The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Don Mahler, Director, IT Performance Management, Leidos & Taylor Crump, Product Marketing, SplunkRecorded: Oct 16 201946 mins
Determining the right metrics and key performance indicators (KPIs) between the business and IT is only half of the picture need when getting modern IT to operate effectively. You need all the right data to be looked at too.
Join us to learn about the right data types in conjunction with the right KPIs that you need to look at, from Leidos, a FORTUNE 500® global science and technology solutions leader, who has successfully transformed their business to be able to make data-driven decision based on their IT data and health information.
Jerry Wong, Systems Engineer, InfobloxRecorded: Oct 16 201957 mins
The perimeter has shifted. Your users directly access cloud applications from everywhere and data no longer reside only in data centers. Digital transformations like SD-WAN, IoT and cloud make securing your infrastructure, applications and data complicated. SD-WAN enabled branches directly connect to the Internet, but they don’t have the ability to replicate a full HQ security stack. IoT leads to an explosion of non-standard devices using non-standard protocols, making them harder to secure. Every new change doesn’t equal need for a new security tool.
What’s needed is a scalable, simple, and integrated security solution that leverages existing infrastructure that organizations already own. DNS is critical to the fabric of the internet and any IP based communication (on-premises, cloud, SD-WAN and IoT environments). It serves as the perfect foundation for security because it is simple to deploy, ubiquitous in networks, is needed anyway for connectivity and can scale to the size of the Internet.
Join Infoblox and (ISC)² on Oct 16, 2019 (Wed) at 14:00 (GMT +8) to learn how leveraging DNS as a foundational security architecture for digital transformations can:
• Protect your brand by securing your traditional networks and transformations like SD-WAN, Cloud and IoT
• Reduce time and cost of your enterprise threat defense
• Automate response when it sees things happening and provide data to the rest of the ecosystem
Presenter: Jerry Wong, Systems Engineer, Infoblox
Moderator: Sam Goh, CISSP, GM for Korea and Japan, Ensign InfoSecurity
David Morris, Lance James, Steven Teppler, and Mark RaschRecorded: Oct 15 201961 mins
This session will delve into the legal responsibilities of your Bank's liability and your requirements to protect your banking credentials from the unauthorized transfer of funds as a result of a hack.
In today’s multi-cloud and hybrid environments, CISO's are struggling to secure assets, manage security policies across clouds, monitor and mitigate risks, while also supporting the business. How are CISOs solving the challenge of complexity?
Join this panel of experts to learn how to simplify cyber risk management as well as maximize the value of your team and technology.
- Risk scoring and security controls
- How to identify risks for organizations and their third-party vendors
- How to prevent, detect, and respond to, privacy and network security incidents
- Best of vulnerability and risk management in a multi-vendor environment
- Best practices and use cases across industries
Jerry Caponera, VP of Products & Cyber Risk, Nehemiah SecurityRecorded: Oct 15 201950 mins
Join us for this webinar to explore how cyber risk models have evolved to more accurately predict financial outcomes through better alignment with frameworks and models like NIST and MITRE ATT&CK. Jerry Caponera, VP of Products and Cyber Risk at Nehemiah Security, will share insights from global cybersecurity leaders who have risen above cyber geek talk and successfully translated risk into business terms. He will cover managing risk by tracking associated potential financial losses; what’s behind the hype surrounding financial data risk assessment (FinDRA); how to calculate ROI for security and mitigation investments; and how to brief your Board on cyber risk in financial terms.
Any Mann, Chief Technology Advocate, Splunk Inc. and Pankaj Prasad, Sr. Principal Analyst, GartnerRecorded: Oct 15 201975 mins
IT Ops teams are now critical to an organization’s success and require a strategy that aligns with the organization’s objectives and its external stakeholders. Most infrastructure monitoring solutions haven’t caught up to meet these new requirements, forcing IT teams to resort to traditional monitoring strategies that don’t allow for innovation and growth.
Join Gartner analyst Pankaj Prasad and Splunk’s Chief Technology Advocate, Andi Mann, as we discuss new trends in IT monitoring strategy, best practices, and new IT models to implement in your organization.
