The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
With the eruption of connected devices and the Internet of Things, cybersecurity professionals have a lot on their plates. More connected devices equates to more traffic, more attack routes, more attempts at cybersecurity breaches, and a lot more data that needs to be analyzed. As the volume of intrusions and breaches multiple, Artificial Intelligence (A.I.) may be able to provide a tool to gain defensive advantage for government agencies. Join John McCumber, (ISC)2’s Director of Cybersecurity Advocacy and Ian Doyle, IBM’s Executive Security Advisor for the U.S. Government as they discuss how to leverage these collaborative and cognitive solutions to help prevent, detect, and respond to today’s cybersecurity threats impacting your agency.
A recent research study conducted by Meritalk on the use of Artificial Intelligence (A.I.) asked federal cybersecurity professionals to share their views on the use of AI to enhance a cybersecurity analyst’s ability to identify and understand sophisticated threats, by tapping into unstructured data and correlating it with local cybersecurity offenses. What are the cybersecurity implications within the Federal Government for the rise of A.I.? What role can A.I. play in incident response? Can it help prepare agencies for real-world cyber attack scenarios? Join John McCumber, (ISC)2’s Director of Cybersecurity Advocacy and Ian Doyle, IBM’s Executive Security Advisor for the U.S. Government for an examination of the recent study and results.
Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.
Steve Reynolds, CTO, Imagine Communications
Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.
Host: Limor Schafman, Content Development Director, TIA
GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises.
But what does GDPR really mean to businesses, how will it impact the way in which organisations handle their data and engage with trusted third parties?
Join Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity for a thought provoking discussion drawing from real-life examples on:
1) Organisational best practices when working with cloud service providers to adhere to GDPR
2) Key factors organisations to take into account when complying to GDPR
3) The steps global enterprises are taking get themselves #fit4GDPR
Symantec launched a major release for DLP, version 15, that focuses on expanding core DLP technology and Information Centric Security.
In today’s cloud generation, data is shared through personal email, created and shared on cloud apps, and accessed via BYO devices by employees, partners, and vendors. With the persistent threat of a breach looming, maintaining visibility, protection, and control over your sensitive data is key for business and maintaining compliance.
Join us on this webinar to review what’s new with Symantec DLP 15 and get first-hand view of the revolutionary Information Centric Security approach.
Attend this Women's Society of Cyberjutsu webinar to discover how you can fully maximize your Linked profile to be found for the right opportunities. Learn how to customize your URL and why keywords impact your headline, summary and skills sections. Understand the importance of having visual elements and expressing your true brand on your profile.
About the Speaker:
Combining her expertise in career counseling, human resources, workforce development and training facilitation, Paula Brand has inspired hundreds of women to take charge of their careers. She speaks to groups and provides individual career coaching on using LinkedIn effectively, managing a successful career and going through career transitions. Past organizational clients include the World Bank, NIH/NIAID, the Johns Hopkins University SAIS program and the Penn Wharton Public Policy Initiative.
Her education includes a Master’s Degree in Applied Psychology from the University of Baltimore, a Bachelor’s Degree from the University of North Carolina at Greensboro and three industry certifications including: Global Career Development Facilitator, Certified Professional Résumé Writer and Job and Career Transition Coach.
Paula is involved in professional associations and is a past President of the Maryland Career Development Association (MCDA). In 2014, she received the Professional Contributions Award from the Middle Atlantic Career Counseling Association (MACCA) and MCDA’s Outstanding Career Practitioner Award.
In every organization, the executive who leads cyber-defense efforts is becoming a key player in their long-term survival. But what do we really know about CISOs and how they operate? Join F5’s own Principal Threat Research Evangelist, Ray Pompon, and CISO guest speakers Kip Boyle and Michael Hamilton for a lively discussion about the findings of the recent F5 commissioned report, The Evolving Role of CISOs and Their Importance to the Business.
