Hi [[ session.user.profile.firstName ]]

IT Security

  • SD-WAN Extends Into the Realm of SAS
    SD-WAN Extends Into the Realm of SAS
    Shefali Chinni, Senior Product Marketing Manager Recorded: Nov 27 2020 48 mins
    Advancing your digital transformation means adopting new technologies and deploying infrastructure in new ways. Whether you’re moving to the cloud or deploying on-premises, transforming your network is essential to a successful transformation. In this live webcast, we will update you on our network transformation vision, which, for the 3rd year in the row, has been named a leader in the 2020 Gartner Magic Quadrant for WAN Edge Infrastructure.
    Join us to learn about the new Secure Access Service Edge (SASE) platform that delivers intrinsic security and Zero Trust Network Access (ZTNA) for organizations embracing cloud and SaaS. Along with SD-WAN work from home (WFH) subscriptions, you can now provide your remote workforce with the benefits of network optimization -- assured application performance with advanced security at an affordable cost.
  • いかにしてソフトウェアのセキュリティを向上させるか?  最新のBSIMMレポートから読み解くソフトウェア・セキュリティをめぐる 現状と改善のための活動
    いかにしてソフトウェアのセキュリティを向上させるか? 最新のBSIMMレポートから読み解くソフトウェア・セキュリティをめぐる 現状と改善のための活動
    日本シノプシス合同会社 ソフトウェア インテグリティ グループ セキュリティコンサルティング マネージングプリンシパル 大森健史 Recorded: Nov 27 2020 53 mins
    ソフトウェア開発におけるセキュリティの重要度は益々高まっています。
    自社のセキュリティ対策はどの程度十分といえるか、どの様にロードマップを敷いて改善に取り組むべきか、こうした悩みを抱える方も多いのではないでしょうか。

    シノプシスのBSIMM(セキュア開発成熟度モデル)は各国の企業・組織のソフトウェア・セキュリティの取り組みをデータ化し、それらと比較することで参考にすべきソフトウェア・セキュリティの取り組み、自社の立ち位置と改善ロードマップ策定に役立てるプログラムです。

    最新のBSIMMから見えるソフトウェア・セキュリティの動向と、改善のための利用例を紹介するセミナーを実施します。

    主な内容
    - ソフトウェア・セキュリティの最新トレンド、シフトレフトのその先?
    - BSIMMから見えた業種ごとのソフトウェア・セキュリティの特長
    - BSIMMの進め方と、改善活動への応用
    - Q&A
  • Data Breach – Tools and tips for managing a cyber attack
    Data Breach – Tools and tips for managing a cyber attack
    Paul Benedek, Consultant Director, Excis Networks Ltd and Bernadette Tyson, Consultant Director, Excis Networks Ltd Recorded: Nov 26 2020 45 mins
    Every day we see news of cyber-attacks. We get the impression that they may only be affecting
    larger companies, but this is far from the truth. In fact, the statistics clearly show that smaller
    companies are also being targeted. Cyber-attacks are not diminishing, and sadly whatever the size of
    your company, you are a target in today’s connected world. But despite this, many businesses are
    not prepared, technically or operationally to deal with the impact of cyber-attacks made against
    them.

    In this talk we look at the steps that all companies, small or large can take to mitigate and deal with
    cyber-attacks, as well as incident response and the human elements that feature in an attack. We
    also cover the key areas of cyber breach management and examine it from an attacker,
    organisational and customer perspective, revealing the impact not only your organisation but to
    others in your value chain.
  • Branch of One Enabling the Secure Office Anywhere
    Branch of One Enabling the Secure Office Anywhere
    Mick Higgins Recorded: Nov 26 2020 30 mins
    Presentation of results from Global CxO study into the future of the secure office anywhere. We surveyed over 1000 C-Suite executives across North America, EMEA and APAC to understand how they are addressing the challenges of Covid-19 and the future hybrid workplace.
  • Friction, Fraud, and Fintech: Delivering Speed and Security with Digital Trust &
    Friction, Fraud, and Fintech: Delivering Speed and Security with Digital Trust &
    Jim Payne and Adam Gibson Recorded: Nov 26 2020 42 mins
    Consumers and businesses rely on fintech services to manage capital with flexibility, transparency, and speed—but fraudsters are standing by to take advantage. So how do fintech services create quick and frictionless experiences for users without putting them at risk, or compromising growth? With a Digital Trust & Safety approach, you can reduce roadblocks, proactively stop fraud and grow your business.
  • 5 Reasons CISOs are Turning to Security-as-a-Service
    5 Reasons CISOs are Turning to Security-as-a-Service
    Jo Peterson, Clarify 360; Dan Bowden, Sentara Healthcare; Tyler Cohen Wood, Private Consultant; Mark Lynd, NETSYNC Recorded: Nov 26 2020 61 mins
    The global security as a service market size is expected to grow from USD 11.1 billion in 2020 to USD 26.4 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 18.9% during that time period. Driven by a cloud-based delivery model, options abound for organizations in areas such as application security, data security, identity and access management, infrastructure protection and integrated risk management to name a few. These options include off the shelf security as a service products as well as those provided and managed by an MSSP.

