Hi [[ session.user.profile.firstName ]]

IT Security

  • A Proactive Prevention Strategy to Reduce Risk
    A Proactive Prevention Strategy to Reduce Risk
    Andrew Homer, VP Business Development Recorded: Jan 17 2020 40 mins
    Despite the increased security investments and proliferation of new infosec tools, the damage caused by cyber breaches continues to worsen. Meanwhile, the adversary plays by their own rules and evade detection by studying a static environment. They’ve had the luxury to decide when, where and how to attack, while organizations continue to remain in a reactionary defensive state.

    This session looks at the most common methods used to bypass detection. It will also discuss how to combat against the adversary advantage with simple proactive approaches to prevention. Finally, it presents recommendations to reduce risk, including a look at innovative technologies with Moving Target Defense to prevent advanced threats fileless attacks and zero days.
  • The 2019 Dell Commercial Client Solutions Lineup
    The 2019 Dell Commercial Client Solutions Lineup
    Cameron Goedde - Client Solutions Field Marketing | Dell EMC Recorded: Jan 17 2020 42 mins
    Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.

    Presented by: Cameron Goedde - Client Solutions Field Marketing, Dell EMC
  • Spotting and Defending Against Common Business Email Compromise Tax Scams
    Spotting and Defending Against Common Business Email Compromise Tax Scams
    Erich Kron, James McQuiggan Recorded: Jan 17 2020 49 mins
    Tax season is upon us, which makes this prime time for hackers to target your unsuspecting users with the latest Business Email Compromise (BEC) scams. From evolved W2 fraud to tax-related spear phishing, cybercriminals capitalize on the first quarter of each new year with smarter, craftier attacks designed to convince your users to provide confidential information, authorize wire transfers, or enable malicious files.

    In this webinar Erich Kron and James McQuiggan, KnowBe4 Security Awareness Advocates, discuss the new types of BEC scams you can expect to see, what your users should be on alert for this tax season, and how to protect your organization from these evolved threats.

    You will learn:
    - Real-world examples of the latest BEC attacks
    - Common targets within your organization and techniques used to trick them
    - Red flags your users need to know now to spot BEC attacks
    - How to educate your organization so you don’t fall victim

    Don't let your organization become a statistic this tax season! Join our experts to find out how to stop the bad guys before it's too late.
  • Cortex XDR 2.0 - Neue Funktionen & Öffnung der Cortex-Plattform für 3rd Party Fi
    Cortex XDR 2.0 - Neue Funktionen & Öffnung der Cortex-Plattform für 3rd Party Fi
    Dirk Thelen und Bastian Schwittay Recorded: Jan 17 2020 49 mins
    Security Teams stehen heutzutage vor gewaltigen Herausforderungen - in Silos agierende Sicherheitssysteme generieren Unmengen von Alarmen ohne den notwendigen Kontext, um Angriffe schnell und umfassend erkennen, verstehen und stoppen zu können. Cortex XDR setzt diesem Dilemma einen neuartigen Ansatz entgegen, der auf der Analyse reichhaltiger, integrierter Daten über Endpunkte, Netzwerk und Cloud hinweg basiert - als erste XDR-Plattform für sichere Prävention, automatisierte Erkennung und schnelle Untersuchung und Eindämmung von Cyberangriffen.

    In diesem Webinar stellen Ihnen Bastian Schwittay und Dirk Thelen vor, wie die neue Version 2.0 von Cortex XDR mit der Einbindung von Daten aus Drittquellen, einem vollkommen neuen Device Control-Modul und umfassend verbessertem Benutzerinterface einen weiteren Meilenstein erreicht und die Messlatte für XDR ein weiteres Mal erheblich höher gelegt hat. Außerdem geben wir Ihnen einen Einblick in die neue Lizenzierung.
  • Success Story: Learn how Apria Healthcare gains unmatched asset intelligence
    Success Story: Learn how Apria Healthcare gains unmatched asset intelligence
    Dave Ochoa, Manager of Information Security Operations & Senior Director of User Support, Janet Hunt Recorded: Jan 16 2020 4 mins
    Learn how Apria Healthcare secures 10,000+ laptops, desktops, and tablets and stays compliant with industry regulations by using Absolute software.

    - Persistent security controls:
    Apria Healthcare is a leading provider of home respiratory services and certain medical equipment, with over 400 locations and 8,000 employees throughout the United States.

    In this interview, Senior Director of User Support, Janet Hunt, discusses the unique differentiator that Absolute offers: protection from the BIOS. The result is superior, more accurate asset tracking.

    The team at Apria Healthcare has visibility into the status of every device, with a persistent connection that cannot be seen or removed by the user. As Dave Ochoa, Manager of Information Security Operations, says, “I can’t protect what I don’t know exists”.

    - Proving compliance:
    In cases of lost or stolen devices, Absolute acts as a kind of insurance policy. The InfoSec team presents regulators with a full profile of the device, including its location, encryption status, other controls, and a list of freeze or wipe commands if the device goes back online.

    Absolute records a snapshot of each device every fifteen minutes, which Apria Healthcare can provide to auditors as proof of a full history of protection.

    - Visibility and control:
    Absolute has transformed how Apria Healthcare manages its devices, and how it keeps sensitive patient data secure.

    Janet Hunt summarizes the partnership by saying, “If Absolute were to disappear, I would retire because I would have no idea where anything was. That was the greatest thing about bringing Absolute in.”
  • Ransomware Hostage Rescue Manual
    Ransomware Hostage Rescue Manual
    Erich Kron, David Littman Recorded: Jan 16 2020 55 mins
    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
  • Apple IT Trends for 2020
    Apple IT Trends for 2020
    Garrett Denney Recorded: Jan 16 2020 32 mins
    As another year passes, Apple's commitment to empowering business and education organizations is unquestionable. Evolved management capabilities and strategic partnerships aim to help more students, teachers and employees enjoy the unmatched capabilities of the Apple ecosystem than ever before.

