Hi [[ session.user.profile.firstName ]]

IT Security

  • Key Performance Indicators to Accelerate Your IT Modernization
    Key Performance Indicators to Accelerate Your IT Modernization
    Don Mahler, Director, IT Performance Management, Leidos & Taylor Crump, Product Marketing, Splunk Recorded: Oct 16 2019 46 mins
    Determining the right metrics and key performance indicators (KPIs) between the business and IT is only half of the picture need when getting modern IT to operate effectively. You need all the right data to be looked at too.

    Join us to learn about the right data types in conjunction with the right KPIs that you need to look at, from Leidos, a FORTUNE 500® global science and technology solutions leader, who has successfully transformed their business to be able to make data-driven decision based on their IT data and health information.
  • DNS as a Foundational Security Architecture for Digital Transformations
    DNS as a Foundational Security Architecture for Digital Transformations
    Jerry Wong, Systems Engineer, Infoblox Recorded: Oct 16 2019 57 mins
    The perimeter has shifted. Your users directly access cloud applications from everywhere and data no longer reside only in data centers. Digital transformations like SD-WAN, IoT and cloud make securing your infrastructure, applications and data complicated. SD-WAN enabled branches directly connect to the Internet, but they don’t have the ability to replicate a full HQ security stack. IoT leads to an explosion of non-standard devices using non-standard protocols, making them harder to secure. Every new change doesn’t equal need for a new security tool.

    What’s needed is a scalable, simple, and integrated security solution that leverages existing infrastructure that organizations already own. DNS is critical to the fabric of the internet and any IP based communication (on-premises, cloud, SD-WAN and IoT environments). It serves as the perfect foundation for security because it is simple to deploy, ubiquitous in networks, is needed anyway for connectivity and can scale to the size of the Internet.

    Join Infoblox and (ISC)² on Oct 16, 2019 (Wed) at 14:00 (GMT +8) to learn how leveraging DNS as a foundational security architecture for digital transformations can:

    • Protect your brand by securing your traditional networks and transformations like SD-WAN, Cloud and IoT
    • Reduce time and cost of your enterprise threat defense
    • Automate response when it sees things happening and provide data to the rest of the ecosystem

    Presenter: Jerry Wong, Systems Engineer, Infoblox
    Moderator: Sam Goh, CISSP, GM for Korea and Japan, Ensign InfoSecurity
  • What Happens When Your Bank is Hacked?
    What Happens When Your Bank is Hacked?
    David Morris, Lance James, Steven Teppler, and Mark Rasch Recorded: Oct 15 2019 61 mins
    This session will delve into the legal responsibilities of your Bank's liability and your requirements to protect your banking credentials from the unauthorized transfer of funds as a result of a hack.
  • [PANEL] How to Simplify Cyber Risk Management?
    [PANEL] How to Simplify Cyber Risk Management?
    Panelists TBA Nov 20 2019 5:00 pm UTC 60 mins
    In today’s multi-cloud and hybrid environments, CISO's are struggling to secure assets, manage security policies across clouds, monitor and mitigate risks, while also supporting the business. How are CISOs solving the challenge of complexity?

    Join this panel of experts to learn how to simplify cyber risk management as well as maximize the value of your team and technology.
    - Risk scoring and security controls
    - How to identify risks for organizations and their third-party vendors
    - How to prevent, detect, and respond to, privacy and network security incidents
    - Best of vulnerability and risk management in a multi-vendor environment
    - Best practices and use cases across industries
  • No Geek-Speak Allowed: The Financial View of Cyber Risk
    No Geek-Speak Allowed: The Financial View of Cyber Risk
    Jerry Caponera, VP of Products & Cyber Risk, Nehemiah Security Recorded: Oct 15 2019 50 mins
    Join us for this webinar to explore how cyber risk models have evolved to more accurately predict financial outcomes through better alignment with frameworks and models like NIST and MITRE ATT&CK. Jerry Caponera, VP of Products and Cyber Risk at Nehemiah Security, will share insights from global cybersecurity leaders who have risen above cyber geek talk and successfully translated risk into business terms. He will cover managing risk by tracking associated potential financial losses; what’s behind the hype surrounding financial data risk assessment (FinDRA); how to calculate ROI for security and mitigation investments; and how to brief your Board on cyber risk in financial terms.
  • Four Steps to Transform Your IT Monitoring Strategy
    Four Steps to Transform Your IT Monitoring Strategy
    Any Mann, Chief Technology Advocate, Splunk Inc. and Pankaj Prasad, Sr. Principal Analyst, Gartner Recorded: Oct 15 2019 75 mins
    IT Ops teams are now critical to an organization’s success and require a strategy that aligns with the organization’s objectives and its external stakeholders. Most infrastructure monitoring solutions haven’t caught up to meet these new requirements, forcing IT teams to resort to traditional monitoring strategies that don’t allow for innovation and growth.

