Hi [[ session.user.profile.firstName ]]

IT Security

  • The Last-Minute Guide to GDPR
    The Last-Minute Guide to GDPR Argin Wong, Data Privacy and Compliance, Box Recorded: May 25 2018 40 mins
    The dawn of GDPR will have a global impact. If you work with European employees, customers or partners, the regulation affects you and failure to comply could result in fines up to 20 million euros, or up to 4% of the company’s total global revenue for the preceding fiscal year, whichever is higher.

    It's not too late to get ready. Sign up for this webinar to learn 3 key steps you need to start now:
     
    •How to show that you are processing data in accordance to the GDPR
    •How to ensure (and document) the security, confidentiality and availability of data
    •How to support the Right to be Forgotten 
     
    You'll also learn how Box can help. Our philosophy is to evaluate and meet the highest bar for data privacy, as well as enable organizations to meet data privacy obligations across the globe, so you can rely on Box to get GDPR-ready.
  • If You’re Not Compliant, You’re Behind – 7 Steps to GDPR Compliance
    If You’re Not Compliant, You’re Behind – 7 Steps to GDPR Compliance Paul Kendall, CGEIT, CISSP, GDPR Advisory Services Principal, at Accudata Systems Recorded: May 25 2018 47 mins
    The GDPR deadline is May 25th – and companies that don’t have a solution will face stiff fines. Businesses need to understand the different categories of data, how data is stored, how it moves throughout an organization, and what technical measures they need to take to ensure they are compliant.

    In this 30-minute webinar, GDPR-certified expert Paul Kendall will explain:

    - 7 critical steps to achieve compliance
    - What data companies need to protect
    - How to protect data that lives inside the EU and how to access that data outside the EU
    - How data breaches and response times can severely impact GDPR fine activity
  • GDPR: Deadline Day Special
    GDPR: Deadline Day Special Mark Rasch, Martyn Hope, Ray Ford, David Morris Recorded: May 25 2018 62 mins
    It's GDPR due date. How will enforcement be rolled out when a breach occurs and what are the likely consequences for the breach?

    Join this panel of experts:

    Martyn Hope: Co-Founder of the GDPR Institut
    Mark Rasch: Chief Legal Compliance Partner at DRM Institute, former Chief Security Evangelist at Verizon, former Lead Prosecutor at U.S. DOJ.
    Ray Ford: Founding Associate of GDPR Institut, DPO for Acer(UK) who currently hold some 15million childrens records on behalf of the Scottish Government.


    This session will cover:
    - How GDPR will be enforced.
    - Who is likely to be among the first brought to court?
    -What Should I do Now?
  • Becoming Compliant: Taming Your GDPR Data
    Becoming Compliant: Taming Your GDPR Data Tom Mighell, Esq., VP of Delivery Services and Greg Forest, CTO, Contoural Recorded: May 25 2018 60 mins
    It's May 25th and the GDPR implementation date is here. Now that you have your GDPR Data Protection Policy in place and you've found all of your GDPR Data out in the wild, what's next? Before you can organize, you need to first answer some basic questions: Where is the right place for specific content to live? How and where do we keep as few copies as possible? Who can and should have access to what? These are all elements of a data placement strategy. At its simplest level a data placement strategy ensures a place for everything and everything in its place. Join Tom Mighell and Greg Forest from Contoural as they discuss unstructured data placement strategies and provide an overview of the components of a strategy including:

    • Determining which data should go in which repositories; including file shares, SharePoint, and enterprise content management systems
    • Organizing data to be intuitive for users, and still meet policy goals
    • Maintaining the fewest copies of information, while still providing collaboration and access for your end users
    • Incorporating records retention, data security and other compliance requirements into your repositories
  • PCI Dream Team: Ask Us Your Toughest Questions [Part 4]
    PCI Dream Team: Ask Us Your Toughest Questions [Part 4] Ben Rothke | David Mundhenk | Jeff Hall | Arthur Cooper Recorded: May 25 2018 7 mins
    With hundreds of different requirements, the various Payment Card Industry (PCI) standards can be overwhelming. While the PCI Security Standards Council has provided lots of answers, the devil is often in the details. Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.

    Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall for an interactive Q&A session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.

    Speakers:
    - Ben Rothke, Principal Security Consultant at Nettitude
    - David Mundhenk, Senior Security Consultant at Herjavec Group
    - Jeff Hall, Principal Security Consultant at Optiv Security
    - Arthur Cooper "Coop", Senior Security Consultant at NuArx
  • GDPR: The Importance of Looking Beyond 25 May, 2018
    GDPR: The Importance of Looking Beyond 25 May, 2018 Robert Arandjelovic, Giampiero Nanni Recorded: May 25 2018 61 mins
    Today is the day that GDPR changes things substantially in protecting customer data, affecting businesses that handle, store or pass data of European Citizens both in and outside of Europe. It’s a huge undertaking with comprehensive and extensive compliance requirements and as it takes effect inevitably there will be stops and starts, legal and logistical challenges and hefty fines for non-compliance.
  • [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks
    [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research Recorded: May 25 2018 48 mins
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.
  • [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks
    [APAC BPW] Stopping the Unstoppable: How to Detect and Prevent Fileless Attacks Kasey Cross, Senior Product Marketing Manager and Yoni Allon, Manager, Behavioral Research Recorded: May 25 2018 47 mins
    Fileless attacks are estimated to account for 35 percent of all attacks in 2018, according to Ponemon Institute. Threat actors can use a combination of exploits, scripts, and “living off the land” to stay under the radar. They can even carry out sophisticated attacks without ever installing malware on compromised endpoints. They can also use common networking and admin tools together with traditional malware to maintain persistence while locating and stealing valuable data.

    By monitoring user and device behavior, organizations can detect anomalies that indicate an attack is under way. Because most fileless attacks start with a vulnerability exploit, advanced endpoint protection can block the initial step of an attack from succeeding in the first place. Join us as we discuss how organizations can detect and stop all stages of fileless attacks.

    Attend this webinar to:
    •Find out how fileless attacks occur with a demo of an attack
    •Learn how Magnifier behavioral analytics, the first app of the Palo Alto Networks Application Framework, can detect the network behaviors associated with fileless attacks.
    •Understand how Traps advanced endpoint protection can block the exploits that lead to endpoint compromise.
  • It's Who You Know That Counts: Person-centric GDPR DSAR Fulfillment
    It's Who You Know That Counts: Person-centric GDPR DSAR Fulfillment George Chedzemov, Director of Client Success, BigID Recorded: May 24 2018 34 mins
    Privacy is About People. If you don't know whose data you have, you can't protect their privacy. GDPR data subject access rights requires companies to put that principle into practice. Yet, existing tools can't tell you what personal information belongs to which data subject in order to respond to data subject requests.

    A person-centric approach to locating and understanding data enables companies to effectively tackle the most challenging GDPR requirement: fulfilling Data Subject Access Requests at scale, across data sources and in minutes, not days.

    In this webinar, you will learn:
    - Why data subject access rights are a cornerstone of GDPR requirements
    - What are the elements of the data subject rights lifecycle
    - How a person-centric approach addresses GDPR requirements centered on data subject rights.
    - How a person-centric approach can bridge automation of request management with fulfillment at scale by IT teams.
    - What automation and fulfillment of a data subject access request utilizing a person-centric approach looks
  • Life After May 25: Sustainable GDPR Compliance With Visibility and Automation
    Life After May 25: Sustainable GDPR Compliance With Visibility and Automation Peter Hughes, Technical Director, Sales, Skybox Security Recorded: May 24 2018 46 mins
    Deadline day for the European Union’s General Data Protection Regulation (GDPR) has been looming large for security programs around the world. But is your organization ready to efficiently and effectively maintain compliance beyond May 25?

    Join Skybox Security for the BrightTALK webinar on simplifying compliance management with comprehensive attack surface visibility and automation.

