The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Cyber Security Brief PodcastRecorded: Mar 25 201922 mins
Symantec threat researcher Stephen Doherty joins us to discuss our recently published research into a wave of attacks against financial institutions in West Africa. We also discuss some new research that found that many free mobile VPNs could actually compromise people’s privacy, a hitman who was convicted thanks to evidence found on his smartwatch, and an embarrassing compromise of the ATLAS MMO game. Also this week, Russia is back in the headlines again, with the DNC revealing it was targeted once again by a spear-phishing campaign originating in Russia in November last, while Facebook also removed a number of “inauthentic” accounts that it says were based in Russia and involved in spreading misinformation on the social media platform.
Delivered endpoint security services can provide powerful threat protection efficacy using the IT headcount already in place supporting your business. In this 5 minute video we will demonstrate the Symantec Endpoint Protection Cloud solution, and show how to get
endpoint security up and running in as little as 5 minutes using the same powerful protection as large enterprises.
Rick Collette, Cloud Architect at Palo Alto Networks; John Martinez, Director of Public Cloud R&D, Palo Alto NetworksRecorded: Mar 22 201955 mins
As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.
With the return of innovation to the SIEM market, the definition of what comprises an effective solution has changed. Join Exabeam for an informative discussion on the ten essential features and capabilities for IT security decision makers to look for when evaluating potential candidates. Discussion points include:
- Advanced processing and analytics
- Automated threat detection and prioritization
- Facilitated incident investigation and triage
- Proactive (and reactive) threat hunting
Lucas Varela, CyberSecurity Architect, Caixabank
Orion Cassetto, Sr. Director Product Marketing, Exabeam
Brian Engle, CISO, Managing Director CISO Advisory, CyberDefenses, Inc.
Chistian Doolmann, Systems Engieneer Specialist, Palo Alto NetworksRecorded: Mar 22 201963 mins
Cyber-Attacken erfolgen heutzutage häufig direkt über gezielt ausgewählte Endgeräte. Daher setzen viele Unternehmen auf EDR (Endpoint Detection and Response) als Lösung, um Cyberangriffe zu erkennen und darauf zu reagieren.
Das Problem dabei: Die Sicht von EDR ist auf den jeweiligen Endpoint beschränkt, ergänzende Informationen fehlen und müssen mühsam und aufwändig ergänzt werden. Laut SANS Institute werden zudem nur 26% aller initialen Angriffsvektoren durch EDR-Lösungen erkannt.
Eines wird dabei deutlich: Ein neuer Ansatz muss her! Und hier kommt XDR ins Spiel. Im Gegensatz zu EDR kombiniert es Daten aus verschiedenen Quellen wie zum Beispiel den Endpoints, dem Netz, der Cloud, Log-Daten mit allgemeinen Bedrohungsinformationen. Dadurch bringt es unterschiedliche Aspekte zusammen und liefert ein weitaus vollständigeres Bild eines Angriffs – der dank der integrierten Analysefunktionen schneller erkannt und besser abgeblockt werden kann.
Wenn Sie erfahren wollen, wie Ihr Unternehmen dank XDR sicherer werden kann, dann sehen Sie sich dieses Webinar an.
Patrick G. Cohen, VP, Strategic Partnerships, NPower, Inc.Recorded: Mar 22 201930 mins
According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers. Key influencers like teachers, parents, state and local officials are encouraged to join this webinar to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.
Cyber Security Brief PodcastRecorded: Mar 22 201925 mins
We discuss authorities' pursuit of Webstresser users, Japan allowing officials to hack civilians’ IoT devices in an attempt to improve security, and the much-discussed Apple Facetime bug. We also chat about the Razy malware attempting to steal cryptocurrencies, an evolution of business email compromise (BEC) scams, and a bizarre sting operation targeting the Citizen Lab internet watchdog group.
Con el incesante aumento de la adopción de la nube, las prestaciones de firewall de próxima generación resultan esenciales para proteger las cargas de trabajo en la nube contra las amenazas avanzadas mediante funciones automatizadas de detección y protección en tiempo real.