What You'll Learn
- How much experience, education and business/technical background most CISOs have
- Who the CISO is reporting to and how the structure can affect security practices
- How security initiatives are rolled out across organizations
The growing migration of business critical applications to SaaS based solutions and public cloud platforms signals a fundamental shift in IT infrastructure. The cloud requires organizations to take a fresh look at their security posture in the light of new threats and an expanding deployment surface. We will discuss the emerging security requirements as results of these shifts and provide recommendations to securely operate in cloud environments
Web application security is complex, difficult, and costly – the problems are well known, but remain prevalent out in the real world. Most development teams do not have the resources to sufficiently protect against the myriad of attacks that are relevant to each vector, and the level of expertise required is difficult to come by even if your project has the time and budget for it. This is further compounded by the need to address these vulnerabilities over and over in every application that goes out the door making it a significant blocker in your path to production.
The good news is that advanced WAF technology is more accessible and affordable than ever before. F5 has teams of researchers and engineers dedicated to this task, and their industry-leading expertise is packaged and available today to defend apps of any size and variety. With the right tools, comprehensive WAF coverage can not only reduce your exposures and give you better control over your applications but also help optimize your resources and reduce overall operating costs. F5 is committed to supporting the OWASP Top 10 and providing defenses for everything it addresses, but that’s just the tip of the iceberg.
In this webinar you will learn:
- About the primary risks to your app, including those addressed by the Top 10.
- How to make the most of development resources by using WAF to do the heavy lifting for you.
- How F5’s unique and flexible deployment options will make WAF remediation for your app a snap.
- How you can go beyond the Top 10 and address additional risk, such as DDoS, bot defense, intellectual property theft, or fraud.
- How WAF can optimize and filter unwanted traffic to help you cut costs in the cloud.
Join us for this live, interactive webinar, where you will learn:
• What the latest threat trends are that we are seeing in 2017 and going into 2018
• Which organizations are most at risk
• How you can implement immediate strategies to proactively protect your institution and your customers
About our presenter:
Dee Millard is an experienced risk management consultant with over two decades of experience in helping organizations of all sizes exceed their fraud prevention programs and compliance requirements. Her expertise includes online and mobile banking fraud prevention, enterprise financial crimes management, digital banking, and anti-money laundering.
There's a common misconception that threat intelligence simply means feeds of indicators just for SOCs or high-level reports only useful to security leaders. The fact is threat intelligence can be a valuable weapon in every part of your information security strategy. In this webinar, we'll take a close look at five different roles generally found within information security organizations: vulnerability management, incident response, security operations, threat analysis, and CISOs. Discover what specific processes and responsibilities are found in each team and how threat intelligence can be integrated into each to improve accuracy and reduce time to action.
Cyberattacks are getting more sophisticated, using a combination of strategies to penetrate the organisation and often for financial gain. Tune in to hear from Singtel's Abdullah Sheikh and Trustwave SpiderLabs researcher Thanassis Diogos as they describe the latest multi-vector attacks uncovered just recently in the financial industry, a modern ‘bank heist’ that uses technical and non-technical methods, with potential to expand across the globe.
The webinar will show you the steps taken by this criminal network and how easy it was for them to divert on average USD$5 million in cash for every target they reached. Understand what measures our experts recommend to ensure your organisation doesn’t become a victim of a similar attack in 2018.
The bad news: phishing is still the #1 cyber-attack vector. The good news: new PhishMe research shows how you can go on the offensive and strengthen your resiliency to costly phishing attacks.
Join Lex Robinson, Anti-Phishing / Cyber Security Strategist, as he breaks down data from training simulations and real-life attacks to reveal how you can design a great anti-phishing program. Learn how a proactive approach conditions employees to recognize both active threats—the latest attacks that are costing organizations big-time—and “classic” threats bad actors can recycle whenever they please. See how to gain insights from incident response and phishing intelligence to keep you out in front of evolving threats. You’ll learn how to take the offensive to lower susceptibility, fortify resiliency and disrupt attacks faster.
In today's business environment, most fintech transactions happen at a fast pace, served through web applications using a combination of mobile devices and legacy systems, with some level of protection. While beneficial to small and medium fintech companies, consumers and regulatory agencies are apprehensive about protecting customers personal data and detecting cyber attacks over the internet which impact the integrity of financial transactions.