    Join Gartner analyst Pankaj Prasad and Splunk’s Chief Technology Advocate, Andi Mann, as we discuss new trends in IT monitoring strategy, best practices, and new IT models to implement in your organization.

    Here’s what you’ll learn:
    •How to effectively approach your IT monitoring strategy in this new world of IT
    •Build a successful IT infrastructure operating model to get to market faster, innovate, and respond in real-time
    •Best practices for integrating LOB owners, application developers and external stakeholders into your strategy
  • SMBs Market Overview and Technology Buying Trends (EMEA)
    SMBs Market Overview and Technology Buying Trends (EMEA)
    Sue Gilkes, CompTIA Faculty, CompTIA Recorded: Oct 15 2019 40 mins
    ** This is an EMEA focused webinar **

    Small businesses are rightly described as the lifeblood of the global economy. This isn’t hyperbole, as SMBs account for the vast majority of business entities while serving as a key driver of job growth and innovation. Success as a small business owner means overcoming challenges on many fronts, but also embracing new opportunities in technology and business.

    CompTIA’s latest research explores the business relevance of technology to SMBs and the factors affecting their perceptions, decisions, and investments in established and emerging technologies. We also explore the professional services industry, taking a look at their decision to offer technology to their own customers.
  • Cloud-Managed Smart Cameras - Everything You Need to Know
    Cloud-Managed Smart Cameras - Everything You Need to Know
    Saralyn Dasig | Product Marketing Manager, MV Smart Cameras Recorded: Oct 15 2019 45 mins
    MV security cameras leverage advances in solid state memory technology and Meraki expertise in cloud management. By removing the need for additional on premise hardware and standalone software packages, like the network video recorder (NVR) and video management software (VMS), Meraki MV streamlines and simplifies purchasing, deployment, and monitoring of video security systems. Join us on a live webinar to learn more!
  • Introducing Desktop as a Service for Any Cloud
    Introducing Desktop as a Service for Any Cloud
    Kong Yang, Senior Product management & Ruben Spruijt, Senior Product Engineer, Nutanix Recorded: Oct 15 2019 39 mins
    Desktop as a Service (DaaS) is a powerful way to leverage the cloud for end user computing with unmatched flexibility, manageability, and performance. Nutanix Frame is a DaaS solution that runs on multiple clouds and provides simple yet very powerful access to Windows applications through a browser.
    In this webcast, learn how high-end graphics tools, resource demanding software, and classic office productivity apps run and scale easily with Nutanix Frame.

    During this webcast, you will learn:
    o How you can run any Windows software in a browser
    o How to setup and manage DaaS with a breeze
    o How Nutanix Frame integrates with cloud storage, identity, and networking like no one else can
  • Live Interview with Graeme Payne, former VP and CIO of Equifax
    Live Interview with Graeme Payne, former VP and CIO of Equifax
    David Morris, Graeme Payne and Reid Eastburn Recorded: Oct 14 2019 61 mins
    Tune in for this live interview with Graeme Payne, former VP and CIO for Global Corporate Platforms at Equifax. This session will give you first hand insights into what happened at Equifax, and lessons learned.
  • Understanding Agent vs. Agentless backups to better protect your VM’s with the b
    Understanding Agent vs. Agentless backups to better protect your VM’s with the b
    Jaap Van Kleef, EMEA Technical Manager Oct 17 2019 9:00 am UTC 45 mins
    Companies of all size are running heterogeneous environments, with physical and virtual servers. As a result, every so often, IT professionals hesitate between deploying agent-based or agentless backup solutions. There is no right or wrong answer; it all depends on your requirements and objectives.