    In this webinar, you’ll learn:
    • How network modeling provides fundamental visibility to understand what data is at risk and what resources you have to protect it
    • Which automated processes will have the greatest benefit on reducing an organization’s data security risk
    • How combining visibility and automation can systematically tighten access and improve security process efficiency and impact
    • The benefits of visibility and automation in compliance-related use cases such as firewall auditing, change management, rule life cycle management, vulnerability management and more
  • PCI DSS, GDPR & Data Security for Call Centers: Navigating Regulatory Landmines
    PCI DSS, GDPR & Data Security for Call Centers: Navigating Regulatory Landmines Scott Kaplan, Semafone, Chanley Howell, Foley & Lardner LLP Recorded: May 24 2018 56 mins
    With the onslaught of cyberattacks we've already seen in just this year alone, data security has never been a higher priority for organizations. Protecting customer data is of utmost importance, especially with governments and regulatory bodies increasingly turning their attention to these issues and producing legislation to implore companies to take additional security measures.

    Contact centers are a part of the organization particularly fraught with responsibility, serving as a vast repository of sensitive customer data and finding themselves to be a favorite target for hackers and fraudsters. Because of this, contact centers face a myriad of laws and regulations governing the way they treat this data, such as the PCI DSS for those taking payments, among many others.

    Register now to join Scott Kaplan from Semafone and Chanley Howell from Foley & Lardner LLP, two leaders in the data security field for an insightful webinar where you'll learn:

    - The top data security regulations, laws, and standards bodies affecting contact center data governance
    - How to comply with sometimes competing regulatory requirements and resolve conflicting stipulations
    - How to achieve compliance more simply and cost effectively

    Additionally, registrants will receive a free copy of Semafone's newly released Navigating the Challenging Regulatory Landscape in Your Contact Center.

    Reserve your space now!
  • Modern Vulnerability Management : Knowledge, Automation, Analytics 
    Modern Vulnerability Management : Knowledge, Automation, Analytics  Syed Abdur, Brinqa, Director of Product Recorded: May 24 2018 60 mins
    With growing numbers of new vulnerabilities disclosed every year, increasing attacker sophistication, and a myriad of tools and teams that have to be synchronized for effective response, most organizations struggle with designing and implementing an effective vulnerability management program. In this webinar we discuss 3 key components that all modern vulnerability programs must address :

    - Knowledge: How to create actionable intelligence from business context, threat intelligence, and any other relevant data source
    - Automation: How to implement automation to streamline significant parts of the VM process
    - Analytics: How to effectively engage and inform all stakeholders
  • Trust But Verify: Mobile App Protection Best Practices - Arxan AppSec Series 3/3
    Trust But Verify: Mobile App Protection Best Practices - Arxan AppSec Series 3/3 Chris Stahly, Arxan Senior Security Architect | Deborah Clark McGinn, Arxan VP of Marketing Recorded: May 24 2018 59 mins
    Traditional network and app security approaches are no longer sufficient to protect high-value apps running in untrusted environments. Knowing the status of apps running in the wild and whether they are under attack is key to responding to the ever changing threat landscape. Visibility into when, how and from where an attack is happening, and the ability to optimize your response in real time can mean the difference between stopping a threat before it spreads or picking up the pieces after the fact.

    In part three of our application security series, we’ll share best practices for app protection and mitigation, plus how Arxan’s comprehensive app protection and alerting capabilities can help prevent reverse engineering, code tampering, IP theft, and help level the playing field with attackers.
  • CMD+CTRL Peek & Play
    CMD+CTRL Peek & Play Mike Cooper, Sr. Security Manager Recorded: May 24 2018 24 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

    Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

    We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

    Sign up to test drive CMD+CTRL!
  • The Truth Behind Machine Learning
    The Truth Behind Machine Learning George Anderson | Director of Product Marketing Recorded: May 24 2018 31 mins
    Over the past couple of years nearly every new security vendor, and many of the established vendors have started talking about Machine Learning as if it’s something new. Webroot won an innovation Edison Award in 2012 (over 6 years ago) for our use of Machine Learning in conjunction with our Webroot SecureAnywhere endpoint security. And, now we hear terms like Next Gen; AI; Machine Learning; Neural Nets and more banded around like they are something revolutionary, when frankly they are passé, out of context, buzzwords most of the time.