    In today’s session we’ll explore these 5 key points:
    1. Security budgets and priorities in a post Covid-19 world
    2. When to outsource
    3. Selecting an MSSP
    4. Tools, Tools and More Tools
    5. Upskilling your team
  • Introducing MSP Edition: IT Monitoring for Managed Service Providers
    Introducing MSP Edition: IT Monitoring for Managed Service Providers
    Pierrick Martel, Product Marketing Manager Recorded: Nov 26 2020 22 mins
    Take advantage of growth opportunities, scale easily and add value to your clients with Centreon's recently launched new software edition. Take a sneak peak at Centreon MSP Edition, a new iteration of the acclaimed Cloud-to-Edge IT Monitoring Platform.

    This webinar walks you through 4 reasons the MSP Edition of the Centreon Platform perfectly addresses the unique requirements and challenges of Infrastructure Managed Service Providers.

    In this session, we'll discuss:
    - Multi-tenancy and distributed architecture
    - Increased team productivity
    - The added value of a comprehensive service catalog and instant return on investment with a flexible, pay-per-use model

    We'll conclude with three questions you may ask yourself to assess whether your organization is ready to address new MSP Market growth opportunities.

    Watch this 20 minute webinar to evaluate whether Centreon MSP Edition is the Cloud-to-Edge IT Monitoring platform you're looking for.
  • POR QUÉ MICROSOFT ATP NO ES SUFICIENTE
    POR QUÉ MICROSOFT ATP NO ES SUFICIENTE
    Andres Gonzalez Duarte Recorded: Nov 26 2020 62 mins
    Únase a SonicWall en este webinar y conozca más sobre:
    - La efectividad de Microsoft ATP contra el phishing en escenarios del mundo real
    - Por qué Office 365 es especialmente susceptible a los ataques de phishing dirigidos
    - Cómo proteger mejor a su organización contra los ataques de phishing actuales.
  • Cyber Threats in 2021: Real impact of COVID on Cyber Security
    Cyber Threats in 2021: Real impact of COVID on Cyber Security
    Himanshu Dubey, Director of Security Labs and Harshad Bhujbal, Technical Architect, Quick Heal Technologies Ltd. Recorded: Nov 26 2020 33 mins
    2020 has seen many Cyber Attacks using the COVID-19 pandemic as the central theme. For most
    part though these have been the same attacks that have existed since the last few years; just
    the packaging was changed.

    We expect the real cyber security repercussions of changes brought in by the COVID-19
    pandemic to be felt in 2021. In this talk we explore what the repercussions might be and what we
    can do to prepare and protect ourselves against them.

    We will cover:
    - Major Cyber Attack trends of 2020
    - What can be expected to continue in 2021
    - Potential repercussions of COVID-19 induced changes and new attack types in 2021
  • Protect your organisations data, privileged users and reputation
    Protect your organisations data, privileged users and reputation
    Dan Marano, Ian Stimpson Recorded: Nov 26 2020 32 mins
    Learn what your organisation can do to protect its data, privileged users and reputation during an unprecedented global disruption requiring new ways of working and large organisational change
  • Beyond the Technology: How can Security Enable Business Impact?
    Beyond the Technology: How can Security Enable Business Impact?
    Richard Bennett, Chief Industry Evangelist & Spokesperson, Industry Strategy & Solutions, Vmware Recorded: Nov 26 2020 12 mins
    A discussion that provides essential guidance to those who allocate resources as part of efforts to shrink their organization's attack surface, reduce security and privacy risk, and develop efficiencies in their security technologies and strategy.
  • High Performance Computing in Algorithmic Trading
    High Performance Computing in Algorithmic Trading
    Dell Recorded: Nov 26 2020 95 mins
    Finding and implementing alpha with better computational platforms.

    Topics that will be presented include:
    • Quantitative asset management - what is it and why?
    • Challenges - what makes you stand out?
    • Alpha - investigation and validation
    • Models & techniques
    • Alternative data and machine learning
    • Tools and libraries
    • Alpha - implementation: portfolio construction
    • Alpha - implementation: trading
    • Requirements on platforms
    • Technology stack
  • Principles for Deploying a Secure Cloud Architecture
    Principles for Deploying a Secure Cloud Architecture
    Stephen Archer, Senior Specialist Systems Engineer Recorded: Nov 26 2020 62 mins
    In the shift to the cloud, enterprises are struggling to balance rapid business innovation with the integration of legacy systems into new cloud-based applications. The good news is that successful enterprise cloud adoption models do exist, that make it possible for teams to work together in a multi-cloud world to deliver apps quickly and securely. We call this Secure Cloud Architecture.

    Attend this webinar to learn about:

    - Architecture design principles that support business outcomes at scale
    - How development and IT roles need to evolve to support the business
    - The importance of reusable infrastructure and security services

    By watching this podcast, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://www.f5.com/company/policies/privacy-notice). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
  • 5 MPLS Migration Challenges SD-WAN Solves
    5 MPLS Migration Challenges SD-WAN Solves
    Yishay Yovel, Chief Marketing Officer at Cato Networks Recorded: Nov 26 2020 52 mins
    It’s no secret that enterprises are looking beyond MPLS for their new WANs. For some, it’s the rigidity and high costs of MPLS services; for others, it’s MPLS’s complexity and incompatibility with the cloud. But how exactly will migrating to SD-WAN help you overcome MPLS’s limitations?

    Find out on our next webinar, as Yishay Yovel, Chief Marketing Officer at Cato Networks shares the stories of businesses from around the globe who made the transition to SD-WAN.

