:
    - Griff James, Director at Damrod Analysis
    - Wyatt Hoffman, Research Analyst, Cyber Policy Initiative at Carnegie Endowment for International Peace
    - Will Lymer, Chief Growth Officer at Loki Labs
  • Best Practices for Threat Hunting
    Best Practices for Threat Hunting Jonny Milliken, Threat Intelligence Manager, Alert Logic Recorded: Jul 18 2018 39 mins
    Cyber threats are increasing in both sophistication and frequency, often overwhelming Security Operation Center (SOC) staff. As a result, more organizations are moving away from traditional reactive security while incorporating threat hunting techniques in their cybersecurity strategy.

    Go threat hunting with Jonny Milliken, Threat Research Manager at Alert Logic and join this webinar – here you’ll learn why more organizations are adding threat hunting capabilities, and why it should be a top priority for you as well.


    Highlights include:
    - Should we fight automation with automation?
    - How to construct your security operations to build to scale and react quickly to new threats
    - Known and unknown threats
    - Threat detection vs. threat hunting
  • A new security nightmare: How drives, messaging, etc. are a risk we can’t ignore
    A new security nightmare: How drives, messaging, etc. are a risk we can’t ignore Yoram Salinger: CEO - Perception Point, Michael Aminov: Founder & Chief Architect - Perception Point Recorded: Jul 18 2018 49 mins
    Wide adoption of new cloud collaboration apps (e.g. OneDrive, Slack, etc.) is creating many new security blindspots that are ripe for hackers to leverage. As more and more companies use these tools to communicate with customers, suppliers, and partners, and insider threats remain a challenge, IT decision makers should adapt and plan how to protect their organization from these new attack vectors.

    Join our CEO and Chief Architect to learn more about:

    1. How these tools are being adopted across the enterprise

    2. What are the specific security risks they pose

    3. How you can effectively manage this new level of complexity, and close the gaps
  • Verizon Threat Research Advisory Center - Insider and Privilege Misuse
    Verizon Threat Research Advisory Center - Insider and Privilege Misuse David Kennedy and John Rudolph, Verizon Global Security Recorded: Jul 18 2018 79 mins
    Leverage Threat Intelligence where it matters most.

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Insider and Privilege Misuse

    Our Verizon Threat Research Advisory Center presenters will be:

    • John Rudolph, Principal Consultant, Identity and Access Management
    • Steve Atnip, Senior Analyst, Threat Intelligence
    • David Kennedy, Managing Principal, Open Source Intelligence
    • Laurance Dine, Managing Principal, Investigative Response – EMEA

    For this month's theme of 'Insider and Privilege Misuse' we'll feature John Rudolph, Principal Consultant, Identity and Access Management who'll discuss insider threat motivations, common denominators, and countermeasures, to include the Zero Trust approach. We'll then touch base on the IR Pulse and trends in our caseload, followed by:

    • Current Intelligence
    • Attacks & Threat Indicators
    • Latest Malware Trends
    • Significant Vulnerabilities
  • Your Growing Cloud Investment: The Magic Formula for Your Cloud Success Story
    Your Growing Cloud Investment: The Magic Formula for Your Cloud Success Story Todd Bernhard, CloudCheckr Product Specialist, Ian Thorton-Trump, Cybersecurity Expert, Laurent Mombel, N2WS System Engineer Recorded: Jul 18 2018 57 mins
    Abracadabra AWS! Presto change Cloud!

    Magic words alone are not enough to deliver the return on investment and cyber security out of your AWS cloud. Join N2WS for a great Webinar Magic Show. We will dispel your business’s fears of cloud migration, demystify cloud compliance and escape from the dunk tank of complexity – especially when it comes to managing backup and ensuring uptime.