Participe en este seminario virtual interactivo, en el que los expertos de SonicWall le explicarán cómo la serie de firewalls SonicWall Network Security virtual (NSv) puede ayudarle a reforzar la seguridad de sus entornos híbridos y multinube. Obtendrá información sobre:
•Las principales tendencias y amenazas de la industria
•Cómo NSv es capaz de proteger de forma efectiva todos los componentes críticos de sus entornos de nube pública o privada
•Cómo garantizar la protección contra la propagación lateral de las amenazas y una seguridad coherente
•Cómo detener las amenazas avanzadas
•Además, podrá ver una demostración en directo
Jessica Gulick, CEO, Katzcy, MBA | PMP | CISSPRecorded: Mar 21 201955 mins
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Guest: Merissa Villalobos & Kristin Parke from NCC Group
Mike Ward, Co-founder and CEO of Turtle Creek ConceptsRecorded: Mar 21 201945 mins
Small businesses are the low-hanging fruit of the cybercrime world. Operating a small business is tough work and requires the small business owner to be skilled in many areas of business, finance, tech, customer service, sales, fulfillment, and so on. Cybersecurity is only a part of what SMB owners needs to know about in order to successfully run their business. However, the cybersecurity portion is often overlooked. As hackers and attackers are looking for people to scam and steal from, they look for the easiest targets first.
In this webinar, audiences will learn more about:
- The risks and real costs of ignoring your data security
- How it can cause you to go out of business
- Simple steps to take immediately to help improve your security
Be sure that you have a good grip on understanding what you need to do when it comes to protecting your small business from these threats.
And as an added bonus, you'll receive some valuable resources that you'll be able to use in the future as you discover, plan, and implement new security strategies in your own small business. Be #SmallBizCyber smart about your small business!
David Monahan, Enterprise Management Associates; Stephen Hinck, Gigamon Insight, Steve Porcello, Gigamon InsighRecorded: Mar 21 201960 mins
Only 28 percent of organizations have alerting systems with enough context to provide highly accurate incident classification, thus requiring manual verification and reclassification of 95 percent of most organizations’ incidents. In addition, 48 percent of organizations had a security incident that caused moderate to severe business impact. Delays in identifying threats and the lack of information that extends the length of incident investigations cause real business problems.
Enterprise Management Associates (EMA) released its 2019 “Top 3 Decision-Makers’ Guide to Security Analytics.” In this webinar David Monahan, Managing Research Director for Security and Risk Management at EMA, Stephen Hinck, Product Manager for Gigamon Insight, and Steve Porcello, Sales Engineer for Gigamon Insight, will discuss the key use cases “Identifying Advanced Threats” and “Enhancing Incident Investigations,” and will also demonstrate how security teams can obtain greater context for decision-making in order to solve these real-world problems faster using Gigamon Insight.
Join leading IT analyst firm Enterprise Management Associates (EMA) and Gigamon to learn more about:
•The methodology behind the report
•What to watch for in selecting a security analytics solution
•How to identify threats faster, thus reducing dwell time
•How threat actors exploit Internet presence within the context of business and security management tools, issues, and practices
•How access to a broad array of network data reduces the attack surface
Alan Foster, Senior Solutions Engineer & Justin Buchanan, Senior Solutions ManagerRecorded: Mar 21 201945 mins
Security teams today understand the need to invest across threat prevention, detection, and incident response. But with strained teams, siloed technologies, and ever-looming compliance audits, where do you start?
Join us for a special session with Justin and Alan, who will share prioritization guidance from working with hundreds of security teams, as well as key findings from an all-new Rapid7 Threat Report. We’ll cover:
1. How teams are bringing automation to their vulnerability management program
2. How to prioritize prevention across your modern network, from remote workers to cloud environments
3. Top alerts & attacker trends, based on findings from Rapid7’s 24/7 Managed Detection and Response service
4. Using the MITRE ATT&CK framework to assess your current detection capabilities
Rene Kolga, Sr. Director of Product and Robert Zamani, Director, Solutions Architect, NyotronRecorded: Mar 21 201949 mins
Most security solution buyers assume they’re protected against known malware. Numbers like 99.9% are common in vendors’ marketing materials. Hence, efficacy conversations tend to focus instead on the solution’s performance against the unknown, zero-day threats. However, with between half a million and one million new pieces of commodity malware created every day, how are antivirus solutions keeping up? Where is this database of signatures, hashes, reputation and behavior stored for over a billion of known pieces of malware? Is the 99.9% number an illusion or reality?
In this webinar we will leverage a study of three leading antivirus products against 60,000 pieces of known new and old malware. The results will surprise you...
Does the ILOVEYOU virus from the year 2000 still pose a threat? You’ll have to join this webinar to find out.