Here’s what you’ll learn:
•How to effectively approach your IT monitoring strategy in this new world of IT
•Build a successful IT infrastructure operating model to get to market faster, innovate, and respond in real-time
•Best practices for integrating LOB owners, application developers and external stakeholders into your strategy
Sue Gilkes, CompTIA Faculty, CompTIARecorded: Oct 15 201940 mins
** This is an EMEA focused webinar **
Small businesses are rightly described as the lifeblood of the global economy. This isn’t hyperbole, as SMBs account for the vast majority of business entities while serving as a key driver of job growth and innovation. Success as a small business owner means overcoming challenges on many fronts, but also embracing new opportunities in technology and business.
CompTIA’s latest research explores the business relevance of technology to SMBs and the factors affecting their perceptions, decisions, and investments in established and emerging technologies. We also explore the professional services industry, taking a look at their decision to offer technology to their own customers.
Saralyn Dasig | Product Marketing Manager, MV Smart CamerasRecorded: Oct 15 201945 mins
MV security cameras leverage advances in solid state memory technology and Meraki expertise in cloud management. By removing the need for additional on premise hardware and standalone software packages, like the network video recorder (NVR) and video management software (VMS), Meraki MV streamlines and simplifies purchasing, deployment, and monitoring of video security systems. Join us on a live webinar to learn more!
Kong Yang, Senior Product management & Ruben Spruijt, Senior Product Engineer, NutanixRecorded: Oct 15 201939 mins
Desktop as a Service (DaaS) is a powerful way to leverage the cloud for end user computing with unmatched flexibility, manageability, and performance. Nutanix Frame is a DaaS solution that runs on multiple clouds and provides simple yet very powerful access to Windows applications through a browser.
In this webcast, learn how high-end graphics tools, resource demanding software, and classic office productivity apps run and scale easily with Nutanix Frame.
During this webcast, you will learn:
o How you can run any Windows software in a browser
o How to setup and manage DaaS with a breeze
o How Nutanix Frame integrates with cloud storage, identity, and networking like no one else can
David Morris, Graeme Payne and Reid EastburnRecorded: Oct 14 201961 mins
Tune in for this live interview with Graeme Payne, former VP and CIO for Global Corporate Platforms at Equifax. This session will give you first hand insights into what happened at Equifax, and lessons learned.
Jaap Van Kleef, EMEA Technical ManagerOct 17 20199:00 amUTC45 mins
Companies of all size are running heterogeneous environments, with physical and virtual servers. As a result, every so often, IT professionals hesitate between deploying agent-based or agentless backup solutions. There is no right or wrong answer; it all depends on your requirements and objectives.
Join our StorageCraft expert, Jaap van Kleef, and learn how you can best protect your VMs and physical machines and keep the business running at all times!
Ulf Mattsson, Head of Innovation, TokenExRecorded: Oct 10 201961 mins
Machine learning platforms are one of the fastest growing services of the public cloud. ML, an approach and set of technologies that use Artificial Intelligence (AI) concepts, is directly related to pattern recognition and computational learning. Early adopters of AI have now rolled out cloud-based services that are bringing AI to the masses.
How are AI, deep learning, machine learning, big data, and cloud related? Can machine learning algorithms enable the use of an individual’s comprehensive biological information to predict or diagnose diseases, and to find or develop the best therapy for that individual? How is Quantum Computing in the Cloud related to the use of AI and Cybersecurity?
Join this webinar to learn more about:
- Machine Learning, Data Discovery and Cloud
- Cloud-Based ML Applications and ML services from AWS and Google Cloud
- How to Automate Machine Learning
Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU
Arvin Bansal, Senior Director Cyber Governance, AmerisourceBergen, Nathan Turajski, Sr. Director, InformaticaRecorded: Oct 10 201932 mins
The California Consumer Privacy Act (CCPA), GDPR and other mandates are a wake-up call to take a fresh look at data protection for personal information. As the scope of sensitive data and user rights requirements have evolved, this includes industries with significant experience managing legacy mandates such as PCI DSS or HIPAA.
AmerisourceBergen is no stranger to industry mandates like HIPAA and HITECH, but is now preparing for a future where the number and impact of healthcare data breaches continues to increase, even as user transparency demands expanded controls. However, there is a silver lining as data privacy controls can also help accelerate digital transformation and enable safe value creation. In this webinar, you’ll learn how AmerisourceBergen approaches making information safe with world-class data masking techniques as a critical component of their privacy journey, and how Informatica is helping deliver data privacy governance solutions for the next-generation Data 3.0 evolution.
Andy Kicklighter, Director of Product Marketing, ThalesRecorded: Oct 10 201935 mins
Digital transformation is fundamentally impacting all industries, and nowhere is this truer than in retail. The internet and mobile technologies have fundamentally changed retailers’ business models, not only by opening new channels to reach customers, but also how they communicate with, serve, and support them.