    Hosted by cybersecurity expert Ian Thornton-Trump, N2WS System Engineer, Laurent Mombel, and CloudCheckr Product Specialist Todd Bernhard, we will spend an hour brewing up a cauldron of information for you - using the recipe for AWS success:

    - Rapid Recovery
    - Flexible Backup
    - Shrink Downtime
    - Why hybrid is dangerous
    - Benefits for small, medium and large companies
    - Maintain Compliance
    - Ease Auditing

    Alakazam! See you there!
  • Protecting and enabling 21st century industrial networks at scale
    Protecting and enabling 21st century industrial networks at scale Del Rodillas, Head of Industrial Cybersecurity Solutions & Lionel Jacobs, Senior ICS Security Architect, Palo Alto Networks Recorded: Jul 18 2018 62 mins
    Modernization initiatives such as "Industry 4.0" and "Industrial IoT" are pushing industrial networks to be more connected as well as more complex and challenging to protect. In this session we will demonstrate how you can establish granular visibility and consistent security policy to your SCADA deployment, IIoT and remote sites in even the harsh environments. In other words, we can show you how to protect all of your IT AND OT infrastructure.

    Join this webinar to learn about:

    - Consistent and integrated deployment securing traffic across the SCADA core, remote sites, controlled/harsh environments, IIoT and industrial cloud
    - Zero-trust segmentation using the PA-220R ruggedized Next-Gen Firewall across IT and OT environments
    - Leveraging central management to increase administrative efficiency and provide cybersecurity and ICS network traffic intelligence to OT and IT
  • Lessons Learned from the Cyber Security Front Line
    Lessons Learned from the Cyber Security Front Line Dan Pitman, Senior Solutions Architect, Alert Logic Recorded: Jul 18 2018 16 mins
    Cybersecurity is currently dominating the headlines – data breaches happen on a regular basis. Cybersecurity is a space that is undergoing significant transformation in trying to gain the upper hand on hackers, and is under a constant bombardment of scrutiny.

    Join this eye-opening webinar with Dan Pitman, Alert Logic’s Senior Solutions Architect, as he discusses the perils of the cyber security industry.

    During this webinar you will gain insight on:
    - What tactics are cyber criminals using to identify a vulnerable target
    - Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
    - How to effectively utilize your security tactics to better protect your web apps
    - Remediation strategies to help defend against cyber attacks
  • [VIDEO PANEL] Cyber Security in Europe: An Executive Perspective
    [VIDEO PANEL] Cyber Security in Europe: An Executive Perspective Kevin Taylor, EMEA VP; Stuart McKenzie, EMEA Mandiant VP; Simon Moor, NEUR VP; Richard Weaver, Data Privacy Officer Recorded: Jul 18 2018 38 mins
    Cyber breaches are inevitable because attackers constantly change their tools, techniques and procedures (TTPs). Everyone is affected in different ways, whether from compromised systems or supply chains to the financial implications of non-compliance and breach notification.

    Join us for a live video panel on trending topics in cyber security:
    -Breach notification sources, dwell time and industries mostly likely to be compromised and retargeted by attackers
    -Importance of understanding cyber attackers and their motives
    -Red teaming to improve security effectiveness
    -Cyber security skills gap
    -Direct and indirect costs of a breach
    -Requirements, processes and policies to handle the GDPR
  • Is your Office 365 data protected?
    Is your Office 365 data protected? Anuj Sawani, Sr. Product Marketing Manager Recorded: Jul 18 2018 50 mins
    SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

    • Accidental data exposure with SharePoint®
    • Uncontrolled use of personal OneDrive® accounts
    • Data security violations in Exchange

    Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

    Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

    You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
  • Managing Threat Detection and Response for Securing AWS
    Managing Threat Detection and Response for Securing AWS Ryan Holland, Alert Logic and Orlando Scott-Cowley, AWS Recorded: Jul 18 2018 28 mins
    Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy?

    Start here with Ryan Holland, Senior Director, Technology Services Group at Alert Logic and Orlando Scott-Cowley, Principal Evangelist at AWS as they list the top considerations to better protect your AWS workloads and applications.