    Join us to hear:

    - How DSM Pharmaceuticals and Fisher & Company solve global latency issues without paying through the nose.
    - The ways UMHS and Pet Lovers Center, with its 100+ site Cato implementation, deliver direct, secure Internet access without deploying a heap of branch office security appliances.
    - What Brady PLC and Adroll did to optimize cloud access at the branch and on the road.
    - How companies reduce costs and optimize global voice and UCaaS delivery without relinquishing the control of MPLS.
  • Tech Jam - Deploy New Distance Collaboration and Business Continuity Strategies
    Tech Jam - Deploy New Distance Collaboration and Business Continuity Strategies
    Bob Williamsen Recorded: Nov 26 2020 24 mins
    In this session, we will cover how to move data faster, improve bandwidth utilization and enhance data security, how this new Isilon solution can help Enterprises can implement distance collaboration and business continuity strategies
    Hear about how one of Isilon’s biggest customers was able to improve throughput by 73% and reduce replication time by 42%
    Presenters: Truls Myklebust Product Management, Brocade Storage Networking and Mark Cincotta, Business Development, Dell Technologies Account Team
  • The Journey to true Hybrid Cloud
    The Journey to true Hybrid Cloud
    Jarren Budds | Systems Engineer, Nutanix Recorded: Nov 26 2020 21 mins
    Today, many organisations are evaluating hybrid cloud architectures to supplement their private cloud deployments with public cloud adoption. However, these deployments can quickly run into silos requiring different management tools and skill sets across clouds.

    These siloed environments all require different management tools and skill sets, which creates a breeding ground for operational complexity. In order to truly benefit from a hybrid cloud, what is needed is a single platform that spans private and public clouds.

    Watch this webinar to learn how Nutanix delivers a True Hybrid Cloud that can help you:

    • Burst capacity into public cloud when demand spikes
    • Migrate applications from on-prem to hybrid cloud without retooling
    • Control cloud costs and drive accountability
    • Automate security auditing and maintain compliance baseline
  • Imaginons le lieu de travail de demain ensemble. Webinar avec Okta et Imerys
    Imaginons le lieu de travail de demain ensemble. Webinar avec Okta et Imerys
    Okta Recorded: Nov 26 2020 25 mins
    Toutes les entreprises du monde entier doivent plus que jamais s’adapter aux nouvelles réalités de l’environnement de travail : les collaborateurs sont soudainement dispersés, digital first, et isolés. Comment réussir à les rapprocher dans un contexte de travail si différent ?

    Pendant ce webinar, vous entendrez Joël Fromont de Imerys, CDO & CISO, nous expliquer comment Imerys travaille à donner vie à ce nouvel environnement en accélérant certaines pratiques de travail après la crise du COVID-19. Rejoignez-nous pour cette session questions/réponses en direct, menée par Nicolas Petroussenko, VP & Country Manager France d’Okta.
  • POR QUE O MICROSOFT ATP NÃO É SUFICIENTE
    POR QUE O MICROSOFT ATP NÃO É SUFICIENTE
    Renato Mataitis Recorded: Nov 26 2020 60 mins
    Participe deste Webinar e saiba mais sobre:
    - A eficácia do Microsoft ATP contra phishing em um cenários do mundo real
    - Por que o Office 365 é exclusivamente suscetível a ataques de phishing direcionados
    - Como proteger melhor sua organização contra os ataques de phishing modernos.
  • I've Been Hit By Ransomware: Now What?
    I've Been Hit By Ransomware: Now What?
    Mark D Rasch, Chief Legal Officer, Unit221B Recorded: Nov 26 2020 44 mins
    This session will focus on specific technical, legal and policy responses to ransomware attacks.

    Join to learn more about:
    * History of Ransomware
    * Most common forms of Ransomware
    * Costs of Ransomware and Mitigation
    * Ransomware Insurance
    * Ransomware prevention
    * Ransomware training and education
    * Legal Issues in Ransomware Payment (with October 2020 developments)
    * Ransomware mitigation
    * Threat intelligence and investigation in ransomware cases
    * Ransomware inoculation
    * Disaster recovery in ransomware
  • Equipping and Educating Your Team for Success
    Equipping and Educating Your Team for Success
    Jeremy van Doorn, VMware | Scott Mckinnon, VMware | Jack Mannino, nVisium Recorded: Nov 26 2020 47 mins
    Security: A Team Sport Episode Three

    This episode is all about the ‘how’ of implementing successful security management. Now that we know the importance of integrating security and IT teams, and how beneficial consolidated management can be, how can you apply this knowledge to your business, master your game plan and set up your business to be successful and secure?

    From optimizing the use of a hybrid cloud structure, to cloud networking and working with your security and IT teams to improve communication and collaboration, this episode will equip you with:

    - A framework for successfully implementing your strategy
    - The practical knowledge you need to maintain a successful security game plan
    - What security excellence looks like as you prepare for the future

    Panellists:

    - Jeremy van Doorn, Sr Director of Solutions Engineering, Software Defined Data Center
    - Scott Mckinnon, Security Architect, SDDC Architecture Team EMEA, VMware
    - Jack Mannino, CEO, nVisium
  • The Secrets to Pole Position in F1 and Network Security
    The Secrets to Pole Position in F1 and Network Security
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP, David Coulthard & Bob Constanduros Recorded: Nov 26 2020 64 mins
    Join F1 star David Coulthard, leading F1 sports commentator Bob Constanduros and Gigamon experts for a unique session on optimising Network Detection and Response (NDR) and other security tools with uncompromised network visibility. Provide your InfoSec and IT teams with the fuel to race towards a winning performance.