    Before you finalize your technology plans for 2020, join us for a brief recap of the major milestones Apple has hit in 2019, and take a sneak peek at what Apple IT trends you can expect in the next year.

    We’ll cover:
    - Apple IT accomplishments in 2019
    - Predictions for Apple IT trends in 2020
    - IT initiatives to consider and how to implement
  • A Year in Review: Cyber Trends in 2019
    A Year in Review: Cyber Trends in 2019
    Neera Desai, Threat Researcher & Marc Larson, Senior Intelligence Analyst Recorded: Jan 16 2020 46 mins
    Each year, the cybersecurity industry is bombarded with threats to be concerned about. In the beginning of 2019, we heard about threats like artificial intelligence, machine learning, and ransomware attacks that would plague cyber professionals all year long. As we move into the new year, we want to look back at the trends that stood out to LookingGlass researchers, how they were different than the threats of years past, and which type of threats we can expect to see in 2020. Join LookingGlass’ Neera Desai, Threat Researcher, and Marc Larson, Senior Intelligence Analyst, at 2 pm on January 16th for our next webinar.

    Attendees will be eligible for one hour of CPE credit.
  • F5 ACI ServiceCenter – Bring L4-L7 to ACI through programmability
    F5 ACI ServiceCenter – Bring L4-L7 to ACI through programmability
    Payal Singh, Solutions Architect, F5 Networks, and Ahmed Dessouki, Sr. Manager, Product Management, Cisco Recorded: Jan 16 2020 60 mins
    Learn how to manage the F5 BIG-IP in your ACI + BIG-IP deployment by leveraging F5’s automation toolchain and ACI’s programmable App Center framework.

    This simple and native integration aims to solve important real world use cases:
    1) Deep infrastructure visibility into the ACI and F5 deployment, and
    2) Network as well as application management on BIG-IP.
    Each use case can be automated due to the SDN capabilities provided by Cisco APIC.

    Join us to understand how you can leverage APIs to achieve end-to-end network automation workflows and learn how different personas within your organization can benefit from these features and functionalities.
  • Deep Dive into Ansible Network Resource Module - Network Automation
    Deep Dive into Ansible Network Resource Module - Network Automation
    Trishna Guha, Red Hat Recorded: Jan 16 2020 45 mins
    A “Resource Module” is defined as a specific discrete network function mapped to a single Ansible module. This session will shed light on how resource module benefits Network Operators/Developers/Architect by returning common payload and tunable output to match the life cycle phase of the playbook, therefore building consistency and transparency. It introduces new state operations and facts integration. The module eases Brownfield device onboarding by returning facts in the similar shape as the respective resource module’s argspec.

    In this presentation we will be doing deep dive with demonstration into the following:

    - Why Resource Module.
    - What a Resource module is.
    - How a playbook with resource module and new states looks like.
    - What common payload resource module returns.
    - How facts is integrated with the module.
  • Hybrid Multi-cloud Infrastructure for Modern App Delivery
    Hybrid Multi-cloud Infrastructure for Modern App Delivery
    Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product Marke Recorded: Jan 16 2020 57 mins
    IT transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business.

    We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
  • Not sure where to start with data privacy? Build a Privacy Center of Excellence.
    Not sure where to start with data privacy? Build a Privacy Center of Excellence.
    Bob Welshmer, Senior Sales Engineer Recorded: Jan 16 2020 12 mins
    Who in your organization needs to use sensitive data? Who manages it? Who defines acceptable levels of data privacy for different uses? Who ensures those levels are achieved every time? If you’re unsure, chances are you’re not utilizing your data to its fullest potential.

    Enter: the Privacy Center of Excellence, a team of executive members, policy implementers and data consumers who work together to find the balance between data utility and data privacy.

    Join Privitar’s Solutions Engineer, Bob Welshmer, to find out what it takes to set up a high-functioning Privacy Center of Excellence.

    Join this session to learn:
    · Who the main players are in the Privacy Center of Excellence
    · Roles and responsibilities in the Privacy Center of Excellence
    · How the Privacy Center of Excellence players work together to maximize data utility while maintaining privacy
  • Data Privacy and Data Protection | Cybersecurity Insights Series
    Data Privacy and Data Protection | Cybersecurity Insights Series
    Director of Security Strategy | Absolute Recorded: Jan 16 2020 8 mins
    Data Privacy is today's greatest challenge for IT and security teams, and with 35% of sensitive data out-of-sight on endpoints, there has never been a stronger need for persistent endpoint visibility and control.

    > DATA PRIVACY EXPLAINED
    Data privacy is a big concern for individuals and organizations alike. The EU’s General Data Protection Regulations (GDPR) has brought the topic to the forefront of society’s collective consciousness recently.

    People have always been conscientious about their personal privacy; however, with The Digital Transformation of our world, who we are has become a collection of individual pieces of data called Personally Identifiable Information (PII). And our PII is everywhere. Business, government, school, research, and even friend-to-friend interactions, all happen in the digital sphere making our data easily accessible and open to exploits by cybercriminals.

    > DATA PRIVACY LAWS
    Learn how the laws designed to protect the privacy of personal information.
    - The EU’s General Data Protection Regulation (GDPR),
    - Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA)
    - In the US: HIPAA (for health information) and S-P and S-ID statutes for financial records, enforced by the SEC. There is also the California Consumer Privacy Act (CCPA). But no national privacy standard. Yet.