    Learn the core fundamentals to a stronger AWS cloud security strategy:
    - Understanding your AWS environment and the exposures your web apps face
    - Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
    - The use of multiple data sources to attain a “defense in depth” security strategy
    - Threat detection capabilities and creating an effective incident response plan
  • Attacker’s Advantage - Understand How & Why Cyberattackers Beat Your Defence
    Attacker’s Advantage - Understand How & Why Cyberattackers Beat Your Defence Robert Healey, Senior Director Marketing, Asia Pacific, Tenable Network Security Recorded: Jul 18 2018 60 mins
    In its inaugural report, Tenable Research explores who has the first-mover advantage – cyber criminals or security teams? What’s the difference in time between when an exploit is publicly available for a given vulnerability and the first time that security teams actually assess their systems? And why does this even matter to your organization?

    The research team analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period. What did they find?

    Alarmingly, all too often, the attackers have the advantage. On average, they have a seven-day head start on defenders. Threat actors are sprinting ahead, exploiting vulnerabilities before security teams have even left the starting blocks – before businesses even know they’re at risk.

    Join Tenable and (ISC)² on Jul 18, 2018 (Wed) at 14:00 (Singapore Time) to understand how and why cyber attackers are beating your defence.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Tony Vizza, CISSP Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Is your Office 365 data protected?
    Is your Office 365 data protected? Anuj Sawani, Sr. Product Marketing Manager Recorded: Jul 18 2018 50 mins
    SaaS applications like Microsoft® Office 365® are wildly popular, and adoption across enterprises continues to grow, but so do the hidden threats lying within these offerings, such as:

    • Accidental data exposure with SharePoint®
    • Uncontrolled use of personal OneDrive® accounts
    • Data security violations in Exchange

    Yes, even trusted SaaS applications like Office 365 can increase your risk of breaches and noncompliance.

    Our Security Operating Platform can help. Sign up for our webinar and learn what you need to meet your CASB needs as well as secure your cloud-based data against malware and accidental exposure.

    You’ll also find out how to achieve complete visibility and reporting, data classification, and fine-grained enforcement across users, folders and file activities to protect your business-critical data in Office 365.
  • How To Manage Your Risk with Threat Intelligence
    How To Manage Your Risk with Threat Intelligence Rob Van Der Ende, Vice President Asia Pacific & Japan, FireEye Inc. Recorded: Jul 18 2018 24 mins
    Organizations continue to fight an asymmetric battle on the cyber front. Attackers are sophisticated, well-funded, well-organized and use highly targeted techniques. Security teams routinely struggle to understand which cyber threats pose the greatest risk to them and how to prioritize those they discover.

    Most organizations stake their security efficacy on legacy, signature-based tactical intelligence feeds that can’t anticipate attacks or provide context to guide response. Instead, these feeds increase alert volumes with false positives that make it nearly impossible to detect attacks and provide a false sense of security.

    The right threat intelligence can help organizations drive business efficiencies, by proactively assessing and managing risks that are relevant, improved detection and prevention of attacks, and building attack context for the alerts that they face.

    Find out how threat intelligence helps you stay on top of an evolving threat landscape.
  • To SIEM or not to SIEM: Protecting Applications in Cloud and Hybrid Environments
    To SIEM or not to SIEM: Protecting Applications in Cloud and Hybrid Environments Dan Pitman, Senior Solutions Architect, Alert Logic Jul 19 2018 9:00 am UTC 60 mins
    Today’s security information and event management (SIEM) solutions are powerful tools that promise to make use of your endpoint, network, and system log data while empowering you with direct control to configure what constitutes a real in your unique environment. However, their success and efficacy depend on the thought and effort that goes into how they are configured, deployed, used and maintained.

