Hi [[ session.user.profile.firstName ]]

IT Security

  • Actionable Steps to Elevating your IT Service Management
    Actionable Steps to Elevating your IT Service Management
    Kevin J Smith, Senior Vice President at Ivanti & David Martinez, Sr. Product Marketing Manager at Ivanti Recorded: Nov 15 2018 60 mins
    Every organization goes through a process of improving its operation. Despite this, many ITSM projects fail to deliver the level of effectiveness and the value promised. You have to ask why do so many ITSM projects fail to deliver the value IT teams know they can realize?

    Join this session to learn:

    • The approach and organizational capabilities required to continually increase ITSM efficiency and effectiveness
    • The building blocks to create institutional processes and a culture of shared learning and accountability needed to deliver optimized ITSM that delivers more value to the business
  • Don't Get Guillotined: A Practical Approach to Privacy Risk and Compliance
    Don't Get Guillotined: A Practical Approach to Privacy Risk and Compliance
    Phil Richards, CISO and Leslie Bonsteel, Senior Director, Marketing Recorded: Nov 15 2018 57 mins
    As companies become increasingly sophisticated in tracking private data, customer sensitivity and government oversight requires that they improve privacy protection and monitoring standards. This interactive conversation with Ivanti CISO Phil Richards will cover topics such as:

    - How to recognize, control, and protect personal data
    - The importance of asset discovery in your privacy program
    - Workflows for managing transactions involving private data
    - Educating other departments on their role in privacy protection
    - The importance of control frameworks for protecting private data
  • Take the WAN superhighway to the cloud with SD-WAN
    Take the WAN superhighway to the cloud with SD-WAN
    Valerie DiMartino Senior Product Marketing Manager, Sony Kogin Principle Product Marketing, Managed Service Provider Recorded: Nov 15 2018 52 mins
    Azure or adopting Office 365, it’s time to look at SD-WAN to securely connect branch users and deliver and optimized experience that’s eases cloud and SaaS migration. This webinar will explain the advantages that Citrix SD-WAN brings to your Microsoft deployment including tools such as Microsoft Azure Virtual WAN and Office 365 performance.

    In this session, you will learn how Citrix SD-WAN helps:

    • Securely connect branches to the cloud, SaaS, and the Internet
    • Optimize Office 365 connectivity and performance
    • Simplify and automate large-scale branch connectivity with Azure Virtual WAN
  • Hello Direct Internet Access; Hello Risk
    Hello Direct Internet Access; Hello Risk
    Kevin Rollinson, Product Marketing Manager, Cisco Umbrella Recorded: Nov 15 2018 41 mins
    Business today happens at the branch. But where does IT work? Typically, not at the branch. So enterprises struggle to manage nontraditional users and even more connected devices across disparate branch locations.

    As direct internet access increases, the risk of exposure to critical business resources rises. At the same time, application usage via multiple clouds (Office 365, G-suite, etc.) challenges the existing network architecture.

    What does this add up to? Pressure for IT staff as they struggle to reduce costs, improve security measures, and application performance. Join us to learn how to gain better performance and more security effectiveness for your branch offices.
  • Low to High: Risk Adverse May Not Make the Most Risk Sense
    Low to High: Risk Adverse May Not Make the Most Risk Sense
    Guy Rosefelt, Director of PM at NSFOCUS and Adrian Sanabria, VP of Strategy and Product Marketing at NopSec Recorded: Nov 15 2018 59 mins
    Recent evidence shows that a surprisingly high portion of vulnerabilities incorporated into malware or exploit kits are ranked low or medium severity. Counter to commonly-accepted practices, focusing only on high-severity vulnerabilities and setting a ‘cut-off’ point for lower scored issues, is not a safe or effective strategy. More importantly, proof-of-concept (POC) code for lower priority vulnerabilities is appearing more quickly after 0-day announcement leading to leading to widespread attacks equally as quickly. NSFOCUS and Nopsec will delve into this recent trend, discuss some of these lower level vulnerabilities being quickly exploited, and provide some thoughts how to better protect against these in the future.
  • Lacework & Snowflake: Security Insights in a High Growth Cloud Environment
    Lacework & Snowflake: Security Insights in a High Growth Cloud Environment
    Omer Singer, Director of Security, Snowflake Computing; Dan Hubbard, Chief Product Officer at Lacework Recorded: Nov 15 2018 31 mins
    Security For Public Cloud + Security Analytics + Data Warehouse Innovation. Lacework and Snowflake Computing are redefining how data is managed and secured.