    Join our StorageCraft expert, Jaap van Kleef, and learn how you can best protect your VMs and physical machines and keep the business running at all times!
  • Machine Learning and AI in a Brave New Cloud World
    Machine Learning and AI in a Brave New Cloud World
    Ulf Mattsson, Head of Innovation, TokenEx Recorded: Oct 10 2019 61 mins
    Machine learning platforms are one of the fastest growing services of the public cloud. ML, an approach and set of technologies that use Artificial Intelligence (AI) concepts, is directly related to pattern recognition and computational learning. Early adopters of AI have now rolled out cloud-based services that are bringing AI to the masses.

    How are AI, deep learning, machine learning, big data, and cloud related? Can machine learning algorithms enable the use of an individual’s comprehensive biological information to predict or diagnose diseases, and to find or develop the best therapy for that individual? How is Quantum Computing in the Cloud related to the use of AI and Cybersecurity?

    Join this webinar to learn more about:
    - Machine Learning, Data Discovery and Cloud
    - Cloud-Based ML Applications and ML services from AWS and Google Cloud
    - How to Automate Machine Learning

    ----------------------------------------
    Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU
  • AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    Arvin Bansal, Senior Director Cyber Governance, AmerisourceBergen, Nathan Turajski, Sr. Director, Informatica Recorded: Oct 10 2019 32 mins
    The California Consumer Privacy Act (CCPA), GDPR and other mandates are a wake-up call to take a fresh look at data protection for personal information. As the scope of sensitive data and user rights requirements have evolved, this includes industries with significant experience managing legacy mandates such as PCI DSS or HIPAA.

    AmerisourceBergen is no stranger to industry mandates like HIPAA and HITECH, but is now preparing for a future where the number and impact of healthcare data breaches continues to increase, even as user transparency demands expanded controls. However, there is a silver lining as data privacy controls can also help accelerate digital transformation and enable safe value creation. In this webinar, you’ll learn how AmerisourceBergen approaches making information safe with world-class data masking techniques as a critical component of their privacy journey, and how Informatica is helping deliver data privacy governance solutions for the next-generation Data 3.0 evolution.
  • The State of Data Security in Retail
    The State of Data Security in Retail
    Andy Kicklighter, Director of Product Marketing, Thales Recorded: Oct 10 2019 35 mins
    Digital transformation is fundamentally impacting all industries, and nowhere is this truer than in retail. The internet and mobile technologies have fundamentally changed retailers’ business models, not only by opening new channels to reach customers, but also how they communicate with, serve, and support them.

    While digital transformation is touching every industry, U.S. retailers are leaders are on the leading edge of implementations,
    with 42% of retailers saying they are either aggressively disrupting the markets in which they participate or embedding digital capabilities that enable greater organizational agility. While Digital Transformation is allowing retailers to introduce new business models and reach more customers in new and innovative ways, it is introducing added difficulties for information security professionals and raises the potential to put sensitive customer data at risk.