    When considering a SIEM for security, there a few factors that are often overlooked:
    * Challenges of aligning SIEM with today’s security challenges
    * Difficulty of improving outputs to be accurate, actionable and relevant
    * Underestimating total effort and cost required to meet objectives

    For most companies, desired outcomes circle around shrinking the attack surface, accurate threat detection, reducing dwell time and most importantly, addressing the current threat landscape. These goals are achievable at lower cost in terms of TCO, staff hours and infrastructure management burden. Simply put, there is a better way.
  • Technical insight: protecting your Office 365 or G Suite data with StorageCraft
    Technical insight: protecting your Office 365 or G Suite data with StorageCraft Jaap van Kleef – EMEA System Engineer Jul 19 2018 9:00 am UTC 75 mins
    When it comes to working in cloud-based applications, the option of granular recovery isn’t a given. But the opportunity for human error can be: users delete important files, overwrite one another’s documents, and accidentally download viruses. And SaaS vendors may or may not have a recovery solution for you. If they do, there’s no guarantee that it'll be easy, that you’ll get the data in a useful format, or that the recovery will happen quickly or inexpensively.
    Join this webcast and learn how StorageCraft Cloud Backup for Office 365 (and G Suite) provides granular protection for Exchange, calendars and contacts, OneDrive for Business, SharePoint, Public shared folder, etc. And you will avoid the sweat for storage space, software upgrades, or the possibility of an onsite backup server failing.
  • Rethinking Security
    Rethinking Security Adrian Rowley, Technical Director EMEA Jul 19 2018 9:00 am UTC 45 mins
    This webinar looks at how to eliminate complexity, increase efficiency of security tools, and improve confidence in the overall security posture of your organisation.
    Adrian Rowley, Gigamon’s Technical Director for EMEA, will discuss todays challenges in network security and how these can be resolved.
    Attendees will learn how you can:
    •Maximise network availability and operational simplicity of security tool upgrades with its integrated inline bypass technology
    •Deliver unmatched depth and breadth of traffic intelligence that is essential to increasing efficiency of overburdened security and networking tools, while decreasing complexity
    •Minimise Total Cost of Ownership and increase ROI by an average of 153%
    Join Adrian Rowley to see why only Gigamon provides a full solution for networking tools and inline and out-of-band security tools across on-premises, remote, virtual and cloud environments.
  • Managing Cybersecurity Risk and Delivering Business Value
    Managing Cybersecurity Risk and Delivering Business Value Craig Saunderson, Reliance acsn & Amardeep Sachdev, LogRhythm Jul 19 2018 9:00 am UTC 60 mins
    Your job is to protect your organisation from the risk associated to cyberattacks. Resources may be tight, you may be struggling with too many alerts, and you may not be getting the visibility you need. As such, constantly evolving threats can slip through the cracks and the risk of suffering a damaging breach could be causing you to lose sleep.

    Join LogRhythm and Reliance ascn to discover what managing cyber risk really means and how the right approach can help you deliver continuous value to the business. We’ll outline how you can reduce your organisation’s cyber risk with a smarter approach to cybersecurity that maximises the efficiency and effectiveness of your security operations centre.

    Join us to:

    • Understand the challenges our customers are facing & how they’re overcoming them
    • Discover the technologies & processes you can use to manage and reduce cyber risk
    • Understand how NextGen SIEM enables measurably faster threat detection and response
    • Learn how automation and orchestration boosts efficiency and productivity
    • Hear how machine learning and true AI capabilities can enhance your security analytics
  • What would you do if you lost all your data…?
    What would you do if you lost all your data…? Ben Searle, EMEA Alliance Manager @ WinMagic Jul 19 2018 10:00 am UTC 60 mins
    Data is the cornerstone of every organisation. Join WinMagic and Bechtle at this webinar where we’ll discuss how to protect your data from endpoint to cloud. You’ll learn the steps you need to take to ensure you’re confident that your data is secure.
  • Observation of Trifles - Sherlock Holmes' Lessons on Machine Learning & Security
    Observation of Trifles - Sherlock Holmes' Lessons on Machine Learning & Security Ben Banks, Global Director of Cybersecurity, Ensono Jul 19 2018 12:00 pm UTC 60 mins
    Join Ensono Global Director of Cybersecurity Ben Banks for a timely and informative session on machine learning and security.

