The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Live From KubCon: Complex Workloads and Containers with GM Financial
In this episode of Keeping Up With Kubernetes, GM Financial Emerging Data Technology Lead Jeff Loyd speaks with JoAnne McDougald about how the evolution of managing complex development workloads has led us to containerization, and how containerization and VMs have completely changed the game.
Live From KubCon: Twistlock’s John Morello on Kubernetes Security
In this episode of Keeping up with Kubernetes, Twistlock CTO John Morello speaks with Joanne McDougald and Nirmata’s Ritesh Patel about the state of security for Kubernetes as well as the close integration Niramata and Twistlock have developed to bring container security to Nirmata’s powerful cross-provider container management platform.
Michael Human, Vice Presidio Global Services, PresidioRecorded: Jan 18 201944 mins
Presidio helps global organizations address various procurement, logistics and service issues by providing innovative, practical solutions, efficiency, control, risk mitigation, and visibility, all supported via our global team and expertise. We have a dedicated team of global commerce and logistics professionals available to assist with any unforeseen roadblocks or challenges.
Live From KubCon With Portworx: Kubernetes Reigns Supreme in 2019
In this episode of Keeping Up With Kubernetes, Portworx VP of Engineering Venkat Ramakrishnan speaks with JoAnne McDougald and Nirmata’s Jim Bugwadia about where containerization is in 2019, what it takes for enterprises to adopt containers for their development process, how Kubernetes is clearly becoming the dominant route in that adoption process, and how Nirmata and Portworx together offer enterprises a straightforward path to Kubernetes.
Live From KubCon: Containers in 2019 With Diamanti and Nirmata
In this episode of Keeping Up With Kubernetes, Diamanti Director of Product Marketing Sean Roth speaks with JoAnne McDougald and Nirmata’s Anubhav Sharma about why KubCon has grown so drastically year over year, and what we can expect from containerization in 2019, as well as how Diamanti and Nirmata have partnered to offer a complete solution for enterprises to adopt Kubernetes.
Live From KubCon With Spotinst: Bringing the Spot Market to Kubernetes
In this episode of Keeping Up With Kubernetes, Spotinst Founder and CEO Amiram Shachar speaks with JoAnne McDougald and Nirmata’s Ritesh Patel about how Spotinst has partnered with Nirmata to bring the dynamic infrastructure qualities offered by the Spot instance market to Kubernetes.
Stephen Dixon, Product Manager at UKCloudRecorded: Jan 18 201918 mins
Are you facing challenges with your traditional application deployment? Higher consumer expectations have led to a strong need for organisations to offer constant updates & high availability whilst reducing costs to remain competitive.
Join Product Manager Stephen Dixon in this new addition to our Data Centre Modernisation Series as he guides you through the evolution of modern digital workloads so you can gain a better understanding of what your organisation needs to do to meet the high expectations of consumers.
You’ll learn more about
-The problems with traditional scale up architecture
-The pros & cons of scale out architecture
-How cloud workloads have evolved & more about the Utopia that is the “Twelve Factor App”
Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab’s Global Research and Analysis TeamRecorded: Jan 18 201953 mins
Kaspersky Lab experts will present their annual, exclusive review of advanced persistent threat activity across the world in 2018, based on the company’s threat intelligence research throughout the year. These findings provide the foundations for the threat actor predictions published on November 20 and provide an invaluable insight into how APTs are evolving over time.
Vous envisagez de migrer vers le cloud ? Avez-vous la certitude que votre infrastructure cloud et vos applications métier sont sécurisées ?
Participez à un webinaire exclusif où des experts SonicWall vous diront comment protéger votre infrastructure cloud public et privé contre les menaces évoluées modernes.
•Comment faire bénéficier votre infrastructure cloud public et privé et vos applications métier d’une sécurité de nouvelle génération
•Comment obtenir une visibilité totale sur votre environnement virtuel pour la prévention des menaces
•Quelles nouveautés apportent les produits NSv et WAF
Tonia Dudley, Security Solutions Advisor, Jeffrey Rogers, VP Customer Success, at CofenseRecorded: Jan 17 201936 mins
New year. New resolutions. Every year we make the pledge to eat healthier and get more exercise. What is good for the waistline is also good for your phishing defense posture. With more than 90% of breaches attributed to successful phishing campaigns – now is the time to think about how to prepare and prevent attacks. In this session, you’ll hear about 10 resolutions for your phishing defense programs that will make your organization more secure.
