Hi [[ session.user.profile.firstName ]]

IT Security

  • Cyber Security Brief: Financial institutions hack, VPN apps, and FB account remo
    Cyber Security Brief: Financial institutions hack, VPN apps, and FB account remo
    Cyber Security Brief Podcast Recorded: Mar 25 2019 22 mins
    Symantec threat researcher Stephen Doherty joins us to discuss our recently published research into a wave of attacks against financial institutions in West Africa. We also discuss some new research that found that many free mobile VPNs could actually compromise people’s privacy, a hitman who was convicted thanks to evidence found on his smartwatch, and an embarrassing compromise of the ATLAS MMO game. Also this week, Russia is back in the headlines again, with the DNC revealing it was targeted once again by a spear-phishing campaign originating in Russia in November last, while Facebook also removed a number of “inauthentic” accounts that it says were based in Russia and involved in spreading misinformation on the social media platform.
  • SEP Cloud Powerful, yet simple to use
    SEP Cloud Powerful, yet simple to use
    Symantec Recorded: Mar 25 2019 5 mins
    Delivered endpoint security services can provide powerful threat protection efficacy using the IT headcount already in place supporting your business. In this 5 minute video we will demonstrate the Symantec Endpoint Protection Cloud solution, and show how to get
    endpoint security up and running in as little as 5 minutes using the same powerful protection as large enterprises.
  • CISO of William’s Engineering Shares How They Solved O365 Security Challenges
    CISO of William’s Engineering Shares How They Solved O365 Security Challenges
    Graeme Hackland, Chief Informations Officer, Williams Group Recorded: Mar 22 2019 3 mins
    (2:28 Customer Testimonial Video)
    Learn how William’s Racing Group has secured email, data, and threat from account takeover in their Office 365 (O365) environment.
  • CISO of Natural Gas Distribution Company Discusses Security for Office 365
    CISO of Natural Gas Distribution Company Discusses Security for Office 365
    Mo Ahddoud, Chief Information Security Officer, SGN Recorded: Mar 22 2019 2 mins
    (1:47 Customer Testimonial Video)
    Hear how SGN secures their Office 365 instance with Symantec solutions for cloud visibility and control
  • Build Security In: Cloud Security at DevOps Speed
    Build Security In: Cloud Security at DevOps Speed
    Rick Collette, Cloud Architect at Palo Alto Networks; John Martinez, Director of Public Cloud R&D, Palo Alto Networks Recorded: Mar 22 2019 55 mins
    As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
    This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.
  • ISSA Thought Leadership Series: 10 Must-Have Features of a Modern SIEM
    ISSA Thought Leadership Series: 10 Must-Have Features of a Modern SIEM
    ISSA International Recorded: Mar 22 2019 57 mins
    With the return of innovation to the SIEM market, the definition of what comprises an effective solution has changed. Join Exabeam for an informative discussion on the ten essential features and capabilities for IT security decision makers to look for when evaluating potential candidates. Discussion points include:

    - Advanced processing and analytics
    - Automated threat detection and prioritization
    - Facilitated incident investigation and triage
    - Proactive (and reactive) threat hunting

    Moderator:
    Lucas Varela, CyberSecurity Architect, Caixabank

    Speakers:
    Orion Cassetto, Sr. Director Product Marketing, Exabeam
    Brian Engle, CISO, Managing Director CISO Advisory, CyberDefenses, Inc.
  • XDR - Neue Waffe im Kampf gegen Cyber-Angriffe
    XDR - Neue Waffe im Kampf gegen Cyber-Angriffe
    Chistian Doolmann, Systems Engieneer Specialist, Palo Alto Networks Recorded: Mar 22 2019 63 mins
    Cyber-Attacken erfolgen heutzutage häufig direkt über gezielt ausgewählte Endgeräte. Daher setzen viele Unternehmen auf EDR (Endpoint Detection and Response) als Lösung, um Cyberangriffe zu erkennen und darauf zu reagieren.

    Das Problem dabei: Die Sicht von EDR ist auf den jeweiligen Endpoint beschränkt, ergänzende Informationen fehlen und müssen mühsam und aufwändig ergänzt werden. Laut SANS Institute werden zudem nur 26% aller initialen Angriffsvektoren durch EDR-Lösungen erkannt.