    In this webinar you will learn:
    - Making correct inferences and deductions from small indicators combined with larger datasets (should we start to correlate data about our clients share prices and related news items).
    - The importance of the reveal (integrability) i.e. "Holmes....how the devil did you know?"
    - The importance of people-centric analysis and 'profiling' i.e. motive
    - Moriarty i.e. expect your enemy to be as good as - if not better - than you
  • Cryptojacking: Who/What/Why/When & How to Prevent Computer Power Being Stolen
    Cryptojacking: Who/What/Why/When & How to Prevent Computer Power Being Stolen Jay Kelley, Senior Product Marketing Manager, Menlo, Lindsay Drabwell, Head of Member Services EMEA, (ISC)² Jul 19 2018 1:00 pm UTC 60 mins
    As users become savvier and increasingly use ad blockers, advertising revenue is declining. Crypto coin mining is emerging as a new way for websites to monetise visitor traffic. But, there is a “dark side” to cryptomining: Cryptojacking, which includes, among other misdeeds, cryptomining without a website visitor’s permission or knowledge. While cryptojacking may seem like a victimless crime, since all that is being “stolen” is visitors’ computing and graphics processing power, it is anything but, and can lead to serious consequences. This session will focus on the differences between safe, legal cryptomining and dangerous cryptojacking, what it is, who is using it, why it is being used, when, how it is being abused, and how web browser isolation eliminates 100% of the cryptojacking risk.

    • How crypto coin mining is being used today
    • Why websites are moving away from advertising to crypto coin mining
    • How and why web browsers are being used to steal users’ compute power away without consent in most cases
    • How businesses can stop wide scale use of cryptojacking across all browsers and devices in their network through isolation
  • Accelerate Open Banking with APIs, Strong Authentication and Risk-Based Security
    Accelerate Open Banking with APIs, Strong Authentication and Risk-Based Security From CA Technologies: Sanjay Tailor, Mehdi Medjaoui, Robert Lindberg, David Chui Jul 19 2018 2:00 pm UTC 60 mins
    Whether driven by PSD2 compliance, market demand for mobile apps, or fintech competition, open banking is becoming a top priority for financial businesses. Through exclusive research and customer successes, we determined that building a modern application architecture with APIs, microservices and strong authentication is a key success factor in this space. In fact, our latest report shows that fully digital banks enjoy an estimated 25% cost-to-income ratio, versus 60% for traditional institutions.

    For this webcast, we assembled a panel that includes Mehdi Medjaoui, author of Banking APIs: State of the Market, along with experts in API and security capabilities, to introduce the elements of modern application architecture that all digital banking business leaders should know about – API management, microservices, strong authentication and risk-based security. You’ll learn about:

    * The current state of open banking, and what your peers are doing

    * How to invest in modern application architecture to improve your open banking projects

    * How to align better with IT to accelerate your time-to-market

    All registrants will also benefit from a complimentary copy of our Banking APIs: State of the Market report.
  • Bring in the cavalry
    Bring in the cavalry Ben Miller, SVP International, IDECSI Jul 19 2018 2:00 pm UTC 60 mins
    The classic cyber security architecture relies on gathering huge amounts of information and using expensive technology and even more expensive people to find the occasional needle in digital haystacks. This cannot scale to match the exponential growth of tomorrow’s problems. There has to be another approach. Will today’s users be tomorrow’s knights in shining armour?
  • Tales from the SOC: Live Simulated Hack
    Tales from the SOC: Live Simulated Hack Graeme McMillan, Solutions Architect, Alert Logic Jul 19 2018 2:00 pm UTC 45 mins
    Watch this 3-stages Live Simulated Hack Demo from Alert Logic's Cloud Security Summit as we show you the impact of reconnaissance tactics to identify vulnerable systems. We also demonstrate how easy it is for cyber criminals to gain foothold in remote environments, the latest tricks attackers are using, and what you should focus on to keep data and systems secure. An exciting and very important demonstration for anyone who develops applications, manages websites or is interested in security.