Speaker: Tim Prendergast, Chief Cloud Officer at Palo Alto NetworksRecorded: Mar 21 201943 mins
As organizations adopt public cloud to accelerate development and reduce reliance on traditional datacenters, risk management remains a top concern. It’s well understood that legacy security tools designed for the datacenter cannot adapt to the distributed, dynamic nature of cloud environments, but what about the security tools offered by the cloud providers? Can they offer the visibility and control needed to effectively manage risk and mitigate vulnerabilities? We take a deep dive into native cloud security to see how these tools work and uncover if they can effectively support the differing security requirements across SecOps, DevOps, and compliance teams.
Deena Thomchick, Sr. Director, Cloud Security, SymantecRecorded: Mar 21 201952 mins
When Securing AWS the Top 5 Things to Consider
Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.
As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.
Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:
- Monitor activity and security configurations
- Control access and prevent risky changes or privileged misuse
- Detect malicious insiders and compromised accounts
- Keep S3 buckets private and secure confidential data with DLP
- Defend S3 buckets from advanced malware threats
Thomas Nuth, Sr. Director of Marketing, OT at ForescoutRecorded: Mar 21 201949 mins
Many organizations reliant on critical infrastructure networks are striving to reduce risk with cybersecurity strategies that bridge both IT and OT asset domains. However, achieving comprehensive IT/OT cybersecurity is often a more challenging task in practice than it is conceptually.
Security professionals interested in effectively executing an integrated IT/OT cybersecurity strategy should join this webinar to learn how they can achieve end-to-end visibility into the full spectrum of both IT and OT network devices, as well as unified business risk management for today’s continuously evolving cyberthreat landscape. During this webinar, we will dive into four foundational elements of a comprehensive IT/OT cybersecurity strategy, including asset visibility, asset management, risk & compliance and investigation & response, with use cases of each.
Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, Lynx TP; David McNeely, CentrifyRecorded: Mar 21 201979 mins
In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.
Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:
- Getting a clear picture of the current health of your organizations' defenses
- Defining your security road map using NIST CSF as a framework
- Conducting gap analysis and executing remediation actions
- Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. DunlapRecorded: Mar 21 201960 mins
Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro FocusRecorded: Mar 21 201932 mins
Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.
Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.
Join this webinar to learn about:
• Ransomware challenges and impact
• Why malware detection alone is not enough
• How to close the gap with holistic endpoint data and device management
Jeremy Wittkop & Cosmo RomeroRecorded: Mar 21 201940 mins
At the core of every organization’s success are intellectual property assets. During today's webinar Protecting Critical IP webinar InteliSecure’s CTO Jeremy Wittkop and Forcepoint's Channel Sales Engineer Cosmo Romero will talk about he importance of intellectual property protection and how you can protect intellectual property using both process and technology.
Marco Miska, Technical Account Manager EMEAMar 26 20199:00 amUTC60 mins
Ihre Teams haben Schwierigkeiten, mit der Häufigkeit von Netzwerksicherheitsanfragen Schritt zu halten, während sie gleichzeitig versuchen die Agilitätsinitiativen Ihres Unternehmens zu unterstützen und die Sicherheit zu wahren.
Sie kennen die Vorteile der Automatisierung, fragen sich aber wahrscheinlich: "Wo fangen wir an?"
Besuchen Sie die Experten von Tufin am 26. März um 10.00 Uhr, um nützliche Tipps für den Einstieg in die Zero-Touch-Automatisierung zu erhalten:
• Warum aktuelle Ansätze nicht funktionieren
• Wie können begrenzte Ressourcenherausforderungen überwunden werden?
• Die Schritte, die Sie unternehmen müssen, um das ultimative Ziel zu erreichen: Zero-Touch-Automatisierung
Frank Thias - Principal Systems Engineer, F5 NetworksMar 26 20199:00 amUTC62 mins
Das Erkennen von bösartigen Bots und der Schutz vor ihnen hat für Unternehmen, die eine nachhaltige Sicherheitsstrategie entwickeln, höchste Priorität. Nehmen Sie an diesem Webinar teil, um zu erfahren:
• Wie Bots Anwendungen infizieren, verbreiten und angreifen
• Welche Arten von Anwendungsangriffen häufig von Bots ausgeführt werden.
• Wie Sie sich gegen schlechte Bots verteidigen können, ohne die guten zu stören.