    This webinar will take you through how Webroot has been applying machine learning for well over 10 years now to create actionable threat intelligence to stop attacks across a wide range of threats and help you understand Machine Learning past the hype.
  • Take Control of Your Digital Certificates Globally
    Take Control of Your Digital Certificates Globally Asif Karel, Director of Product Management, Certificate Management, Qualys Inc. Recorded: May 24 2018 60 mins
    Take Control of Your Digital Certificates Globally: Assess and Monitor Their Security Implementation

    Effective certificate management is critical for every organization, especially to prevent risk of breaches and unplanned outages. Having complete visibility into certificates, underlying SSL/TLS configurations and Certificate Authority policies, enable organizations to continuously and effectively protect their digital assets.

    Join Asif Karel, Director of Product Management for Qualys CertView, to learn how your organization can discover, monitor and create an inventory of certificates.

    You will understand how to:
    * Create a full inventory of certificates across the enterprise
    * Prevent expired or expiring certificates from causing disruptions in business critical systems
    * Get full visibility of TLS configurations in your enterprise
    * Get SSL Labs like grades for each certificate
    * Detect specific vulnerabilities (such as POODLE, ROBOT, etc), risks (weak ciphers/protocols) or compliance issues (PCI, unapproved CAs) through customizable dashboards and searches

    This webcast will also include a live demo and Q&A with the speaker.
  • How Can Your Organization Safeguard Against Phishing Emails?
    How Can Your Organization Safeguard Against Phishing Emails? Jimmy Lin, Product Manager, Email Security.cloud, Symantec Recorded: May 24 2018 27 mins
    Spear-phishing emails emerged as by far the most widely used infection vector in 2017, employed by 71 percent of targeted attack groups according to findings in our latest Internet Threat Security Report.

    In this how-to session, we will demonstrate:

    - How to optimize the configurations of your Email Security.cloud service to protect your organization.

    - We will explain the benefits of the following technologies and how to enable them in your administration console ClientNet:

    • SPF Authentication
    • DMARC Authentication
    • Business Email Scam Analyzer
    • Email Impersonation Control

    Register Today
  • The Impact of GDPR: Even if You're Not in the EU
    The Impact of GDPR: Even if You're Not in the EU Patrick Grillo, Senior Director, Solutions Marketing Recorded: May 24 2018 39 mins
    While the new law doesn't include a lot of specifics on how to comply, it is clear that personal data needs to be safe at all times. Join this discussion of the implications of the General Data Protection Regulation and how to approach preparations.
  • Digital Workplace
    Digital Workplace Aruba, a Hewlett Packard Enterprise company Recorded: May 24 2018 3 mins
    Are BYOD and IoT stressing your network? See how Aruba can help you build the mobile-cloud network of the future.
  • Make Classroom Education Smarter
    Make Classroom Education Smarter Aruba, a Hewlett Packard Enterprise company Recorded: May 24 2018 2 mins
    Boost interactive learning with Aruba solutions that deliver fast and reliable Wi-Fi with seamless onboarding and app prioritization.
  • Nemertes Conversations: Is Your Data Ready for GDPR?
    Nemertes Conversations: Is Your Data Ready for GDPR? Co-presented by: Julie McCoy, Solutions Engineer, AvePoint; and Irwin Lazar, VP & Service Director, Nemertes Research Recorded: May 24 2018 53 mins
    GDPR requires organizations to identify, classify, and protect personal information, but how do you prepare and protect against a possible breach if you don't know what data you have, where it lives, or how it's classified?