    > DATA PRIVACY TIPS
    Thwart attackers and stay audit-ready with these three steps:
    1. See everything
    2. Analyze the risk
    3. Apply rapid response


    Learn tips and strategies for maintaining data privacy and data protection with confidence.
  • Hijacked! The Perils of Business Email Compromise
    Hijacked! The Perils of Business Email Compromise
    Ryan Terry, ProofPoint; Derrick Butts, Truth Initiative; Michael Weisberg, Garnet River, LLC; Brandon Dunlap (Moderator) Recorded: Jan 16 2020 59 mins
    According to the FBI’s Internet Crime Complaint Center, Business Email Compromise (BEC) resulted in more than $26 Billion in losses since 2016. Bad actors impersonating or using stolen trusted identities use a variety of attack vectors to defraud targets out of money and sensitive information. The problem is only getting worse, as these attacks are increasing due to a larger attack surface and the ability to move quickly through an organization. Detection can be difficult. What can be done to combat this fast growing and moving threat? Join ProofPoint and (ISC)2 on January 16, 2020 at 1PM Eastern for a Roundtable discussion on BEC, the threats it poses and strategies to defend against it.
  • How to Lower Your AWS Bill with RIs, AWS Savings Plans, and Spot Instances
    How to Lower Your AWS Bill with RIs, AWS Savings Plans, and Spot Instances
    Todd Bernhard, CloudCheckr Product Marketing Director Recorded: Jan 16 2020 30 mins
    Amazon Web Services now offers a discount model called AWS Savings Plans. This program offers flexible pricing for EC2 Instances and AWS Fargate in exchange for a usage commitment (dollars/hour) over a set time period of 1 or 3 years.

    With this resource purchasing model now on the table, businesses are comparing Reserved Instances (RIs) vs AWS Savings Plans to find out which model offers the deeper discount and whether that makes sense for their global investment strategy. In this webinar, we cover the use cases for RIs, AWS Savings Plans, and Spot Instances, and how they impact your overall cloud cost optimization efforts.

    Join CloudCheckr’s Director of Product Marketing, Todd Bernhard for “How to Lower Your AWS Bill with RIs, AWS Savings Plans, and Spot Instances”. Understand how to use RIs vs AWS Savings Plans to lower our cloud bill, the percentage discounts you actually receive, and where Spot Instances fit into the picture.
  • Aruba's SD Branch and Real-World Benefits
    Aruba's SD Branch and Real-World Benefits
    Jeff Olson (Product Solutions Marketing - Aruba), Luke Pfaffinger, VP of Business Technology at PrimeGroup Recorded: Jan 16 2020 51 mins
    Join us, Jan. 16, 2020 at 10am Pacific as Luke Pfaffinger, Vice President of Business Technology at Prime Group, shares hares how his newly deployed Aruba SD Branch solution, managed by the Aruba Central cloud management platform, enables his business to:

    •Enjoy a 20X WAN performance improvement using SD-WAN versus MPLS
    •Slash branch deployment times by more than 50 percent
    •Resolve help desk issues up to 40 percent faster

    This webinar will also include an Aruba Central demo and eligible attendees could qualify for a complimentary access point and a 90-day trial of Aruba Central.
  • Deception Technology – Looking Forward to 2020
    Deception Technology – Looking Forward to 2020
    Carolyn Crandall, Chief Deception Officer & CMO and Joseph Salazar, TME at Attivo Networks Recorded: Jan 16 2020 58 mins
    Deception Technology was one of the most researched hot topics in 2019, only second to Zero Trust. Analysts have also increased their coverage and endorsement of cyber deception as a foundational threat detection solution for organizations of all sizes. Deception has materially changed in its capabilities as well as operational efficiency over the last decade. It is now a far cry from the original honeypot. Join this webinar for insight into what deception will look like in 2020 and what criteria to consider when selecting the right solution for you.

    Topics to include:
    • Evolution from honeypots
    • Coverage capabilities, both environmental and attack vector
    • Modifying attacker behavior during recon, lateral movement, and Active Directory queries
    • Value in threat intelligence programs
    • Automation and role in SOAR

    Deception users are typically tight-lipped about their use of the technology, often driven by its application for catching insider threats and legal requirements to avoid tipping off attackers. Attivo Networks is 2-years running as a top 100 fastest growing tech company on the Deloitte Fast 500, demonstrating its impact in derailing threats early and the for being a force multiplier to current security defenses.

    Sign up now to learn what this technology can do for you to reduce risk and attacker dwell time significantly.
  • Data Center and Hybrid Cloud Security Best Practices
    Data Center and Hybrid Cloud Security Best Practices
    Alex Berger and Christer Swartz, with Host Karin Shopen Recorded: Jan 16 2020 62 mins
    The modern data center is complex. A variety of workload types - from mainframes to virtual machines, bare metal servers to containers, physical desktops to virtual desktops - are commingled across multiple data centers, branch locations, and public clouds. They are connected by a combination of physical and virtual networks, all managed by different teams within IT. And as the cliche goes, “complexity is the enemy of security”.

    In this webinar, our experts will:
    explore the reality of securing modern data centers and hybrid clouds
    discuss best practices for holistically and consistently securing physical, virtual and public cloud environments
    offer practical insights into use cases and scenarios that we’ve encountered from our years of guiding customers through their cloud transformation journeys.
  • Delight your DevOps teams by accelerating change
    Delight your DevOps teams by accelerating change
    Eric Ledyard, Sr. Technical Product Marketing Manager at ServiceNow, and Tameem Hourani, Principal at RapDev Recorded: Jan 16 2020 56 mins
    Change has always been a constant. But the pace of change is accelerating dramatically. For today’s DevOps teams, the challenge is to deliver innovation at the pace the enterprise needs without compromising quality and reliability.