    Lacework and Snowflake Computing are innovators in their respective markets; data warehousing and security for public cloud. Working together, they deliver powerful and actionable security insights, combined with the most flexible, scalable, easy to use data warehouse on the planet.

    Please join Omer Singer, Director of Security, Snowflake Computing and Dan Hubbard, Chief Product Officer at Lacework Inc., to review and demonstrate their upcoming partnership.
  • Enterprise-wide Kubernetes, Episode 3: Multi-Cloud Persistent Storage
    Enterprise-wide Kubernetes, Episode 3: Multi-Cloud Persistent Storage
    Michael Ferranti, VP, Marketing, Portworx and Anubhav Sharma, VP, Business Development, Nirmata, Recorded: Nov 15 2018 60 mins
    Ready to learn how to manage persistent storage for containers in the multi-cloud environment?

    Kubernetes is enabling multi-cloud strategies for the Enterprise like never before. As data is a fundamental element of all Enterprise applications, without a consistent data management strategy, companies have been able to containerize 5-10% of applications, mostly stateless workloads. With Kubernetes adoption, Enterprises have to think about data management strategies because, without it, companies cannot truly adopt multi-cloud. Data backup, data portability, and DR are critical requirements that have to be addressed as part of any robust Kubernetes solution stack.

    In this webinar, will be talking about best practices on managing persistent storage in a multi-cloud environment and demonstrate application portability across the clouds leveraging Nirmata and Portworx.


    Presenters:
    Anubhav Sharma, VP, Business Development, Nirmata
    Michael Ferranti, VP, Marketing, Portworx,
  • Building a Data-Centric Architecture for the Future of Government
    Building a Data-Centric Architecture for the Future of Government
    Pure Storage | Red River | Cisco Recorded: Nov 15 2018 61 mins
    Register Now!
  • Foolproof Digital Identity with Behavioral Biometrics
    Foolproof Digital Identity with Behavioral Biometrics
    Ehab Samy, VP Product Management, Plurilock Recorded: Nov 15 2018 59 mins
    Digital identity authentication can be challenging to do effectively. Join us to learn about the evolution of biometrics technologies, from those that determine who you ARE in the digital realm, to behavioral biometrics that determine your identity based upon what you DO and how you do it. Ehab Samy, Vice President of Product Management for Plurilock, will map which digital identity management mechanisms are best suited for particular environments including law enforcement, airport security, health care, and the workplace.
  • 802.11ax or 802.11ac: Which is Right for Your Business?
    802.11ax or 802.11ac: Which is Right for Your Business?
    Cherie Martin, Sr. Solutions Marketing Manager - Aruba Recorded: Nov 15 2018 48 mins
    The industry is buzzing about the soon-to-be released 802.11ax Wi-Fi standard that will greatly increase wireless speed and optimize client battery life. Are you ready to take your network to the next level? Join us as Aruba’s Cherie Martin, Sr. Solutions Marketing Manager, shares the top three things you need to consider in deciding which technology to choose to give your business, employees, and guests, simple, business-class networking without sacrifice
  • Inside a Docker Cryptojacking Exploit
    Inside a Docker Cryptojacking Exploit
    Ethan Hansen, Threat Stack Security Analyst Recorded: Nov 15 2018 30 mins
    Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes. While Docker is great at managing the lifecycle of these workloads, it’s not a security tool.

    In this webinar, Ethan Hansen, Security Analyst for Threat Stack’s Cloud Security Operations Program, will discuss recently observed Docker exploit attempts from the field, where attackers were looking for web applications vulnerable to command injection. He’ll also provide examples of what to watch for in your logs, cryptojacking and container breakout attempts among them.
  • Open Source Security Tools for Defending Enterprise Organizations
    Open Source Security Tools for Defending Enterprise Organizations
    Steve Kaufman (LogRhythm) and Paul Asadoorian (Security Weekly) Recorded: Nov 15 2018 57 mins
    Tips & Tricks for Defending the Enterprise Using Open Source Tools

    One of the common complaints I hear from security professionals is, “I don’t have the budget for that.” Do you know many of the tools that can solve problems in the enterprise are free, as in free beer? You don’t have to buy commercial products to secure your entire enterprise. Sure, there are some areas that do require a PO, however, there are also several areas of your security program that can be implemented using free and/or open source tools.

    Learn which aspects of your security program can benefit the most from these tools, and how to configure and use them. (Free beer will NOT be provided during this webcast, however, you are encouraged to bring your own, as the presenter’s jokes may be funnier if you are enjoying an adult beverage.)

