Hi [[ session.user.profile.firstName ]]

IT Security

  • CISSP Exam Prep Clinic #4: Pass the CISSP the 1st Time - Best Answer Selection
    CISSP Exam Prep Clinic #4: Pass the CISSP the 1st Time - Best Answer Selection Mission Critical Institute Recorded: Sep 22 2018 42 mins
    Learn how to analyze exam answer choices so you can select the best answers.

    In Clinic #4, you will learn tactics for analyzing the answer choices and then selecting the “best answer”. Often there is no “right” answer and you need to eliminate the less likely answers.

    If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    These five Clinics include tips for all 8 CISSP domains covered in the exam.

    Register today and move closer to your goal!

    SPONSORED BY: Mission Critical Institute
  • The Proven & Premier SD-WAN Choice of Hundreds of Global Enterprises
    The Proven & Premier SD-WAN Choice of Hundreds of Global Enterprises Nirav Shah, Sr. Director, Product & Solutions & Shalini Sundaram, Manager, Product Marketing Recorded: Sep 21 2018 49 mins
    Join us to bear witness to a once-in-a-lifetime first, executed by NSS Labs and the remarkable advantages Fortinet has been bringing to the market, as the only vendor with security capabilities to receive SD-WAN "Recommended" rating.
  • How Snapper Further Protects Data in Amazon S3 Using CWP for Storage
    How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Sameer Vasanthapuram, Kevin Stultz and Paul Hortop Recorded: Sep 21 2018 43 mins
    Snapper, a New Zealand-based company, needed a security solution to protect their customer data in Amazon Simple Storage Service (Amazon S3) from advanced threats and malware. In our upcoming webinar, learn why the flexibility and scalability of Symantec Cloud Workload Protection for Storage (CWP for Storage) made it the right solution for Snapper.

    In this webinar, you’ll learn:

    - How CWP for Storage protects against the latest threats and malware

    - Ways CWP for Storage delivers scalable security that integrates with DevOps workflows

    Register Today
  • DatAlert Master Class
    DatAlert Master Class Brian Vecci Recorded: Sep 21 2018 64 mins
    Learn how to use DatAlert through and through – from understanding the dashboard and user alerts to prioritizing your investigations.
  • Exclusive Look: CSO's 2018 US State of Cybercrime Survey
    Exclusive Look: CSO's 2018 US State of Cybercrime Survey Bob Bragdon, Perry Carpenter, Randy Trzeciak, Christopher Leone Recorded: Sep 21 2018 45 mins
    Get an exclusive look into the results of the CSO 2018 US State of Cybercrime survey, with moderator Bob Bragdon, SVP and Publisher of CSOonline.com. Join Bob and guests from the U.S. Secret Service, the Software Engineering Institute at Carnegie Mellon University, and and KnowBe4, a leading security awareness training and simulated phishing provider. This lively and revealing discussion examines the latest 2018 cybercrime findings, including: the number of security events, major causes, and their impact; what CIOs and CSOs can do to better secure their organizations; and a close-up look at the state of security awareness training.
  • Back to School Cybersecurity Checklist
    Back to School Cybersecurity Checklist Casey Ulaky, Product Marketing Manager, Cisco Umbrella Recorded: Sep 21 2018 27 mins
    As summer vacations draw to an end, and kids return to school, we’re hoping you have more time to focus on how to improve your organization’s security posture. Cisco cloud security product expert Casey Ulaky will walk you through our Back to School Cybersecurity Checklist, where you will learn how to:

    - Know if you are experiencing a targeted attack.
    - View unsanctioned cloud services and gain a better understanding of your internet activity across all devices, on and off the network.
    - Highlight some of our new features, like iOS protection, cryptomining security category, app discovery and more!
  • Targeted Search on Live Remote Systems with AD Enterprise
    Targeted Search on Live Remote Systems with AD Enterprise Steve Sunday, Senior Sales Engineer, AccessData Recorded: Sep 21 2018 16 mins
    AD Enterprise 6.5 introduced new, enhanced targeted search capabilities on live remote systems. Come join us for a short introduction to the new ability. Use it to search and preview data including keywords, hash values, email, security events, etc. These capabilities can be used for any event from post-breach analysis and threat hunting, to searching for unauthorized data and file content.
  • [SPANISH WEBINAR] La entrega de aplicaciones acaba de volverse más eficiente
    [SPANISH WEBINAR] La entrega de aplicaciones acaba de volverse más eficiente Yovani Piamba, Manager, Systems Engineering - NOLA, at A10 Networks Recorded: Sep 21 2018 55 mins
    Adoptar una estrategia híbrida y en múltiples nubes para la entrega de su aplicación también puede llevar a perder la percepción del rendimiento de su aplicación. Compartiremos y demostraremos las últimas funciones de análisis centradas en la aplicación en Harmony Controller 4.1. Nuestro controlador más nuevo ayuda a las organizaciones a obtener información útil sobre el rendimiento de las aplicaciones, la experiencia del usuario final y los problemas de seguridad, y permite una resolución de problemas más rápida y fácil.

