The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Sahil M Bansal, Senior Product Marketing ManagerRecorded: Jun 5 202034 mins
"One cloud, two clouds. Hybrid cloud, multi-cloud. Got an idea which really fits your needs? Do you have to pick one vs the other or can hybrid clouds, leveraging a cloud-like experience built on your datacenter, cohabit with multiple public clouds? This matchup has got you covered!
In this webinar you will learn:
What is a True Hybrid Cloud and how to build one
Benefits of a hybrid cloud vs multi-public cloud strategy
How to make cost-aware decisions when choosing private vs public clouds"
Vy (Gavin) Nguyen, Partner Technical Specialist, Microsoft, Huynh Tuan Kiet, Security Solution Manager, HPIDRecorded: Jun 5 202062 mins
Ngày nay, đối với hầu hết mọi tổ chức doanh nghiệp, việc áp dụng các dịch vụ đám mây (cloud services) ngày càng có xu thế mở rộng, đồng thời mở rộng hơn việc sử dụng mã hóa. Hãy tham gia buổi trò chuyện trong giờ café buổi sáng của bạn cùng chúng tôi, tìm hiểu cách bạn có thể bắt đầu hành trình chuyển đổi số an toàn và bảo mật cho hệ thống dữ liệu cũng như ứng dụng của bạn - cùng các giải pháp kết hợp của Thales và Microsoft.
Nội dung chính:
• Chương trình chuyển đổi lên cloud của Microsoft diễn ra như thế nào?
• Microsoft quản lý dữ liệu khách hàng ra sao?
• Giảii pháp quản lý khóa Bring Your Own Key(BYOK) và Your Own Encryption (BYOE) là gì?
Jenn Markey, Product Marketing, Entrust DatacardRecorded: Jun 5 202024 mins
2020 has brought about a new normal. One of the biggest changes has been the rapid rise in businesses and consumers interacting and transacting online. While ecommerce, online banking, and other digital services are hardly new, many people and businesses that were slow to adopt such models now find themselves wanting, and in many cases, needing to go online. And that introduces the challenge of securely verifying customer identities, especially when an in-person identity check is not feasible.
Modern identity proofing keeps your customers safe and protects your organization.
Learn best practices to:
- Securely verify consumer identities
- Limit user friction in the verification process
- Protect consumer identities
- Minimize fraud exposure
Pramukh Ganeshamurthy (Palto Alto Networks) & Dov Lerner (Sixgill)Recorded: Jun 4 202028 mins
Please join us to explore how Sixgill and Cortex XSOAR (previously Demisto) are enabling customers to scale and accelerate their incident prevention and response by combining deep and dark web intelligence with automation. Building simple, automated & effective cyber security, and executing it to the fullest extent, is critical in order to get the best outcomes and maximize business impact.
Learn how combined Cortex XSOAR and Darkfeed can:
- Automatically integrate and enrich a data stream of industry-related indicators of compromise (IOCs) from closed-access sources in the cyber underground
-Receive automated early warnings of new threats before they are deployed in the wild
-Hunt for malicious IOCs on corporate networks from a single dashboard
Stephen Ryan, co-founder & COO of Ciphertrace; Rebecca Aspler, Director of Product Management – Blockchain at Unbound TechRecorded: Jun 4 202054 mins
As digital assets move into the mainstream, regulation and compliance has become more important than ever for custody providers.
In this fireside chat, Stephen Ryan, co-founder and COO of Ciphertrace, and Rebecca Aspler, Director of Product Management – Blockchain at Unbound Tech, will discuss:
+ Cryptocurrency intelligence – tracing, risk scoring and threat detection
+ AML and anti-fraud as it applies to digital assets
+ Technical enablers to AML and anti-fraud policy enforcement
Tim Carlson | Dell TechnologiesRecorded: Jun 4 202047 mins
Are you getting all you can out your PowerVault ME4? Even as an entry-level array, it empowers businesses to be able to support a variety of use cases including HPC, Surveillance, Backup/Recovery, Virtualization, VDI, and more. In this webinar session, we’ll explore configuration optimization for your applications, when to run Virtual or Linear mode, the extended management ecosystem, whether to use as an RBOD (RAIDED array) or as a server attach JBOD and much more.