    Outline:
    – Lightweight threat intelligence: pi-hole in the cloud (+TacyonNet)
    – Vulnerability profiling: Integration with vFeed
    – Patching your systems with Ansible
    – Network monitoring with Bro
    – High-performance firewalls with OpnSense
    – The best free training resources

    Steve Kaufman, a Technical Product Manager from LogRhythm, will be joining the webinar to cover how security technology vendors are aligning with open source tools. He’ll explore how LogRhythm’s architecture, including elasticsearch, enables the product to integrate with open source tools.
  • Cloud Risk-Based Authentication To Prevent Password Based Attacks
    Cloud Risk-Based Authentication To Prevent Password Based Attacks
    Sujay Doshi, Sr. SIEM Solution Engineer Recorded: Nov 15 2018 51 mins
    Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect the sophisticated techniques used by hackers. By integrating your SIEM with your SSO/IDM solution, SOC analysts can gain the visibility needed to prevent these access based attacks.

    Attend this webinar to hear about:

    - Why password access based attacks in cloud environments?
    - Threat detection and threat hunting use cases for password-based attacks
    - User account based orchestration and incident response actions
    - Walkthrough of Securonix - Okta integration with a live demo
  • An Inside Look at Targeted Ransomware Attacks
    An Inside Look at Targeted Ransomware Attacks
    Peter Mackenzie, Malware Escalations Manager, Sophos Recorded: Nov 15 2018 47 mins
    Join Peter Mackenzie as he discusses the rise of targeted ransomware and why attacks like SamSam, Dharma and BitPaymer are making headlines. Watch a live demo of a ransomware payload being unleashed and the steps you need to protect your organization from similar attacks.
  • Accelerate investigation with Proofpoint Threat Response | Live Demo
    Accelerate investigation with Proofpoint Threat Response | Live Demo
    Frank Tsang, Principle Systems Engineer Recorded: Nov 15 2018 32 mins
    Accelerate investigation, prioritize threats, and resolve incidents with less time and effort.

    Proofpoint Threat Response Auto-Pull (TRAP) offers an effective solution. It automatically pulls delivered malicious email into quarantine, saving you from slow and labor-intensive manual process.

    Join us for a live demo of the Proofpoint Threat Response platform and learn how to:

    • Reduce exposure time to malicious emails
    • Reduce the time to quarantine and contain email threats
    • Reduce your dependency on custom-coded software
  • Detection and Response, Why Limit Yourself to the Endpoint?
    Detection and Response, Why Limit Yourself to the Endpoint?
    Fernando Montengro of 451 Research & Mitchell Bezzina of Palo Alto Networks Recorded: Nov 15 2018 63 mins
    Visibility is an undeniable requirement of all security teams, but it shouldn’t come at a cost. EDR products are positioned as our last chance to improve defenses though since inception discovery and response times have only increased. Is EDR really enough? Do we need more visibility from other sources? Are security operations actually improving? We’ve surveyed over 300 of your peers to answer one important question, “Will Endpoint Detection and Response help me?”

    Join 451 Research Senior Industry Analyst on Information Security, Fernando Montenegro and Palo Alto Networks Director of Product, Mitchell Bezzina to learn more about:
    •The state of EDR technology and the challenges it faces in today’s threat landscape
    •The need for visibility beyond the endpoint
    •The future of detection and response with XDR
  • Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Kubernetes: Securing Hybrid and Multi-Cloud Environments
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Recorded: Nov 15 2018 45 mins
    Kubernetes is widely used to re-architect traditional applications. Many organizations first set up Kubernetes within their on-prem environment and then later expand to the public cloud. This hybrid environment often creates security and compliance challenges with workloads. Join this webinar to learn how to leverage universal security policy definition that works across a hybrid environment.
  • Defense One Summit 2018 Livestream
    Defense One Summit 2018 Livestream
    Defense One | Underwritten by: Booz Allen Hamilton Recorded: Nov 15 2018 274 mins
    Register Now
  • It’s November.  How compliant are you with NIST 800-171?
    It’s November. How compliant are you with NIST 800-171?
    Leo Sheridan, Executive Liaison for Federal and Systems Integrators, ForeScout Technologies, Inc. Recorded: Nov 15 2018 39 mins
    Ten months after the mandate to comply with NIST 800-171, many prime contractors and subcontractors admit they underestimated the cost of implementation. The U.S. Deputy Secretary of Defense just announced that the Department of Defense (DoD) would bring even more pressure on DoD contractors to meet higher cybersecurity standards, and that they would hold large contractors responsible for demanding that their subcontractors do the same. The DoD plans to begin launching “red team cyberattacks” on industrial partners, in which a cell would test vulnerabilities and try to penetrate the contractors' systems. Leo Sheridan, executive liaison for federal and systems integrators will discuss:

    • How being noncompliant can affect your business revenue next year

    • Why it has been challenging to comply with NIST 800-171

    • How to quickly assess your level of compliance

    • Defining a path to clear up the confusion and focus on the key
    elements to a strong System Security Plan (SSP)
  • How to Get More Out of Your Splunk Deployment with ExtraHop
    How to Get More Out of Your Splunk Deployment with ExtraHop
    Scott Olson, Sr. Sales Engineer; Stephen DeSanto, Solutions Engineer Recorded: Nov 15 2018 44 mins
    Splunk is an excellent platform for analyzing machine data and orchestrating responses. ExtraHop extracts wire data events and metrics from network communications, and can send this information to Splunk for added accuracy and context.

    This webinar explains why ExtraHop and Splunk make such a great fit, and how you can use the ExtraHop App for Splunk to stream wire data such as details for DNS, database, storage, and more.
  • A Connected Military: The Department of Defense's Future in Cloud
    A Connected Military: The Department of Defense's Future in Cloud
    Defense One | Cisco Recorded: Nov 15 2018 63 mins
    Register Now!
  • How to Ensure Your Applications are Secure by Design
    How to Ensure Your Applications are Secure by Design
    Chris Wysopal, Co-Founder and CTO, CA Vercode Recorded: Nov 15 2018 46 mins
    As software becomes a bigger component of the value delivered by companies in every industry, it’s no exaggeration to say that every company is becoming a software company.

    We find our customers pushing the envelope on how to tool up their internal software factory to make software better, faster and more efficiently. By necessity, software is more often assembled than it is created from scratch, as developers are more frequently incorporating open source libraries to speed up time-to-market. But as open source libraries increase, so do the number of vulnerabilities, resulting in increased risk.

    In this REPLAY session, you'll have the opportunity to view CA Veracode CTO Chris Wysopal talk about what it means to be secure by design, and why businesses need to focus on prevention. The days of detect-and-respond tactics are a thing of the past – we’re living in an age when the attacks will happen before you have the time to find and respond to them.

    *This webinar session was previously recorded.*
  • Introducing a Simpler Way to Effective Threat Management
    Introducing a Simpler Way to Effective Threat Management
    Alert Logic Recorded: Nov 15 2018 60 mins
    How to Get the Right Security Coverage for the Right Resources

    There’s a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM (security incident and event management), or expensive traditional security outsourcing vendors.

    Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Learn how Alert Logic’s seamless combination of platform, threat intelligence, and expert services can provide a simpler, more cost-effective approach to security for all your infrastructure and workloads – including across physical, virtual and cloud environments. Learn also how our flexible packaging and pricing will help you get the right level of leverage for the optimal level of investment.

    Join our experts in this webinar to learn more about this new approach to cybersecurity and see a demo of it in action.
  • Career Conversations w/ Amelie Koran, Department of Health and Human Services
    Career Conversations w/ Amelie Koran, Department of Health and Human Services
    Jessica Gulick, MBA | PMP | CISSP Nov 16 2018 12:00 am UTC 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Amélie E. Koran serves as the Deputy Chief Information Officer for the U.S. Department of Health and Human Services, Office of the Inspector General. Amélie comes to DHHS OIG via a rather circuitous route through multiple industry sectors, academia, and the public sector
    including The Walt Disney Company, Carnegie Mellon University CERT/CC, Mandiant, The World Bank and The American Chemical Society. Her public sector experience started as Lead Enterprise Security Architect for the U.S. Department of the Interior, the U.S. Treasury Department leading the Continuous Diagnostics and Mitigation implementation across the entire agency and a leadership development rotation as part of the President’s Management Council
    Fellowship serving the Federal CIO in supporting cybersecurity policy analysis and legislative review, including stewardship of the Open Data Initiative and help in giving “birth” to the United States Digital Service (USDS). She’s an ardent advocate for new approaches to hiring talent into and rational applications of security strategy and technologies for the Federal government space.