    El controlador Harmony de múltiples nubes brinda inteligencia conectada a través de múltiples servicios de aplicaciones seguras A10: ADC / balanceo de carga, inspección SSL, Gi-Firewall y NAT de grado de operador.

    Al unirse al seminario web, aprenderá cómo:
    * Simplificar y agilizar sus operaciones de TI
    * Asegurar la disponibilidad de la aplicación
    * Desglosar fácilmente a datos contextuales y rápidamente identificar las áreas problemáticas
    * Acceder a aplicaciones centralizadas, redes y análisis de seguridad desde un único panel de cristal
    * Habilitar el análisis de autoservicio para varios propietarios de aplicaciones
  • Solving Mobile Security: Peer-tested Strategies That Work
    Solving Mobile Security: Peer-tested Strategies That Work Brian Duckering,Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC Recorded: Sep 21 2018 61 mins
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?

    - What is your advice to your peers who are starting their mobile security journey?

    - What are the most important requirements of a mobile security solution?

    By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • Dans la foulée de Wannacry - nouvelles techniques & méthodes des cyber criminels
    Dans la foulée de Wannacry - nouvelles techniques & méthodes des cyber criminels Hervé Doreau, Directeur Technique, Symantec France Recorded: Sep 21 2018 37 mins
    Les cyber criminels continuent d'utiliser des méthodes éprouvées, en 'identifiant de nouveaux vecteurs d'infection pour augmenter le taux de réussite de leurs attaques ciblées. Dans la continuité de WannaCry, l'utilsation de vers connait un regain au sein des réseaux d'entreprise. Les vulnérabilités au niveau du poste de travail devenant néanmoins moins courantes, les attaquants doivent trouver de nouveaux vecteurs et plateformes d'infection : l'IoT est une option de plus en plus intéressante pour eux.

    Lors de ce webcast, vous en saurez plus sur :

    • la diversification des méthodes d'attaque vs leur profitabilité
    • les nouveaux modes de propagation, véritables casse-têtes pour les entreprises
    • les menaces IoT next-gen
    • les récentes campagnes d'attaques ciblées
  • How to Give Your Patient Experience Scores a Boost
    How to Give Your Patient Experience Scores a Boost Adam Mahmud, Healthcare Manager, Jamf; Nick Thompson, Jamf Recorded: Sep 20 2018 38 mins
    Improving the patient experience is a critical priority in today’s healthcare landscape. But how can you engage patients in new ways and positively impact HCAHPS scores at the same time? One option is to invest in a mobile technology initiative that delivers faster, more personalized care to patients, while also improving care team communication and clinical workflow efficiency.

    In our webinar, How to Give Your Patient Experience Scores a Boost, we will discuss mobility trends in healthcare, explain security and automation implications to consider, and provide a methodology to ensure a successful technology deployment that positively impacts patients and clinical staff.

    You’ll learn how:

    - iPad and Apple TV can be deployed to patient rooms to empower patients in new ways
    - iPhone and iPad can be used to streamline the delivery of care
    - Healthcare specific solutions can automate IT processes
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
    Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Dinah Davis, VP Research & Development - Arctic Wolf Networks Recorded: Sep 20 2018 38 mins
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
  • Data Breaches under GDPR - What you need to know
    Data Breaches under GDPR - What you need to know Marc French, Chief Trust Officer and Data Protection Officer, Mimecast Recorded: Sep 20 2018 22 mins
    Whether you're just starting your compliance journey or feel your house is in order, there's still much to learn and understand about GDPR.

    In this video interview, Mimecast Chief Trust Officer and Data Protection Officer (DPO) Marc French explores issues related to data privacy and breach compliance and how requirements under GDPR impact processes and procedures for organizations across the globe.