    Eines wird dabei deutlich: Ein neuer Ansatz muss her! Und hier kommt XDR ins Spiel. Im Gegensatz zu EDR kombiniert es Daten aus verschiedenen Quellen wie zum Beispiel den Endpoints, dem Netz, der Cloud, Log-Daten mit allgemeinen Bedrohungsinformationen. Dadurch bringt es unterschiedliche Aspekte zusammen und liefert ein weitaus vollständigeres Bild eines Angriffs – der dank der integrierten Analysefunktionen schneller erkannt und besser abgeblockt werden kann.

    Wenn Sie erfahren wollen, wie Ihr Unternehmen dank XDR sicherer werden kann, dann sehen Sie sich dieses Webinar an.
  • The Digital Workforce Wants YOU: Consider a Career in Cybersecurity
    The Digital Workforce Wants YOU: Consider a Career in Cybersecurity
    Patrick G. Cohen, VP, Strategic Partnerships, NPower, Inc. Recorded: Mar 22 2019 30 mins
    According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers. Key influencers like teachers, parents, state and local officials are encouraged to join this webinar to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.
  • Cyber Security Brief: Japan to hack IoT devices, Facetime bug, and BEC scams
    Cyber Security Brief: Japan to hack IoT devices, Facetime bug, and BEC scams
    Cyber Security Brief Podcast Recorded: Mar 22 2019 25 mins
    We discuss authorities' pursuit of Webstresser users, Japan allowing officials to hack civilians’ IoT devices in an attempt to improve security, and the much-discussed Apple Facetime bug. We also chat about the Razy malware attempting to steal cryptocurrencies, an evolution of business email compromise (BEC) scams, and a bizarre sting operation targeting the Citizen Lab internet watchdog group.
  • Refuerce su seguridad con los firewalls virtuales de SonicWall
    Refuerce su seguridad con los firewalls virtuales de SonicWall
    Alex Vazquez Recorded: Mar 22 2019 36 mins
    Con el incesante aumento de la adopción de la nube, las prestaciones de firewall de próxima generación resultan esenciales para proteger las cargas de trabajo en la nube contra las amenazas avanzadas mediante funciones automatizadas de detección y protección en tiempo real.

    Participe en este seminario virtual interactivo, en el que los expertos de SonicWall le explicarán cómo la serie de firewalls SonicWall Network Security virtual (NSv) puede ayudarle a reforzar la seguridad de sus entornos híbridos y multinube. Obtendrá información sobre:

    •Las principales tendencias y amenazas de la industria
    •Cómo NSv es capaz de proteger de forma efectiva todos los componentes críticos de sus entornos de nube pública o privada
    •Cómo garantizar la protección contra la propagación lateral de las amenazas y una seguridad coherente
    •Cómo detener las amenazas avanzadas
    •Además, podrá ver una demostración en directo
  • Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group
    Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group
    Jessica Gulick, CEO, Katzcy, MBA | PMP | CISSP Recorded: Mar 21 2019 55 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Merissa Villalobos & Kristin Parke from NCC Group
  • Small Business, Big Cyber Risk
    Small Business, Big Cyber Risk
    Mike Ward, Co-founder and CEO of Turtle Creek Concepts Recorded: Mar 21 2019 45 mins
    Small businesses are the low-hanging fruit of the cybercrime world. Operating a small business is tough work and requires the small business owner to be skilled in many areas of business, finance, tech, customer service, sales, fulfillment, and so on. Cybersecurity is only a part of what SMB owners needs to know about in order to successfully run their business. However, the cybersecurity portion is often overlooked. As hackers and attackers are looking for people to scam and steal from, they look for the easiest targets first.

    In this webinar, audiences will learn more about:
    - The risks and real costs of ignoring your data security
    - How it can cause you to go out of business
    - Simple steps to take immediately to help improve your security

    Be sure that you have a good grip on understanding what you need to do when it comes to protecting your small business from these threats.

    And as an added bonus, you'll receive some valuable resources that you'll be able to use in the future as you discover, plan, and implement new security strategies in your own small business. Be #SmallBizCyber smart about your small business!
  • Accelerating Enhanced Threat Identification and Incident Investigation
    Accelerating Enhanced Threat Identification and Incident Investigation
    David Monahan, Enterprise Management Associates; Stephen Hinck, Gigamon Insight, Steve Porcello, Gigamon Insigh Recorded: Mar 21 2019 60 mins
    Only 28 percent of organizations have alerting systems with enough context to provide highly accurate incident classification, thus requiring manual verification and reclassification of 95 percent of most organizations’ incidents. In addition, 48 percent of organizations had a security incident that caused moderate to severe business impact. Delays in identifying threats and the lack of information that extends the length of incident investigations cause real business problems.