    Join Graeme McMillan, Alert Logic’s Sales Engineer, as e demonstrated the importance of understanding the risk and your attack surface of your business-critical applications. Make sure to identify high risk areas, before the cyber criminals get there first.
  • Incremente la eficiencia del SOC mientras reduce el costo de operaciones
    Incremente la eficiencia del SOC mientras reduce el costo de operaciones Luis Guzman, Security Engineer, Securonix Jul 19 2018 3:00 pm UTC 60 mins
    Más del 60% de las alertas en su SOC demandan tiempo de investigación y no constituyen un riesgo alto para su organización. SIEM 2.0 puede automatizar sus procesos de investigación para que los analistas se enfoquen en lo que realmente es una amenaza. Lo invitamos a un webinar donde nuestros expertos en UEBA de Securonix presentarán las ventajas técnicas y económicas al tener una solución de Seguridad Analítica Avanzada en su SOC
  • The Evolution of Mobile Threat Actors
    The Evolution of Mobile Threat Actors Michael Flossman, Head of Threat Intelligence, Lookout Jul 19 2018 3:00 pm UTC 60 mins
    Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.

    Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
  • Can computers be creative? Integrating AI in media content workflows
    Can computers be creative? Integrating AI in media content workflows IBC365 | Adobe | GrayMeta | Channel 4 | EBU Jul 19 2018 3:00 pm UTC 75 mins
    Artificial intelligence (AI) and machine learning are starting to transform the way content is created, managed and delivered.

    New cognitive-computing tools are enhancing creativity, eliminating mundane repetitive work and unlocking new value from content.

    AI is suddenly everywhere: the ready availability of powerful AI services from all the major cloud providers means hundreds of media technology products are plugging into AI and offering new ways of working.

    This webinar cuts through the hype to reveal how media companies are actually using AI tools throughout the content supply chain - from aiding craft and creative work in post-production, automating metadata extraction and compliance, to making smart content recommendations to audiences. Our speakers will explain how best to use AI, what we can and can't do, and how it will continue to change workflows into the future.

    Speakers:
    Michael Gamböck, Senior Strategy Relations EMEA, Creative Cloud Video, Adobe
    Josh Wiggins, Chief Commercial Officer, GrayMeta
    Neil Taylor, Lead Data Strategist for Commercial Innovations, Channel 4
    Jean-Pierre Evain, Principal Project Manager, EBU Artificial Intelligence Committee
  • What’s New in Data Protection Suite: Introducing Data Protector 10.04
    What’s New in Data Protection Suite: Introducing Data Protector 10.04 Julita Kussmaul, Senior Product Marketing Manager and Uli Wallscheid, Product Manager, Micro Focus Jul 19 2018 3:00 pm UTC 60 mins
    Join us for an exciting and informative look at the latest release of Data Protector.

    Data Protector 10.04 brings improvements in the Scheduler and adds other enhancements to the user experience. It also introduces new platform integrations and virtualization improvements.

    Data Protector 10.04 offers our first integration with Micro Focus Operations Orchestration which allows automation of backup operations using workflows.

    See a live demo of the new features.
  • Two Companies Walk into a Bar: Cyber Risk for the C-Suite
    Two Companies Walk into a Bar: Cyber Risk for the C-Suite Cynthia Wright, CEO at Synthus Jul 19 2018 4:00 pm UTC 60 mins
    It's become a truism among cybersecurity professionals that there are two types of companies: those that have been hacked and those that will be. If cyber incidents are inevitable, what can organizations do to pro-actively minimize the impact on their operations? This session addresses considerations for organizations addressing cyber-risk at the strategic level.
  • Enforcing Immutability & Least Privilege to Secure Containers: Red Hat OpenShift
    Enforcing Immutability & Least Privilege to Secure Containers: Red Hat OpenShift Tsvi Korren - Chief Solutions Architect at Aqua Security Jul 19 2018 4:00 pm UTC 60 mins
    One of the benefits of using containers, especially in microservices-based applications, is they make it easier to secure applications via runtime immutability—or never-changing—and applying least-privilege principles that limit what a container can do.

    With immutability, every attempt to change the runtime environment is interpreted as an anomaly. And, thanks to containers’ simplicity, it is easier to predict their behavior in the application context and create a tight security envelope, allowing them to perform only their required function and preventing behaviors outside that scope.