While digital transformation is touching every industry, U.S. retailers are leaders are on the leading edge of implementations,
with 42% of retailers saying they are either aggressively disrupting the markets in which they participate or embedding digital capabilities that enable greater organizational agility. While Digital Transformation is allowing retailers to introduce new business models and reach more customers in new and innovative ways, it is introducing added difficulties for information security professionals and raises the potential to put sensitive customer data at risk.
Based on the results from the 2019 Thales Data Threat Report – Retail Edition, participants in this webinar can expect to learn about:
•How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
•The data security challenges facing retail companies today
•Critical analyst recommendations for how organizations can be most effective when selecting the right tools that will enable them to manage greater amounts of complexity, that span legacy on-premises needs as well as modern, cloud-based, edge-oriented technologies.
John Smith, Prin. Sec. Engr, ExtraHop; Sean Scranton, RLI Cyber; William Boeck, Lockton; Brandon Dunlap, ModeratorRecorded: Oct 10 201959 mins
More and more companies are offering cyber insurance policies to help mitigate the financial losses an organization might suffer from a cyber incident. With the increase in breaches, intrusions and ransomware incidents, cyber insurance could be right for your organization as a part of the risk mitigation strategy. But there’s a lot of confusion for organizations in determining what a company’s exposure is and what exceptions and exclusions might be in a policy. Organizations are almost forced to think like an underwriter to address these concerns. Join ExtraHop and (ISC)2 October 10, 2019 at 1PM Eastern for a discussion on cyber insurance, demystifying the current insurance landscape and what are the right questions to answer.
Cherie Martin - Product Marketing, ArubaRecorded: Oct 10 201953 mins
Join us October 10th at 10am PDT as we discuss how to:
•Consistently deliver high-quality network and application services
•Reduce help desk tickets
•Identify and resolve issues before they affect your users
This webinar also includes a live demo of Aruba Central, our cloud managed networking solution.
Attend and you may qualify for a free Aruba Instant Access Point and a 90-day trial of Aruba Central.
Srini Srinivasan, Founder and Chief Product Officer at Aerospike, and Anil Vasudevan, Senior Principal Engineer at IntelRecorded: Oct 10 201940 mins
Application Device Queues (ADQ) is a new Intel innovation for system-level network input/output (I/O) performance. This will improve application response predictability and scalability in a cost-effective manner. ADQ dedicates queues and shapes traffic for the transfer of data through Ethernet for critical applications. This is accomplished by using standard operating system networking stacks and interfaces supplemented with Intel hardware technologies for improved performance. The goal of ADQ is to ensure that high-priority applications receive predictable high performance through dramatically reduced jitter.
Aerospike is the first commercial/open database that supports Intel’s innovative product lines – Intel PMEM and now Intel ADQ. The close collaboration between Aerospike and Intel resulted in unprecedented performance gains and low latency in applications powered by the Aerospike database.
Aerospike 4.7 is optimized for the Intel Ethernet 800 Series with ADQ. The network adapter hardware enables enterprises to move beyond NUMA pinning to speed up applications by quickly moving vast amounts of data to and from the edge, the core and the cloud.
Join this Special Customer Update featuring Srini Srinivasan, Founder and Chief Product Officer at Aerospike, and Anil Vasudevan, Senior Principal Engineer at Intel. Each will share perspective on the significance of these advancements.
You’ll hear details on Intel Ethernet 800 Series with ADQ directly from one of Intel’s most influential engineers and Srini’s expectations for what 4.7 will mean for Aerospike customers.
Tony Morris, Enterprise Architect-Public Cloud, HylandRecorded: Oct 10 201944 mins
Zero Trust is a concept that is typically used to describe the security model for a company's infrastructure and data. Application delivery pipelines are typically managed using a perimeter-centric security model. In this session, we will discuss how to apply the core concepts of Zero Trust to the application delivery pipeline, helping to ensure your applications are delivered to production safely and securely.
Kevin Balaji, Product Marketing Manager at MuleSoft and Andrew Bragdon, Director of Product Management at MuleSoftRecorded: Oct 10 201934 mins
Today’s enterprises are increasingly dependent on all types of APIs and apps for flexibility and rapid development. However, if even one component of this chain breaks, it can have a ripple effect on its dependents, ultimately sacrificing customer experience and impacting the overall business. As traffic increases, organizations need real time visibility, proactive notifications of issues, and an efficient way to mitigate problems in order to deliver on customer expectations.