In this webinar, we are going to:
- Explore top cyber threats that fintech companies face
- Identify what are the Compliance regulations and standards that apply to fintech companies
- Determine how continuous monitoring and security analytics help meet compliance regulations/standards requirements
Chief Information Security Officer, Angelo Purugganan, will also be joining us in this discussion. He will be sharing his insights on how security analytics and continuous monitoring can simplify compliance using a SOC-as-a-Service provider.
To see how you can eliminate challenges in fintech compliance, register now.
About our CISO speaker:
Angelo has 15+ years of information security and compliance and 10+ years of software development experience. He has led information security programs for cloud providers and various enterprise clients using frameworks, such as Trust Services Principles, PCI-DSS, HIPAA, FISMA, Euro Directives, ISO-27000, and SOX. He has conducted information security audits in sectors such as SaaS CRM providers, logistics and distribution, manufacturing supply chain, finance ERP, foreign exchange and hedging operations, airline and travel.
Whether it is a new ransomware campaign or stealthy targeted attack, your endpoints are being attacked and are often the last line of defense in your fight against the cybercriminals. In this webinar, you will understand how endpoints are the final frontier for security and how you must be resilient in using the latest prevention and protection technologies.
Learn how the power of machine learning and artificial intelligence are changing the endpoint protection landscape. Gone are the days of daily signature updates, maxed out performance impact, and the lack of security effectiveness against both known and unknown threats. It is time explore the new world of endpoint security.
Digitization has become deeply embedded in enterprise strategy, as nearly all businesses and activities have been slated for digital transformations. The significant advantages of digitization, with respect to customer experience, revenue, and cost, have become increasingly compelling, and we are starting to see digital transformations in risk create real business value by improving efficiency and the quality of risk decisions.
The state of risk management at most global, multiregional, and regional banks is abundant with opportunity. Current processes are resource intensive and insufficiently effective, as indicated by average annual fines above $400 million for compliance risk activities alone. By improving the efficiency and effectiveness of current risk-management approaches, digital risk initiatives can reduce operating costs for risk activities by up to 30 percent, and a digitized risk function can provide better monitoring and control and more effective regulatory compliance. On this webinar our panel of experts will discuss digital innovations for risk management success.
Proofpoint Threat Response Auto-Pull (TRAP) offers a fast, easy and effective solution. It automatically pulls delivered malicious email into quarantine, saving you from all those time-consuming steps. Join us for a demo of this version of the Proofpoint Threat Response platform and learn firsthand how to:
• Reduce exposure time to malicious emails
• Reduce the time to quarantine and contain email threats
• Reduce your dependency on custom-coded software
Enterprises are quickly moving their corporate data and custom internal apps to IaaS platforms like AWS, but many lack the visibility and control they need over business-critical data and workloads. Services like S3 and RDS, for example, store massive volumes of sensitive data that enterprises must protect.
In this webinar, we explore key security issues faced by enterprises during data migration from on-prem to AWS, how cloud access security brokers (CASBs) are evolving to protect IaaS with granular access controls, real-time-DLP, encryption/tokenization, and more. Learn how a CASB can help enterprises achieve compliance and protect data across apps deployed in AWS.
As an organization grows the number of use cases the data center needs to support increases with it. What starts out as a NAS for file sharing, moves to a SAN for database applications, and then storage for data protection. As the organization hits full stride it might look at arching to limit growth and a mobility solution to support a distributed workforce. The problem is each one of these storage types are silo’ed and have to be implemented, operated and maintained separately. As a result, storage ends up consuming a large chunk of the IT budget.
"Artificial Intelligence" is arguably one of the most over-used terms in cybersecurity today and despite the potential, most organizations are in the dark about how best to apply it -- and more importantly, how to explain the results it produces. We will discuss how encoding expert tradecraft using scientific methods and common knowledge / data models - can produce AI with explainable results for improved investigation and an active cyber defense.
Join us along with Forrester as we have an in-depth look at the Total Economic Impact of Guaranteed Fraud Protection.