    Based on the results from the 2019 Thales Data Threat Report – Retail Edition, participants in this webinar can expect to learn about:
    •How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    •The data security challenges facing retail companies today
    •Critical analyst recommendations for how organizations can be most effective when selecting the right tools that will enable them to manage greater amounts of complexity, that span legacy on-premises needs as well as modern, cloud-based, edge-oriented technologies.
  • Nice to Have or Have to Have? The Case for Cyber Insurance
    Nice to Have or Have to Have? The Case for Cyber Insurance
    John Smith, Prin. Sec. Engr, ExtraHop; Sean Scranton, RLI Cyber; William Boeck, Lockton; Brandon Dunlap, Moderator Recorded: Oct 10 2019 59 mins
    More and more companies are offering cyber insurance policies to help mitigate the financial losses an organization might suffer from a cyber incident. With the increase in breaches, intrusions and ransomware incidents, cyber insurance could be right for your organization as a part of the risk mitigation strategy. But there’s a lot of confusion for organizations in determining what a company’s exposure is and what exceptions and exclusions might be in a policy. Organizations are almost forced to think like an underwriter to address these concerns. Join ExtraHop and (ISC)2 October 10, 2019 at 1PM Eastern for a discussion on cyber insurance, demystifying the current insurance landscape and what are the right questions to answer.
  • Top 3 Ways to Maximize Network Performance and Reduce Help Desk Tickets
    Top 3 Ways to Maximize Network Performance and Reduce Help Desk Tickets
    Cherie Martin - Product Marketing, Aruba Recorded: Oct 10 2019 53 mins
    Join us October 10th at 10am PDT as we discuss how to:
    •Consistently deliver high-quality network and application services
    •Reduce help desk tickets
    •Identify and resolve issues before they affect your users

    This webinar also includes a live demo of Aruba Central, our cloud managed networking solution.

    Attend and you may qualify for a free Aruba Instant Access Point and a 90-day trial of Aruba Central.
  • Customer Update: Aerospike 4.7 for Intel® Ethernet 800 Series with ADQ
    Customer Update: Aerospike 4.7 for Intel® Ethernet 800 Series with ADQ
    Srini Srinivasan, Founder and Chief Product Officer at Aerospike, and Anil Vasudevan, Senior Principal Engineer at Intel Recorded: Oct 10 2019 40 mins
    Application Device Queues (ADQ) is a new Intel innovation for system-level network input/output (I/O) performance. This will improve application response predictability and scalability in a cost-effective manner. ADQ dedicates queues and shapes traffic for the transfer of data through Ethernet for critical applications. This is accomplished by using standard operating system networking stacks and interfaces supplemented with Intel hardware technologies for improved performance. The goal of ADQ is to ensure that high-priority applications receive predictable high performance through dramatically reduced jitter.

    Aerospike is the first commercial/open database that supports Intel’s innovative product lines – Intel PMEM and now Intel ADQ. The close collaboration between Aerospike and Intel resulted in unprecedented performance gains and low latency in applications powered by the Aerospike database.

    Aerospike 4.7 is optimized for the Intel Ethernet 800 Series with ADQ. The network adapter hardware enables enterprises to move beyond NUMA pinning to speed up applications by quickly moving vast amounts of data to and from the edge, the core and the cloud.


    Join this Special Customer Update featuring Srini Srinivasan, Founder and Chief Product Officer at Aerospike, and Anil Vasudevan, Senior Principal Engineer at Intel. Each will share perspective on the significance of these advancements.

    You’ll hear details on Intel Ethernet 800 Series with ADQ directly from one of Intel’s most influential engineers and Srini’s expectations for what 4.7 will mean for Aerospike customers.
  • Zero Trust Application Delivery Pipeline
    Zero Trust Application Delivery Pipeline
    Tony Morris, Enterprise Architect-Public Cloud, Hyland Recorded: Oct 10 2019 44 mins
    Zero Trust is a concept that is typically used to describe the security model for a company's infrastructure and data. Application delivery pipelines are typically managed using a perimeter-centric security model. In this session, we will discuss how to apply the core concepts of Zero Trust to the application delivery pipeline, helping to ensure your applications are delivered to production safely and securely.
  • API monitoring and troubleshooting in a hybrid world
    API monitoring and troubleshooting in a hybrid world
    Kevin Balaji, Product Marketing Manager at MuleSoft and Andrew Bragdon, Director of Product Management at MuleSoft Recorded: Oct 10 2019 34 mins
    Today’s enterprises are increasingly dependent on all types of APIs and apps for flexibility and rapid development. However, if even one component of this chain breaks, it can have a ripple effect on its dependents, ultimately sacrificing customer experience and impacting the overall business. As traffic increases, organizations need real time visibility, proactive notifications of issues, and an efficient way to mitigate problems in order to deliver on customer expectations.