    Enterprise Management Associates (EMA) released its 2019 “Top 3 Decision-Makers’ Guide to Security Analytics.” In this webinar David Monahan, Managing Research Director for Security and Risk Management at EMA, Stephen Hinck, Product Manager for Gigamon Insight, and Steve Porcello, Sales Engineer for Gigamon Insight, will discuss the key use cases “Identifying Advanced Threats” and “Enhancing Incident Investigations,” and will also demonstrate how security teams can obtain greater context for decision-making in order to solve these real-world problems faster using Gigamon Insight.

    Join leading IT analyst firm Enterprise Management Associates (EMA) and Gigamon to learn more about:
    •The methodology behind the report
    •What to watch for in selecting a security analytics solution
    •How to identify threats faster, thus reducing dwell time
    •How threat actors exploit Internet presence within the context of business and security management tools, issues, and practices
    •How access to a broad array of network data reduces the attack surface
  • MITRE ATT&CK™ Framework & The Nature of Intent
    MITRE ATT&CK™ Framework & The Nature of Intent
    Gary Gagnon, CSO MITRE; David Wolpoff, Co-Founder, Randori; Keith Mccammon, CSO, Red Canary Recorded: Mar 21 2019 60 mins
    The MITRE ATT&CK framework is the most comprehensive knowledge base for adversary tactics and techniques, but how does the nature of adversarial intent fit into the matrix?

    Join Gary Gagnon, CSO of MITRE, and industry experts for a panel discussion on MITRE ATT&CK and how organizations are correctly and incorrectly applying it in cybersecurity today.
  • Balancing Prevention, Detection & Response: Your Guide to Success
    Balancing Prevention, Detection & Response: Your Guide to Success
    Alan Foster, Senior Solutions Engineer & Justin Buchanan, Senior Solutions Manager Recorded: Mar 21 2019 45 mins
    Security teams today understand the need to invest across threat prevention, detection, and incident response. But with strained teams, siloed technologies, and ever-looming compliance audits, where do you start?

    Join us for a special session with Justin and Alan, who will share prioritization guidance from working with hundreds of security teams, as well as key findings from an all-new Rapid7 Threat Report. We’ll cover:

    1. How teams are bringing automation to their vulnerability management program
    2. How to prioritize prevention across your modern network, from remote workers to cloud environments
    3. Top alerts & attacker trends, based on findings from Rapid7’s 24/7 Managed Detection and Response service
    4. Using the MITRE ATT&CK framework to assess your current detection capabilities
  • Can ILOVEYOU Still Infect You?
    Can ILOVEYOU Still Infect You?
    Rene Kolga, Sr. Director of Product and Robert Zamani, Director, Solutions Architect, Nyotron Recorded: Mar 21 2019 49 mins
    Most security solution buyers assume they’re protected against known malware. Numbers like 99.9% are common in vendors’ marketing materials. Hence, efficacy conversations tend to focus instead on the solution’s performance against the unknown, zero-day threats. However, with between half a million and one million new pieces of commodity malware created every day, how are antivirus solutions keeping up? Where is this database of signatures, hashes, reputation and behavior stored for over a billion of known pieces of malware? Is the 99.9% number an illusion or reality?

    In this webinar we will leverage a study of three leading antivirus products against 60,000 pieces of known new and old malware. The results will surprise you...

    Does the ILOVEYOU virus from the year 2000 still pose a threat? You’ll have to join this webinar to find out.
  • Cloud Native Security: What’s Missing?
    Cloud Native Security: What’s Missing?
    Speaker: Tim Prendergast, Chief Cloud Officer at Palo Alto Networks Recorded: Mar 21 2019 43 mins
    As organizations adopt public cloud to accelerate development and reduce reliance on traditional datacenters, risk management remains a top concern. It’s well understood that legacy security tools designed for the datacenter cannot adapt to the distributed, dynamic nature of cloud environments, but what about the security tools offered by the cloud providers? Can they offer the visibility and control needed to effectively manage risk and mitigate vulnerabilities? We take a deep dive into native cloud security to see how these tools work and uncover if they can effectively support the differing security requirements across SecOps, DevOps, and compliance teams.
  • How to Protect Your Business Critical Operations in AWS
    How to Protect Your Business Critical Operations in AWS
    Deena Thomchick, Sr. Director, Cloud Security, Symantec Recorded: Mar 21 2019 52 mins
    When Securing AWS the Top 5 Things to Consider

    Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.