The cost of online fraud for e-commerce merchants extends well beyond chargebacks and fraud-related fees. It includes losses from orders declined unnecessarily, slower order processing and loss of customer loyalty.
If you have not turned to Guaranteed Fraud Protection to minimize your fraud costs and optimize your operations, you are missing a chance to grow revenue without selling more goods.
During this session, we’ll cover:
+ The top 5 retail fraud and security threats in 2018 - and how to deal with them
+ The full economic impact of Guaranteed Fraud Protection, including how one enterprise retailer achieved a 3.8x ROI
+ How the right fraud solution can mean faster order fulfillment and higher customer satisfaction.
+ How one retailer added $5.9 million to its bottom line by reducing chargebacks and increasing the number of orders shipped.
“We went from 88.9 percent order acceptance to 93.5 percent while also displacing 61 basis points for chargebacks.” — manager of a large U.S. retailer’s e-commerce operations.
Featuring Guest Speakers:
+ Reggie Lau, TEI Principal Consultant, Forrester
+ Brendan Miller, Principal Analyst, Forrester
***This webinar will cover a June 2017 commissioned study conducted by Forrester Consulting on behalf of Signifyd.
The release of Symantec Control Compliance Suite version 12.0 is here! Please join us for a special webinar on Tuesday, November 21 to find out what’s new in this release and how it will better help you to:
Measure and prove compliance with security regulations, mandates, and best practices
Determine risk and prioritise remediation
Don’t miss this great opportunity to get the latest news and information on Control Compliance Suite!
Im Webinar erfahren Sie:
•Wie SEP Mobile Crowd-basierte Threat-Informationen mit Endpoint- und Server-basierte Analysen kombiniert, um bekannte und unbekannte Mobile Threats zuverlässig und proaktiv zu stoppen
•Wie die Lösung Malware, Netzwerk-basierte Threats sowie Exploits auf Anwendungs- und OS-Ebene erkennt – und zwar sowohl auf iOS als auch auf Android-Geräten, egal ob online oder offline
•Wie Sie mit vorausschauenden Analysen verdächtige Netzwerke und Anwendungen bewerten können, ehe sie Schaden im Netzwerk anrichten
•Wie einfach und schnell das Onboarding mittels nativer iOS- und Android-Apps funktioniert und wie Sie die Lösung mit Ihren vorhandenen EMM-, MDM-, SIEM-, IAM- und VPN-Umgebungen verzahnen
Darüber hinaus verraten wir Ihnen, wie die weitere Roadmap zur Integration der SkyCure-Produkte in unser bestehendes Portfolio aussieht, und geben Ihnen einen kurzen Überblick über alle anderen wichtigen Neuerungen in unserem Portfolio.
Angriffe auf mobile Endgeräte nehmen rasant zu: Immer öfter nutzen Angreifer maßgeschneiderte Malware und Advanced Persistent Threats, um Smartphones und Tablets zu kompromittieren und auf diese Weise Zugriff auf sensible Daten oder Unternehmensnetz zu erlangen.
Symantec trägt diesen steigenden Sicherheitsanforderungen mit der Akquisition des Mobile-Security-Spezialisten SkyCure Rechnung – und integriert dessen innovative Technologie jetzt als Symantec Endpoint Protection Mobile (SEP Mobile) in das marktführende Endpoint-Security-Portfolio.
Phishing campaigns are among the most common and damaging cyberattacks. Despite how common and successful phishing attacks are, often times organisations and their employees are ill-prepared to handle these threats.
In this webinar, Greg Foss, LogRhythm Manager of Global Security Operations, Paul Asadoorian, Security Weekly CEO and Founder, and John Strand, Black Hills Information Security Owner and Security Analyst, discuss phishing attacks and how you can protect yourself from them. Additionally, the three go on to discuss how LogRhythm’s open-source Phishing Intelligence Engine (PIE), can help streamline and automate the entire process of tracking, analysing, and responding to phishing emails.
Watch now to learn how LogRhythm is helping to automate the detection and response to phishing attacks.