    Full visibility of internal mechanics and external surroundings is crucial for F1 drivers racing on circuits at break-neck speed. Protecting your IT infrastructure is no different. Without clear visibility of ALL relevant traffic, deploying NDRs or any other security tool is so resource-intensive and time-consuming, it can take InfoSec teams away from detecting and hunting threats.

    Learn more about network security optimisation, Gigamon solutions and hear how customers are optimising their NDR investment. The final lap will see David Coulthard taking live questions from the audience and being interviewed by Bob Constanduros who has covered over 670 Grand Prix’s and interviewed multiple F1 legends throughout his career.
  • Managing secrets sprawl – 3 reasons why you need a root of trust
    Managing secrets sprawl – 3 reasons why you need a root of trust
    John Boero, Sr. Solutions Engineer, HashiCorp and Juan C. Asenjo, Ph.D., CISSP, nCipher Security Recorded: Nov 26 2020 58 mins
    As organizations migrate to the cloud to manage workloads in a more flexible and cost-effective manner, the number of passwords, PINs, keys, tokens, and other secrets used to access application platforms and data is increasing exponentially. Maintaining centralized repositories of secrets enables organizations to apply consistent protection policies that strengthen security and facilitate auditing and compliance.

    This webcast will look at the growing challenge faced when deploying centralized secrets management tools and how to mitigate risks associated with aggregation of sensitive assets. Our speakers will examine how cloud migration, DevOps, and regulatory compliance require a root of trust, and will describe best practices for deploying these solutions.

    Join the webcast and learn:
    • What challenges secrets sprawl represents for organizations
    • How centralized key management ensures consistent policy
    • Why cloud, DevOps, and regulations require a focus approach
    • Where is a root of trust required for high assurance security

    This webinar is for you if you are responsible for:
    1. Managing digital transformation and cloud migration
    2. Overseeing security best practices in your organization
    3. Auditing and ensuring your organizational compliance
  • How to Define a Winning Security Strategy
    How to Define a Winning Security Strategy
    Jeremy van Doorn, VMware | Joe Baguley, VMware | Chani Simms, Meta Defence Labs Recorded: Nov 26 2020 46 mins
    Security: A Team Sport Episode Two

    With benefits of integrating your IT and Security teams ranging from fewer breaches to faster response times, collaboration is evidently the way forward. ‘IT and Security Silos: A Spotlight On The EMEA Region’ states that whilst 29% of companies already have a unified IT management and security strategy, 40% are planning on implementing a unified strategy in the next 12 months. But how should businesses planning on implementing this new strategy approach the formation of a united security plan?


    In the second episode of ‘Security: A Team Sport’, we’ll share:

    - What challenges you can expect
    - Best practices for preparing to equip a winning team for success
    - The benefits this will have for your business.

    Panellists:

    - Jeremy van Doorm, Sr Director of Solutions Engineering, Software Defined Data Center
    - Joe Baguley, VP & Chief Technology Officer, VMware
    - Chani Simms, Cybersecurity and GDPR Consultant. CEO and Founder of SHe CISO Exec and Meta Defence Labs
  • Office365: Protecting the largest, most popular SaaS application
    Office365: Protecting the largest, most popular SaaS application
    David Lomax, Kenin Orritt, Phil Howe Recorded: Nov 26 2020 26 mins
    Microsoft continues to grow as the world’s most adopted SaaS application provider with over 258 million Office 365 and 75 million Teams users, according to the company’s third-quarter earnings call in 2020. As a result, it has become a rich repository for critical business data and a tantalizing target for cyberattackers.

    Join us on November 26th at 11am to learn how Cognito Detect for Office 365 detects how cybercriminals use account take over and legitimate Office 365 services to bypass security controls to execute attacks. We’ll share insights from our recently published research in the 2020 Spotlight Report for Office 365, which identifies the tools and services within the cloud-based application commonly being leveraged by attackers. By observing 4 million Office 365 accounts over a 90-day period, Vectra were able to identify suspicious high-risk behaviours associated with attacker techniques exploiting built-in Office 365 capabilities.


    Key learnings
    • David Lomax, Vectra, will be walking you through the impact of Office 365 on security, how important keeping a watchful eye on the misuse of user access across on premises networks and cloud instances

    • Kevin Orritt, ICT Security Manager at Greater Manchester Mental Health Foundation Trust will be discussing his own experience with the Office 365 integration as well as outlining the part he has played in shaping this solution with Vectra.


    There will be a chance at the end to get any of your questions answered so stay tuned.

    Register today to save your seat.
  • Dry Run#2 - Testing to Quality Engineering – A Transformation driven by Agile
    Dry Run#2 - Testing to Quality Engineering – A Transformation driven by Agile
    Manu Rajsathyarajan, QE Practitioner, Richard Telleria, MD - Australia & NZ, Jagadeesh Balakrishnan, Director - Lean Nov 30 2020 4:00 am UTC 60 mins
    How the traditional Software Testing process, methodologies, approach, and techniques that are used to ensure quality at the end of the SDLC life cycle have transformed into ‘Quality Engineering’, an engineering discipline that drives the development of quality products. The transformation that was driven by Agile adoption which demands greater flexibility, speed, and collaboration. Also, explore how the methodologies like BDD transformed test automation to enable In-Sprint functional testing automated, compared to how it was leveraged just for Regression testing traditionally.
    • Key Takeaways:
    - Demystify Quality Engineering Vs Testing
    - Best practices to implement QE in Agile
    - Advantages of BDD approach in Agile QE
    - Introduce UST’s Agile QE tools & capabilities
  • SSCPオンラインチャレンジセミナー
    SSCPオンラインチャレンジセミナー
    安田良明, CISSP, SSCP, (ISC)² 認定講師; 小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan Nov 30 2020 7:00 am UTC 120 mins
    経営陣が情報セキュリティやリスクマネジメントの取り組みを推進してはいるものの、期待するほど情報セキュリティが向上していない声をよく耳にします。その理由の1つとして経営陣は情報セキュリティの課題を解決するために必要となる現場を把握する仕組みづくりにうまくいっていないことが挙げられます。