Some of the topics covered include:
- How to empower humans to be part of the solution
- Best practices to balance automation with human intuition
- How the latest features and technologies can make your life easier
John Kindervag, Field CTO, Palo Alto NetworksRecorded: Jan 17 201961 mins
“Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks
Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?
High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.
Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.
Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:
• Learn specific outcomes of implementing a Zero Trust architecture
• Hear recommendations on where to start when planning and implementing a Zero Trust framework
• See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
• Get your questions answered in our Live Q&A
The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.
Attend this webinar to learn how Docker can help you meet migration deadlines by providing a validated methodology for containerizing legacy Windows applications, quickly. The combination of the Docker Enterprise container platform and purpose-built tools, allow you to upgrade and improve application security and reliability; all while cutting costs by up to 50%.
Chris McCormack, Firewall Product Specialist, SophosRecorded: Jan 17 201960 mins
Sophos XG Firewall gives you everything you need to secure your network against advanced threats like ransomware, bots, worms, hacks, breaches and APTs. In addition, you get unparalleled network visibility that no other firewall on the market can deliver.
Join this webcast to see how XG Firewall can transform your network security and performance. You’ll see:
- How the threat landscape is evolving
- How ransomware gets onto your network and spreads – fast
- Essential protection you need in your firewall to secure your network
- Best practices for deploying your firewall to provide a solid defense
Chris Murdock, Security Architect at CongaRecorded: Jan 17 201936 mins
In a world of evolving, complex cloud infrastructure – there is no shortage of advanced security technologies that monitor for potential threats. People look for better ways to gain security insights from large datasets and are tasked with the responsibility of communicating associated business risk throughout the entire organization.
In this webinar, Security Architect Chris Murdock from Conga will explore how to democratize the security of your next-gen infrastructure by building measurement directly into systems, factoring in security-related KPIs and OKRs. Tune in to learn how to securely scale your infrastructure while continuing to enable innovation at the speed of business.
Josh Bartolomie, Dir, Res & Dev, Cofense; Sharon Smith, Fndr, C-Suite Results; Theresa Frommel, Act Dep CISO, State of MORecorded: Jan 17 201958 mins
Process automation delivers a lot of promises. A car can be assembled in less than a day and vegetables can go from vine to can in hours. Sensors look for obvious flaws, but at points in the production process there is human oversight in the form of quality control. The same holds true for protecting against phishing threats. Automation can help weed out some of the bad stuff, but bad actors and new threats constantly outsmart the latest sensors. Join Cofense and (ISC)2 on January 17, 2019 at 1:00PM Eastern for a panel discussion examining strategies on how to enable your workforce to be quality control when it comes to malicious emails to know when something isn’t right and what to do when they see something.
Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace.Recorded: Jan 17 201965 mins
With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.
Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:
- Implement security analytics for incident detection and response.
- Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
- Leverage AI to autonomously respond to emerging threats before they can do serious damage.
- Understand key information that needs to be communicated to various stakeholders in the event of a breach.
- Apply a “standard of due care” in order to prove compliance to regulatory agencies.
Dr. V.N. Berlin, CEO, Mission Critical InstituteRecorded: Jan 17 201934 mins
Looking to break into or advance your career in the lucrative field of cybersecurity? Want to know how to get recruited by employers for $100K+ cybersecurity jobs? Join our webinar to find out!
Mission Critical Institute is an industry leader in producing job-ready, cybersecurity experts through our academic and training partners. Our innovative programs are custom-built to meet industry standards and advance your cybersecurity career.
There is a growing shortage of trained cybersecurity professionals, with over 3.5 million unfilled jobs projected by 2021, and employers need candidates now. Join us and learn how to start your cybersecurity today!