    As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.

    Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:

    - Monitor activity and security configurations
    - Control access and prevent risky changes or privileged misuse
    - Detect malicious insiders and compromised accounts
    - Keep S3 buckets private and secure confidential data with DLP
    - Defend S3 buckets from advanced malware threats
  • Overcoming Cyberthreats to Critical Infrastructure with IT/OT Cybersecurity
    Overcoming Cyberthreats to Critical Infrastructure with IT/OT Cybersecurity
    Thomas Nuth, Sr. Director of Marketing, OT at Forescout Recorded: Mar 21 2019 49 mins
    Many organizations reliant on critical infrastructure networks are striving to reduce risk with cybersecurity strategies that bridge both IT and OT asset domains. However, achieving comprehensive IT/OT cybersecurity is often a more challenging task in practice than it is conceptually.

    Security professionals interested in effectively executing an integrated IT/OT cybersecurity strategy should join this webinar to learn how they can achieve end-to-end visibility into the full spectrum of both IT and OT network devices, as well as unified business risk management for today’s continuously evolving cyberthreat landscape. During this webinar, we will dive into four foundational elements of a comprehensive IT/OT cybersecurity strategy, including asset visibility, asset management, risk & compliance and investigation & response, with use cases of each.
  • [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, Lynx TP; David McNeely, Centrify Recorded: Mar 21 2019 79 mins
    In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.

    Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

    - Getting a clear picture of the current health of your organizations' defenses
    - Defining your security road map using NIST CSF as a framework
    - Conducting gap analysis and executing remediation actions
    - Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
  • Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. Dunlap Recorded: Mar 21 2019 60 mins
    Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
  • Close the gap in your ransomware defense
    Close the gap in your ransomware defense
    Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro Focus Recorded: Mar 21 2019 32 mins
    Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.

    Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.

    Join this webinar to learn about:

    • Ransomware challenges and impact
    • Why malware detection alone is not enough
    • How to close the gap with holistic endpoint data and device management
  • Protecting Critical IP
    Protecting Critical IP
    Jeremy Wittkop & Cosmo Romero Recorded: Mar 21 2019 40 mins
    At the core of every organization’s success are intellectual property assets. During today's webinar Protecting Critical IP webinar InteliSecure’s CTO Jeremy Wittkop and Forcepoint's Channel Sales Engineer Cosmo Romero will talk about he importance of intellectual property protection and how you can protect intellectual property using both process and technology.
  • Webinar: Das Reifegradmodell für die Verwaltung von Sicherheitsrichtlinien
    Webinar: Das Reifegradmodell für die Verwaltung von Sicherheitsrichtlinien
    Marco Miska, Technical Account Manager EMEA Mar 26 2019 9:00 am UTC 60 mins
    Ihre Teams haben Schwierigkeiten, mit der Häufigkeit von Netzwerksicherheitsanfragen Schritt zu halten, während sie gleichzeitig versuchen die Agilitätsinitiativen Ihres Unternehmens zu unterstützen und die Sicherheit zu wahren.

    Sie kennen die Vorteile der Automatisierung, fragen sich aber wahrscheinlich: "Wo fangen wir an?"

    Besuchen Sie die Experten von Tufin am 26. März um 10.00 Uhr, um nützliche Tipps für den Einstieg in die Zero-Touch-Automatisierung zu erhalten:

    • Warum aktuelle Ansätze nicht funktionieren
    • Wie können begrenzte Ressourcenherausforderungen überwunden werden?
    • Die Schritte, die Sie unternehmen müssen, um das ultimative Ziel zu erreichen: Zero-Touch-Automatisierung
  • Anleitung zum Kampf gegen bösartige Bots
    Anleitung zum Kampf gegen bösartige Bots
    Frank Thias - Principal Systems Engineer, F5 Networks Mar 26 2019 9:00 am UTC 62 mins
    Das Erkennen von bösartigen Bots und der Schutz vor ihnen hat für Unternehmen, die eine nachhaltige Sicherheitsstrategie entwickeln, höchste Priorität. Nehmen Sie an diesem Webinar teil, um zu erfahren:

    • Wie Bots Anwendungen infizieren, verbreiten und angreifen
    • Welche Arten von Anwendungsangriffen häufig von Bots ausgeführt werden.
    • Wie Sie sich gegen schlechte Bots verteidigen können, ohne die guten zu stören.