    Join ServiceNow expert, Eric Ledyard, Sr. Technical Product Marketing Manager, and ServiceNow Partner, Tameem Hourani, from RapDev as they discuss how DevOps teams can reduce the internal friction that slows effective change management.

    Attendees will:
    - Learn how to tap into information already in their systems for the insight they need to speed up change while maintaining control, transparency, and integrity.
    - Learn more about the evolving best practices for speeding up change while meeting service and quality expectations.
    - Find out how development teams can collaborate more effectively with IT Operations to deliver quality solutions that adhere to enterprise policy and standards.
    - Get more information on the ServiceNow solutions available to address the challenge of accelerating change while ensuring discipline and transparency.
  • A Strategic Approach to IoT Security Best Practices and Standards
    A Strategic Approach to IoT Security Best Practices and Standards
    Brian Russell, Co-chair, CSA IoT Working Group & Gonda Lamberink, Global Senior Business Development Manager, UL Recorded: Jan 16 2020 50 mins
    The market for IoT products continues to expand, with increased quantities of devices being integrated into consumer and business networks.  These products are turning into always-on services that incorporate cloud connectivity and expose many points of interconnection.  Automation is beginning to take hold on top of this layer of pervasive connectivity and users are becoming ever more reliant on workflows enabled by these systems. Even as the reliance on IoT systems continues to increase, manufacturers are still not getting cybersecurity right.  There are still far too many instances where even basic security controls are not enforced in IoT products.  This is concerning especially given the adoption of safety-critical and health-critical devices being introduced onto the market, and growing risk of data breaches and related security compromises next to an increasing prevalence of botnets and large-scale automated, distributed attacks. 

    As the future unfolds, the ‘attack surface’ will only grow larger and the public will be put at increasing risk if strategic changes do not occur immediately.  To this extent, UL and the Cloud Security Alliance (CSA) have partnered to better understand the current state of IoT cybersecurity regulations, standards and best practices through primary research.  Our aim is to identify gaps in coverage that could lead to deployment of insecure IoT services and systems.  In this webinar, we will share the results of that research and discuss our strategic approach to fixing the current state of IoT security based on constant collaboration between industry stakeholders, government agencies and enterprise users.
  • Security Policy Automation for Your SDN Fabric with Tufin R19-3 GA
    Security Policy Automation for Your SDN Fabric with Tufin R19-3 GA
    Hadas Lahav, Roi Alon Product Management & Sigalit Kaidar, Product Marketing, Tufin Recorded: Jan 16 2020 46 mins
    Enterprises are adopting SDN in order to align network operations and network security with the needs of the business. As networks become too complex to manage securely and effectively, many of them seek a central solution that offers visibility, compliance and automation within the SDN fabric and beyond – across the hybrid network.

    Tufin provides superior visibility and automation for the leading SDN platforms, and Tufin Orchestration Suite R19-3 GA complements essential capabilities. Join the webinar to learn about the highlights of this release, including:
    •Complete support for VMware NSX-T to ease the adoption and migration from NSX-V
    •Superior visibility and path analysis for Cisco ACI – within and beyond the fabric
    •Enhancements to zero-touch automation across vendors and platforms
  • Cloud-Managed IT for Education
    Cloud-Managed IT for Education
    Imran Idrees | Product Marketing Manager | Cisco Meraki Recorded: Jan 16 2020 63 mins
    Join us for a webinar to learn how Meraki is redefining education by providing IT teams with the networking infrastructure they need to support students and teachers in a constantly evolving classroom environment. Eligible attendees receive a free wireless access point!
  • What SD-WAN Vendors Won’t Tell You About SD-WAN
    What SD-WAN Vendors Won’t Tell You About SD-WAN
    Steve Garson is the president and founder of SD-WAN Experts. Recorded: Jan 16 2020 36 mins
    Cut WAN costs, improve performance, increase security — SD-WAN seems to do everything right, but is it too perfect? Find out as we take a hard look at the myths and realities of SD-WAN.

    In our next webinar, long-time WAN consultant, Steve Garson, president of SD-WAN Experts, speaks with Dave Greenfield, Cato’s secure networking evangelist, about the truth and fiction of SD-WAN.

    Join us for a free-wheeling, no holds barred conversation into SD-WAN’s dirty little secrets including:

    Why SD-WAN won’t improve your network performance
    Why reducing WAN costs isn’t a realistic goal for most SD-WAN deployment — and why that shouldn’t matter
    When you need a provider to run your SD-WAN service.
    What SD-WAN vendors mean when they say “security,” and why that’s still not enough security for your organization
  • How to become a CISO and not go insane under the pressure
    How to become a CISO and not go insane under the pressure
    Jane Frankland (CISO Advisor), Daniel Wahlen (Indeed), Andrey Evdokimov (Kaspersky) Recorded: Jan 16 2020 62 mins
    Most IT security leaders (70%) say that an emphasis on risk management has been a key change to their role, followed by the belief that business acumen now matters more than depth of technical expertise. This means that CISOs need to develop new skills, while keeping up with complex IT architecture and a growing threat landscape.

    Kaspersky brings together cybersecurity and HR professionals to discuss what expertise is required for modern CISOs and those who would like to enter this industry, as well as the main HR challenges and further career paths.