Sign up for this webinar to learn:
• How do you get recruited for a $100K+ cybersecurity job?
• What are employers looking for in cybersecurity professionals?
• What certifications do you need to get recruited?
• What experience do you need to become a cybersecurity professional?
• Why are companies willing to pay $100K+ for trained cybersecurity professionals?
Join our webinar today and learn how you can be the next $100K+ cybersecurity professional!
Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVaultRecorded: Jan 17 201960 mins
Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.
In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.
Join us for this webcast to learn:
- The most common challenges in meeting and maintaining compliance with PCI DSS
- Best practices to help you plan and prepare for an audit
- The core security capabilities you need to demonstrate compliance
- How AlienVault Unified Security Management can simplify the compliance process
VP of Product Marketing at AlienVault
Qualified Security Assessor (QSA) with Terra Verde
Sales Engineer at AlienVault
Jasson Casey - CTO at SecurityScorecardRecorded: Jan 17 201962 mins
Please join us on the 17th of January as Jasson Casey, CTO at SecurityScorecard, describes the state of cybersecurity in the modern world, and what best practices are for measuring it - differently. He will discuss the importance of behavioral analytics, and how to make use of an “outside-in approach” when measuring cybersecurity.
He will relate how to apply security analytics to different facets of our business, including devops. With 20 years in the industry, Jasson will discuss his perspective on what tactics work, and which do not. Please join us to learn more.
Dean Nicolls, VP of Marketing, Jumio Corp.Recorded: Jan 17 201927 mins
Customer acquisition is top of mind for most financial service organizations and their boards. Normally, when banks and other financial service institutions think customer acquisition, they think about launching a new advertising campaign with the hope of driving more online or in-branch traffic -- but these campaigns are iffy at best.
Instead, why not rethink your online account opening process where FSIs lose about 20% of their prospects through abandonment. If you can plug that leaky funnel, you will see an immediate improvement in customer acquisition.
Join us for this informative “how-to” webinar and discover how to…
- Dissect the abandonment problem
- Reduce the number of identity verification screens & clicks
- Cast a wider net with omni-channel verification
- To say “no” to verification “maybes”
Wayne Murphy, Sec-1 Ltd.; Ben Rafferty, SemafoneRecorded: Jan 17 201947 mins
Over the last seven years, the technologies used by call and contact centers to communicate with customers and complete card transactions have changed drastically. Networking methodologies like VoIP have since become widely adopted, while the number of applications organizations employ to process customer information has risen dramatically. For this reason, the PCI SSC recently released their highly anticipated updated “Guidance for Protecting Telephone-Based Card Payments” for the first time since 2011, offering several much-needed clarifications for organizations looking to achieve PCI DSS compliance inside their contact centers.
Join Semafone and Sec-1 Ltd. for this insightful webinar into the most pertinent changes, featuring two of the members of the PCI SSC’s Special Interest Group – Ben Rafferty, Chief Innovation Officer at Semafone, and Wayne Murphy, Senior Security Consultant at Sec-1 Ltd. We’ll cover the following:
• How to avoid scope-creep inside the contact center during PCI DSS compliance
• How Pause and Resume call recording solutions create more problems than they solve
• How most 3rd party services are now in scope for PCI DSS compliance
• How devices that control SIP Redirection are now also in scope
Hear predictions from our security experts about the evolving threat landscape so you can get prepared with actionable recommendations to improve your cybersecurity posture for 2019.
The attack landscape is shifting with increased automation and cunning new distribution methods. There’s no discrimination when it comes to a security breach any more: everyone is at risk. How are you preparing to stay ahead of attackers, and not just for their existing attack methods but new and emerging ones as well?
Alert Logic security experts have a front row seat on current and emerging attacks across more than 4,000 clients. Join this webinar to hear their predictions for 2019 along with practical guidance on how you can stay a step ahead and better protect your business.
Corie Chung - Chief Strategy Officer; Shlomi Levin - Co-founder and CTO; Michael Aminov Co-founder & Chief ArchitectRecorded: Jan 17 201947 mins
Nearly 90% of businesses are pursuing a digital-first strategy as their processes become digitized as data-driven.