    Twitter: @webjedi
  • Come proteggere le caselle di posta quando si passa a G Suite
    Come proteggere le caselle di posta quando si passa a G Suite
    Antonio Cancellara Nov 16 2018 9:00 am UTC 75 mins
    Guarda questo webinar con una demo live per scoprire come difendere G Suite in modo efficace tramite:

    •Protezione contro minacce avanzate come frodi via e-mail, business email compromise (BEC) e attacchi di phishing mirati
    •Prevenzione della perdita dei dati (DLP)
    •Continuità della posta elettronica
  • Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
    Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
    Dan Maier, VP of Marketing at Cyren Nov 16 2018 9:30 am UTC 44 mins
    Ransomware such as Petya and WannaCry are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defences. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    Download this webinar to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Around the World with Privacy and Your Business
    Around the World with Privacy and Your Business
    Victoria McIntosh, Information and Privacy Professional, MLIS,CIPT, Information in Bloom Management Services Nov 16 2018 4:00 pm UTC 60 mins
    Planning on doing business overseas? Establishing a new office in a foreign land, or selling online to consumers in a new country? When going over company requirements for working in your new neighbourhood, don’t forget to review corporate privacy practices.

    When it comes to privacy, expectations, safeguard minimums and rights of the data subject can vary between jurisdictions. From Canada and the United States, the European Union with its new GDPR, Japan, Australia, even between China and Hong Kong, there’s no single set of global standards. Fortunately however, many privacy legislations do contain common ground. There are also ways to proactively account for the differences.

    Information and Privacy Professional Victoria McIntosh presents a taste of privacy across the globe, with some of the ways businesses can prepare in dealing with data across borders.
  • Part I: New Hands-On Cloud/Cyber Security Certification
    Part I: New Hands-On Cloud/Cyber Security Certification
    Dr. V. N. Berlin, CEO Mission Critical Institute Nov 17 2018 4:00 pm UTC 60 mins
    New Hands-On Cloud Cyber Security Certification: Learn how to qualify and fast-track your cyber career in this 3 part series

    Includes Free CISSP Adaptive Exam Prep

    In this three part webinar series you will learn about the new Certified Cloud Risk Management Professional (CCRMP) certification—
    • How the CCRMP helps you fast-track your cloud security career
    • Employers who hire CCRMPs
    • Cybersecurity jobs CCRMPs are getting
    • How veterans have benefited
    • How to qualify for the CCRMP
    • Why the free CISSP Adaptive Exam Prep is offered to CCRMPs

    CCRMP Rationale
    Employers seek cloud risk management professionals who are job-ready to utilize the NIST Risk Management Framework (RMF) and FedRAMP– the de facto U.S. standards for cloud security risk management. FedRAMP employs the NIST RMF as the tool of choice and requires all Cloud Service Providers for the federal government to comply with FedRAMP, and thus the NIST RMF. Similarly, cloud risk management professionals seek a certification which validates they are job-ready to implement the NIST RMF and FedRAMP. To meet the needs of employers and candidates Mission Critical Institute (MCI) has launched the only performance-based NIST RMF certification, the Certified Cloud Risk Management Professional (CCRMP) to address:
    • Accelerating cybersecurity staffing shortages
    • Scarcity of “job-ready” NIST RMF/FedRAMP specialists
    • Need for performance-based certifications, as opposed to exam-based certifications

    Benefits of the CCRMP
    The benefits of earning the CCRMP include:
    • 100% hands-on—no exam
    • NIST RMF/FedRAMP virtual internship
    • Earn 15 graduate credits for your accredited cloud security MSIS or MBA
    • Validation you are NIST RMF/FedRAMP job-ready
    • Cyber career development support to help you find a top cyber job
    • NIST RMF/FedRAMP project experience employers seek
    • Recognition of curriculum by Department of Homeland Security
    • Pay increase potential even while earning your CCRMP
  • Visibility and Risk in the IOT World with NAC 3.0
    Visibility and Risk in the IOT World with NAC 3.0
    Steve Mulhearn, Director Enhanced Technology Fortinet Nov 19 2018 10:00 am UTC 45 mins
    In the rapidly changing threat landscape one of the top concerns for most organisations is the introduction of IOT.

    While some organisations have attempted to prevent the connection of these devices due to their lack or non existence of any security, many organisations and Enterprises have now reached the reality that they are here to stay.

    With this in mind what risk does this pose to your organisation and how to reduce this risk to an acceptable level? We will walk through some of the options available and how they may help Enterprise manage the changing landscape.
  • How To Take Your DDoS Protection To The Next Level
    How To Take Your DDoS Protection To The Next Level
    Timothy Fong, Security Product Expert at Cloudflare | John Esterline, Solutions Engineer at Cloudflare Nov 19 2018 2:00 pm UTC 45 mins
    As the web application security landscape evolves, companies are facing increased pressures to strengthen their security posture. Recently, the world’s largest distributed denial of service (DDoS) recorded attacked GitHub at 1.35 Tbps. While the big attacks get all the headlines, at Cloudflare we have learned about other forms of attacks that can unexpectedly bring your site down.