Presented by: Tim Carlson
An IT veteran with over 35 years’ experience in HPC and Enterprise DataCenters, specializing in storage and filesystems, Tim has a unique combination of expertise in sales, pre-sales, professional services and support from large corporations to smaller businesses. With hands-on experience in large SAN, heterogeneous filesystems, HPC and performance tuning, Tim is currently the Product Line Manager for PowerVault in EMEA.
Jack Palivoda, Senior Solutions Engineer and Ryan Sanders, Product Marketing ManagerRecorded: Jun 4 202030 mins
If you’ve deployed multiple F5 BIG-IP appliances to run your business applications, you know how important – yet complex – it is to manage keys and digital certificates. Keyfactor enables enterprises to automate requests, provisioning, and renewal of certificates across F5 appliances to avoid certificate-related outages and improve security.
Join Jack Palivoda, Sr. Solutions Engineer, and Ryan Sanders, Product Marketing Manager, for a 30-minute discussion and live demo of the Keyfactor + F5 BIG-IP integration.
In this webinar, you’ll learn:
-The importance of keys and certificates in F5 deployments
-How to avoid costly downtime and automate distribution of certificates
-How Keyfactor integrates with F5 appliances at scale
Mariana Agache, VP Managed Services, F5Recorded: Jun 4 202021 mins
Applications are your enterprise customers’ capital. F5 can help you bring new managed services to market that allow you to help your enterprise customers ensure the performance and security of their applications no matter where they run—in the cloud, in their private data centers, or on premises in the enterprise. In this session, you will learn how to offer an Advanced WAF managed service for increased application security as well as other services you can offer to differentiate and grow revenue. We’ll also introduce the new Managed Service Program, which can help you accelerate your time to market for new services and grow revenue.
Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTORecorded: Jun 4 202030 mins
Join us for the inaugural broadcast of Between Two CTOs: Lloyd vs. Lloyd, an informal discussion of current issues in cybersecurity.
This 20-minute discussion will focus on “Lessons for cybersecurity from the pandemic.”
Our speakers are two of the most engaging people we know:
- (Dr.) Mike Lloyd, RedSeal CTO. His career has focused on modeling complex systems, beginning with epidemiology and moving to networks. He provides a unique perspective on our current situation.
- Wayne Lloyd, RedSeal Federal CTO. He’s a long time federal government cybersecurity practitioner, with a background working for…well, we can’t tell you that
Jimmy Alvarez and David DuncanRecorded: Jun 4 202041 mins
Cloud adoption has many benefits, including improved resilience, reduced cost of ownership, and greater infrastructure and business agility. However, many organizations remain concerned about providing adequate security and privacy for applications and data in cloud environments.
An operating system for the cloud without good management can be a challenge, but there is an alternative. Red Hat® Insights provides proactive management of Red Hat Enterprise Linux® instances, pinpointing potential security, performance, availability, and stability risks so that you can try to resolve them before they cause downtime or other operational impacts. Since May 2019, Insights has been included as part of a Red Hat Enterprise Linux subscription at no additional cost.
Join this webinar to learn about Insights support built into Red Hat Enterprise Linux for Amazon Web Services (AWS).
In addition to covering the capabilities of Insights, we’ll:
• Highlight the solutions and demo them.
• Show you how to get started on your own.
Jimmy Alvarez, Principal Technical Marketing Manager, Red Hat;
David Duncan, Partner Solution Architect, Amazon Web Services
Jari will share her professional and personal experience to help you at any stage of your career in cyber security. She will share her own standouts, how those apply to her hiring and to her own career success—and yours.
•You will gain insights and best practice in this series on how you can build new skills, while staying engaged for the long haul in our current global turmoil. We’ll bring to the table with our Guest Expert Speakers, successful strategies and approaches to security today and going forward, for women—and anyone—globally
•You will be able to apply these to your current and future career in our field, to sustain or grow, at entry, mid-career, senior and executive level, or in transition, whether you hold a senior role, or aspire to something different than where you are today.