    Durch Ihre Teilnahme an diesem Webinar werden Ihre persönlichen Daten an F5 weitergegeben und in Übereinstimmung mit den F5-Datenschutzrichtlinien behandelt (https://f5.com/about-us/policies/privacy-policy). Zudem stimmen Sie zu, dass wir Sie zukünftig auch über F5-Produkte und -Dienstleistungen informieren dürfen. Sie können dies natürlich jederzeit widerrufen.
  • Trust in Action: A Discussion with Kevin Fielder, CISO, Just Eat
    Trust in Action: A Discussion with Kevin Fielder, CISO, Just Eat
    Kevin Fielder, CISO, Just Eat, Justin Shaw-Gray, Sales Director, Synack Mar 26 2019 9:00 am UTC 60 mins
    Consumers are upping the ante for CISOs in 2019! >19% of consumers reported that they would not feel comfortable shopping at a store that has been breached or using an online service and 50% of consumers claim that security was a priority when choosing a bank. From eCommerce to Financial Services: trust is top of mind for consumers, and trust is becoming a core part of the CISO charter.

    Join Synack's Justin Shaw-Gray as he interviews Kevin Fielder, CISO, Just Eat
    They'll discuss:

    - The security challenges CISOs face in eCommerce and how they are integrating crowdsourced security into their day-to-day operations to build trust with the board and with customers.
    - What security’s role is in building a trusted business
    - How to plug security into DevOps
    - And Kevin's perspective on which security programs are actually worthwhile and where innovation is needed. What works? What doesn’t?

    You won’t want to miss this lively discussion
  • How to Automate Security and Compliance for DevOps
    How to Automate Security and Compliance for DevOps
    Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWS Mar 26 2019 9:00 am UTC 47 mins
    There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.

    Join Raj Patel, Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram, Partner Solutions Architect, AWS to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.

    In this webinar we'll discuss:
    -How DevOps and InfoSec teams can align to the new DevSecOps paradigm
    -Why continuous compliance management is a new business imperative
    -How to build security in to your Continuous Integration/Continuous Development pipeline
  • The role of  SIEM: Combating todays cybersecurity risks
    The role of SIEM: Combating todays cybersecurity risks
    Erik Bartholomy (LogRhythm) and Eric Parent (Sonepar) Mar 26 2019 10:00 am UTC 47 mins
    Building a Cybersecurity Architecture to Combat Today’s Risks:
    Foundations, Visions, Testing and the Role of SIEM

    The rapid development and adoption of cloud infrastructure, mobile workforces, IoT and other susceptible environments has mandated a reappraisal of security architecture. Modern organisations are recognising their security posture may not be keeping up with the threat landscape, and this leads to frightening discoveries around the safety of their data and networks.

    Join Erik Bartholomy – a Security Architect at LogRhythm – and Eric Parent – CISO at Sonepar – to discover how security architecture is developing to face the current threat landscape. Failures in past layered approaches are frequent, and serve as valuable learning lessons on the importance of proactive monitoring and response.

    During the webinar you will learn:

    • How LogRhythm’s POC enabled Sonepar’s team to efficiently expedite threat detection, and improve their SOC and analyst efficiency

    • The guiding principles and technology behind modern security frameworks and architecture, including the rise in popularity and value of the Zero Trust Framework

    • How security architecture helps align IT security with business strategy and current threats

    • Adapting architecture to accommodate different environments, including on-premises, cloud, and hybrid cloud
  • Cloud Security: Thinking Beyond the Perimeter
    Cloud Security: Thinking Beyond the Perimeter
    Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, Forrester Mar 26 2019 10:00 am UTC 55 mins
    Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.

    Join Robert Arandjelovic, Director Product Marketing, Symantec and Heidi Shey, Director Product Marketing, Forrester as they discuss:

    - The inherent security challenges of cloud
    - Security strategies and imperatives
    - How organizations are approaching and need to approach cloud security today
  • Otwórz. Kliknij. Daj się zhakować
    Otwórz. Kliknij. Daj się zhakować
    Marcin Kacprzak, Senior Sales Engineer & Damian Hoffman, Senior Sales Engineer Mar 26 2019 10:00 am UTC 45 mins
    Kliknąć, czy nie? Każdego dnia użytkownicy poczty elektronicznej zadają sobie podobne pytanie. Wg najnowszych statystyk 1 na 101 wszystkich wiadomości email zawiera złośliwą treść, która może prowadzić do infekcji zarówno pojedynczego komputera, jak i całej organizacji.