However, with the promise of great leaps in growth and productivity, also come major security loopholes. From new communication channels to problematic security policies to legacy systems, there are many ways in which the digital-first business may be exposed - a risk brands simply can't afford to take.
Join our founders to learn more about the digital transformation phenomena, its IT enablers, and how to close some of the major loopholes leaving organizations exposed.
Bogdan Botezatu, Director of Threat Research and Reporting, BitdefenderRecorded: Jan 17 201949 mins
What threats can we expect to see in 2019, and how do we make sure we're prepared?
Join Bitdefender Director of Threat Research and Reporting, Bogdan Botezatu to discuss research-based predictions on the biggest threats of 2019. He'll walk through the future of cryptojacking, advanced persistent threats (APTs), network-level exploits, IoT attacks, and others and provide recommendations on the industry's best defenses against these threats.
Greg Foss (LogRhythm) and Randy Franklin Smith (UWS)Jan 21 201910:00 amUTC90 mins
In this webinar Randy Franklin Smith (UWS) and Greg Foss (LogRhythm) take a real-world example of a SIEM, in this case LogRhythm, and an IAM, Okta, and demonstrate how their integration matures an organisation’s security posture.
We’ll dive into how Security Analysts can make more informed decisions and perform better investigations when they have a full picture of IAM events spanning on-prem and cloud-based activity and how organisations can respond rapidly to security alarms with automatic protective measures.
In this webcast, discover how to:
• Visualise and analyse data from Okta in your SIEM
• Identify accounts that have compromised credentials by monitoring for successful authentications paired with failed multifactor logins
• Utilise the Okta API to automate security tasks
• Build upon identity monitoring to work towards a “Zero Trust” architecture
Paul Chapman, Chief Information Officer | Joel De La Garza, Chief Information Security Officer | Crispen Maung, VP ComplianceJan 21 201910:00 pmUTC47 mins
What are the best ways to keep your cloud stack secure, your business compliant, and your users safe? Getting straight (and useful) answers to these simple questions isn't always easy.
Watch a candid discussion with Box CIO Paul Chapman and his counterparts in Security and Compliance as they reveal how they work together every day to tackle the complex security and compliance challenges every global business faces today. They'll share best practices, pitfalls to avoid, and answer your hardest questions.
This isn't your typical webinar. No slides. No pitches. No filters. Just a candid discussion with the guys who are safeguarding the data for over 80,000 businesses — including 67% of the Fortune 500 — as they share best practices and insights.
Here's what they'll discuss:
-How to get executives and users to care about security and compliance
-Top of mind security or compliance issues (and tackling them)
-The toughest challenges they faced
Simon Tompson, Product Marketing LeadJan 22 201910:00 amUTC25 mins
Increasing digital consumption by your customers and modern-day technology provides your business with unlimited opportunities! The challenges of digitalization vary, but each digital infrastructure requires one thing above all: a strong network foundation. Join us for a webinar to learn more about cloud-managed IT and accelerate your digital journey!
Aaron Cockerill, Chief Strategy OfficerJan 22 201911:00 amUTC29 mins
What is currently happening the world of security?
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*
The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.
During this webinar Aaron Cockrill, CSO at Lookout will talk about:
- What does a post-perimeter world mean to enterprise security?
- Why mobility changes the enterprise security paradigm?
- How to protect data when accessed from outside the corporate perimeter?
- What are the current and emerging threats?
* Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
Brandon Dunlap, Moderator, (ISC)². Chris Marrison, System Engineer, InfobloxJan 22 20191:00 pmUTC60 mins
Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organisation solve and streamline this improve their cybersecurity operations? Join Infoblox and (ISC)² for an examination of how Infoblox and Fortinet have joined together to assist organisations in improving their security operations and reducing time to containment.
OLIVIER SEGERS - Sr. Technical Marketing Lead at BMC Remedyforce, NATHAN CHAN - Solutions Engineer at OneLoginJan 22 20193:00 pmUTC60 mins
Together, BMC and OneLogin provides a best-in-class identity management solution for securing access and simplifying user management across your IT Service Management (ITSM) solution stack.