•Think Big! And yet, at the smallest detail, what can you do to improve your opportunities at any stage? Our executive women will help you become more conscious of where opportunities best exist today for any of us, as an employee, executive, consultant, business owner, entrepreneur, or hiring manager. We will help you sustain for today, and build for your future.
It is more important than ever for businesses to get the most out of their digital stack. Businesses continue to invest in cloud based applications or other software tools to connect with customers and increase how employees can maneuver through their work day.
Heather Paunet, VP of Product goes in depth about how SD-WAN technology can help businesses unleash the full potential of their application ecosystem, giving employees more of what they need to increase productivity and efficiency during this time.
Alberto Vazquez. Solutions Architect Latinoamérica.Recorded: Jun 4 202044 mins
Acompañenos a este webinar en el cual hablaremos de las diferentes soluciones de seguridad que son importantes en la época actual, para que su marca y su negocio estén protegidos contra los ataques de estos criminales cibernéticos.
Marius Tudor, VP of Sales, Liqid, Inc.Recorded: Jun 4 202044 mins
Join Liqid VP of Sales Marius Tudor as he discusses the benefits that composable infrastructure solutions deliver for AI workloads.
Liqid composable infrastructure enables IT users to orchestrate, deploy and change hardware configurations of previously static servers. Disaggregated trays of GPU, NVMe, FPGA, Intel® Optane™, networking, and CPU are managed through software, across multiple fabrics, including PCIe, Ethernet, and Infiniband to provision and augment bare-metal servers in seconds.
Data has gravity. Learn how composable IT enables users to provision resources independently to meet the requirements specific to each stage of the AI workflow, providing business agility and infrastructure elasticity, while in tandem minimizing silos and hardware sprawl. Outcome: faster time to meaningful data at improved economics together with adaptive infrastructure.
Marius will discuss recent deployments by organizations such as the University of Illinois at Chicago, which is now using Liqid solutions to manage global research for visually intensive computing, including AI deployments for scientific research.
Join Us! One lucky attendee will receive a $100 gift card to the grocery delivery or food delivery service of their choice.
Joseph Salazar, Technical Deception Engineer | Attivo NetworksRecorded: Jun 4 202047 mins
Join Attivo Networks as we reveal how the integration between the ThreatDefend® platform and the CrowdStrike Falcon Insight EDR solution combines accurate in-network detection with automated response actions to isolate attackers and empower organizations to respond quickly to attackers already inside the network.
The integrated solution provides organizations an advanced level of visibility and improves overall incident response to block and quarantine attackers before they spread. The solution works by accurately detecting attackers as they attempt to move laterally and quarantining the compromised systems either manually or automatically.
Hear how our joint solution can provide your organization with:
•Advanced detection of threats that evade existing security controls
•Enhanced visibility into attack activity early in the attack cycle
•Accurate, event-based alerts with detailed attack forensics
•Automated incident response to mitigate attacks
•Increased operational efficiency
•Collection of company-centric threat intelligence to improve defenses
Sunil Ravi, Chief Security Architect for Versa NetworksRecorded: Jun 4 202061 mins
Security expectations and technologies continue to evolve as part of an end-to-end Enterprise network. Learn how a comprehensive integrated security architecture can drive dramatic improvements in threat protection, performance, and application experience.