    The panelists will include Jane Frankland (CISO Advisor, Author, Keynote Speaker), Daniel Wahlen (Senior Evangelist & Senior Marketing Manager, Indeed), Andrey Evdokimov (Head of Information Security, Kaspersky). The panel discussion will be moderated by Alena Reva (Head of Human Resources, Kaspersky North America & Europe).
  • Zero-Touch Network Security Automation
    Zero-Touch Network Security Automation
    Dania Ben Peretz, Product Manager (AlgoSec) Jan 19 2020 3:00 pm UTC 35 mins
    Complex networks take significant resources to get projects from A to B. There’s a lot of hands-on, manual effort required to manage networks and keep them secure. Network management is demandingly ‘high-touch.’

    There is a better way. ‘Zero-touch’ solutions can accelerate change requests, with request generation to implementation taking just minutes. But, preparing for zero-touch network automation isn’t a zero-touch process. Preparation is needed, especially if you have a complex hybrid network: on-premise, in the cloud, and/or using an SDN.

    In this webinar, Dania Ben Peretz, AlgoSec Product Manager, will reveal technical tips and tricks and the steps needed to get zero-touch network automation up and running.

    Learn how to:
    • Get a comprehensive view of your network
    • Automate each step in the change process
    o Discover which security devices are in the path and blocking traffic
    o Define the allowed connectivity between zones
    o Plan changes, naming conventions, and change policies
    o Push changes to devices
    o Validate changes and detect out-of-band changes
    • Accelerate application changes and have application owners and IT managers speak the same language
  • Ransomware insights in 2019: What we learned and how to foresee threats coming
    Ransomware insights in 2019: What we learned and how to foresee threats coming
    Fedor Sinitsyn and Orkhan Mamedov, Kaspersky Advanced Threats Research and Detection Team Jan 19 2020 8:45 pm UTC 58 mins
    Ransomware, or malicious cryptors, are among the most active types of malware in 2019: This year, they’ve been paralyzing the infrastructure of cities, commercial and public entities. Fedor Sinitsyn and Orkhan Mamedov, Kaspersky Advanced Threats Research and Detection Team will summarize their experience and share insights on what we learned this year, and what is coming up on the threat landscape.

    The following topics will be covered during the webinar:
    - Overview of active ransomware families and groups in 2019
    - The main vectors of cryptor distribution
    - Detailed analysis of the most popular and advanced cryptor families
    - Targeted attacks on organizations
    - Use of legitimate software by cryptors
    - How to avoid becoming a victim (using products to protect an organization's infrastructure)
    - What to do if an organization becomes a victim of a cryptor
  • Data Protector zum Wochenstart: Best Practices & Empfehlungen – DP Upgrades
    Data Protector zum Wochenstart: Best Practices & Empfehlungen – DP Upgrades
    Sprecher ist ein Technical Consultant mit Spezialisierung auf Data Protection Jan 20 2020 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    Je nach Thema dauern die Webinare zwischen 60 und 90 Minuten.
  • Hybrid Multi-Cloud Infrastructure for Modern App Delivery
    Hybrid Multi-Cloud Infrastructure for Modern App Delivery
    Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product Marke Jan 20 2020 1:00 pm UTC 57 mins
    T transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business.

    We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
  • Mindhunter: Mein zweiwöchiges Gespräch mit einer Ransomware-Zelle
    Mindhunter: Mein zweiwöchiges Gespräch mit einer Ransomware-Zelle
    Fabian Freundt, Sr. Sales Engineer, ALPS, SonicWall Jan 21 2020 8:30 am UTC 60 mins
    Lassen Sie sich vom SonicWall Security Experten Fabian Freundt einen Einblick in die menschliche Seite einer modernen Ransomware-Zelle vermitteln. Sie erhalten Ratschläge, wie Sie Hacker vom Eindringen in Ihre Organisation, von der Verschlüsselung Ihrer Endpunkte und von der Verbreitung auf andere Laufwerke und Segmente Ihres Netzwerks abhalten können.
  • Cyberthreats on META horizon: Top Threats of 2019 and Predictions for 2020
    Cyberthreats on META horizon: Top Threats of 2019 and Predictions for 2020
    Kaspersky's Dr. Amin Hasbini, Head of Global Research & Analysis Team for META and Maher Yamout, Senior Security Researcher Jan 21 2020 10:00 am UTC 54 mins
    During the webinar Dr. Amin Hasbini, Head of Global Research & Analysis Team for META at Kaspersky, and Maher Yamout, Senior Security Researcher at kaspersky, will talk about the evolving threat landscape in the Middle East, Turkey and Africa. The webinar will explore some of the key trends in terms of tools, techniques and processes likely to be used by such groups against government organizations, enterprises, critical infrastructure, society at large, and more – and consider what that means for organizations, the security community and international cyberspace. In addition to that, the web meeting will be focused on the outlook for the 2020 and new challenges that cybersecurity industry will possibly face on the edge of a new decade.

    Speakers:

    Dr. Amin Hasbini
    Head of Global Research & Analysis Team for META, Kaspersky

    Maher Yamout
    Senior Security Researcher, Kaspersky
  • Enterprise Information Archiving
    Enterprise Information Archiving
    Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving Specialist Jan 21 2020 10:00 am UTC 48 mins
    Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what is the best way for you to develop and implement a new secure approach to your data archiving challenges?

    Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations
    - Improve visibility into your archived data
  • 10 Años - El Estado de la Seguridad del Software
    10 Años - El Estado de la Seguridad del Software
    Antonio Reche, Solution Architect at Veracode Jan 21 2020 10:00 am UTC 45 mins
    Durante diez años, Veracode ha estado siguiendo el estado de la seguridad del software. En nuestro estudio en el décimo aniversario, confirmamos que los equipos están haciendo especial énfasis en la reducción de la deuda de seguridad. Este seminario web analiza algunos de los desafíos más comunes que afrontan los desarrolladores, y ofrece razones reales para el optimismo. Comenzamos Veracode con la misión de asegurar el software del mundo. Hoy, esa misión permanece, con el enfoque adicional de permitirle crear, innovar y "cambiar el mundo" con software, sin ser frenado por preocupaciones de seguridad.

    En este seminario web:
    - Conozca la realidad de seguridad que enfrentan los responsables de aplicaciones: la mayoría de las aplicaciones no cumplen con los estándares de la industria
    - Vea qué lenguajes son los peores infractores de seguridad
    - Observe qué fallos son las más frecuentes, con qué frecuencia se corrigen, cómo se explotan y qué categorías conducen a la mayor cantidad de incidentes.
    - Comprenda cómo los equipos pueden alcanzar una reducción de 5 veces en la deuda de seguridad
    - Obtenga información sobre cómo los desarrolladores pueden reducir el "tiempo medio de remediación" (MTTR) en más del 70%
  • Introduction to Cloud-Managed Wireless
    Introduction to Cloud-Managed Wireless
    Cisco Meraki Team Jan 21 2020 10:00 am UTC 46 mins
    Organisations with limited IT resources, yet with an enterprise’s needs - scalability, security, and reliability - often struggle to deliver a robust wireless experience. In this live webinar, we will show how cloud computing brings simplicity and effectiveness to wireless networks.
  • STORAGE LIMITATION under GDPR: Overcoming compliance challenges in 2020
    STORAGE LIMITATION under GDPR: Overcoming compliance challenges in 2020
    Virgilio Cervantes, Data Protection Compliance Manager, Countrywide PLC Jan 21 2020 1:00 pm UTC 45 mins
    The GDPR principle of storage limitation determines that personal data must be erased (or anonymised) when 'no longer necessary'.

    As such, data controllers must embed appropriate technical and organisational measures into operations, to allow for the periodical review of personal data and to the erasure (or anonymisation) of any 'non-necessary' data, thus achieving compliance with GDPR's data storage requirements.

    An overview on the impact of the 'storage limitation' principle on organisations' operations will be undertaken, considering:

    - Storage limitation (structured, unstructured data);
    - Data minimisation (data collection, data hygiene);
    - Time limitation (retention policies, procedures and time schedules);
    - Risks of non-compliance (Data subject rights, data breaches).

    This session will thus provide a holistic and pragmatic framework-based approach to storage limitation and its ongoing compliance.


    Presenter:
    Virgilio Lobato Cervantes holds an LLB Honours degree in Law and a Master of Arts degree in International Tourism and Aviation Management. He is a certified Data Protection Officer by the University of Maastricht (ECPC-B DPO). Currently pursues a Doctorate degree in law at the University of Reading. Virgilio’s research focus is in EU data protection and privacy law.

    England and Wales Qualified Paralegal Lawyer, member of the Professional Paralegal Register (PPR Tier 3) and the Institute of Paralegals (Q.Inst.Pa.), specialised in Data Protection and Privacy Law, Virgilio presently takes on the role of Data Protection Compliance Manager at Countrywide PLC, the UK’s largest property services group.
  • Stories from the Front Line of Threat Hunting
    Stories from the Front Line of Threat Hunting
    Zeki Turedi, Technology Strategist EMEA, CrowdStrike, Brandon Dunlap, Moderator, (ISC)² Jan 21 2020 1:00 pm UTC 60 mins
    CrowdStrike’s 2019 Falcon OverWatch Mid-Year Report provides unique insights into the targeted, state-sponsored and criminal campaigns the CrowdStrike team has encountered in the first half of 2019.

    Join this webcast and hear CrowdStrike Technology Strategist, Zeki Turedi provide detailed accounts of real-world incidents the CrowdStrike team have observed, including the trends, adversaries and techniques that were most prominent in the last 12 months. You will also gain valuable information on the industries and regions most impacted by cyberattacks.

    Learning Outcomes:
    -Why “speed” is the new critical metric in cybersecurity.
    -How organisations are using the MITRE ATT&CK framework to shorten the time to investigate and understand threats.
    -Trends in adversary tradecraft, as seen across 1000s of real-world intrusion attempts.
    -Action plans that you can use to ensure your organisation is ready to anticipate and defend against the most dangerous threats of tomorrow.
  • Key Considerations for SaaS Security and Performance
    Key Considerations for SaaS Security and Performance
    Akhilesh Dhawan, Matt Brooks, Robin Manke-Cassidy, & Wesley Shepherd Jan 21 2020 2:00 pm UTC 70 mins
    Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT operating costs. However, it can also create IT security and app performance headaches.
    Join us as two Citrix experts in the fields of networking and IT provide industry perspective and their experiences on:
    -How hackers use different techniques to exploit weaknesses in your SaaS, web, and other applications
    -How Citrix can reduce SaaS and web security threats with an integrated solution
    -Key factors that influence SaaS and web app performance
    -How Citrix can improve application performance for more than 4,000 SaaS apps, including O365
    -Why a Citrix-differentiated security approach with a people-centric focus extends the digital perimeter
  • Digitale Identität und Connected Cars - Die Power von IAM richtig eingesetzt
    Digitale Identität und Connected Cars - Die Power von IAM richtig eingesetzt
    Dr. Heiko Klarl, CMO, iC Consult Group and Gerhard Zehethofer, Vice President IOT, ForgeRock Jan 21 2020 3:00 pm UTC 39 mins
    Fahrzeuge werden zunehmend intelligenter und vernetzter. Um das Kundenerlebnis bestmöglich zu personalisieren und zu sichern, baut ihre Technologie auf digitale Identität. Für den Fuhrpark-Manager, den Versicherer, den Verbraucher und alle anderen Akteure im Connected Car Ökosystem ist es wichtig zu wissen, "wer" auf "was" zugreifen kann.