This 3 part webinar series will give show you the 3 key pillars to achieving social success in sales. Learn how to create the ultimate profile, build a winning personal brand, create great and consistent content and build a winning strategy. The final session will be packed with the best industry tips and tricks to make social work for you.
Part 3 - Social Selling Top Tips & Tricks
From LinkedIn searching secrets all the way to email address generating hacks, these are the top tips and tricks that will give you a huge advantage in the world of social selling. This webinar will bring everything together in the social selling series and will give you the ultimate list of tools use social to dramatically enhance your pipeline and sales process.
The clock is ticking and it’s time to act as Europe’s most demanding and far reaching Data Security regulation to date has been published. This webinar from IBM Cloud will examine the key requirements of GDPR, and look at how we can IBM's Cloud and Data security capabilities to simplify your GDPR Readiness journey.
What You Will Learn
The impact of the Regulation and its key principles
What data protection by design and by default means for organisations
The foundational principles of data protection
Practical application of data protection by design and by default in the Cloud - Data security, encryption capabilities, data breach notification, Multi Cloud SaaS offerings, IBM Cloud services and our Technical and Operational Measures.
What does signing of 24 IBM Cloud infrastructure and PaaS services means in terms of data protection adherence under GDPR.
Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions. Cyber adversaries are taking advantage of this sprawling digital attack surface, looking forweaknesses to exploit. The attack surface has become the battle line between malicious actorsand an organisation’s external threat defenders and its compromise is behind many of the breaches that get reported with alarming frequency.
In an effort to highlight and quantify the risks which organisations have in their attack surface, we conducted research on the top 30 UK organisations (FT30) to highlight the issues we believe all companies face. We will present the various types of risk we uncovered and offer practical advice on ways to mitigate them and harden your attack surface.
Listen to Kevin Curtis, Distinguished IOT Architect – Connected Cities, Verizon Enterprise Solutions (VES) talk about how digital transformation occurs when information technology (IT) and operational technology (OT) data assets are effectively integrated, to realize new business outcomes and to create transformative value, not previously possible.
Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
Here is your chance to learn the basics about containers and the associated security challenges. In this webinar, presented by Tsvi Korren, Sr. Director, Solution Architecture at Aqua Security, we will start with a gentle introduction to containers, discuss why they are so popular, and convey the key concepts of container security.
Join our webinar to learn:
•What are containers?
•How to use containers?
•What are the security challenges they introduce?
With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.
What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?
Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
- The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
- Managing IT risk and vulnerabilities
- How to improve breach prevention, detection and response
- What to expect in the future
- Igor Baikalov, Chief Scientist, Securonix
- Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
- Sam Abadir, Director of Product Management, LockPath
Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.
This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.
Join us to hear more about:
•The Mandatory Data Breaches scheme
•Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
•The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
In recent years, we have seen large-scale botnets used to execute attacks rarely seen in the past -- botnets that incorporate new features and bigger capabilities than ever before. How and why some of these botnets remain resilient is a question that needs to be answered, and one of the reasons is Fast Flux. Fast Flux is a DNS technique used by botnets to hide various types of malicious activities (such as phishing, web proxying, malware delivery, and malware communication) behind an ever-changing network of compromised hosts acting as proxies. In general, a Fast Flux network is mostly used to make communication between malware and its command and control server (C&C) more resistant to discovery. Akamai’s high visibility to both Web and Enterprise traffic enables new and unique insights on the behavior of such Fast Flux networks.
In this webinar, you will get an in-depth analysis on:
- How network fluxing is using domains, IP addresses and even nameservers to become resistant to discovery
- How Fast Flux networks offer services such as malware communication and hosting of malicious content
- How botnets are used both for Fast Flux communications and a variety of Web attacks such as Web scraping and credential abuse
- Best practices for detecting and defending against such botnets
Join Akamai and (ISC)² on Nov 22 (Wed) at 13:00 (Singapore time) / 16:00 (Sydney time) to learn more about the Fast Flux Botnet.