    In this informative webinar we'll discuss:
    • GDPR data classification requirements
    • How to incorporate GDPR data analysis into your breech prevention and reaction plan
    • How to classify and protect information across multiple data stores
    • Solutions for automating classification and information protection

    We look forward to sharing this information with you!
  • Examen technique détaillé – Sécuriser Office 365 avec SonicWall Email Security
    Examen technique détaillé – Sécuriser Office 365 avec SonicWall Email Security Laurent Meimoun May 28 2018 8:00 am UTC 60 mins
    Les entreprises adoptent de plus en plus Office 365 dans le cadre de leur « migration vers le Cloud ». Elles sont également nombreuses à évaluer une solution Cloud de sécurisation de messagerie afin de combler les lacunes en matière de sécurité et de réduire les risques liés à la migration vers le Cloud.
    Participez à ce webcast pour découvrir une démonstration en direct de ce que peut faire la solution SonicWall Email Security pour sécuriser Office 365. Ce webcast aborde les thèmes suivants :
    • les éléments à considérer pour la protection de votre service de messagerie Office 365
    • comment SonicWall Email Security permet une réelle protection avancée contre les menaces, la prévention contre la perte de données et la continuité de messagerie pour Office 365
  • Automating VM-Series deployments on AWS and Azure with Terraform and Ansible
    Automating VM-Series deployments on AWS and Azure with Terraform and Ansible Vinay Venkataraghavan - Senior Solution Architect, Technical Business Development May 29 2018 2:00 am UTC 60 mins
    Join us for our new cloud webinar, in which cloud automation experts will show you how customers have successfully automated their VM-Series next-gen firewall deployments and effectively protected their DevOps environments in AWS®.

    You’ll learn how to:

    - Implement touchless deployment for your fully configured firewalls with native and third-party automation tools, such as Terraform® and Ansible®

    - Consume tags to execute your commitless policy updates

    - Automate VM-Series deployments across your multi-cloud environment
  • 使用网络安全策略网络分段,阻止恶意软件扩散
    使用网络安全策略网络分段,阻止恶意软件扩散 Rui Wang, 系统工程师 & David Leung, 资深系统工程师 May 29 2018 2:00 am UTC 90 mins
    一旦恶意软件突破了网络防御边际,就很难阻止它们攻击其他的内网设备,而且他们能潜伏在您的网络中长达数日,数周,甚至是数月。在您的网络中,每一个网络设备都很可能成为潜在的攻击对象。

    我们必须侦查到每个网络终端节点而且实施保护措施,包括每一个受管控的设备到非受管控的系统乃至物联网设备。加入我们五月二十九日的讲座,我们会展示如何最大限度的减少网络相关攻击和漏洞,以及如何保护您的企业免受恶意软件的攻击。

    •使用无代理的完全网络可视性以及细致的设备分类,去定义网络设备的功能角色和区域
    •无需安装代理,强力执行企业的网络安全策略,控制终端行为。
    •利用企业中现有的网络安全设备直接加强可视性和减少修复时间。
  • The Role of the DPO
    The Role of the DPO Tarun Samtani, Group DPO for Vectura Group Plc, & SkyePharma May 29 2018 7:00 am UTC 60 mins
    For many organisations, it will be a legal requirement to have a Data Protection Officer. Even if you may not have a legal requirement, it will be useful to have a person responsible for Data Protection.

    Join this presentation to learn more about:
    - Challenges faced by organisations on deciding whether they should have a DPO
    - How to choose a DPO (full time or consultant)
    - The expectations from the role
  • Schutz von Office 365 mit SonicWall Email Security–ein Einblick in die Technik
    Schutz von Office 365 mit SonicWall Email Security–ein Einblick in die Technik Silvan Noll May 29 2018 8:00 am UTC 60 mins
    Immer mehr Organisationen entscheiden sich für Office 365, wenn sie in die Cloud umziehen. Viele Organisationen evaluieren auch Cloud-basierte E-Mail-Sicherheitslösungen, um Sicherheitslücken zu schließen und Risiken bei der Migration in die Cloud zu minimieren.
    Nehmen Sie an diesem Webinar teil und erfahren Sie in einer Livedemo, wie die Email Security-Lösung von SonicWall einen umfassenden Schutz für Office 365 sicherstellt. Finden Sie mehr zu folgenden Themen heraus:
    • was Sie beim Schutz Ihres Office-365-E-Mail-Dienstes beachten sollten
    • wie SonicWall Email Security einen überragenden, hoch entwickelten Schutz vor Bedrohungen und Datenverlust sowie E-Mail-Kontinuität für Office 365 bietet
  • Securing the Transforming Industrial Environment
    Securing the Transforming Industrial Environment Ronen Shpirer, Security Solutions Architect, Fortinet May 29 2018 9:00 am UTC 60 mins
    IoT, IIoT, OT... It is likely that for many of us these acronyms are confusing. The fact is that traditional industrial environments, such as utilities and production, have started a digital transformation process which harness these and other technologies to become more efficient, automated and competitive.