    Join this webinar to learn about:

    - How small DDoS attacks can still bring your site down
    - A little known way attackers can bypass traditional DDoS protections
    - Why TCP services may make you vulnerable to a DDoS attack
    - Pros and cons of multiple solutions: BGP, MPLS, and building your own
    - How to augment Cloudflare’s unmetered DDoS solution with Spectrum, Rate Limiting, and Argo Tunnel
  • Have it All: Achieving Agility and Security with Automation
    Have it All: Achieving Agility and Security with Automation
    Yoni Geva, Product Manager Nov 19 2018 3:00 pm UTC 60 mins
    Are you still implementing firewall changes manually? Are you still trying to keep track of all the changes and their ramifications with spreadsheets?
    Network security policy automation gives you quick, accurate change management across even the most complex hybrid networks, avoiding security holes, compliance issues and costly outages. With automation, you don’t have to choose between agility and security. You can have both.
    In this webinar, Yoni Geva, Product Manager at AlgoSec, explains how security policies can be updated automatically and accurately.
    Join our webinar to learn how to take advantage of:
    •Automated security policy automation with zero touch
    •Security policy management that keeps up with business requirements
    •Automatic identification of risk
    •Enhanced compliance with quick audit reports on demand
  • Ransomware Solved. Cryptojacking, Next.
    Ransomware Solved. Cryptojacking, Next.
    Anthony Giandomenico, Senior Security Strategist; Damien Lim, ATP Product Marketing; Aamir Lakhani, Sr. Security Strategist Nov 19 2018 6:00 pm UTC 61 mins
    A recent threat landscape assessment reports a double-digit growth of cryptojacking. Organizations will soon be facing a phenomenon similar to ransomware if their security posture is not ready to address this new issue.

    Join our panel of experts for a round table discussion around these types of threats and the tactics cybercriminals are leveraging today plus learn about how Fortinet’s advanced threat protection (ATP) Fabric-enabled approach stops the delivery of malicious crypto-mining malware across the dynamic attack surface targeting end-users and servers from the campus to the cloud.
  • Technology Trends 2019: 5 ways cybersecurity will transform next year
    Technology Trends 2019: 5 ways cybersecurity will transform next year
    Matthew Gyde, Group Executive, Cybersecurity at Dimension Data Nov 19 2018 6:30 pm UTC 60 mins
    CyberConversations around the strength of a company’s cybersecurity has never been more pertinent. We’re generating more data than we know how to deal with, and as the opportunities for cybercriminals proliferate, so does their approach to attacks mature.
    A key piece of advice? Trust no-one. With the cloud continuing to aid digital transformation, and AI/machine learning finally realising their potential, cybersecurity defences are beginning to migrate to a more predictive model. This will allow companies to create digital fingerprints of their employees, improve access to data and applications, and predict attacks before they happen.
    Join Matthew Gyde, Group Executive, Cybersecurity at Dimension Data, as he reveals the main findings from Dimension Data’s Technology Trends 2019 report, exploring how the cybersecurity landscape will shift in 2019, and what measures companies can take to keep the bad guys out.
    This webinar will cover:
    •How zero trust is maturing into digital trust, and the evolution of predictive threat detection.
    •Why organisations are focusing on cloud-based security platforms.
    •Why organisations now aim to be secure by design.
    •How cybersecurity is becoming intelligence driven.
    •Why tighter regulation is affecting risk profiles.
  • Select and Deploy New Security Tools Faster
    Select and Deploy New Security Tools Faster
    Ian Farquhar, Distinguished Sales Engineer, WW Security Subject Matter Expert, Gigamon Nov 20 2018 6:00 am UTC 62 mins
    Sign up for this webinar and find out how to increase the efficiency of your security tools. Efficient prevention coupled with rapid detection and containment improves your overall security posture. Threats don't stand a chance.

    Discover how to select and deploy new security tools faster and more easily than you ever thought possible.

    You’ll learn how to:
    • Implement strategies for keeping up with ever-changing security tools.
    • Test multiple tools under consideration without impacting network performance.
    • Set up tests for inline tools.
    • Strengthen testing and streamline deployment of tools.

    See how to eliminate the challenges of testing and deploying security tools with a security delivery platform.

    Join Gigamon and (ISC)² to learn how to select and deploy new security tools faster.

    Presenter: Ian Farquhar, Distinguished Sales Engineer, WW Security Subject Matter Expert, Gigamon
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Technology Trends 2019: 5 ways the tech landscape will transform next year
    Technology Trends 2019: 5 ways the tech landscape will transform next year
    Ettienne Reinecke, Group CTO at Dimension Data Nov 20 2018 6:00 am UTC 60 mins
    Until now, the tech sector has spoken about innovative technologies somewhat theoretically, without providing a clear picture of how these powerful innovations will be used and what they will look like in practice. This has left people without a solid understanding of how these solutions will ultimately manifest in our work and personal lives.