    In dem gemeinsamen Webinar von iC Consult und ForgeRock erfahren Sie, wie Sie:
    - Ihre Connected Identity-Strategie aufbauen können.
    - Synergien mit anderen Geschäftsbereichen schaffen können.
    - Beim Rollout von vernetzten Diensten als auch bei der Erforschung neuer Geschäftsmodelle die Geschwindigkeit erhöhen und die Time-to-Market verkürzen können.

    Webinare / Webcasts
    Mit Ihrer Registrierung erklären Sie sich damit einverstanden, dass wir Ihre Daten an den Sponsor dieses Webinars weitergeben, damit dieser Sie kontaktieren und Follow-up-Marketing betreiben kann. Die Rechtsgrundlage für die Verarbeitung Ihrer personenbezogenen Daten auf diese Weise ist unser berechtigtes Interesse gemäß Art. 6 (1) (f) DSGVO, das wäre die Teilnahme unserer Sponsoren, die einen großen Teil der Kosten für die Webinare / Webcasts übernehmen.
  • Delivering AI at Enterprise Scale
    Delivering AI at Enterprise Scale
    Dan Jeavons, General Manager of Data Science (Shell) Jan 21 2020 3:00 pm UTC 25 mins
    Shell has been an early adopter of artificial intelligence (AI), as it attempts to speed up its digital transformation. From machine learning to computer vision, deep learning to virtual assistants and autonomous vehicles to robotics, Shell has been focused on a range of technologies that have supported advances in AI.

    Dan Jeavons joins us to detail Shell’s journey to data analytics excellence, focusing on the deployment of self-service analytics both for the data science teams who look to deploy mission-critical models for real-time use and for the longer-term strategy of filling the “data science skills gap.” Dan Jeavons is the General Manager of Shell’s Data Science CoE within the company’s central Digital Technology organisation. He is currently part of a leadership team tasked with leading Shell’s digital transformation.
  • Webinar - Building IoT security: cloud connected does not mean less protected
    Webinar - Building IoT security: cloud connected does not mean less protected
    James Penney - Chief Technology Officer, Device Authority and Juan Asenjo - Dir. Marketing, nCipher Security Jan 21 2020 3:00 pm UTC 60 mins
    The Internet of Things (IoT) presents a business opportunity across almost every industry. But to be successful, IoT security must become a primary focus. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the legal and safety consequences of compromised security.

    It’s one thing to connect an IoT device, but how do you manage the security lifecycle of thousands, possibly millions of devices? Often devices are in the field for 5-10 years. The management of these devices can become a resource headache with high costs if dealt with manually. Not to mention the risk of human error.

    Today there are various IoT platforms available to connect your devices, applications and data to in order to gain valuable insights. Microsoft Azure IoT is a popular choice and will be a focus point for the discussion.

    Join this webinar to:

    • Learn about at recent IoT breaches
    • Discover key aspects of managing IoT security operations and applying IoT lifecycle management
    • Explore best practice for building an IoT root of trust using Microsoft Azure
    • Find out about HSM as a Service and its key benefits
    • Learn about real IoT use cases: How to overcome/mitigate security risks in a cost-effective way
  • Essentials of a Successful Digital Integration Strategy
    Essentials of a Successful Digital Integration Strategy
    Aravind Ajad Yarra, Wipro Fellow and Danesh Hussain Zaki, Senior Member - Distinguished Member of Technical Staff, Wipro Jan 21 2020 3:30 pm UTC 60 mins
    Join this exclusive session by the editors of the State of Digital Integration 2019 report, to hear the key takeaways from the report and crack your enterprise integration puzzle.

    ‘State of Digital Integration’ is a global research and thought leadership report by Wipro to guide enterprises in crafting their integration strategy and amplify the outcomes of their Digital Transformation initiatives.
  • PCI 4.0 So What? How to Centre your PCI Programme Around your Business Objective
    PCI 4.0 So What? How to Centre your PCI Programme Around your Business Objective
    Craig Moores, Risk Advisory Practice Director Jan 21 2020 4:00 pm UTC 60 mins
    SureCloud will explore the challenges that organisations face when achieving and maintaining compliance with PCI DSS, with a particular focus on how organisations can design and deploy a programme that aligns with wider business objectives and embeds compliance activities into business operations.

    With headlines focusing on the evolution of PCI DSS 4.0, our session will target all levels of stakeholder involvement in the management of PCI compliance. Using our experience of delivering compliance applications, as an Approved Scanning Vendor, a penetration testing provider and critically from the experience of our ex-QSAs, we will share some of the shortfall’s that organisations have experienced, particularly focusing on the people, process and technologies critical in protecting an organisations’ payment channels.

    Craig is responsible for SureCloud’s Risk Advisory Practice including engagement scoping, consultancy delivery and client relationships. Craig has experience in leading and delivering complex cyber security solutions aligned to strategic business objectives. Craig has broad cyber security experience including a strong technical, software development and project management background, with particular strengths in the areas of information risk management, PCI DSS, strategic planning and business auditing.


    (The session will be structured around our case study organisation, Bananas to help bring this use case to life.)