    経営陣が情報セキュリティの活動を宣言したとしても現場の実務者が経営陣が期待する活動を行わない限り情報セキュリティは向上していきません。しかし、現場の実務を支える実務者の育成は耳ざわりがよい知識と技術を身に着ければよいというわけではなく、「組織」という観点を理解し、情報セキュリティ専門家や経営陣とコミュニケーションを図れる人材でなければなりません。そのため、IT全体にわたる知識とスキルがあり、ネットワークやシステムの開発・運用などに従事する人に必要な知識に加え、確実なセキュリティ対策を実装・維持できる技術的な観点だけではなく「組織」という観点から情報セキュリティを理解している必要があります。

    SSCPの7ドメインは、情報セキュリティの運用から基本的な情報セキュリティの実務に必要な知識を取り扱い、情報セキュリティを専業としていない実務経験年数が少ない方にとっても、より実践に近い内容をグローバルの標準に則って理解することが期待できます。今回のオンラインセミナーでは、「現場の情報セキュリティ担当者に必要な情報セキュリティの知識と考え方」として、IT全般のエンジニアやサポート技術者、アナリスト担当者が知っておくべき情報セキュリティの知識をわかりやすくお教えします。

    SSCPを受験させてみたいけど、どのような内容になっているのかわからないというユーザー企業の管理職の皆さんにも理解しやすい内容で提供させていただきます。

    システム開発や情報システム担当者の皆さんにも効果的な内容となっています。
  • Data Protector zum Wochenstart: Data Protector Neuerungen – November Release
    Data Protector zum Wochenstart: Data Protector Neuerungen – November Release
    Sprecher ist ein Technical Consultant mit Spezialisierung auf Data Protection Nov 30 2020 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor. Aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery fließen ebenfalls in die Webinare mit ein. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand.

    Je nach Thema dauern die Webinare zwischen 60 und 90 Minuten.
  • Advanced Server Access & Your Journey to the Cloud Operating Model
    Advanced Server Access & Your Journey to the Cloud Operating Model
    Ivan Dwyer, Group Product Marketing Manager, Okta Nov 30 2020 9:00 am UTC 45 mins
    Historical approaches to managing and operating access management solutions no longer work in a world where infrastructure dynamically spins up & down and may only last for weeks, days or even minutes. DevOps teams are using automation pipelines and managing their infrastructure as code - so why aren't you?

    In this session, you will learn why you should adopt an "everything as code" approach to managing your IAM stack. Hear how to leverage Okta Advanced Server Access to streamline access to Cloud Infrastructure, with a peek into the upcoming product roadmap.
  • Continuous Assurance for the AWS Well-Architected Framework [ISRAEL EVENT]
    Continuous Assurance for the AWS Well-Architected Framework [ISRAEL EVENT]
    Rob Melka - Senior Solutions Architect at AWS, Ori Tabachnik - CRO at CloudZone, Avi Aharon - VP Cloud at Continuity Software Nov 30 2020 9:00 am UTC 42 mins
    Join us to learn all about the AWS Well-Architected Framework’s five pillars, including why it’s important for your business, how it helps build best-of-breed infrastructure for applications, and how it provides a method for the maintenance of optimal infrastructure.

    This session will help you ensure your new apps are built in line with AWS design principles and best practices, and show you how you can continuously and automatically be sure you're adhering to AWS Well-Architected Framework to reach better business outcomes.

    Topics of discussion will include:

    - Challenges to building and maintaining robust infrastructure
    - Removing threats to Well-Architected adherence
    - How the solution works in a joint customer case study

    The session's guest speakers are:

    - Rob Melka, Senior Solutions Architect at AWS
    - Ori Tabachnik, CRO at CloudZone
    - Avi Aharon, VP Cloud at Continuity Software
  • MINDHUNTER #3: Storms Ahead: The Dark Side of the Rush to the Cloud
    MINDHUNTER #3: Storms Ahead: The Dark Side of the Rush to the Cloud
    John Aarsen, SE - Benelux and Nordics, SonicWall Nov 30 2020 10:00 am UTC 60 mins
    Join SonicWall Cybersecurity expert John Aarsen as he explores the biggest threats to cloud environments — and why new ways of looking at cybersecurity, such as “Shift Left,” are required for safe and productive cloud use.
  • Podcast: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!
    Podcast: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!
    Digital Shadows Threat Researchers, Stefano De Blasi, Dylan Gray, Adam Cook, and Kim Bromley Nov 30 2020 10:30 am UTC 50 mins
    ShadowTalk hosts Stefano, Kim, Dylan, and Adam bring you the latest in threat intelligence. This week they cover:

    - RegretLocker’s approach to quickly encrypting files - how their
    efficiency compares to counterpart Ryuk
    - Vx Underground’s code used in ransomware attacks
    - APT32, or OceanLotus, using social media and news sites to draw in
    users and redirect them to phishing pages
    - U.S. DoJ seizes $24 Million in cryptocurrency, assisting the Brazilian
    government
  • Cyber Security Disasters of 2020
    Cyber Security Disasters of 2020
    Tim Holman, CEO at 2-SEC Consulting Nov 30 2020 11:00 am UTC 30 mins
    During the webinar you will learn:

    The Top 5 biggest Cyber Security Disasters of 2020
    How to improve your defences against the things that matter
    How to make an effective plan to conquer Cyber Security Disasters when they happen

    Attend the webinar, learn from others’ Cyber Security mistakes and make sure that your business is ready for anything that 2021 throws at you!
  • Financial cyberthreats in 2021
    Financial cyberthreats in 2021
    Security researchers from Kaspersky, Austrian Energy CERT, Banco C6 S.A. and Cetelem Nov 30 2020 2:00 pm UTC 60 mins
    As we near the end of 2020, a challenging year that has turned many things upside down, it is clear that one thing remains unchanged: financial threats are still key security concerns among both individual users and organizations.
    As cybercriminals continually evolve and invest in developing new tools, as well as reinventing themselves and their tactics, techniques and procedures, we should ask what can be learnt from the experiences we faced in 2020 and what financial threats are to come in 2021.
    In this talk, Dmitry Bestuzhev, head of Kaspersky’s Global Research and Analysis Team (GReAT) in Latin America, and Ivan Kwiatkowski, senior security researcher for Kaspersky’s GReAT team in Europe, will present their thoughts through an exclusive overview of the top cyberthreats targeting financial institutions in 2020 and share the company’s predictions for 2021.

    In addition, threat researchers Anchises Moraes from Banco C6 S.A., Olaf Schwarz from Austrian Energy CERT and George Dragusin from Cetelem will join the discussion and tap into Kaspersky’s financial threat predictions for 2021, presenting different angles and his view on what the future will bring.
    During the webinar, attendees will learn about key events that happened in 2020, as well as the latest techniques and tactics used by targeted attack groups who specialize in stealing money from financial institutions.
  • Continuous Assurance for the AWS Well-Architected Framework [US EVENT]
    Continuous Assurance for the AWS Well-Architected Framework [US EVENT]
    Rob Melka - Senior Solutions Architect at AWS, Ori Tabachnik - CRO at CloudZone, Avi Aharon - VP Cloud at Continuity Software Nov 30 2020 4:00 pm UTC 42 mins
    Join us to learn all about the AWS Well-Architected Framework’s five pillars, including why it’s important for your business, how it helps build best-of-breed infrastructure for applications, and how it provides a method for the maintenance of optimal infrastructure.

    This session will help you ensure your new apps are built in line with AWS design principles and best practices, and show you how you can continuously and automatically be sure you're adhering to AWS Well-Architected Framework to reach better business outcomes.

    Topics of discussion will include:

    - Challenges to building and maintaining robust infrastructure
    - Removing threats to Well-Architected adherence
    - How the solution works in a joint customer case study

    The session's guest speakers are:

    - Rob Melka, Senior Solutions Architect at AWS
    - Ori Tabachnik, CRO at CloudZone
    - Avi Aharon, VP Cloud at Continuity Software
  • Ransomware Survival Guide: Ransomware Kill Switch
    Ransomware Survival Guide: Ransomware Kill Switch
    Ritesh Agrawal, CEO, Airgap Networks Nov 30 2020 4:00 pm UTC 29 mins
    Ransomware attacks continue to plague K–12 schools nationwide, and they’re not slowing down anytime soon. In the pandemic, more than 1,000 educational institutions have fallen victim to ransomware, according to a report by security firm Armor. With most schools implementing some form of online instruction this school year, these attacks have only increased in volume and speed, and their impact is much more significant.

    In addition to the ransom itself, these attacks can exact a heavy cost: school district operation disruption, remediation costs, and job implication.

    In this BrightTalk session, Edu tech and IT will learn:
    How ransomware is surging in a remote/online learning environment?
    What is the fundamental mind shift in network design required?
    What to do before, during, and after a ransomware attack with Zero Trust solution?
    Why you shouldn’t and cannot pay ransoms?
    What is Ransomware Kill Switch and how it can protect you?
    How to stop ransomware propagation in seconds?
  • Ransomware Battleground: The Ryuk Ransomware
    Ransomware Battleground: The Ryuk Ransomware
    Anonymous Security Expert and Syya Yasotornrat Nov 30 2020 6:00 pm UTC 45 mins
    This unique BrightTALK session is your 1-on-1 meetup with the most recent ransomware attack - Ryuk - in UHS Universal Health Services Ryuk's operators are known to go "big game hunting" and have previously targeted large organizations, including shipping giant Pitney Bowes and the U.S. Coast Guard. UHS has 400 hospitals and healthcare facilities in the U.S. and the U.K., and serves millions of patients each year. In this session, you will get to know how Ryuk ransomware behave in your organization and how you can use Zero Trust Isolation to prevent the attack proactively.
  • Podcast: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!
    Podcast: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!
    Digital Shadows Threat Researchers, Stefano De Blasi, Dylan Gray, Adam Cook, and Kim Bromley Nov 30 2020 7:00 pm UTC 50 mins
    ShadowTalk hosts Stefano, Kim, Dylan, and Adam bring you the latest in threat intelligence. This week they cover:

    - RegretLocker’s approach to quickly encrypting files - how their
    efficiency compares to counterpart Ryuk
    - Vx Underground’s code used in ransomware attacks
    - APT32, or OceanLotus, using social media and news sites to draw in
    users and redirect them to phishing pages
    - U.S. DoJ seizes $24 Million in cryptocurrency, assisting the Brazilian
    government
  • Master the Art of Zero-Touch Deployments
    Master the Art of Zero-Touch Deployments
    Jim Grandbois Nov 30 2020 11:00 pm UTC 25 mins
    In the era of zero-touch deployment, IT can now successfully deploy Mac, iPad and iPhone to users directly without ever having to open the box. Apple’s deployment programs enable this by automating enrolment and configuration from a central location — eliminating the need to ever physically touch the device.