    Join Ettienne Reinecke, Group CTO at Dimension Data, as he reveals the game-changing approaches that will transform the tech landscape during 2019 and beyond, and how companies can ensure emerging solutions – such as AI, machine learning, robotics and AR/VR – become firmly embedded in their core processes. Ettienne will explore:

    •Why easier access will accelerate the adoption of game-changing technologies.
    •How identity will emerge as the killer app for blockchain.
    •How companies can extract value from data, while respecting privacy.
    •Why the Internet of Things (IoT) will change our lives for the better.
    •How disruption will drive consolidation among tech vendors.
  • Démo Rubrik : Disponibilité instantanée de toutes vos applications
    Démo Rubrik : Disponibilité instantanée de toutes vos applications
    Lionel Meoni, Systems Enginee Manager, Rubrik France Nov 20 2018 9:00 am UTC 33 mins
    Rubrik a développé la première plateforme Cloud Data Management conçue pour la gestion de données convergées avec la protection des données, la recherche, l’analyse, l’archivage et la copie de données pour le cloud hybride entreprise

    Rejoignez Lionel Meoni pour assister à une présentation et une démo et découvrir comment Rubrik remplace les logiciels de sauvegarde par une appliance « plug-and-play » capable d'assurer l'orchestration des données, la gestion des catalogues et la déduplication du stockage. Il vous présentera également la plate-forme SaaS Polaris.
  • LIVE PANEL: Cybersecurity for the Modern Era
    LIVE PANEL: Cybersecurity for the Modern Era
    Tom Berry, Adenike Cosgrove, Swati Lay, Naveen Vasudeva, Graham Edwards and Clive Room Nov 20 2018 10:00 am UTC 60 mins
    In today's ever evolving threat landscape, the attackers are increasingly targeting people rather than technology.

    For CISOs and security professionals, the top priority is to strike the perfect balance between technology and employee empowerment. You need to build defences that start with and work for your organisation's most important asset - your people!

    Join us and our line up of industry experts at this live panel discussion, part of our Hacking Human Nature Summit to hear how they are building people centric strategies.

    Line up:
    •Swati Lay, CISO, Funding Circle
    •Graham Edwards, Former Head of Group Security, Nationwide
    •Naveen Vasudeva, MD & Co-founder, CyberCorre
    •Clive Room, Chairman, White Hat Ball
    •Adenike Cosgrove, International Cybersecurity Strategist, Proofpoint

    Moderated by: Tom Berry, Advisory Board Member, ClubCISO
  • Back to Basics: Solving the Email Fraud Problem
    Back to Basics: Solving the Email Fraud Problem
    Robert Holmes, VP Email Security Products Nov 20 2018 11:30 am UTC 43 mins
    In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology.

    Join this webinar to learn:
    - Findings from our latest Email Fraud study
    - Email Fraud trends from 2017 and threats to look out for in 2018
    - Helpful tips to protect your people, data and brand against Email Fraud
    - Live Q&A with the speakers
  • Live Demo: 360 Degrees of Email Fraud Defense
    Live Demo: 360 Degrees of Email Fraud Defense
    Neil Hammet Nov 20 2018 12:30 pm UTC 45 mins
    Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.

    Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.

    • Block malicious emails spoofing your domains before they reach your employees and customers
    • Monitor all emails (inbound and outbound) from your domains and those of third parties
    • Accurately distinguish between legitimate emails and fraudulent emails
  • Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbH Nov 20 2018 1:00 pm UTC 59 mins
    Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
    Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
  • Driving Behavioural Change Through Phishing Simulation and Security Training
    Driving Behavioural Change Through Phishing Simulation and Security Training
    Paul Down, Wombat Specialist Nov 20 2018 1:30 pm UTC 45 mins
    Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.

    Join us for this webinar where you will learn:

    * About the latest trends and tactics used by threat actors that target your organization
    * How to assess your users’ susceptibility to phishing attacks
    * To respond to threats through end-user training and reporting
  • Comment contextualiser les accès et les habilitations avec le model Zéro Trust
    Comment contextualiser les accès et les habilitations avec le model Zéro Trust
    Chardy N'Diki, Directeur Regional, Europe du Sud Nov 20 2018 2:00 pm UTC 30 mins
    La sécurité doit non seulement être simple mais doit aussi aider les différents métiers d’une entreprise à être plus efficient.