Durch Ihre Teilnahme an diesem Webinar werden Ihre persönlichen Daten an F5 weitergegeben und in Übereinstimmung mit den F5-Datenschutzrichtlinien behandelt (https://f5.com/about-us/policies/privacy-policy). Zudem stimmen Sie zu, dass wir Sie zukünftig auch über F5-Produkte und -Dienstleistungen informieren dürfen. Sie können dies natürlich jederzeit widerrufen.
Kevin Fielder, CISO, Just Eat, Justin Shaw-Gray, Sales Director, SynackMar 26 20199:00 amUTC60 mins
Consumers are upping the ante for CISOs in 2019! >19% of consumers reported that they would not feel comfortable shopping at a store that has been breached or using an online service and 50% of consumers claim that security was a priority when choosing a bank. From eCommerce to Financial Services: trust is top of mind for consumers, and trust is becoming a core part of the CISO charter.
Join Synack's Justin Shaw-Gray as he interviews Kevin Fielder, CISO, Just Eat
- The security challenges CISOs face in eCommerce and how they are integrating crowdsourced security into their day-to-day operations to build trust with the board and with customers.
- What security’s role is in building a trusted business
- How to plug security into DevOps
- And Kevin's perspective on which security programs are actually worthwhile and where innovation is needed. What works? What doesn’t?
Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWSMar 26 20199:00 amUTC47 mins
There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.
Join Raj Patel, Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram, Partner Solutions Architect, AWS to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.
In this webinar we'll discuss:
-How DevOps and InfoSec teams can align to the new DevSecOps paradigm
-Why continuous compliance management is a new business imperative
-How to build security in to your Continuous Integration/Continuous Development pipeline
Erik Bartholomy (LogRhythm) and Eric Parent (Sonepar)Mar 26 201910:00 amUTC47 mins
Building a Cybersecurity Architecture to Combat Today’s Risks:
Foundations, Visions, Testing and the Role of SIEM
The rapid development and adoption of cloud infrastructure, mobile workforces, IoT and other susceptible environments has mandated a reappraisal of security architecture. Modern organisations are recognising their security posture may not be keeping up with the threat landscape, and this leads to frightening discoveries around the safety of their data and networks.
Join Erik Bartholomy – a Security Architect at LogRhythm – and Eric Parent – CISO at Sonepar – to discover how security architecture is developing to face the current threat landscape. Failures in past layered approaches are frequent, and serve as valuable learning lessons on the importance of proactive monitoring and response.
During the webinar you will learn:
• How LogRhythm’s POC enabled Sonepar’s team to efficiently expedite threat detection, and improve their SOC and analyst efficiency
• The guiding principles and technology behind modern security frameworks and architecture, including the rise in popularity and value of the Zero Trust Framework
• How security architecture helps align IT security with business strategy and current threats
• Adapting architecture to accommodate different environments, including on-premises, cloud, and hybrid cloud
Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, ForresterMar 26 201910:00 amUTC55 mins
Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.
Join Robert Arandjelovic, Director Product Marketing, Symantec and Heidi Shey, Director Product Marketing, Forrester as they discuss:
- The inherent security challenges of cloud
- Security strategies and imperatives
- How organizations are approaching and need to approach cloud security today
Marcin Kacprzak, Senior Sales Engineer & Damian Hoffman, Senior Sales EngineerMar 26 201910:00 amUTC45 mins
Kliknąć, czy nie? Każdego dnia użytkownicy poczty elektronicznej zadają sobie podobne pytanie. Wg najnowszych statystyk 1 na 101 wszystkich wiadomości email zawiera złośliwą treść, która może prowadzić do infekcji zarówno pojedynczego komputera, jak i całej organizacji.
Podczas naszego webinarium dowiesz się jak wykrywać i blokować podejrzane wiadomości email oraz poznasz szczegóły efektywnej strategii ochrony poczty elektronicznej przed takimi atakami jak:
Dan Goldstein, Product StrategyMar 26 201911:00 amUTC45 mins
Gartner estimates by the end of 2020 over 20 million Internet of Things (IoT) devices will be online. Every day the automotive, aviation, consumer goods and utilities industries (just to name a few) are pushing new boundaries in how customers interact with technology. While this evolution unlocks incredible potential, security and performance challenges put IoT device manufacturers and providers at risk of security incidents and unable to meet customers' rapidly growing expectations.
Security-wise many devices are still treated like machines from early in the century: release patches on Tuesdays and cross our fingers our users update. Performance-wise centralized cloud providers are not built to deliver ultra low-latent responses to millions of devices with a global footprint.
Join our webinar and take a look at how Cloudflare is helping IoT manufacturers and providers meet emerging security and performance challenges.