    Anypoint Monitoring helps you to proactively identify and resolve issues, all in one place with real time visibility into your APIs and integrations. Ensure business continuity with real time visibility into app performance, customizable dashboards, advanced alerts, and instant access to historical log data.

    Watch this live demo to learn:
    - How MuleSoft customers leverage Anypoint Monitoring to enable best practices and steps towards operational monitoring of their application network.
    - Advanced Monitoring capabilities, including advanced alerts, log management, and custom metrics/events.
    - How Anypoint Monitoring provides real time visibility into your APIs and integrations with easy to use out-of-the-box and customizable dashboards.
  • Enterprise IoT Security: Connect and Protect
    Enterprise IoT Security: Connect and Protect
    Momenta Partners Oct 24 2019 4:00 pm UTC 60 mins
    Security remains a top priority in today’s connected world. The market landscape is dynamic, innovative and confusing at the same time. Navigating the ever emerging threats requires vigilant expertise, which is always in short supply in a digitally accelerated world. Every connected device and service has potential vulnerabilities. Join Momenta Partners as we highlight the most relevant issues of today in Enterprise IoT Security: Connect and Protect.

    In this webinar, Momenta's Managing Director Ken Forster will be joined by a panel of IoT security experts; Duncan Greatwood, CEO of Xage Security, Nicole Ford, VP, Chief Information Officer of Carrier, and Julie Fitton, VP, Digital Product Security of Stanley Black & Decker Inc. to discuss these key themes in digital security:

    - What is enterprise IoT security?
    - Current state of the security market
    - What are the risks?
    - IT - OT gap
    - Solutions and use cases
  • Network of the Future is Powered by AI: Dartmouth College Case Study
    Network of the Future is Powered by AI: Dartmouth College Case Study
    Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth College Recorded: Oct 10 2019 60 mins
    When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.

    In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.

    Watch now, and learn how to:

    -Gain visibility into the Wi-Fi user experience
    -Quickly troubleshoot network problems with an AI-driven virtual assistant
    -Predict network problems before they arise
    -Implement personalized location services, such as wayfinding and proximity notifications
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    K. Eric Gentry, Managing Principal, VTRAC Oct 16 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the social attacks and the current cybersecurity threat landscape.

    We’ll cover:
    •The most common social engineering attacks
    •New insights on phishing attacks
    •Top threat actors in social attacks

    Our Verizon Threat Research Advisory Center presenters will be:
    •K. Eric Gentry, Managing Principal, VTRAC
    •David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • 7 Tips for Marketing Cybersecurity Solutions
    7 Tips for Marketing Cybersecurity Solutions
    Jessica Gulick, CEO, and Monica Ricci, VP of Marketing, Katzcy Oct 29 2019 3:00 pm UTC 60 mins
    Join Jessica Gulick, tech & cybersecurity growth hacker, as she shares the top lessons that have not only been learned, but have been put into practice by Katzcy’s growth-stage clients. We’ll talk about the importance of understanding buyer profiles, the techno-buzz trap, the right time for geek-speak, and how to build a narrative that positions your unique solution in the right box in the minds of buyers, industry analysts, and influencers alike.
  • Unified Data Protection: Part 2
    Unified Data Protection: Part 2
    Ankur Chadda, Senior Product Marketing Manager Oct 16 2019 3:00 pm UTC 38 mins
    Enterprises are facing new challenges when it comes to protecting regulated data and critical IP.

    Understanding the location of all data, whether at-rest, in-use, and in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify its riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data.

    Wednesday, October 16, 2019

    10 a.m. CDT

    This webinar explores how companies should rethink data security. Addressing the challenges of protecting critical data & intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection, including these three main components.

    Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate

    Risk-Adaptive Controls – to eliminate the complexity of policy enforcement

    Intelligent & Dynamic Automation – to build a better understanding of context and user intent
  • How to enhance and manage your IoT security in a Microsoft Azure environment
    How to enhance and manage your IoT security in a Microsoft Azure environment
    James Penney, Device Authority and Ian Banham, Microsoft Oct 16 2019 3:00 pm UTC 60 mins
    IoT platforms like Microsoft Azure IoT provide several capabilities and features to build and deploy IoT applications, solutions and services in a better, faster, more cost-effective and integrated way. IoT platforms also provide quick interconnection of assets and support a wide variety of operating systems and devices.