    Dans des environnements où le cloud et la mobilité deviennent la norme, comment réduisez-vous les risques associés à ses usages tout en augmentant la productivité ?

    Durant ce webinaire nous allons vous présentez la plateforme Zéro Trust de Centrify et comment nous pouvons unifier la gestion des accès, des habilitations, la traçabilité en tenant des différents contextes d’usages et des facteurs risque qui y sont associés.
  • Trust No One Part 2.  What Does Zero Trust Mean for You?
    Trust No One Part 2. What Does Zero Trust Mean for You?
    Lindsay Drabwell, Head of Membership, (ISC)² EMEA, Richard Archdeacon, Duo, Daniel Cuthbert, Banco Santander Nov 20 2018 2:00 pm UTC 60 mins
    As early as 2003 the Jericho Forum was created to tackle "de-perimeterisation" and later in 2014 Google released their "BeyondCorp" paper detailing how they made it happen. However, have Zero-Trust security models been adopted in the enterprise and what challenges do organisations face when considering de-perimeterisation?

    Join the discussion between Richard Archdeacon from Duo Security and Daniel Cuthbert from Banco Santander in Part 2 of the Zero Trust series and learn about Zero Trust deployments within the enterprise.
    Speakers:
    Richard Archdeacon, Advisory CISO, Duo Security
    Daniel Cuthbert, Global Head of Cybersecurity Research, Banco Santander

    For Part 1 in the Zero Trust Series, copy and paste this link into your browser: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars?commid=334792&Part2
  • Kaspersky Lab’s Advanced Targeted Threat predictions for 2019
    Kaspersky Lab’s Advanced Targeted Threat predictions for 2019
    Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab’s Global Research and Analysis Team Nov 20 2018 2:00 pm UTC 60 mins
    Kaspersky Lab will share its predictions for what the world’s major threat actors could have planned for the coming year. The webinar will explore some of the key trends in terms of tools, techniques and processes likely to be used by such groups against government organizations, enterprises, critical infrastructure, society at large, and more – and consider what that means for organizations, the security community and international cyberspace.

    The aim of the webinar is to stimulate debate among IT security professionals in all industries and to increase awareness and understanding that will help them to defend their organization against these threats.
  • Live Demo: Phishing Simulation and Security Awareness Training
    Live Demo: Phishing Simulation and Security Awareness Training
    Jen Gough, Sales Engineer, Proofpoint Nov 20 2018 3:00 pm UTC 45 mins
    What are the key components of a best-in-class solution for phishing simulation and training?

    Join us for a live demo of Wombat Security to see for yourself!

    Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.


    You’ll learn how to:

    - Assess your users’ susceptibility to phishing and spear phishing attacks
    - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
    - Allow your employees to report suspicious messages with a single mouse click
  • Everything SMBs and MSPs Need to Know about Machine Learning
    Everything SMBs and MSPs Need to Know about Machine Learning
    George Anderson, Director of Product Marketing at Webroot Nov 20 2018 3:00 pm UTC 60 mins
    Recently, new and established security vendors have upped their use of the fancy-sounding term "machine learning". While the technology isn't new (Webroot won an innovation Edison Award for work in the field over 6 years ago in 2012), it has resurfaced as a marketing buzzword and created some confusion in the industry.

    We’d like to invite you to join Webroot director of product marketing George Anderson for a 30-minute webinar to learn how Machine Learning is used in cybersecurity and how Webroot has been applying it for more than 10 years to create actionable threat intelligence for stopping a wide range of threats.

    Topics include:

    • Understanding Machine Learning (ML)
    • How ML can stop zero-day and never-before-seen threats
    • The importance of contextual analysis and predictive analytics
    • Real-world results from the “new” ML technology
    • How ML Directly Benefits your Customers
  • Measuring Policy Effectiveness
    Measuring Policy Effectiveness
    Michael Rasmussen Nov 20 2018 3:00 pm UTC 36 mins
    Defining Process & Metrics to Demonstrate Policy awareness and adherence.

    Policies are no good if they are left to be documents that are written and forgotten, stored on a physical or electronic shelf collecting real or digital dust. Organizations need policies that are correctly written, but also clearly understood and enforced in the environment. This webinar looks at the key metrics and process to effectively communicate policies in the environment, track awareness, enforce policies, and monitor metrics of policy adherence.

    Attendees will specifically learn how to:
    •Write policies that are clearly understood
    •Develop a policy communication and awareness plan
    •Demonstrate understanding of policies by individuals
    •Enforce policy compliance/adherence
    •Measure and monitor effectiveness of policies