Kelvin Murray, Threat Expert, WebrootMar 26 201911:00 amUTC60 mins
With cybercriminals constantly seeking innovative ways to steal information and monetise data, it is crucial for businesses and MSPs to keep up to date on emerging trends in the threat landscape.
Webroot is hosting a series of webinars every 3 months that aim to keep the industry informed on the latest threat trends and review the top cyberattacks that hit businesses each quarter. These webinars will also provide tips on how to stay safe in a complex threat landscape.
Join Webroot’s Threat expert as he discusses topics such as:
•The rise of information stealers
•The changing face of ransomware
•Relentless phishing attacks
•The theft, trade and cracking of passwords
Gert De Wever, Security CSE, EU North & Koen Chiau, Sales & Channel Manager BeNeLux, Aruba Security SolutionsMar 26 20191:00 pmUTC75 mins
Mars, c'est le mois de la Cybersécurité !
C'est l'occasion de (re)découvrir l'offre de sécurité Aruba à 360º !
Mardi 26 mars à 14h, nos experts Sécurité d'Aruba Belux, Gert De Wever & Koen Chiau aborderont pour vous les 360º de l'offre sécurité d'Aruba :
· Le défi
· Les 4 piliers de la sécurité : identifier, protéger, détecter et remédier
· Mise en place et automatisation de la sécurité
· Approche 360° de l'expérience utilisateur sur le réseau
· Demo live
Jared Phipps, VP Worldwide Sales Engineering, SentinelOne, Brandon Dunlap, Moderator, (ISC)²Mar 26 20191:00 pmUTC60 mins
If you ask Gartner about the problems with today’s EDR technologies, they will say most solutions don’t deliver EDR capabilities in an operationally feasible or complete manner.
The purpose of an EDR solution is to provide advanced detection & response capabilities to complement an EPP solution. At SentinelOne, we deliver the very best of EDR & EPP in a highly differentiated manner and in one single lightweight agent.
Join us and learn about a new EDR- Active EDR - a new world of EDR capabilities and user experience. Explore how to:
- Eradicate benign alert noise, focus on what’s important.
- Optimise threat hunting time with curated and focused story lines.
- Maximise staff efficiency and let staff become expert threat hunters.
Michael Aminov, Chief Architect - Perception PointMar 26 20192:00 pmUTC15 mins
The built-in security for G Suite is insufficient against the modern threat landscape. In this short webinar, join our Chief Architect Michael Aminov to learn how to dramatically improve the prevention of APTs, phishing, malware, spam and BEC attacks with no disruption to existing business processes or IT overhead.
Mariusz Sawczuk – Specialist Systems Engineer, F5 NetworksMar 26 20192:00 pmUTC66 mins
Identyfikacja złośliwych botów i ochrona przed nimi jest priorytetem dla firm opracowujących zrównoważoną strategię bezpieczeństwa. Weź udział w tym webinarium, aby dowiedzieć się:
• W jaki sposób boty infekują, rozprzestrzeniają i atakują aplikacje
• Jakie rodzaje ataków na aplikacje są najczęściej przeprowadzane przez boty
• W jaki sposób możesz bronić się przed szkodliwymi botami, nie przeszkadzając tym dobrym
Oglądając to webinarium wyrażasz zgodę na przetwarzanie Twoich danych osobowych przez F5 zgodnie z polityką firmy (https://f5.com/about-us/policies/privacy-policy). Wyrażasz również zgodę na otrzymywanie informacji od F5 na temat produktów i rozwiązań firmy z możliwością wycofania zgody w dowolnym momencie.
Lee Neely, Mentor Instructor, SANS Institute and Mic McCully, Senior Solutions Consultant, SymantecMar 26 20192:00 pmUTC62 mins
The ubiquitous use of mobile devices has radically changed the landscape of data protection and the abundance of applications only complicates the situation.
How, then, can mobile device data be protected? This webcast reviews the current and emerging services and practices designed to help secure and protect the data on these devices, and identifies areas where solutions are needed to fill the remaining gaps and provides recommendations for a holistic approach including mobile threat protection.
Join this webinar to learn more about:
- What role security tools such as analytics can play in managing mobile devices
- How mobile devices and data are currently protected and how effective those protections are
- Common attack vectors and possible mitigation strategies
- Features and capabilities that a solution should have to provide organizations with ideal mobile security and visibility
Join Darktrace and Redscan to discuss how advances in AI are shaping the way security teams visualise, detect, and autonomously respond to emerging threats - all in real time.