    Key session takeaways:
    •Understand some of the business challenges that organisations face when implementing and maintaining a PCI compliance programme.
    •Gain real-world insight into the compliance management shortfalls and lessons learned by other organisations.
    •Reflect on how the next release of the PCI DSS 4.0 provides an opportunity for organisations.
    •Learn how to gain visibility of compliance using metrics and automation.
  • A Practical Approach to  FFIEC, GDPR & CCPA Compliance
    A Practical Approach to FFIEC, GDPR & CCPA Compliance
    Ulf Mattsson, Head of Innovation, TokenEx Jan 21 2020 4:00 pm UTC 60 mins
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.

    This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.

    Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.
  • Be Everywhere: How to Leverage Speaking Gigs to Grow Your Business
    Be Everywhere: How to Leverage Speaking Gigs to Grow Your Business
    Beck Power Jan 21 2020 5:00 pm UTC 60 mins
    Ready to grow your impact, influence and income through speaking? In this webinar, Beck will show you how to be more prolific with your speaking outreach - so you can "be everywhere" your clients are.

    There are three sections we'll cover
    1. Strategy: Who you want to get in front of, how you'll do it and what will happen as a result
    2. Application: Actually doing the outreach and doing the gigs
    3. Leveraging the gigs into content, clients, and collaborations

    Bring your questions, and your speaking goals for 2020 - you don't want to miss this.

    You'll learn:

    · Being prolific with applications and using tools like Innovation Women to secure gigs
    · Email outreach strategies and tools to help keep you from being overwhelmed
    · The art of leverage - importance of lead tracking and making money from speaking gigs
  • Best Practices for DevSecOps at Scale
    Best Practices for DevSecOps at Scale
    Andrew van der Stock, Senior Principal Consultant, Managed Services SIG Consulting​, Synopsys Jan 21 2020 6:00 pm UTC 60 mins
    Today’s security professionals and software developers not only have to do more in less time; they have to do it securely. This means mitigating risk and addressing compliance requirements in an environment where:
    - The threat landscape continues to evolve.
    - Application portfolios and their risk profiles continue to shift.
    - Security tools are difficult to deploy, configure, and integrate into workflows.
    - Consumption models continue to change.
    How can your internal resources keep pace in this dynamic environment? Managed application security testing can be just the relief valve your organization needs. In this webinar, we’ll discuss the need for managed application security testing, the sweet spots where it offers maximum value, what you should look for in a managed application security testing provider, and highlights from Synopsys’ Managed Services offering.
  • Data Privacy in 2020: Data Management for a Multi-Regulation Environment
    Data Privacy in 2020: Data Management for a Multi-Regulation Environment
    Jill Reber, CEO & Chair | Kina Ratanjee, Delivery Director, Primitive Logic Jan 21 2020 6:00 pm UTC 45 mins
    When GDPR first arrived, some companies addressed it by implementing data privacy measures solely for their EU data subjects — only to have to go through the same exercise for California residents when CCPA came along. With major data privacy laws now in effect on both sides of the Atlantic and more on the way (possibly including U.S. federal legislation), organizations must adopt a holistic approach to managing personal data in an ethical, compliant manner.

    Join the data privacy experts from Primitive Logic to explore data management strategies for achieving and maintaining readiness for CCPA, GDPR, and other current and future privacy regulations.

    You will learn:

    - Why traditional master data management (MDM) can lay the groundwork for multi-regulation readiness, but won’t make you compliant on its own
    - How to address common threads in data privacy legislation while maintaining flexibility to adapt to future requirements
    - How to build a single source of truth for personal data as a cornerstone of your data privacy strategy
    - Governance strategies for adapting to “triggers” in maintaining data privacy readiness
  • Balancing Data Privacy & Security in 2020
    Balancing Data Privacy & Security in 2020
    Dr. Christopher Pierson | Shahrokh Shahidzadeh | Michelle Drolet | George Wrenn Jan 21 2020 6:00 pm UTC 60 mins
    How has the compliance landscape changed in 2020? Is your organization aware of the main differences in data regulations around the world?

    Join this panel of industry leaders for an interactive Q&A roundtable to get a comprehensive look into the different data privacy and security requirements. The panel will also discuss what to expect in 2020 and beyond.

    Viewers will learn more about:
    - CCPA is now in effect and what this means for you
    - The main differences between GDPR and CCPA
    - Best tools, practices, required policies and cultural game changers for commercial and government environments
    - Other data regulations on the horizon
    - Recommendations for 2020

    Speakers:
    - Dr. Christopher Pierson, CEO & Founder, BLACKCLOAK
    - Shahrokh Shahidzadeh, CEO, Acceptto
    - Michelle Drolet, CEO, Towerwall
    - George Wrenn, CEO & Founder, CyberSaint Security

    This Q&A panel is part of Privacy Month.
  • Tackling the Container Iceberg: How to Approach Open Source Security
    Tackling the Container Iceberg: How to Approach Open Source Security
    Jeffrey Martin (Director of Product) and Dan Garfield (Chief Technology Evangelist at Codefresh) Jan 21 2020 6:00 pm UTC 60 mins
    Container images are based on many direct and indirect open source dependencies, which most developers are not aware of. What are the security implications of only seeing the tip of the iceberg? What are the challenges one faces when relying so heavily on open source? And how can teams overcome these?

    Join Codefresh and WhiteSource, as they embark on a journey to tackle:

    *The container iceberg - learn what are your blind spots
    *The main security challenges when using open source in containerized applications
    *The role of automation in open source security in containers
    *A live demo showing how WhiteSource & Codefresh can allow you to automate open source security in containers throughout the DevOps pipeline