    While the IoT Platform vendors and ecosystem partners continue to evolve, security is still the #1 concern for its adoption. This is introduced by the scale of IoT, its unique characteristics, disparate components involved, as well as the consequences of compromised security. The IoT continues to grow rapidly but concerns about security remain a significant barrier and are hindering the adoption.

    Enterprise IoT security solutions typically use owner-controlled security posture
    and need to integrate with IoT Platforms’ device and data management.

    The webinar discussion will include:

    • Challenges of building, deploying and securing IoT – on premise and in the cloud
    • A real world Automotive / Connected Car use case; the problem/challenge and the solution
    • The value of Microsoft Azure IoT together with KeyScaler
  • 10 Ways to Dramatically Cut Abandonment Rates During Account Onboarding
    10 Ways to Dramatically Cut Abandonment Rates During Account Onboarding
    Dean Nicolls, VP of Global Marketing, Jumio Oct 16 2019 3:30 pm UTC 31 mins
    Financial institutions are losing almost 40% of applicants during digital on-boarding. There's a number of reasons for this, but often its the online identity verification part of the process where customers are lost. This is because the experience is often too time-consuming, onerous, or clunky.

    In this webcast, Dean Nicolls provides an update on the abandonment crisis and then shares 10 practical tips for improving the onboarding process. He also shares a handy TCO calculator for comparing conversion rates of different identity verification solutions.
  • Getting Started with WiCyS Student Chapters and Making an Impact
    Getting Started with WiCyS Student Chapters and Making an Impact
    Dr. Vitaly Ford, Professor Pauline Mosley, and the Tennessee Tech Chapter Students Oct 16 2019 4:00 pm UTC 60 mins
    In this webinar, we will talk about how to get started as a Women in CyberSecurity (WiCyS) Student Chapter and share ideas on activities, funding, sustainability, competitions, and resources.
  • Get to the Point! Communicate More By Saying Less
    Get to the Point! Communicate More By Saying Less
    Diane DiResta Oct 16 2019 4:00 pm UTC 60 mins
    Do you do most of the talking? Do you take too long to get your point across? Do you allow the conversation to go down a rabbit hole?

    Whether you’re an entrepreneur or business professional, you can’t seal the deal unless you can speak clearly and concisely. In this webinar you’ll learn:
    - how speakers and high level executives lose their audience
    - how to create a message that’s crisp
    - a mantra for keeping you on track

    When you learn to be crisp, you’ll see glazed eyes of boredom turn into raised eyebrows of interest.
  • NCSAM Part 2 of 4: Accelerate Incident Response Through Automation
    NCSAM Part 2 of 4: Accelerate Incident Response Through Automation
    Joseph Loomis, CSO, CyberSponse and Steve Sunday, Principal Technical Engineer, AccessData Oct 16 2019 4:00 pm UTC 28 mins
    When a data breach occurs, every second counts. With the new RESTful API from AccessData, organizations can now automate incident response, saving up to 40 minutes of analysis time per incident. When an attack is detected by an organization’s cybersecurity software, like CyberSponse, the #1 security, orchestration, automation and incident response solution, the API alerts the AD Enterprise agent and initiates a collection job within moments of the attack, immediately preserving data related to the root cause of the breach.