OneLogin’s Unified Access Management platform integrates seamlessly with BMC Remedyforce to help organizations accelerate business transformation. Hundreds of customers today leverage the joint solution to take complete control over user access to applications, connect Remedyforce to common IT directories, add a second factor of authentication, and enforce access security policies for Remedyforce and other SaaS tools.
In this webinar, you will learn:
- How to automate identity management processes for BMC Remedyforce, such as real time user provisioning and de-provisioning
- Best practices for improving security of user access with SSO, MFA, directory integration, and more
- Improving user engagement and experience across digital tools
Jason Reed, Senior Industry Analyst, CyberSecurity, Frost & SullivanJan 22 20194:00 pmUTC60 mins
In a time when major data breaches have become a routine feature of the news cycle, digital consumer trust is an intangible and highly consequential metric for any organization conducting business online.
With a focus on 10 major global markets, this session will show the results of groundbreaking research that quantifies this difficult-to-measure concept and outlines the business implications of building or losing trust.
• Do perceptions of customers in the business community align with consumer reality?
• What makes (or breaks) consumer digital confidence in organizations?
• Find out the regional variations in the degree of trust consumers have in online services—and the impacts on consumer behavior.
Justin Fier, Darktrace Director of Cyber Intelligence and AnalyticsJan 22 20195:00 pmUTC45 mins
As we enter a new era of machine-speed attacks, stretched security teams are hard-pressed to deploy the best technologies to respond to cyber-threats before they do damage.
Relied on by hundreds of customers globally, including City of Las Vegas and Trek Bicycles, Darktrace’s cyber AI technology has already proven crucial in autonomously neutralizing subtle and fast-acting cyber-threats. The launch of Darktrace Antigena Version 2 has enhanced its powerful capabilities to fight back against malicious emails before they reach the target user.
In this webinar, Darktrace’s Director of Cyber Intelligence and Analytics, Justin Fier, will explore Antigena’s newest features and deliver a short demo of the technology in action.
2018 was worse than 2017 for cyber security. This year every month was filled with even more major breaches, hacks, and attacks surfacing then 2017. The nature and range of the attacks varied from email hacking to zero days, from minor incursions to (potentially) everyone’s data being stolen. 2018 will probably go down as the new worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2019 bear the full weight and impact of the events of 2019, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2019 landscape?
Join us, make notes, and then check back in a year to see how our panel of experts did in providing insight and making predictions for the 2019 challenges to InfoSec.
James McQuiggan, Product & Solutions Security Officer, Service Americas Division, Siemens Gamesa Renewable Energy
Ricky Allen, CISO, Critical Start
Patrick Miller, Managing Partner, Archer International
Andrew Miller and Jeremy WittkopJan 22 20196:00 pmUTC60 mins
Despite the best efforts of many well-meaning data security professionals, data breaches are up 75% over the last two years. Every passing week seems to bring a new large scale data breach to the headlines. Most organizations deploy data protection controls to identify and prevent sensitive information loss, but are frustrated by the lack of proactive measures they can take. Understanding open source tools from both an attacker’s and a defender’s perspective will help organizations identify vulnerable data before it is exploited as well as helping to build better response processes.
Join InteliSecure Senior Program Analyst, Andrew Miller, and Chief Technology Officer, Jeremy Wittkop as they discuss some of the open source tools adversaries use to attack you, and how you can leverage them to build better defenses.
Specific discussion topics include:
- Open Source tools for data theft available to attackers and defenders
- Understanding how exposed data is found and exploited from an attacker’s perspective
- What you should do if you identify a potential data breach
Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, GigamonJan 22 20196:00 pmUTC60 mins
Enable IT Collaboration with a Common Distributed Data Services Layer.
The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.
To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.
ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.
Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
Resellers, join us on Tuesday, January 22 for a webinar with DataMotion! For nearly 20 years DataMotion has provided users with an easy to use secure email delivery system. With SecureMail Desktop, you can send emails that are encrypted and secure, helping to meet any compliance regulation requirements. The best part is that this can all be done via an easy to install plug-in. During the webinar, we will be discussing the following topics with a Q&A at the end:
•DataMotion's balance between security and ease of use
•How DataMotion helps customers stay in compliance with regulations like HIPAA, GLBA, FISMA, and more.