Join Sunil Ravi, Chief Security Architect for Versa Networks for a live webinar where you'll learn:
+ Security architectures for SD-WAN
+ Details of NGFW design in SD-WAN
+ Universal Threat Management (UTM) architectures with SD-WAN
Liel Strauch, Dir, Cyber Security Research, PerimeterX; Deepak Patel, VP Security Strategy, Brandon Dunlap, ModeratorRecorded: Jun 4 202059 mins
Stolen payment card information usually needs to be validated before they can be used to run larger fraudulent transactions or be sold on the black market. Typically, automated bots run these tests or validation through smaller websites that lack anti-bot defenses. Join PerimeterX and (ISC)2 on June 4, 2020 at 1:00PM Eastern as we discuss how to detect and stop fraudulent transactions originating from carding bots and save thousands of dollars in payment processing charges. We’ll also cover :
Alex Leon, CISO at Dime Community BankRecorded: Jun 4 202062 mins
Building an information security program that meets the business needs of your organization and its continuance, while protecting the institution’s assets, is a venture all CISO’s have to endure. During this webinar, a bank CISO with over 25 years of experience in the Financial Services industry will share his knowledge on how to build a successful program for various size organizations. This session will cover the GRC framework (Governance, Risk and Compliance) will blend with the Cybersecurity framework (Identify, Protect, Detect, Respond and Recover) creating a unique formula for success.
Alex Leon is the CISO at Dime Community Bank, a $6 Billion institution located in Brooklyn, New York. Alex has over 25 years of experience working in the Financial Services industry, including 18 years at Citibank and 4 years at Mitsubishi UFJ Trust and Banking. He has experience working in all 3 Lines of Defense (IT/IS, Risk, Audit). He has some of the most recognized Information Security certifications such as: C|CISO, CISSP, CISM, CISA, CRISC, CGEIT, CBCP, CTPRP and CSX-f. Alex has a Master of Science in IT Management from Colorado Technical University; and also earned a CISO Executive Program Certification from Carnegie Mellon University’s Heinz College of Information Systems and Policy. He is a Cybersecurity Advisory Board Member at Rutgers University, New Jersey. Alex is the first CISO at Dime Community Bank and reports directly to the Chief Risk Officer. He briefs the Bank’s Board of Directors at least quarterly. In his free time he shares his knowledge and industry experience with those entering the cybersecurity field. He is a Learning Tree Cybersecurity Instructor and enjoys skydiving during the summer months.
Anthony Vicinelly, Technology Director, Nlyte SoftwareRecorded: Jun 4 202021 mins
Join this candid conversation on the NEW Federal DCOI Initiative.
The new DCOI M19-19 mandate expands on the previous DCOI M19-16 by further improving federal data center initiatives as well as provide a path for Modernization, implementing a Cloud First initiative, and performing Application Rationalization.
What you will here is:
- What is new and improved in the new initiative
- Best practices in implementing a DCOI program
- How DCIM is the Rosetta Stone in getting your agency on board with the federal mandate
The BigFix Endpoint Management Platform can perform multiple functions that have previously required many disparate tools. We'll look at building a business case for BigFix by identifying infrastructure cost savings, productivity improvements, operational efficiencies, and other benefits.
Matt Robertson, Andrew Miller, Sohil Merchant, Charles JohnsonRecorded: Jun 4 202059 mins
Ransomware alone impacted the 2019 economy by $11.5 billion. With no signs of slowing down, ransomware continues to be a growing fear in today’s environment. Accudata has assembled a panel of cybersecurity experts to discuss the threats facing organizations today.
Tune in to our panel June 4 at 11 a.m. to learn about tangible best practices that you can implement in your environment to fight and prevent ransomware. Our expert panel includes:
-Matt Robertson, principal SE, Pure Storage
-Andrew Miller, principal SE, Pure Storage
-Sohil Merchant, senior practice manager, data center & cloud applications, Accudata Systems
-Charles Johnson, cybersecurity practice manager, Accudata Systems
Cindy Stanton,VP Product Marketing; Scott King, Director Security Advisory Services; Derek Abdine, Director Security ResearchJun 5 20209:00 amUTC32 mins
As communities around the world start to discuss reopening, it poses a lot of questions for organizations:
Is the virtual workforce here to stay, and what does it mean for your security posture? Which of the emergency security practices you enacted are working, and which are not? What role does the cloud play in all of this? Should you be accelerating migration plans, what immediate threats do you need to watch for, and the list goes on.
These are all equally important and valid questions, but knowing where to start can feel daunting.