Anypoint Monitoring helps you to proactively identify and resolve issues, all in one place with real time visibility into your APIs and integrations. Ensure business continuity with real time visibility into app performance, customizable dashboards, advanced alerts, and instant access to historical log data.
Watch this live demo to learn:
- How MuleSoft customers leverage Anypoint Monitoring to enable best practices and steps towards operational monitoring of their application network.
- Advanced Monitoring capabilities, including advanced alerts, log management, and custom metrics/events.
- How Anypoint Monitoring provides real time visibility into your APIs and integrations with easy to use out-of-the-box and customizable dashboards.
Security remains a top priority in today’s connected world. The market landscape is dynamic, innovative and confusing at the same time. Navigating the ever emerging threats requires vigilant expertise, which is always in short supply in a digitally accelerated world. Every connected device and service has potential vulnerabilities. Join Momenta Partners as we highlight the most relevant issues of today in Enterprise IoT Security: Connect and Protect.
In this webinar, Momenta's Managing Director Ken Forster will be joined by a panel of IoT security experts; Duncan Greatwood, CEO of Xage Security, Nicole Ford, VP, Chief Information Officer of Carrier, and Julie Fitton, VP, Digital Product Security of Stanley Black & Decker Inc. to discuss these key themes in digital security:
- What is enterprise IoT security?
- Current state of the security market
- What are the risks?
- IT - OT gap
- Solutions and use cases
Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth CollegeRecorded: Oct 10 201960 mins
When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.
In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.
Watch now, and learn how to:
-Gain visibility into the Wi-Fi user experience
-Quickly troubleshoot network problems with an AI-driven virtual assistant
-Predict network problems before they arise
-Implement personalized location services, such as wayfinding and proximity notifications
K. Eric Gentry, Managing Principal, VTRACOct 16 20192:00 pmUTC90 mins
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the social attacks and the current cybersecurity threat landscape.
•The most common social engineering attacks
•New insights on phishing attacks
•Top threat actors in social attacks
Our Verizon Threat Research Advisory Center presenters will be:
•K. Eric Gentry, Managing Principal, VTRAC
•David Kennedy, Managing Principal, Open Source Intelligence
And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
•Current Intelligence Overview
•Attacks and Threat Indicators
•Latest Malware Trends
If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
Jessica Gulick, CEO, and Monica Ricci, VP of Marketing, KatzcyOct 29 20193:00 pmUTC60 mins
Join Jessica Gulick, tech & cybersecurity growth hacker, as she shares the top lessons that have not only been learned, but have been put into practice by Katzcy’s growth-stage clients. We’ll talk about the importance of understanding buyer profiles, the techno-buzz trap, the right time for geek-speak, and how to build a narrative that positions your unique solution in the right box in the minds of buyers, industry analysts, and influencers alike.
Ankur Chadda, Senior Product Marketing ManagerOct 16 20193:00 pmUTC38 mins
Enterprises are facing new challenges when it comes to protecting regulated data and critical IP.
Understanding the location of all data, whether at-rest, in-use, and in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify its riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data.
Wednesday, October 16, 2019
10 a.m. CDT
This webinar explores how companies should rethink data security. Addressing the challenges of protecting critical data & intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection, including these three main components.
Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate
Risk-Adaptive Controls – to eliminate the complexity of policy enforcement
Intelligent & Dynamic Automation – to build a better understanding of context and user intent
James Penney, Device Authority and Ian Banham, MicrosoftOct 16 20193:00 pmUTC60 mins
IoT platforms like Microsoft Azure IoT provide several capabilities and features to build and deploy IoT applications, solutions and services in a better, faster, more cost-effective and integrated way. IoT platforms also provide quick interconnection of assets and support a wide variety of operating systems and devices.
While the IoT Platform vendors and ecosystem partners continue to evolve, security is still the #1 concern for its adoption. This is introduced by the scale of IoT, its unique characteristics, disparate components involved, as well as the consequences of compromised security. The IoT continues to grow rapidly but concerns about security remain a significant barrier and are hindering the adoption.
Enterprise IoT security solutions typically use owner-controlled security posture
and need to integrate with IoT Platforms’ device and data management.