•Beyond email: SSO, file transfer, inbound communications and APIs
•DataMotion's Partner Program
David Hines, Vice President of Architecture and Engineering - TierPointJan 22 20199:00 pmUTC60 mins
As reported in Forbes last year, 73% of companies are planning to move to a fully software-defined data center within two years.
A software-defined data center is based on a virtualized environment of compute, storage, networking and security in conjunction with policy-based management and automation. The evolution from a traditional data center architecture to one that is software-defined can take months if not years but can yield immense benefits for the business.
Join us for a discussion on the progress toward the fully software-defined data center, including benefits of infrastructure as code and overcoming challenges associated with traditional workflows.
Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, CitrixJan 23 201910:00 amUTC45 mins
Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.
Learn how Citrix networking solutions for hybrid cloud can deliver:
•Contextual and secure access to applications
•Website and application protection from internal and external threats
•Application and network visibility and intelligent analytics
•Flexibility and performance
See how Synopsys started the software security journey and is taking an active role in providing industry expertise to help organizations deliver robust software security solutions. We will focus on identifying cyber risks and equip you with solutions to overcome security issues. If you want more than our Q&A at the end of the webinar, visit us in Copenhagen, Denmark. Synopsys will be hosting the Copenhagen Security Symposium at the Carlsberg Museum 6th February 2019.
You don’t need an expert to tell you that open source software will be ubiquitous in the enterprise in 2019. You also don’t need an expert to tell you that this will present security challenges either. But what can you do in 2019 to ensure your open source software is as secure as you can make it? Best practices, processes and tools are coming into focus. 2019 is the year you need to implement and use them.
Join the panel of experts as they share their best advice to help make 2019 a secure year for your open source use.
Marco Riboli, VP Southern Europe di FireEyeJan 23 20191:30 pmUTC45 mins
Il 2018 sta volgendo al termine e, come di consueto, ecco il nostro aggiornamento sull’evoluzione del mondo della cyber security nel 2019 e oltre. Sappiamo che gli attaccanti attaccheranno e che i difensori faranno di tutto per fermarli. Dobbiamo però essere pronti ad affrontare le minacce imminenti, oltre a restare un passo avanti rispetto agli attaccanti, se non addirittura precederli.
Marco Riboli, VP Southern Europe di FireEye, offrirà una panoramica sulla sicurezza del mondo cyber nel 2019. In questo webinar, Marco affronterà diversi punti trattati nel report ‘Facing Forward: Cyber Security in 2019 and Beyond’, frutto dell’esperienza e delle conoscenze dei nostri senior leader, degli analisti di FireEye iSIGHT Intelligence, degli esperti di Incident Response di Mandiant, e dei Labs di FireEye. Partecipa per saperne di più su:
•Minacce nel settore dell’aviazione, compreso lo spionaggio informatico e il cybercrime
•Come le grandi nazioni e i paesi emergenti affronteranno i rischi cyber
•Come gli attaccanti stanno modificando le loro tattiche per essere sempre un passo avanti rispetto alle strategie di difesa
Registrati subito per scoprire cosa ci riserva il futuro della cyber security.
Rob Daniels, GM, security portfolio strategy & propositions, & David Simpkins, GM, managed services & public cloudJan 23 20192:00 pmUTC30 mins
You’re under immense pressure for digital transformation. Moving to the cloud presents new possibilities: but the security of your data and apps is critical. It’s not all plain sailing because the cloud requires a fundamentally different approach to security. If you dig your heels in, you’ll find that Shadow IT increases and people will circumvent you. It’s also increasingly difficult to keep an eye on your entire network, so you’ll need to continually reassess where you’re most exposed.