Join Rapid7’s Vice President of Product Marketing, Cindy Stanton; Senior Director, Security Advisory Services, Scott King; Senior Director, Security Research, Derek Abdine; and series moderator, Vice President Global Growth Marketing and Operations, Tom Rogers as they discuss industry trends and research they’ve been collecting, how they’re approaching security as it relates to reopening Rapid7, cloud best practices, and more.
Join us for a live webinar to learn more about Cyber Intelligence 4U's new Cyber Certificate offerings at Pace University Seidenberg School Of Computer Science and Information Systems.
We'll provide more information about the program, including the format, requirements, and registration process.
Improve your organization's cyber resiliency, sharpen your cyber skills and expand your cyber knowledge. Our wide range of courses fits to company's and student's skill levels, business roles, and topic of interest.
The online Enterprise Cybersecurity Program kicks off in May! Learn more about our offerings her
Justin Melloni Senior Manager of Education Services at 128 TechnologyJun 5 20204:00 pmUTC60 mins
Although the 128 Technology GUI is very powerful, there are many people who still prefer to use the PCLI to do their troubleshooting. The PCLI offers many useful “show” commands. But, which of the many show commands are the most useful to use for your network?
This webinar will go over:
1. How to log into the PCLI
2. How to view the help in the PCLI
3. How to read many of the show command tables
4. How to use Linux commands while inside the PCLI
Jadon Montero, Senior Product Manager, SOAR, Rapid7 & Devin Hamilton, Product Manager API & Alliances at MimecastJun 5 20204:00 pmUTC18 mins
As security teams continue to evolve, adapt, and innovate at a rapid rate, the struggle to balance increasing workloads with limited resources, complex ecosystems, and rising threats has never been greater. Security orchestration and automation (SOAR) helps teams improve their security posture and create efficiency—without sacrificing control of important security and IT processes.
Learn how you can automate your security program from end-to-end by deeply integrating Mimecast with the rest of your security stack using Rapid7’s SOAR solution, InsightConnect.
David Jacoby, Security Evangelist at KasperskyJun 7 20202:00 pmUTC5 mins
Technological progress, new devices and tools have evolved in the past 40 years, but how did the methods and targets actually change? What is new?
Watch a quick overview of how hacking has changed over the past decade, presented by David Jacoby, a security evangelist from Kaspersky’s GReAT, at #SASatHome, the online version of the renowned Security Analyst Summit, which took place on 28-30, April.
Michael Thelander, Director of Product Marketing, VenafiJun 8 20209:00 amUTC45 mins
Certificate-related outages, whether from expired or misconfigured or unknown TLS certificates, are the bane of digital transformation. Perfectly functioning applications and services can be rendered inoperable. Worse still the security controls you rely on, from traffic inspection devices to web application firewalls, can’t protect you when a certificate-related outage shuts them down.
Venafi has helped over 360 global customers eliminate certificate-related site and service outages. The resulting approach, based on a deep understanding of people, processes and technology needed to achieve this outcome, is VIA Venafi, the Venafi Way. VIA Venafi gives our customers the Visibility, Intelligence and Automation they need to stop outages. It also provides the world’s only guarantee against certificate-related outages: the VIA Venafi No Outage Guarantee.
In this session you will:
• Learn about some of the most troublesome certificate-related outages that have led to site failures and breaches in recent years
• Gain an understanding of what’s needed to ensure against outages
• Understand Venafi’s eight-step process to stopping certificate-related outages
• Learn about our VIA Venafi No Outage Guarantee
• See how a platform that delivers Visibility, Intelligence and Automation can achieve this outcome in a way that is not only affordable and manageable....but achieves it in a way guarantees results
Getting to the (meta)data by applying the Nuix Engine to the photographs and videos in your evidence set - particularly those from mobile devices - drawing a wealth of information known as "EXIF data" from those files.
In this webinar, you'll learn how to quickly show any of the images containing GPS information in order to help put the device (and therefore its owner) at a location or crime scene.