    In this webinar, Tsvi Korren, Chief Solutions Architect at Aqua Security, will explain and demonstrate how an approach that enforces immutability and least privilege can secure applications in an active container environment.
  • SEC Guidance - Cyber Security Disclosures
    SEC Guidance - Cyber Security Disclosures Aseem Rastogi CEO & Founder - CloudOptics Jul 19 2018 4:00 pm UTC 30 mins
    Information / Discussion on SEC Guidance On Public Company Cyber Security Disclosures

    The Securities & Exchange Commission, in Feb-2018 has published a guidance to assist public companies in handling Cyber Security Risks and Incidents. In this webinar, participants will learn about -
    - Context Of SEC Guidance
    - Purpose Of SEC Guidance
    - Disclosure Approach
    - Steps to Adhere to Guidelines
    - Technology & Operational Considerations
  • The Practitioner’s Guide to Security Monitoring in the Cloud
    The Practitioner’s Guide to Security Monitoring in the Cloud Danielle Russell, Group Product Marketing Manager & Brian Bledsoe, Sr. Technical Manager, Sales Enablement for NA, AlienVault Jul 19 2018 4:00 pm UTC 60 mins
    Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:

    - What the shared responsibility model means for the security of your cloud assets
    - Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
    - How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
    - Benefits of an all-in-one security solution for threat detection, incident response and compliance management

    Hosted By
    Danielle Russell
    Group Product Marketing Manager
    Danielle is a Group Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement.

    Brian Bledsoe
    Sr. Technical Manager, Sales Enablement for North America
    Brian is a member of AlienVault's Sales Enablement team. He was previously a Sales Engineer, and then Sales Engineering manager at AlienVault.
  • The Public Sector Guide to FISMA Accreditation
    The Public Sector Guide to FISMA Accreditation Jeff Valentine, Chief Product Officer, CloudCheckr, and Matt Jordan, VP Corporate Development, JHC Technology Jul 19 2018 4:00 pm UTC 60 mins
    FISMA is the all-embracing legislative framework for protecting the security, integrity, and availability of federal information and information systems. To meet FISMA compliance requirements, governmental agencies and private contractors that handle federal data must maintain full visibility over their information system inventory.

    Attendees will learn:
    - How to leverage existing documentation
    - Shared responsibility
    - Gaining an ATO without FedRAMP assessed infrastructure
  • Culture Club: Developing a Culture of Security at an Organization
    Culture Club: Developing a Culture of Security at an Organization Erich Kron, KnowBe4, Keri Pearlson, M.I.T.; Spencer Wilcox; Brandon Dunlap (Moderator) Jul 19 2018 5:00 pm UTC 75 mins
    Human error. Unintentional security incident. It’s going to happen at every organization. Sooner or later, someone will click on a rogue link or open an attachment they shouldn’t, exposing your organization to malware, phishing and ransomware. Old-school training, testing and policies can only go so far. Actions need to replace rhetoric. Join KnowBe4 and (ISC)2 on July 19, 2018 at 1:00PM Eastern for a discussion on how to build a security-centric culture than can benefit any size organization. We’ll examine how to establish a solid foundation, making sure everyone is on the same page and leveraging leadership to help with accountability.
  • SOAR Like An Eagle: The Key to Fast, Full-Lifecycle Incident Response
    SOAR Like An Eagle: The Key to Fast, Full-Lifecycle Incident Response Jon Oltsik (ESG) and Stan Engelbrecht (D3 Security) Jul 19 2018 5:00 pm UTC 75 mins
    Join Senior Principal Analyst and ESG Fellow, Jon Oltsik, and Director of Cyber Security at D3 Security, Stan Engelbrecht, CISSP, as they discuss the complexity of today’s security incidents and the need for organizations to utilize SOAR (Security Orchestration, Automation and Response) tools in order to seamlessly, and rapidly, coordinate the people, technology, and processes that make up their security infrastructure.