    Within this transformation from a well-defined and well-controlled industrial ecosystem to a dynamic and open one, lurks a shift in the security challenges, needs and solutions/architecture.

    This session will focus on the technologies and challenges digital transformation introduces in industrial environments and how Fortinet’s Security Fabric is deployed in such an environments to provide the required security infrastructure and posture, including demonstration of some simplified use cases.
  • Multi-Cloud, Multi-Problems
    Multi-Cloud, Multi-Problems Mike Dahlgren, Senior Cloud Solution Architect, Red Hat May 29 2018 9:00 am UTC 75 mins
    Simplifying complex IT operations with automation & management

    IT operations is more complex than ever before. Automation and management are critical to keep pace and deliver business results.

    Join this webinar to learn how management, automation, and innovation address your hardest IT challenges:

    > Improving processes, migrating apps for optimization, and providing a single language for DevOps practices using agentless IT automation
    > Managing multicloud environments efficiently, securely, and with compliance to various standards
    > Easily and quickly building, developing, and deploying in nearly any infrastructure—on premise, in a public cloud, or hosted
  • Automating VM-Series deployments on AWS and Azure with Terraform and Ansible
    Automating VM-Series deployments on AWS and Azure with Terraform and Ansible Vinay Venkataraghavan - Senior Solution Architect, Technical Business Development May 29 2018 9:00 am UTC 60 mins
    Join us for our new cloud webinar, in which cloud automation experts will show you how customers have successfully automated their VM-Series next-gen firewall deployments and effectively protected their DevOps environments in AWS®.

    You’ll learn how to:

    - Implement touchless deployment for your fully configured firewalls with native and third-party automation tools, such as Terraform® and Ansible®

    - Consume tags to execute your commitless policy updates

    - Automate VM-Series deployments across your multi-cloud environment
  • Secrets of Successful Sales. Pillar 3&4: Sales Strategy and Confidence
    Secrets of Successful Sales. Pillar 3&4: Sales Strategy and Confidence Alison Edgar May 29 2018 10:00 am UTC 60 mins
    Over three webinars, Alison will share her Secrets to Successful Sales focusing on her Four Key Pillars of Sales methodology. Alison will teach you the strategies and processes she used to build her own business and become One of the UK’s Top 10 Business Advisers.

    If you want to hit target? Or better yet, exceed target? Maybe even grow a business? Then you need to tune into these webinars with Alison Edgar, The Entrepreneur’s Godmother.

    Webinar 3: Pillar 3&4: Sales Strategy and Confidence

    This webinar is split into two sections, strategy and confidence. Everyone needs a sales strategy, if you don’t know where you’re going, how are you supposed to know where to start? I’m going to the strategy that helped me become One of the UK’s Top 10 Business Advisers and got me to where I am today.
  • GDPR compliance on mobile devices, how secure is your organization?
    GDPR compliance on mobile devices, how secure is your organization? Aaron Cockerill, Chief Strategy Officer, Lookout May 29 2018 11:00 am UTC 60 mins
    Since 25 May, the General Data Protection Regulation (GDPR) is now officially enforceable. By now, most of the companies dealing with data should have taken the necessary steps to comply with the regulation and stay out of trouble. And this is all good but, have you thought about how your employees are using their mobile phones or devices to access your company data? How do you protect your organization from an employee's phone being hacked? The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

    By popular demand, we're replaying this webinar hosted by Aaron Cockerill, Chief Strategy Officer at Lookout and his guest, Kabir Barday, CEO at OneTrust.