In this webinar, you will learn:
- How leveraging machine learning and AI algorithms defends against advanced, never-seen-before, cyber-threats
- How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
- How to achieve 100% visibility of your entire digital enterprise including cloud, network, and IoT environments
- Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk
Matt Selheimer, Chief StrategistMar 26 20193:00 pmUTC58 mins
How to handle evolving threats and expanding compliance risks when you have resource constraints.
For years, organizations have struggled with the high-cost and long time-to-value of implementing Security Information and Event Management (SIEM) tools. Even worse, you may have tried an expensive cybersecurity outsourcing vendor that failed to deliver little more than yet another alert stream.
Join this webinar instead of being held back by the past. Because the good news is there’s a new approach that seamlessly combines an award-winning security platform, cutting-edge threat intelligence, and 24x7 expert defenders that doesn’t take months or years to implement – with starting costs far less than one FTE a year – yes, you read that right.
It’s a risk-based approach that gives you the right level of security and compliance coverage for cloud, hybrid, and on-premises environments.
You really should check it out, unless you want to keep trying to make that SIEM tool work…
Chris Roberts (LARES Consulting), Nathan Wenzler (Moss Adams), Jessica Gulick (Katzcy), Joseph Carson (Thycotic)Mar 26 20194:00 pmUTC60 mins
What were the highlights of this year's RSA Conference in San Francisco? Discover the major security developments that happened in the past year and the biggest topics discussed during RSAC.
Join this exclusive panel of security experts as they share their experiences, insights and recommendations in an interactive Q&A discussion on:
- Top security challenges and how are we solving them
- Biggest buzzwords: Hype vs. reality
- Exciting new tech
- Top conference highlights
- Cybersecurity as a boardroom issue
- CISO's toolbox
- Words of wisdom for people interested in security
This is an interactive session and the audience is encouraged to ask questions during this live webcast.
Darren Thompson, Vice President and CTO EMEA, SymantecMar 26 20194:00 pmUTC39 mins
Businesses today are learning that migrating to the cloud does not happen over night. It takes time and many businesses face the challenge of having to manage both on-premise and cloud solutions. Discover what’s driving businesses to transition to the cloud, the reality of today’s cloud, and best practices from the frontline.
Join Darren Thompson, Vice President and CTO in EMEA, as he walks the audience through “a day in the life of a cloud migration”.
Viewers will be able to learn more about:
- The drive to digital transformation
- Today's "Cloud reality"
- What businesses are up against
- Best practices from the frontline
The world is changing, attacks come at the speed of light, and are changing so fast detection is almost impossible. So, how do we tell when we are being attacked? What new technologies are coming down the pipe? This session will cover these and many more topics.
With the growing sophistication and speed of cyber-attacks, you need the confidence to know that your endpoint protection has you covered. Your job isn’t getting easier, so we keep making Traps better. The Traps team has announced new features which fundamentally change how Traps is deployed and managed. In this webinar we’ll cover:
•An update on the latest threat landscape trends
•Overview of the new features of Traps 6.0
•How you can take action and upgrade now
Cyber threat actors find a seemingly limitless supply of hacking tools and products in deep and dark web markets and forums. How far can an attacker go with a ready-made hacking tool that was bought on the dark web? Where would the attacker be from? And what are the most popular off-shelf hacking product these days?
Colin Gibbens (Dir Prod Mgmt, Enterprise Security Products) and Don Leatham (Sr Manager, Global Strategic Alliances)Mar 26 20195:00 pmUTC60 mins
Cyber attackers are using sophisticated automation tactics to quickly find and exploit weaknesses in organizational defenses. Normal response tactics fail to mitigate or stop these “machine speed” attacks. The information necessary to address these attacks is often in different security tools, none of which are easily connected and coordinated.
In this webinar, you will learn how Symantec and Splunk products address this problem by working together to automate a complete, closed-loop security system.
When streaming data meets machine learning and advanced analytics, the innovation possibilities can be endless. Operationalization of data movement in a hybrid cloud architecture is key to making your technology investments deliver on their promises. Without it comes frustrated developers, failed projects and technology disillusionment.
Join Doug Cutting, Apache Hadoop creator and Chief Architect at Cloudera, and Arvind Prabhakar, co-founder and CTO at StreamSets as they discuss how to use DataOps to avoid common pitfalls associated with adopting modern analytics platforms.