    In this webinar, Master the Art of Zero-Touch Deployments, we will demystify Apple’s deployment programs and walk through what it takes to implement these programs in your organisation.
  • Secure SD-WAN Self Healing MQ
    Secure SD-WAN Self Healing MQ
    John Maddison Chief Marketing Officer and Executive Vice President, Products - Fortinet Dec 1 2020 12:00 am UTC 56 mins
    Join our Fortinet subject matter expert to learn why we believe Fortinet SD-WAN solutions stand out among the competition and help thousands of customers simplify management, lower TCO, reduce their attack surface, and achieve the promise of digital transformation.
  • Rethinking Offshore Delivery: Is Your WAN Ready?
    Rethinking Offshore Delivery: Is Your WAN Ready?
    Anish Gogate, Regional Sales Director and Vikram Srivatsa, Solutions Architect, Aryaka Networks Dec 1 2020 6:00 am UTC 45 mins
    It's not a particularly well-kept secret that most delays in an Offshore Delivery set-up are accredited to a company’s inability to secure the necessary infrastructure on time. Take MPLS for instance, it's rigid, prohibitive, plus scheduling with regional providers can stretch the installation process into months.
    When mission-critical connectivity is of the essence, inflexible deployments translate into lost revenue.
    For seamless connectivity into the customer's premises, ODCs need a robust network with guaranteed SLAs. But how do you get the reliability of MPLS with the internet like flexibility?

    Join Aryaka on 1st December at 11:30 AM IST to learn more about achieving standardization across dispersed offshore teams and unlocking the true potential of your business with a plug and play network platform that thinks for itself. You will learn about addressing:

    • The need for flexible bandwidth and connectivity based on customers and projects
    • Utilize new technologies like SD-WAN and WAN optimization to improve connectivity to customer’s network
    • And much more…
  • 365 Days Since Sangfor Launched Its Incident Response Service
    365 Days Since Sangfor Launched Its Incident Response Service
    Jeffrey Lee - Sangfor Security Service Product Manager Dec 1 2020 8:00 am UTC 60 mins
    Sangfor Security Services will share some of their cyber incident response use cases for your education. They will also present statistics on how and by who customers were attacked, as well as mitigation strategies that could be used to combat the attacks.
  • Zero-Trust-Sicherheit für IoT-Geräte
    Zero-Trust-Sicherheit für IoT-Geräte
    Daniel Künzli, Pre-sales Engineer, Forescout Technologies Dec 1 2020 8:00 am UTC 52 mins
    Durch die wachsende Zahl von IoT- und OT-Geräten in Unternehmensnetzwerken ist eine vollständige Durchsetzung von Zero-Trust-Sicherheit häufig schwierig.

    Laut Gartner haben „fast 20 % aller Unternehmen in den vergangenen drei Jahren mindestens einen IoT-basierten Angriff verzeichnet.“ (Gartner, 2019)

    Um das Risiko einer Sicherheitsverletzung zu verringern, müssen Sicherheitsteams geeignete Maßnahmen ergreifen, mit denen IoT-Geräte proaktiv geschützt werden.
    Erfahren Sie, wie Sie den Zero-Trust-Ansatz für IoT-Geräte in Ihrem Unternehmen implementieren können.

    Nehmen Sie an unserem Webinar mit folgenden Themen teil:
    • Erkennen und Klassifizieren von IoT-Geräten
    • Erstellen von vertrauenswürdigen Zonen für alle Geräte in Ihrem Netzwerk
    • Durchsetzen von Least-Privilege-Richtlinien
    • Permanente Überwachung auf ungewöhnliche Aktivitäten
    • Koordinieren und Automatisieren von Reaktionsmaßnahmen
  • A Guide to Being Adaptable: Shifting Strategy and Managing a Remote Workforce
    A Guide to Being Adaptable: Shifting Strategy and Managing a Remote Workforce
    Simon Ratcliffe, Ensono | Mike Kiersey, Dell Boomi I Aaron Peacock, OSCE I Eithne Metcalfe-Bliss, Checkout.com Dec 1 2020 10:00 am UTC 60 mins
    "Work Reimagined" For A Hybrid Workforce Episode 3

    The new normal is here to stay, and hybrid working models are just one of the ways that the workplace has changed. With some employees choosing to return to the office, and some remaining at home, it’s important to be adaptable. Lots of businesses are reacting to core changes and challenges, but how do you move from being reactive to active in your strategy? Now that we know this is the new normal, how can we untangle it and make it work efficiently and productively?

    Moving forward, and applying the lessons learnt over the last few months is key. For example, when onboarding new employees, it’s imperative that though you may be working remotely, the process does not become totally digital. This could be isolating, especially for those entering the workforce for the first time. With Boomi solutions, driving digital processes to optimise on-boarding has never been easier. Processes can be automated, accelerating the on-boarding experience, and connecting new employees to existing management, to prevent a potential disconnect between recruits and management. Creating an efficient mentorship scheme whether in person or from home is key to the remote onboarding process. This is just one example of how to be adaptable in this new environment.