    Podczas naszego webinarium dowiesz się jak wykrywać i blokować podejrzane wiadomości email oraz poznasz szczegóły efektywnej strategii ochrony poczty elektronicznej przed takimi atakami jak:
    ·Spear phishing
    ·Impersonation
    ·W2 Scam
  • Authentication, Security, and Performance for the Internet of Things
    Authentication, Security, and Performance for the Internet of Things
    Dan Goldstein, Product Strategy Mar 26 2019 11:00 am UTC 45 mins
    Gartner estimates by the end of 2020 over 20 million Internet of Things (IoT) devices will be online. Every day the automotive, aviation, consumer goods and utilities industries (just to name a few) are pushing new boundaries in how customers interact with technology. While this evolution unlocks incredible potential, security and performance challenges put IoT device manufacturers and providers at risk of security incidents and unable to meet customers' rapidly growing expectations.

    Security-wise many devices are still treated like machines from early in the century: release patches on Tuesdays and cross our fingers our users update. Performance-wise centralized cloud providers are not built to deliver ultra low-latent responses to millions of devices with a global footprint.

    Join our webinar and take a look at how Cloudflare is helping IoT manufacturers and providers meet emerging security and performance challenges.
  • Cyberattacks: Q1 Review and Emerging Trends
    Cyberattacks: Q1 Review and Emerging Trends
    Kelvin Murray, Threat Expert, Webroot Mar 26 2019 11:00 am UTC 60 mins
    With cybercriminals constantly seeking innovative ways to steal information and monetise data, it is crucial for businesses and MSPs to keep up to date on emerging trends in the threat landscape.

    Webroot is hosting a series of webinars every 3 months that aim to keep the industry informed on the latest threat trends and review the top cyberattacks that hit businesses each quarter. These webinars will also provide tips on how to stay safe in a complex threat landscape.

    Join Webroot’s Threat expert as he discusses topics such as:

    •The rise of information stealers
    •The changing face of ransomware
    •Relentless phishing attacks
    •The theft, trade and cracking of passwords
  • La sécurité Intelligente
    La sécurité Intelligente
    Gert De Wever, Security CSE, EU North & Koen Chiau, Sales & Channel Manager BeNeLux, Aruba Security Solutions Mar 26 2019 1:00 pm UTC 75 mins
    Mars, c'est le mois de la Cybersécurité !
    C'est l'occasion de (re)découvrir l'offre de sécurité Aruba à 360º !
    Mardi 26 mars à 14h, nos experts Sécurité d'Aruba Belux, Gert De Wever & Koen Chiau aborderont pour vous les 360º de l'offre sécurité d'Aruba :
    · Le défi
    · Les 4 piliers de la sécurité : identifier, protéger, détecter et remédier
    · Mise en place et automatisation de la sécurité
    · Approche 360° de l'expérience utilisateur sur le réseau
    · Demo live
    · Q&A
  • Active EDR - Automated Investigation with Artificial Intelligence
    Active EDR - Automated Investigation with Artificial Intelligence
    Jared Phipps, VP Worldwide Sales Engineering, SentinelOne, Brandon Dunlap, Moderator, (ISC)² Mar 26 2019 1:00 pm UTC 60 mins
    If you ask Gartner about the problems with today’s EDR technologies, they will say most solutions don’t deliver EDR capabilities in an operationally feasible or complete manner.

    The purpose of an EDR solution is to provide advanced detection & response capabilities to complement an EPP solution. At SentinelOne, we deliver the very best of EDR & EPP in a highly differentiated manner and in one single lightweight agent.

    Join us and learn about a new EDR- Active EDR - a new world of EDR capabilities and user experience. Explore how to:

    - Eradicate benign alert noise, focus on what’s important.
    - Optimise threat hunting time with curated and focused story lines.
    - Maximise staff efficiency and let staff become expert threat hunters.
  • Transform G Suite Email Security in less than 10 minutes
    Transform G Suite Email Security in less than 10 minutes
    Michael Aminov, Chief Architect - Perception Point Mar 26 2019 2:00 pm UTC 15 mins
    The built-in security for G Suite is insufficient against the modern threat landscape. In this short webinar, join our Chief Architect Michael Aminov to learn how to dramatically improve the prevention of APTs, phishing, malware, spam and BEC attacks with no disruption to existing business processes or IT overhead.
  • Mądrze zwalczaj szkodliwe boty
    Mądrze zwalczaj szkodliwe boty
    Mariusz Sawczuk – Specialist Systems Engineer, F5 Networks Mar 26 2019 2:00 pm UTC 66 mins
    Identyfikacja złośliwych botów i ochrona przed nimi jest priorytetem dla firm opracowujących zrównoważoną strategię bezpieczeństwa. Weź udział w tym webinarium, aby dowiedzieć się:

    • W jaki sposób boty infekują, rozprzestrzeniają i atakują aplikacje
    • Jakie rodzaje ataków na aplikacje są najczęściej przeprowadzane przez boty
    • W jaki sposób możesz bronić się przed szkodliwymi botami, nie przeszkadzając tym dobrym

    Oglądając to webinarium wyrażasz zgodę na przetwarzanie Twoich danych osobowych przez F5 zgodnie z polityką firmy (https://f5.com/about-us/policies/privacy-policy). Wyrażasz również zgodę na otrzymywanie informacji od F5 na temat produktów i rozwiązań firmy z możliwością wycofania zgody w dowolnym momencie.
  • SANS Research: How to Secure Mobile Data and Devices
    SANS Research: How to Secure Mobile Data and Devices
    Lee Neely, Mentor Instructor, SANS Institute and Mic McCully, Senior Solutions Consultant, Symantec Mar 26 2019 2:00 pm UTC 62 mins
    The ubiquitous use of mobile devices has radically changed the landscape of data protection and the abundance of applications only complicates the situation.

    How, then, can mobile device data be protected? This webcast reviews the current and emerging services and practices designed to help secure and protect the data on these devices, and identifies areas where solutions are needed to fill the remaining gaps and provides recommendations for a holistic approach including mobile threat protection.
    Join this webinar to learn more about:
    - What role security tools such as analytics can play in managing mobile devices
    - How mobile devices and data are currently protected and how effective those protections are
    - Common attack vectors and possible mitigation strategies
    - Features and capabilities that a solution should have to provide organizations with ideal mobile security and visibility
  • Self-Learning AI: The Machine Fights Back
    Self-Learning AI: The Machine Fights Back
    Constantine Courtis, Sales Director, Redscan; Seb Gaziano, Account Director, Darktrace Mar 26 2019 2:00 pm UTC 45 mins
    Join Darktrace and Redscan to discuss how advances in AI are shaping the way security teams visualise, detect, and autonomously respond to emerging threats - all in real time.

    In this webinar, you will learn:
    - How leveraging machine learning and AI algorithms defends against advanced, never-seen-before, cyber-threats
    - How new immune system technologies enable you to pre-empt emerging threats and reduce incident response time
    - How to achieve 100% visibility of your entire digital enterprise including cloud, network, and IoT environments
    - Why automation and autonomous response is enabling security teams to neutralize in-progress attacks, prioritise resources, and tangibly lower risk
  • Why You No Longer Need a SIEM Tool
    Why You No Longer Need a SIEM Tool
    Matt Selheimer, Chief Strategist Mar 26 2019 3:00 pm UTC 58 mins
    How to handle evolving threats and expanding compliance risks when you have resource constraints.

    For years, organizations have struggled with the high-cost and long time-to-value of implementing Security Information and Event Management (SIEM) tools. Even worse, you may have tried an expensive cybersecurity outsourcing vendor that failed to deliver little more than yet another alert stream.

    Join this webinar instead of being held back by the past. Because the good news is there’s a new approach that seamlessly combines an award-winning security platform, cutting-edge threat intelligence, and 24x7 expert defenders that doesn’t take months or years to implement – with starting costs far less than one FTE a year – yes, you read that right.

    It’s a risk-based approach that gives you the right level of security and compliance coverage for cloud, hybrid, and on-premises environments.

    You really should check it out, unless you want to keep trying to make that SIEM tool work…
  • RSAC 2019 Recap - Emerging Tech, Threats and AI
    RSAC 2019 Recap - Emerging Tech, Threats and AI
    Chris Roberts (LARES Consulting), Nathan Wenzler (Moss Adams), Jessica Gulick (Katzcy), Joseph Carson (Thycotic) Mar 26 2019 4:00 pm UTC 60 mins
    What were the highlights of this year's RSA Conference in San Francisco? Discover the major security developments that happened in the past year and the biggest topics discussed during RSAC.