    Join us on Thursday, August 22nd at 2:00 pm ET for a 60-minute webinar co-presented by AccessData and CyberSponse. In this webinar, you’ll understand how automation can facilitate faster, more secure incident response and you'll see firsthand how the integration between these two platforms using the new AccessData API triggers automated forensics, dramatically accelerating incident response. Collected evidence is then immediately available for analysis in AD Enterprise. Join us to see a live demo of the integration!
  • When Machines Fight Machines: Cyberbattles and the New Frontier of AI
    When Machines Fight Machines: Cyberbattles and the New Frontier of AI
    Marcus Fowler, Director of Strategic Threat at Darktrace Oct 16 2019 5:00 pm UTC 60 mins
    AI is sometimes spoken about like something that will, in the future, secure networks. However, AI cyber security is already deployed by numerous companies to detect and autonomously respond to increasingly advanced, fast-moving, and stealthy threats. At the same time, attackers are developing malicious AI, which will be almost impossible to detect. Companies that fail to deploy AI today may find themselves unable to detect the threats of tomorrow. In this session, learn about how the use of unsupervised machine learning allows companies to benefit from cyber AI within weeks, why building trust with security teams is so essential, and use cases of cyber AI beyond threat detection and response.
  • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Gabe Gumbs, Chief Intelligence Officer at Spirion and Ben Rice, VP of Business development at Bitglass Oct 16 2019 5:00 pm UTC 60 mins
    Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solutions already in use in your organization. Want to learn more?

    Join Spirion’s and Bitglass data protection experts in our joint webinar: Getting Ahead of the Game in Data Protection: Discover, Classify and Manage on October 16, 1 PM ET.

    What you will learn?

    •Data protection challenges to be mindful of
    •Managing digital transformation and unstructured data proliferation
    •How Bitglass and Spirion's solutions work together to protect your data
  • Live Demo: Foundations of People-Centric Cybersecurity
    Live Demo: Foundations of People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Oct 16 2019 5:00 pm UTC 45 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • Why Rip and Replace Your VPN if You Don’t Need to?
    Why Rip and Replace Your VPN if You Don’t Need to?
    Richard Greenberg, CISSP, OWSAP Foundation; Eitan Bremler - Co-Founder & VP Technology Safe-T Oct 16 2019 5:00 pm UTC 60 mins
    VPNs have been a cornerstone of secure networking for the last 20+ years. While VPNs have stood the test of time, today, we now know that a true security architecture is hinged upon the concept of Zero Trust Network Access.

    Most organizations have already poured a great deal of time and resources into building out their VPN infrastructure. Considering that the technology does exactly what it’s supposed to do, ripping and replacing it may not make much sense.

    What if we tell you that you don’t have to rip and replace your VPN in order to start your journey towards Zero Trust Network Access? Join us to this webinar to find out how.
  • Best Practices For Stopping Theft and Abuse of Employee Credentials
    Best Practices For Stopping Theft and Abuse of Employee Credentials
    Nithin Varam, Lior Kolnik, Stan Lee, with Host Karin Shopen Oct 31 2019 5:00 pm UTC 60 mins
    The theft and use of stolen passwords is a common attack for adversaries, mostly because passwords are the weakest link in security. Plus, stealing credentials is much faster, cheaper and easier than having to find and exploit a vulnerability in a system.

    Once done, an adversary can bypass the entire attack lifecycle – impersonating a valid user – and move freely through the network. With inside access, an attacker can quickly move laterally to set up a broader footprint, compromise additional systems and steal other credentials along the way.

    In our new webcast, Best Practices for Stopping Theft and Abuse of Employee Credentials, our experts will:
    *Outline the common techniques attackers use
    *Provide best practices to prevent further credential attacks
    *Showcase Palo Alto Networks features you can enable now to protect your organization

    Get your questions answered, and learn how to stop credential theft and abuse in your organization today.
  • National Cyber Security Awareness Month- Protect IT
    National Cyber Security Awareness Month- Protect IT
    Kevin Haley | Eva Velasquez | Ryan Lawless Oct 16 2019 5:00 pm UTC 60 mins
    As we wrap up National Cyber Security Awareness month join Symantec and partners The Identity Theft Resource Center and Infolock for our final webinar. Whether you are connecting to networks or collecting customer/consumer data, protection is needed. This group of speakers will help familiarize you on how to check your systems and how to keep others’ data safe.