    Topics explored include:

    * How aspects of GDPR including data breach notifications and the right to be forgotten actually work

    * The role of the Data Protection Officer under GDPR and their responsibilities

    * What your vendors can do to ease pressures related to organizational GDPR compliance
  • Legacy IT Evolves: How Cloud Choices like Microsoft Azure Can Conquer the VMware
    Legacy IT Evolves: How Cloud Choices like Microsoft Azure Can Conquer the VMware David Linthicum, C.C.S.O. ,Deloitte - Tim Crawford, CIO, AVOA - David Grimes, V.P. of Engineering, Navisite Recorded: Sep 20 2018 58 mins
    Can organizations gain a future-proof path to hybrid computing that simplifies architecture and makes the most total economic sense?

    Watch this webcast panel discussion which addresses these pressing issues with guests David Linthicum, Chief Cloud Strategy Officer at Deloitte Consulting; Tim Crawford, CIO Strategic Advisor at AVOA; and David Grimes, Vice President of Engineering at Navisite, moderated by Dana Gardner, Principal Analyst at Interarbor Solutions.

    The panel explored the likely evolution of IT platforms from a VMware legacy, and reviewed how cloud providers like Microsoft Azure are addressing hybrid cloud models. The discussion provided a great primer to help IT leaders define the right tradeoffs and best rationale for making the strategic decisions key to your organization’s digital transformation.

    Focused on hybrid cloud technology, managed cloud services, VMware, and Microsoft Azure, experts shared:
    •Major issues organizations must grapple with as they face a crossroads on their infrastructure's future
    •Best metrics for success, defining the right factors for major decisions, and how to execute well
    •Best options for leading adopters as they invest in life after VMware ESX
    •Key benefits of moving to Azure versus AWS and other public cloud providers

    Sign up today to hear a great discussion and learn best practices from industry experts.
  • Into a Dark Realm: The Evolution of Ransomware
    Into a Dark Realm: The Evolution of Ransomware Darrel Rendell, Principal Intelligence Analyst, Aaron Riley, Intelligence Analyst, at Cofense Recorded: Sep 20 2018 43 mins
    While ransomware might not be dominating the headlines, it is still a persistent threat that continues to evolve. Weaponized emails still make it past the gateway and ransomware infections happen. Today, variants of ransomware offer “customer support” offered by the cybercriminal for communication and negotiation with the victim. Ransom amounts can vary depending on the perceived wealth of the victim. Ransomware operators also offer flexible payment methods using forms of payment other than Bitcoin and even structured payment/decryption plans. As ransomware evolves, so must your response to these threats.

    This session will help you understand:

    - The impact of what happens if your users are not trained on email scrutiny
    - The multiple effects it can have on your enterprise
    - Techniques to mitigate incidents and bolster your network’s protection against future attacks
  • Ace the Audit with Total Compliance
    Ace the Audit with Total Compliance Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Sep 20 2018 24 mins
    Total Compliance is the newest CloudCheckr module, and it’s free for all of our Security customers. It has three main functions. First, it automatically and continuously monitors your infrastructure for compliance with 35 different standards, such as HIPAA, PCI DSS, CIS, NIST, SOC2 and more. Second, if a problem is found, our software can often fix the issue for you upon your command, or automatically, thanks to Self-Healing Automation. Third, it provides a detailed log for third-party auditors with historical details and remediation notes.

    Attendees will learn the in’s and out’s of this new, valuable feature, with the added advantage of asking questions along the way. Join our experts and find out how Total Compliance can advance your organization.

    Attendees will learn:
    - Best Practice Checks
    - *New* Total Compliance module
    - Automated “Fix Now” capabilities that can save time and effort
    - Leverage Change Monitoring and Logs to Ace the Audit!
  • GDPR Compliance for Contact Centers: Using PCI DSS as a Proven Framework
    GDPR Compliance for Contact Centers: Using PCI DSS as a Proven Framework Jay Trinckes, Principal Security Consultant for Risk Management & Governance, NCC; Aaron Lumnah, Semafone Recorded: Sep 20 2018 47 mins
    On May 25, 2018, the European Union's General Data Protection Regulation (GDPR) went into effect, becoming the world's strictest and most comprehensive data protection legislation. Companies around the world, regardless of whether they are physically located within EU borders, had to meet compliance requirements if they process the data of EU citizens, creating a huge headache for any organization running a call or contact center.