The webinar discussion will include:
• Challenges of building, deploying and securing IoT – on premise and in the cloud
• A real world Automotive / Connected Car use case; the problem/challenge and the solution
• The value of Microsoft Azure IoT together with KeyScaler
Dean Nicolls, VP of Global Marketing, JumioOct 16 20193:30 pmUTC31 mins
Financial institutions are losing almost 40% of applicants during digital on-boarding. There's a number of reasons for this, but often its the online identity verification part of the process where customers are lost. This is because the experience is often too time-consuming, onerous, or clunky.
In this webcast, Dean Nicolls provides an update on the abandonment crisis and then shares 10 practical tips for improving the onboarding process. He also shares a handy TCO calculator for comparing conversion rates of different identity verification solutions.
Do you do most of the talking? Do you take too long to get your point across? Do you allow the conversation to go down a rabbit hole?
Whether you’re an entrepreneur or business professional, you can’t seal the deal unless you can speak clearly and concisely. In this webinar you’ll learn:
- how speakers and high level executives lose their audience
- how to create a message that’s crisp
- a mantra for keeping you on track
When you learn to be crisp, you’ll see glazed eyes of boredom turn into raised eyebrows of interest.
Joseph Loomis, CSO, CyberSponse and Steve Sunday, Principal Technical Engineer, AccessDataOct 16 20194:00 pmUTC28 mins
When a data breach occurs, every second counts. With the new RESTful API from AccessData, organizations can now automate incident response, saving up to 40 minutes of analysis time per incident. When an attack is detected by an organization’s cybersecurity software, like CyberSponse, the #1 security, orchestration, automation and incident response solution, the API alerts the AD Enterprise agent and initiates a collection job within moments of the attack, immediately preserving data related to the root cause of the breach.
Join us on Thursday, August 22nd at 2:00 pm ET for a 60-minute webinar co-presented by AccessData and CyberSponse. In this webinar, you’ll understand how automation can facilitate faster, more secure incident response and you'll see firsthand how the integration between these two platforms using the new AccessData API triggers automated forensics, dramatically accelerating incident response. Collected evidence is then immediately available for analysis in AD Enterprise. Join us to see a live demo of the integration!
Marcus Fowler, Director of Strategic Threat at DarktraceOct 16 20195:00 pmUTC60 mins
AI is sometimes spoken about like something that will, in the future, secure networks. However, AI cyber security is already deployed by numerous companies to detect and autonomously respond to increasingly advanced, fast-moving, and stealthy threats. At the same time, attackers are developing malicious AI, which will be almost impossible to detect. Companies that fail to deploy AI today may find themselves unable to detect the threats of tomorrow. In this session, learn about how the use of unsupervised machine learning allows companies to benefit from cyber AI within weeks, why building trust with security teams is so essential, and use cases of cyber AI beyond threat detection and response.
Gabe Gumbs, Chief Intelligence Officer at Spirion and Ben Rice, VP of Business development at BitglassOct 16 20195:00 pmUTC60 mins
Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solutions already in use in your organization. Want to learn more?
Join Spirion’s and Bitglass data protection experts in our joint webinar: Getting Ahead of the Game in Data Protection: Discover, Classify and Manage on October 16, 1 PM ET.
What you will learn?
•Data protection challenges to be mindful of
•Managing digital transformation and unstructured data proliferation
•How Bitglass and Spirion's solutions work together to protect your data
Joel Sierra, Sales Engineer at ProofpointOct 16 20195:00 pmUTC45 mins
What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?
Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.
Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:
1.Protect your people from email-based attacks
2.Gain visibility into who in your organization is getting the most attacks
3.Solve for user awareness through threat simulation and training
Richard Greenberg, CISSP, OWSAP Foundation; Eitan Bremler - Co-Founder & VP Technology Safe-TOct 16 20195:00 pmUTC60 mins
VPNs have been a cornerstone of secure networking for the last 20+ years. While VPNs have stood the test of time, today, we now know that a true security architecture is hinged upon the concept of Zero Trust Network Access.
Most organizations have already poured a great deal of time and resources into building out their VPN infrastructure. Considering that the technology does exactly what it’s supposed to do, ripping and replacing it may not make much sense.
What if we tell you that you don’t have to rip and replace your VPN in order to start your journey towards Zero Trust Network Access? Join us to this webinar to find out how.
Nithin Varam, Lior Kolnik, Stan Lee, with Host Karin ShopenOct 31 20195:00 pmUTC60 mins
The theft and use of stolen passwords is a common attack for adversaries, mostly because passwords are the weakest link in security. Plus, stealing credentials is much faster, cheaper and easier than having to find and exploit a vulnerability in a system.