    Topics will include:

    - If You Connect, You Must Protect: updating to the latest security software, web browser and operating systems

    - Wi-Fi safety

    - If You Collect It, Protect It: keeping customer/consumer data and information safe

    Register Today
  • Master the Fundamentals of VM Analysis and Prioritization
    Master the Fundamentals of VM Analysis and Prioritization
    Robert Healey | Senior Director Marketing, Asia Pacific, Tenable Oct 17 2019 3:00 am UTC 60 mins
    Learn how you can effectively analyze vulnerability data to prioritize patching and remediation to reduce cyber exposure. Overcome vulnerability overload and gain insight into the following topics:
    1. Recognizing the value and limitations of CVSS scores for prioritization
    2. Identifying vulnerabilities most likely to be exploited in the near term
    3. Incorporating asset criticality into your analysis
    4. How to compare the effectiveness of your internal operations with industry peers and across internal business units
    5. How you can more effectively prioritize your efforts to reduce cyber risks
  • Becoming a Leader: An Inside Look at a Level 4 Threat Hunting Program
    Becoming a Leader: An Inside Look at a Level 4 Threat Hunting Program
    Casey Smith Director of Applied Research & with Brian Baskin Technical Director of Threat Research @ Carbon Black Oct 17 2019 2:00 am UTC 60 mins
    What is required to take your threat hunting program to the highest level of maturity? Using Red Canary as a case study, this session will provide a behind-the-scenes look at how to bring together MITRE ATT&CK™, CB Response, and Atomic Red Team to analyze massive amounts of data and quickly detect adversaries. This webinar also features David J. Bianco's threat hunting maturity model.

    Attendees will learn how to:

    - Automate the majority of successful data analysis procedure
    - Map adversary techniques to detection coverage
    - Test, validate, and continuously improve visibility
    - Make threat hunting a repeatable process that drives better security outcomes
  • Global Trends in Cloud Access Management, Single Sign On and Authentication
    Global Trends in Cloud Access Management, Single Sign On and Authentication
    Danna Bethlehem, Director of Product Marketing, Thales Oct 17 2019 10:00 am UTC 45 mins
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • How to Transform Your Wide Area Network with SD-WAN
    How to Transform Your Wide Area Network with SD-WAN
    Shamus McGillicuddy, Research Director, EMA Oct 17 2019 12:00 pm UTC 59 mins
    What are the considerations, trade-offs, and keys to maximizing the impact of your WAN transformation project?
  • How Do You Know Your Email Security Is Working?
    How Do You Know Your Email Security Is Working?
    Tom McNash, Senior Solutions Engineer, Cyren & Duncan Mills, Product Marketing Director, Cyren Oct 17 2019 2:00 pm UTC 60 mins
    Whether you use Office 365 or an on-premises gateway, have you been able to quantify how much malware, phishing and spam is evading your email security and getting through to your users? Cyren has developed an Email Security Gap Analysis test to measure how well a company’s in-place security is performing, and has just published a new, updated report with aggregated data on results from assessments done in 2019.
    This webinar reviews the key statistics and general findings in that report, as well as case studies and segmented industry data, example emails and threats uncovered during assessments (appropriately anonymized), and it covers how to complete your own assessment. Webinar registrants will receive a complimentary copy of the report.
  • What’s Your Organization’s Exposure on the Dark Web?
    What’s Your Organization’s Exposure on the Dark Web?
    Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management, Terbium Labs Oct 17 2019 3:00 pm UTC 60 mins
    A thriving fraud economy exists in the criminal underground, on the Dark Web and beyond, that trades in compromised information. Even if it’s not your business’s information, it’s still your problem because stolen user credentials are used for large-scale phishing attacks, credential stuffing, and account takeover. Join two Terbium Labs VPs—Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management—as they offer insights into how your organization should rethink data security as more information is exposed, and re-exposed, every day.
  • The Brave New World of 5G
    The Brave New World of 5G
    Johna Till Johnson, CEO and Founder, Nemertes Research Oct 17 2019 3:00 pm UTC 60 mins
    5G is here. But what does it mean, and how can a new wireless standard transform enterprise organizations? Find out here. We'll delve into the changes 5G brings to wireless services, and how those changes will affect businesses today and going forward. And we'll provide practical next steps for organizations looking to move towards 5G.