Presenter: Or Katz, Principal Lead Security Researcher, Akamai
Moderator: Ir. Tejinder Singh, Senior Development Expert, T-Systems Malaysia SGA Security Engineering
Was Sie beachten sollten,um Ihre IT-Security 2018 zu stärken
Was können Sie von den jüngsten Datenschutzverletzungen und Malware-Wellen lernen? Welche Schlüsse ziehen Sie, um die Sicherheitsvorfälle signifikant zu reduzieren? Wie bereiten Sie Ihre Netzwerke, Server und Endgeräte auf die neuen Angriffsmethoden vor, die 2018 kommen könnten und wie erfüllen Sie gleichzeitig die Regularien, wie GDPR?
Das folgende Webinar von Orla Cox, Director Security Response Team, sollten Sie daher nicht verpassen!
Das Webinar behandelt:
•Analyse der grössten IT Security Vorfälle in 2017: Die Methodik und Hintergründe
•Die wichtigsten Maßnahmen, die sie sofort ergreifen sollten
•Eine Prognose für 2018 und besten Schutzmechanismen für 2018 und danach
Kaspersky Lab will present an in-depth review of its industry and technology threat predictions for 2018 – and consider what they could mean for some of the world’s most connected industry sectors over the coming year.
The session will discuss the top trends expected to affect enterprises, with a particular focus on connected healthcare, automotive, financial services, industrial security, and cryptocurrencies.
The aim of the webinar is to help IT security professionals in all industries to understand the rapidly evolving threat landscape and the actions they can take to defend their organization against these threats.
Three major trends define the Cloud Generation chaos that organisations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).
On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organisations with ransomware, targeted attacks and mobile malware.
Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for organisations who face a severe shortage of skilled IT security personnel.
Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
-Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
-Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
-Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
-Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
Every business is impacted by global digital disruption.
Even the most successful and iconic 20th century businesses must transform to remain relevant and retain their leadership in the 21st.
Tech-savvy start-ups with natively digital business models regard this point in time as the best time in the history of the world to invent something.
The world is buzzing with technology-driven opportunities leveraging the solid platform provided over the past 30 years, birthed from the Internet, then mobility, social
and now the massive scale of cloud computing and the Internet of Things.
Join this webinar to learn how your business can leverage the opportunities of digital disruption.
Debra Bordignon, CTO, Strategist and Innovation Executive, DD Australia
Scott Gibson, Group Executive: Digital Practice, Dimension Data Group
Rapid adoption of cloud apps and services is driving the need for Cloud Access Security Brokers (CASB)
It is time for CASB systems to weave into your overall security infrastructure. There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security solutions into their environment to improve security and reduce operational overhead.
This talk will explore this next frontier of CASB solutions.
2017 is not yet over and it's already the year of cyber attacks. From phishing, to hacks, to classified hacking tools leaked and the biggest ransomware attacks to date (Wannacry, NotPetya), security professionals across the world are looking to apply the lessons learned in 2017 for improved cyber security next year.
Watch this interactive Q&A panel with experts from the artificial intelligence, deep learning and IoT security space to learn about:
- The biggest attack trends seen so far
- Impact across industries
- Threats on the horizon
- Recommendations to better secure your data and company in 2018
- Shimon Oren, Head of Cyber-Intelligence at Deep Instinct
- Ted Harrington, Executive Partner at Independent Security Evaluators
- Greg Foss, Global SecOps Manager at LogRhythm
When asked about the challenges of HCI adoption, IDC found that 25% of customers were concerned about cost or were unsure regarding the projected ROI. Dell Financial Services developed the Cloud Flex for HCI program with that in mind. The primary goal is to allow you to move to hyperconverged infrastructure without making a long term commitment.
Join us for this webinar to learn how companies across many verticals are using Dell financial services to help them in their HC.I transition
Cloud computing perform amazing things for startups, providing young companies with access to enterprise grade infrastructure . But also act as a double edge sword. Lack of proper security controls can lead to multiple challenges varying from longer sales cycles to losing customers & investors trust.
The Cloud Security Alliance identified those unique challenges and developed a cloud security for startups guidelines.
In the upcoming webinar, the guidelines co-authors will explain the 3 phases security strategy that is recommended for your cloud based startups.