    In this webinar you will learn how to:

    •Ease the adoption of SOAR through out-of-the-box security product integration
    •Identify, contextualize and rank threats automatically (so your analysts don’t have to)
    •Eliminate silos with visual playbooks that weave human and machine tasks together
    •Automate case management activities, such as incident investigations, link analysis and forensics tracking
    •Extend automation and orchestration capabilities to compliance, privacy and investigative teams
  • Containers At-Risk: A Review of 21,000 Cloud Environments
    Containers At-Risk: A Review of 21,000 Cloud Environments Dan Hubbard, Chief Security Architect | Lacework Jul 19 2018 5:30 pm UTC 45 mins
    Securing workloads in public clouds requires a different approach than that used for traditional data centers. The need to operate security at cloud speed, respond to continuous change, and adapt at scale all require a dramatic shift in the type of security solution required by today’s operation.

    This webcast will deliver a detailed analysis of the threats and risks discovered by recent research done by Lacework when it comes to deploying containers and orchestration services like Kubernetes running on AWS.
  • Master DNS Security for a Bulletproof, Tier One Network
    Master DNS Security for a Bulletproof, Tier One Network Tony Scott, DJ Goldsworthy, D.J. Long, Cricket Liu, Victor Danevich Jul 19 2018 6:00 pm UTC 90 mins
    You're charged with building a bulletproof, tier one secure network. If your Domain Name System (DNS) goes down, nothing else matters. And, DNS is the leading attack vector for cyber villains. Say “Hack no! ” to DNS threats.

    Join guest speaker Tony Scott, former CIO of the United States, Microsoft, and the Walt Disney Company, alongside leading practitioners from Aflac and McAfee in this live panel discussion. This unique gathering of industry experts will discuss their perspectives on building a safe, secure network and actionable best practices in this era of cloud and mobile. Moderated by Infoblox Chief DNS Architect Cricket Liu, this discussion will give you an opportunity to hear from the experts and ask questions about.

    - What leading organizations are doing to secure their DNS
    - When to best utilize DNS data, network context, and threat intelligence in your security operations
    - How to integrate DNS data with your security ecosystem to accelerate threat mitigation and remediation
    - How Aflac blocked nearly 37 million threat connections with < 100 false positives

    Save your spot now.

    ----------------------------------------------------------------------------------------------

    Panelists:

    Tony Scott,U.S. CHIEF INFORMATION OFFICER (2015–2017), TONYSCOTTGROUP

    DJ Goldsworthy, DIRECTOR, SECURITY OPERATIONS AND THREAT MANAGEMENT, AFLAC

    D.J. Long, VICE PRESIDENT, STRATEGIC BUSINESS DEVELOPMENT, MCAFEE

    Cricket Liu, CHIEF DNS ARCHITECT, INFOBLOX

    Victor Danevich, VICE PRESIDENT, WORLDWIDE FIELD ENGINEERING, INFOBLOX
  • Impersonation: The Many Masks of Email Threats
    Impersonation: The Many Masks of Email Threats Ken Bagnall, Vice President, Email Security, FireEye Jul 19 2018 6:00 pm UTC 60 mins
    You can’t always trust that the sender of your email truly sent it. Impersonation threats are becoming more popular and difficult for end users to spot.

    Ken Bagnall, Vice President, Email Security, presents “Impersonation: The Many Masks of Email Threats,” a FireEye webinar that digs into the details behind impersonation attacks:

    • What psychological authentication involves
    • How attackers prey on recipients’ imagination and emotions
    • How impersonation attacks are evolving
    • What is in the future for impersonation
    • How threat intelligence and the speed of email security impact cyber risk
  • Applying Data Science to Measure Your True Risk
    Applying Data Science to Measure Your True Risk Michael Roytman, Chief Data Scientist at Kenna Security Jul 19 2018 7:00 pm UTC 45 mins
    There’s a difference between threat data and threat intelligence, and while the former may give you a better understanding of malicious data sources, IPs, websites, and domains, what it fails to do is give you and your security team the context to remediate a threat. When CVEs are responsible for tens of millions of attacks, simply having threat data won’t cut it.

    When it comes to cybersecurity, knowledge is power. And as cyber criminals gain more sophisticated tactics, protecting yourself requires a more intelligent approach.