    Join this exclusive panel of security experts as they share their experiences, insights and recommendations in an interactive Q&A discussion on:
    - Top security challenges and how are we solving them
    - Biggest buzzwords: Hype vs. reality
    - Exciting new tech
    - Top conference highlights
    - Cybersecurity as a boardroom issue
    - CISO's toolbox
    - Words of wisdom for people interested in security

    This is an interactive session and the audience is encouraged to ask questions during this live webcast.
  • A Day in the Life of a Cloud Migration
    A Day in the Life of a Cloud Migration
    Darren Thompson, Vice President and CTO EMEA, Symantec Mar 26 2019 4:00 pm UTC 39 mins
    Businesses today are learning that migrating to the cloud does not happen over night. It takes time and many businesses face the challenge of having to manage both on-premise and cloud solutions. Discover what’s driving businesses to transition to the cloud, the reality of today’s cloud, and best practices from the frontline.

    Join Darren Thompson, Vice President and CTO in EMEA, as he walks the audience through “a day in the life of a cloud migration”.

    Viewers will be able to learn more about:
    - The drive to digital transformation
    - Today's "Cloud reality"
    - What businesses are up against
    - Best practices from the frontline
  • ISSA International Series: Threat Detection - Trends and Technology
    ISSA International Series: Threat Detection - Trends and Technology
    ISSA International Mar 26 2019 4:00 pm UTC 120 mins
    The world is changing, attacks come at the speed of light, and are changing so fast detection is almost impossible. So, how do we tell when we are being attacked? What new technologies are coming down the pipe? This session will cover these and many more topics.
  • Docker & Forrester Webinar - A Guide to Adopting Container Platforms
    Docker & Forrester Webinar - A Guide to Adopting Container Platforms
    Dave Bartoletti, VP & Principal Analyst at Forrester & Jenny Fong, Director of Product Marketing at Docker Mar 26 2019 5:00 pm UTC 58 mins
    Learn what you should be evaluating and how containers will be essential to powering your next phase of digital transformation.

    Webinar will dive into the state of the container platform market with insights into:

    - The state of the cloud and container platform markets heading into 2019: what’s driving all this digital transformation?

    - The rise of the enterprise container platform market and the core capabilities enterprises look for in their next development and operations platform

    - How to evaluate the market for enterprise container platforms and find the best solution to help you create new applications and modernize your key existing applications

    - Why we believe Docker Enterprise has been named a Leader in the enterprise container platform market
  • What's New In Traps 6.0
    What's New In Traps 6.0
    Danny Milrad Mar 26 2019 5:00 pm UTC 60 mins
    With the growing sophistication and speed of cyber-attacks, you need the confidence to know that your endpoint protection has you covered. Your job isn’t getting easier, so we keep making Traps better. The Traps team has announced new features which fundamentally change how Traps is deployed and managed. In this webinar we’ll cover:
    •An update on the latest threat landscape trends
    •Overview of the new features of Traps 6.0
    •How you can take action and upgrade now
  • Off-The-Shelf Hacking Products
    Off-The-Shelf Hacking Products
    Gilad Israeli Mar 26 2019 5:00 pm UTC 60 mins
    Cyber threat actors find a seemingly limitless supply of hacking tools and products in deep and dark web markets and forums. How far can an attacker go with a ready-made hacking tool that was bought on the dark web? Where would the attacker be from? And what are the most popular off-shelf hacking product these days?
  • Advanced Automated Security with Symantec and Splunk
    Advanced Automated Security with Symantec and Splunk
    Colin Gibbens (Dir Prod Mgmt, Enterprise Security Products) and Don Leatham (Sr Manager, Global Strategic Alliances) Mar 26 2019 5:00 pm UTC 60 mins
    Cyber attackers are using sophisticated automation tactics to quickly find and exploit weaknesses in organizational defenses. Normal response tactics fail to mitigate or stop these “machine speed” attacks. The information necessary to address these attacks is often in different security tools, none of which are easily connected and coordinated.
    In this webinar, you will learn how Symantec and Splunk products address this problem by working together to automate a complete, closed-loop security system.
  • Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Doug Cutting - Hadoop Creator & Chief Architect - Cloudera | Arvind Prabhakar - Co-Founder & CTO - StreamSets Mar 26 2019 5:00 pm UTC 56 mins
    When streaming data meets machine learning and advanced analytics, the innovation possibilities can be endless. Operationalization of data movement in a hybrid cloud architecture is key to making your technology investments deliver on their promises. Without it comes frustrated developers, failed projects and technology disillusionment.

    Join Doug Cutting, Apache Hadoop creator and Chief Architect at Cloudera, and Arvind Prabhakar, co-founder and CTO at StreamSets as they discuss how to use DataOps to avoid common pitfalls associated with adopting modern analytics platforms.