Once done, an adversary can bypass the entire attack lifecycle – impersonating a valid user – and move freely through the network. With inside access, an attacker can quickly move laterally to set up a broader footprint, compromise additional systems and steal other credentials along the way.
In our new webcast, Best Practices for Stopping Theft and Abuse of Employee Credentials, our experts will:
*Outline the common techniques attackers use
*Provide best practices to prevent further credential attacks
*Showcase Palo Alto Networks features you can enable now to protect your organization
Get your questions answered, and learn how to stop credential theft and abuse in your organization today.
Kevin Haley | Eva Velasquez | Ryan LawlessOct 16 20195:00 pmUTC60 mins
As we wrap up National Cyber Security Awareness month join Symantec and partners The Identity Theft Resource Center and Infolock for our final webinar. Whether you are connecting to networks or collecting customer/consumer data, protection is needed. This group of speakers will help familiarize you on how to check your systems and how to keep others’ data safe.
Topics will include:
- If You Connect, You Must Protect: updating to the latest security software, web browser and operating systems
- Wi-Fi safety
- If You Collect It, Protect It: keeping customer/consumer data and information safe
Robert Healey | Senior Director Marketing, Asia Pacific, TenableOct 17 20193:00 amUTC60 mins
Learn how you can effectively analyze vulnerability data to prioritize patching and remediation to reduce cyber exposure. Overcome vulnerability overload and gain insight into the following topics:
1. Recognizing the value and limitations of CVSS scores for prioritization
2. Identifying vulnerabilities most likely to be exploited in the near term
3. Incorporating asset criticality into your analysis
4. How to compare the effectiveness of your internal operations with industry peers and across internal business units
5. How you can more effectively prioritize your efforts to reduce cyber risks
Casey Smith Director of Applied Research & with Brian Baskin Technical Director of Threat Research @ Carbon BlackOct 17 20192:00 amUTC60 mins
What is required to take your threat hunting program to the highest level of maturity? Using Red Canary as a case study, this session will provide a behind-the-scenes look at how to bring together MITRE ATT&CK™, CB Response, and Atomic Red Team to analyze massive amounts of data and quickly detect adversaries. This webinar also features David J. Bianco's threat hunting maturity model.
Attendees will learn how to:
- Automate the majority of successful data analysis procedure
- Map adversary techniques to detection coverage
- Test, validate, and continuously improve visibility
- Make threat hunting a repeatable process that drives better security outcomes
Danna Bethlehem, Director of Product Marketing, ThalesOct 17 201910:00 amUTC45 mins
The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).
This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
- What are the major attack vectors for cyber attacks
- Which access management technologies organizations are deploying to secure access to the cloud
- Which access management technologies IT professionals deem the most effective in securing access to the cloud
- The criteria IT professionals use to determine access policies for users
- Who are the internal stakeholders involved in Access Management deployments
Tom McNash, Senior Solutions Engineer, Cyren & Duncan Mills, Product Marketing Director, CyrenOct 17 20192:00 pmUTC60 mins
Whether you use Office 365 or an on-premises gateway, have you been able to quantify how much malware, phishing and spam is evading your email security and getting through to your users? Cyren has developed an Email Security Gap Analysis test to measure how well a company’s in-place security is performing, and has just published a new, updated report with aggregated data on results from assessments done in 2019.
This webinar reviews the key statistics and general findings in that report, as well as case studies and segmented industry data, example emails and threats uncovered during assessments (appropriately anonymized), and it covers how to complete your own assessment. Webinar registrants will receive a complimentary copy of the report.
Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management, Terbium LabsOct 17 20193:00 pmUTC60 mins
A thriving fraud economy exists in the criminal underground, on the Dark Web and beyond, that trades in compromised information. Even if it’s not your business’s information, it’s still your problem because stolen user credentials are used for large-scale phishing attacks, credential stuffing, and account takeover. Join two Terbium Labs VPs—Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management—as they offer insights into how your organization should rethink data security as more information is exposed, and re-exposed, every day.
Johna Till Johnson, CEO and Founder, Nemertes ResearchOct 17 20193:00 pmUTC60 mins
5G is here. But what does it mean, and how can a new wireless standard transform enterprise organizations? Find out here. We'll delve into the changes 5G brings to wireless services, and how those changes will affect businesses today and going forward. And we'll provide practical next steps for organizations looking to move towards 5G.