In this webinar, live from the studio, you’ll discover how to:
- Create a security strategy that works as an enabler to support your cloud migration, not a separate work stream or standalone function
- Take steps to protect your new cloud infrastructure as well as your legacy network
- Avoid certain pitfalls when it comes to cloud migration that could open up new vulnerabilities and threats
The Three Lines of Defence is a popular framework for managing Governance, Risk Management & Compliance (GRC). In our first webinar on the Three Lines of Defence we explored the policy implications of the first line of defence – the front line employees. In this webinar we now explore the second line of defence, the risk, security, and policy owners and managers and their job in ensuring that policies are current and understood in the organization.
Continual growth of regulatory requirements, complex business operations, and global expansion demand a well thought-out and implemented approach to policy management that is governed by the second line of defence. In order to achieve effectiveness, efficiency, and agility in policy management, organizations need to define a structured governance framework and process. However, effectively managing policies is easier said than done. To consistently manage and communicate policies, the second line of defence is turning toward defined processes and technologies to govern policies and implement an effective policy management lifecycle.
This webinar focuses on how to effectively manage and govern policies and enable the second line of defense in your organization through effective policy oversight.
Attendees will learn:
• GRC and policy management in the context of the Three Lines of Defence Model
• How the second interact with the first and third lines of defense to protect the organization
• How to effectively manage and maintain polices in the organization
• Methods for second line employees to to ensure that first line of employees are aware of policies
• How technology can automate and enable the second line of defence
• Driving efficiency, effectiveness and agility into all three lines of defence
Enabling the First Line of Defence Webinar: https://goo.gl/accjxb
Asha May, Customer Engagement at VeracodeJan 23 20194:00 pmUTC45 mins
Veracode continues to build and expand a strong community to support the people and teams that make your organization’s software secure. The Veracode Community provides a resource and forum for customers as well as developers or security professionals seeking best practices about securing applications throughout the development lifecycle.
Join this webinar to see how the Veracode Community can help you tackle tough application security issues while paving the way for an optimized program. We will provide:
•An overview of the community – a space for developers and security practitioners to find answers and collaborate on application security best practices
•Tips for community members to access resources, customer support, and forums for collaboration
•Updates on latest community enhancements including newly-available access to all Veracode Integrations-related content and support
Back by popular demand, we're providing you another chance to view this popular webinar from Fall of 2018. Enjoy the replay!
Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?
During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
John Wilson, ACE, AME, CBE and Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPAJan 23 20195:00 pmUTC75 mins
Even in the most clear-cut matters, defending IP and trade secrets can be difficult. And when digital evidence is obfuscated through direct and indirect efforts, these defenses can be downright daunting. However, with a comprehensive and integrated discovery plan supported by a team of experts with digital investigative experience augmented with targeted eDiscovery technologies, legal teams can quickly, effectively, and economically gain and maintain the legal high ground in these critical corporate matters.
This expert presentation will present actionable approaches and best practices for counsel to consider as part of forensic collection, early case insight, and legal document review efforts during IP and trade secret matters. Shared through the lens of an example matter based on an aggregate of actual experiences, this webcast will help legal teams as they seek to proactively shape positive eDiscovery outcomes.
+ Organizing for Success: From Complaint to Discovery Plan
+ Accelerated Execution: Translating Data into Evidence
+ Advancing on Smoking Guns: Advanced Technologies and Assisted Review
+ Reviewing Right: Accelerated Legal Document Review
+ Decisive Differences: The Benefit of an Integrated eDiscovery Provider
+ John Wilson, ACE, AME, CBE
As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody.
+ Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA
Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad while working on highly complex forensic and e-Discovery projects.
Benjy Portnoy, CISSP, CISA, Aqua SecurityJan 23 20195:00 pmUTC60 mins
Benjy Portnoy, Director of DevSecOps at Aqua Security, has spent the past 3 years working with dozens of organizations on securing their deployments of Kubernetes, Docker, Red Hat OpenShift and other cloud native technologies.
In this webinar, Benjy will share his experiences to help you figure out:
• What to expect from platform providers, security-wise, and what gaps remain
• The maturity curve of securing cloud native applications (containers, serverless and what’s in between) – from the most basic controls to advanced runtime controls
• What to expect from a cloud native security platform: Key criteria to consider
• How to ensure that your organization is ready to go into production across various stake holders and teams