    For contact centers that have troves of sensitive customer information, GDPR compliance can easily become a massive undertaking. However, using preexisting tried-and-true frameworks like the PCI DSS, companies can relieve the burden of meeting compliance obligations.

    Join Semafone and NCC for this informative session, where you'll learn:
    - How to achieve GDPR compliance in your call or contact center
    - How to use existing data security frameworks like the PCI DSS to simplify compliance efforts
    - How to improve data security inside your contact center while enabling a more seamless customer experience

    Additionally, registrants will receive a free copy of Semafone's GDPR Guide for Contact Centers.

    Reserve your space now!

    About Jay Trinckes:

    John ‘Jay’ Trinckes, Jr., CISSP, CISM, CRISC, HITRUST CSF Practitioner leads NCC Group’s healthcare practice by assisting clients in managing their IT risk to ensure they are not subject to cyber-attack along with helping them validate their compliance with IT regulations such as HIPAA. Jay is the author of three books, “How Healthcare Data Privacy Is Almost Dead…and What Can Be Done to Revive It! (2017), "The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules" (2012), and "The Executive MBA in Information Security" (2009), and has a wide range of experience in computer networks, vulnerability and penetration testing, security, compliance, and risk assessment.
  • Enterprise-Wide Kubernetes - Episode 1
    Enterprise-Wide Kubernetes - Episode 1 Paulo Renato, Principal Cloud Architect at Microsoft and Jim Bugwadia , CEO at Nirmata Recorded: Sep 20 2018 49 mins
    In this our first episode of the Enterprise-wide Kubernetes series, we will introduce what an enterprise-wide Kubernetes stack consists of, and will look at the compute, networking, and storage infrastructure requirements. Our featured guest will be Paulo Renato, a Principal Cloud Architect with the Microsoft Azure team. Some of the questions we will cover are:

    1. What are the enterprise options for selecting Kubernetes distributions?
    2. When should an enterprise choose a managed Kubernetes service?
    3. How should enterprises evaluate managed Kubernetes services from the top cloud providers?
    4. What else matters for Kubernetes infrastructure?
  • A Zero Trust Approach to Decoupling Intent from Implementation
    A Zero Trust Approach to Decoupling Intent from Implementation Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon Recorded: Sep 20 2018 60 mins
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.
  • OpenDemo: Network Automation with Ansible
    OpenDemo: Network Automation with Ansible Eric McLeroy, Senior Solution Architect, Red Hat Recorded: Sep 20 2018 56 mins
    Ansible's simple automation framework means that previously isolated network administrators can finally speak the same language of automation as the rest of the IT organization, extending the capabilities of Ansible to include native support for both legacy and open network infrastructure devices. Network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
    The original airdate of this demo was Sept. 18.
  • DDoS Attack and Bot Protection: Defending your Applications
    DDoS Attack and Bot Protection: Defending your Applications Chad Lavoie, Senior Support Engineer Recorded: Sep 20 2018 52 mins
    We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise Edition is able to perform the real time behavioral analysis that mitigating today’s threats demands. Rather than being caught off guard, join this webinar to see how you can use HAProxy Enterprise Edition to create an effective, high performance threat protection solution.

    In this webinar we will present how to:

    •Protect against application-based DDoS attacks such as HTTP request flooding
    •Protect against bot threats such as web scraping, brute forcing, and vulnerability scanning
    •Implement an advanced threat response policy with Antibot and Google reCAPTCHA
    •Implement cluster wide threat protection with a Stick Table Aggregator
    •Enhance bot threat protection with WAF and Fingerprint modules
    •Dynamically maintain cluster wide whitelists and blacklists
    •Monitor threat protection status
  • Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7
    Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7 NNT Recorded: Sep 20 2018 4 mins
    For the first time ever, ServiceNow customers are able to reconcile changes that occur with the IT environment with the actual changes approved in ServiceNow.

    NNT has integrated its award-winning Change Tracker Gen7™ with ServiceNow's service management tool to enable a closed-loop environment for change management. This integration provides zero tolerance to changes –leaving no place to hide for unwanted changes or breach activity. To further help reduce change noise, NNT Change Tracker leverages the worlds largest whitelisting service to automatically analyze changes in real-time using NNT's File Assured Safe Technology (FAST).

    See how NNT Change Tracker Gen 7 ™ delivers "closed loop" SecureOps, reconciling all actual changes made with ServiceNow® change requests.