    In this session, we will explore:
    - How to incorporate lessons learned throughout 2020 into your strategy
    - How to keep a distributed workforce productive
    - How to go about onboarding new employees virtually without losing the human element
  • Driving Real Behaviour Change: Build a Security Awareness Program that Works
    Driving Real Behaviour Change: Build a Security Awareness Program that Works
    Paul Down, Director & Matt Cooke, Cybersecurity Specialist, Proofpoint EMEA Dec 1 2020 10:00 am UTC 36 mins
    When it comes to modern Cybersecurity – ultimately your users are your last line of defence. So you need to arm them with both knowledge and practice to mould dynamic, alert guardians of both your organisation and your data. The key to your success is engaging, entertaining - and crucially - topical security awareness training.

    So where to start, or how to renew your program? Are you one of the 80% of organisations who allocate two hours or less per year for security awareness, how useful do you judge this small amount of user training to effect behaviour change?

    Join our Security Awareness Training experts as we review valuable strategies on how to create and sustain an impactful cybersecurity awareness education program. Plus we delve deep into thought-leadership on the following questions:

    - How do I ensure my users embrace the training? Who are the key influencers internally?
    - What is the minimum – and maximum – levels of training shown to have been successful?
    - How do I motivate and reward my last line defenders?
    - What reporting and measures are the most pertinent to the IT team and alternatively to the C-suite?
  • Get the most out of your DevOps investments
    Get the most out of your DevOps investments
    Alistair Russell, Steve Davies, Colin Fletcher & Sam Hill Dec 1 2020 10:00 am UTC 61 mins
    Cost Saving and Business Benefits of Using SCM, CI and CD for Enterprises Enabled by GitLab
    As an IT leader you are leaning on DevOps methodologies to help your business meet market needs; to do so, your DevOps teams must find ways to accelerate the speed of delivery, decrease code flaws and improve time to market.

    The Total Economic ImpactTM of GitLab - a commissioned study conducted by Forrester Consulting - examined the potential return on investment (ROI) enterprises may realize by deploying GitLab. The purpose of this study was to demonstrate, justify, and realize the tangible value of using one complete DevOps application to both senior management and other key business stakeholders.
    Join our panellists for an in-depth discussion about understanding the fundamentals of value and cost reduction in the ever-changing agile world of software development.

    In this roundtable our experts will cover:
    A framework to evaluate the potential financial impact of DevOps your organisation - DevOps best practices to reduce your ’toolchain tax’
    How some companies improved development and delivery efficiency by over 87%, resulting in over US$23 million in savings
    How applying the right DevOps principles and tooling will help you increase revenue by enabling your organizations to deploy 12 times as many releases
    How with one complete DevOps solution will allow your teams to strengthened quality and security while increasing productivity and collaboration
  • Maze ransomware: Use threat research & MITRE ATT&CK to turn analysis into action
    Maze ransomware: Use threat research & MITRE ATT&CK to turn analysis into action
    Randy Franklin Smith (Ultimate Windows Security), Dan Kaiser (LogRhythm) and Sally Vincent (LogRhythm) Dec 1 2020 10:00 am UTC 59 mins
    Threat research can be an invaluable asset to security teams' proactive and reactive response plans. However, general recommendations found in threat research don't always easily translate into practical steps to defend against particular attacks.

    During this webinar with Ultimate Windows Security, LogRhythm Labs' Dan Kaiser and Sally Vincent will demonstrate how to translate a recent report on Maze ransomware into actionable steps for your SOC.

    They'll review how to:

    - Turn threat details into new monitoring and threat hunting techniques
    - Configure your security solution to incorporate those actionable takeaways
    - Use samples of Maze that have been reverse engineered to test your newly configured solution
  • Operationalize Threat Intelligence with Mandiant Security Validation
    Operationalize Threat Intelligence with Mandiant Security Validation
    Alexis Bourbion, Sales, Mandiant Threat Intelligence & David Grout, Director Southern Europe Sales Engineering Dec 1 2020 10:00 am UTC 60 mins
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This limitation exacerbates their struggle to justify the high-cost of cyber defenses and organizations often rely on assumptions to guide decisions and justify decisions.

    This session reveals the actual state of cyber security based on real world data around cyber security controls across enterprise networks, from email, endpoint, network and the cloud. It also explains how security validation can validate, consolidate, recoup and maximize the value from existing investments.
  • Rise Above the Unexpected. Create Extraordinary Customer Experiences.
    Rise Above the Unexpected. Create Extraordinary Customer Experiences.
    Andre Durand, CEO of Ping Identity and Molly Bloom, Entrepreneur & Author of Molly's Game Dec 1 2020 10:00 am UTC 36 mins
    Join Andre Durand, CEO of Ping Identity in a fireside chat with Molly Bloom, olympic-class skier, entrepreneur and author of "Molly’s Game".

    From running one of the most exclusive high-stakes poker games in Hollywood to becoming a successful entrepreneur, Molly’s amazing story of failures and perseverance is truly remarkable and is particularly relevant to businesses in 2020.

    Learn about the repeatable strategies she used to create exclusive, personalised experiences for her players and to recover from disastrous circumstances. Hear how her strategies can help businesses turn their customers into loyal advocates.