We'll also cover how you can further enrich the data processed by the Nuix Engine by utilizing several built-in technologies, including:
- Skin tone analysis. Automatically identify or eliminate images based on the presence of skin tone present.
- Facial identification. Identify persons of interest through cutting-edge facial identification capabilities.
- Child exploitation. Take advantage of Microsoft's donated PhotoDNA engine, which helps to fight the horrendous creation and distribution of indecent images of children through the amazing work of organizations such as Project VIC.
- Deep learning. Use a neural network trained with over a million images that can classify pictures into categories like paper, rock, scissors...or categories more relevant to criminal investigations, such as guns, drugs, knives, etc.
En este Webinar aprenderemos a usar la herramienta gratuita de configuración Liteconfigurator; esta herramienta es de gran utilidad para centralizar la información de sus proyectos, la configuración de su sistemas en cuanto a cantidad, capacidad y compatibilidad de sistemas FIRELITE además de generar de una manera sencilla listados, reportes y cálculos de baterías.
Marius Rohart, Security Sales Engineer EMEA, LookoutJun 9 202012:00 amUTC46 mins
Enterprises must securely enable employees to work remotely.
More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.
Join Lookout for this 30-minute webinar where we will cover:
- The mobile threat landscape
- How to securely enable a remote workforce
- How to protect cloud data from phishing and social engineering attacks
- How Lookout provides visibility into mobile threats
Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.
Yet not all CASBs are created equal, and it can be a challenge to identify which solution to deploy. From capabilities to the security of underlying architectures, there is much to consider.
Chris Hartley - Regional Director for UK & Ireland, Rapid7, and Warwick Webb - Security Practitioner, Rapid7Jun 9 20201:00 amUTC38 mins
Security has played a positive role in enabling business over the recent weeks. This has been demonstrated by allowing remote workforces to remain productive and the hard work of security teams to keep operations running. However all this is putting a strain on the internal resources trying to protect their critical business assets from both external attackers and insider threats.
At Rapid7 we are taking a practical role in helping ensure security advice and guidance is available for all, and we will be running a series of talk tracks to help provide a measured perspective on how to remain secure and operational with the resources you have.
Join us for this live talk where Chris Hartley, Director at Rapid7 UK & Ireland, and Warwick Webb, Security Practitioner, will discuss the top 5 reasons why some organisations are looking to augment or outsource their threat detection and response operations including:
· Talent shortage in cybersecurity and why specialisation is key
· Business continuity and the impact of ‘always on’
· Threat intelligence and global visibility of the threat landscape
· Role of threat hunters in incident response
We’ll also be joined by customer, Simon Parry from the Development Bank of Wales to reveal how they are using managed services in their own environment and which elements of managed detection and response are most important the success of their security program.
Melanie Turek VP of Research and Fellow, Connected Work, Frost & SullivanJun 9 20201:00 amUTC35 mins
With the rise of mobile and social technologies, customers are more knowledgeable and empowered than ever before. Their ability to access and share information gives them enormous control—and they know it.
As a result, they expect data-driven, personalized interactions at every stage of the customer experience. Frost & Sullivan research shows that one of the clearest trends in customer engagement is the shift from traditional to digital interactions. Buyers like self-service, automated channels because they want easy access to information, on their time line, from anywhere. At the same time, agents want to discard the routine tasks that lower job satisfaction and lead to boredom and churn.
AI and ML help companies leverage real-time and historical information to deliver a contextual, relevant and highly personal customer experience while improving agent morale. This webinar will show you how.
Chris Hinsz - Director Product Marketing, James Allen - Director of Products & Solutions FortinetJun 9 20201:00 amUTC50 mins
Learn how to take branch locations to the next level with a truly Secure SD-Branch and a deeper understanding of how to extend edge security to branch locations while streamlining management. Plus, take a look at what an extended architecture that goes a step beyond edge security can achieve with secure access points, phone and camera systems, switches, and more that can increase efficiency without compromising protection.
Shashwath Hegde, Solutions Architect, APACJun 9 20202:00 amUTC60 mins
A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
Vinay Pidathala, Director of Security Research - Menlo SecurityJun 9 20202:00 amUTC57 mins
Many organizations rely on a sandbox to protect against sophisticated email or malware threats. Sandboxes observe machine behavior and any deviation from the norm is flagged as suspicious and blocked. On the other hand, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. So as attackers improve their evasion techniques, how do you prevent and protect your business?
In this webinar, Vinay Pidathala, Director of Security Research at Menlo Security, will discuss the techniques actively being used by attackers to evade sandboxes. He will also share how Internet Isolation defends against these by helping companies achieve a Zero Trust Internet.
- How attackers bypass sandboxes and what is the best way to thwart these attacks
- Real life examples of sandbox failures and how Internet Isolation protected against attacks
- Why Internet Isolation is critical to a modern security architecture
Alex Pinto and Gabriel BassettJun 9 20203:00 amUTC75 mins
This is the 13th edition of the Data Breach Investigations Report (DBIR). Join the discussion with Alex Pinto and Gabriel Bassett, as they reveal key findings on global cyber security breaches and threat patterns faced by businesses and organizations. A Q&A session will be hosted by Ashish Thapar after the presentation.
Distinguished Engineer and Team Manager
Data Breach Investigations Report (DBIR)
Verizon Business Group
Data Breach Investigations Report (DBIR) Co-author
Verizon Business Group
Darren Hamway, Portfolio Manager, Tiffany & Co. and Bruce Randall, Director, Product Marketing-ITSM, ServiceNowJun 9 20203:00 amUTC56 mins
Digital transformation means transforming IT. Whether increasing productivity, driving insights, delivering innovation, or simply providing a consumer-like experience for employees; IT has proven to be an indispensable element in business success.
Join Darren Hamway, Portfolio Manager/ IT Project Management Officer, Tiffany & Co. along with Bruce Randall, Product Marketing – IT Service Management Director, ServiceNow as they discuss how Tiffany & Co. has successfully increased IT throughput and productivity with ServiceNow.
In this webinar you will also learn:
- How modernised IT can help drive digital transformation for you and your business
- How to deliver innovation without negative employee impact, or breaking the bank on infrastructure and resources
- How combining IT Service Management and IT Business Management helps to deliver new innovations
- How to transition from successful IT Service Management to successful IT Business Management
Ruben Sprujit, CTO FrameJun 9 20203:00 amUTC42 mins
Traditionally, end-user computing has been dominated by on-premises solutions like virtual desktop infrastructure (VDI). But the cloud has ushered in the emergence of desktop-as-a-service (DaaS), and many organizations have transitioned from a "design-build-support" model to an as-a-service model.
Join us for this informative webinar to learn what the DaaS landscape looks like, including the differences between VDI and DaaS and why DaaS has become such a compelling option for IT teams.
Ruben Sprujit, Sr. Technologist at Nutanix will lead you through:
- Core DaaS technologies and their value.
- Pros/cons of Azure, AWS, and GCP as Infrastructure-as-a-Service platforms for DaaS.
- Tips for DaaS success
- And more!
Kayla Hartman, Data Analyst, AlloyJun 9 20203:00 amUTC34 mins
According to Capgemini’s World Payments Report 2017, global digital payments are expected to rise to roughly 726 billion transactions in 2020. The growth of digital financial services offers innumerable opportunities, expanding access to financial services products and allowing for essentially instantaneous feedback loops. With these opportunities, however, also come risks, including fraud. The threat of fraud requires financial services organizations to act proactively to minimize losses due to fraud. Analysis of data surrounding their customers and transactions is an essential effort to ensure the benefits of the digital payments space continue to outweigh the risks.
In this webinar, Kayla Hartman will discuss the various ways data is used in fraud prevention. As a Data Analyst at Alloy, a fintech company that provides identity verification APIs for clients’ KYC (know your customer) and AML (anti-money laundering), she has firsthand experience in enhancing fraud prevention efforts through data analysis. She will dive into the ways the use of data is currently advantageous to fraud prevention, as well as the challenges that are presented in this quickly changing space.