    On the agenda:
    - Why mobile is a problem for GDPR compliance
    - Understanding the threats & risks to GDPR compliance from mobile
    - Finding & stopping mobile threats to GDPR compliance

    Did you know?

    84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

    31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

    63% of enterprise employees say they access their organization's customer, partner, data and employee data while on their mobile device.
  • Approfondimento tecnico - Proteggere Office 365 con SonicWall Email Security
    Approfondimento tecnico - Proteggere Office 365 con SonicWall Email Security Luca Pesce & Keith Johnson May 29 2018 12:30 pm UTC 60 mins
    Sempre più organizzazioni adottano Office 365 nell’ambito del loro "passaggio al cloud". Molte aziende stanno anche valutando la scelta di una soluzione di email security basata sul cloud per colmare le lacune di sicurezza e ridurre al minimo i rischi correlati alla migrazione nel cloud.
    Partecipa a questo webinar con una demo live su come la soluzione SonicWall Email Security protegge Office 365. Scopri di più su:
    • Fattori da valutare per garantire la sicurezza del proprio servizio e-mail Office 365
    • Perché SonicWall Email Security offre un livello superiore di protezione contro le minacce avanzate, prevenzione della perdita dei dati e continuità della posta elettronica per Office 365
  • Crypto Crime:  Hunting for Cryptocurrency Mining in Your Enterprise
    Crypto Crime: Hunting for Cryptocurrency Mining in Your Enterprise Lindsay Drabwell, Head of Membership Services, (ISC)² EMEA, Tom Kellermann, CISO, Rick McElroy, Sec. Strategist, Carbon Black May 29 2018 1:00 pm UTC 60 mins
    2018 is shaping up to be an important year for not just Bitcoin, but the many new cryptocurrencies that seem to be popping up by the day. Attackers have discovered that mining cryptocurrency can prove to be a very profitable endeavor if they can leverage someone else's computing resources.
    To ensure that organisations have full visibility into all activity in their environments, Tom Kellermann – Chief Security Officer and Rick McElroy – Security Strategist from Carbon Black will walk you through the key pointers you need to know about how to hunt for malicious mining malware in your enterprise and ensure your critical business resources aren't generating profit for the adversary on your dime.
    In this webinar you will hear all you need to know for a Cryptocurrency Mining 101, as well as learning about:
    •Monero - What is it, and why use it?
    •Indicators of cryptominers
    •Using Carbon Cb Response to hunt for miners
  • Living in the GDPR World – What Now?
    Living in the GDPR World – What Now? Shawn Ryan, Senior Product Marketing Manager, Imperva, and Timothy Yim, Senior Regulatory Counsel, Imperva May 29 2018 4:00 pm UTC 60 mins
    With the deadline for General Data Protection Regulation (GDPR) compliance passing on May 25, 2018, those companies that have taken the necessary steps are wondering “what’s now?”, while those lagging behind must quickly mobilize to eliminate gaps and mitigate the risks associated with failure to comply.

    This webinar will provide you with:

    - A refresh of the GDPR requirements and risks associated with the failure to comply.
    - An overview of the key actions and requirements for organizations that are already at, or near compliance, and those that are still ramping their compliance efforts.
    - A deep dive into how your data security program can facilitate GDPR compliance and the various solutions available to support organizational readiness efforts.
  • IoT Risk and Posture Assessment
    IoT Risk and Posture Assessment Mitesh Shah, Sr. Technical Product Marketing Mgr., ForeScout Technologies, Inc. May 29 2018 4:00 pm UTC 45 mins
    IoT devices being deployed by the thousands, they often lack IT oversight and basic security best practices such as strong credentials. A recent industry analysis notes that 81 percent of breaches involve the misuse of stolen, weak or default credentials. Botnets such as Mirai take advantage of weak IoT credentials and harvest millions of IoT devices to cause service disruptions. Hence, IoT assessment is the next logical step after IoT classification for managing risk and reducing your attack surface.
    Join us to learn how the ForeScout platform helps organizations assess IoT devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including functionality that lets you:
    • Identify IoT devices with factory default and weak credentials
    • Create your custom IoT credential assessment library or leverage the ForeScout-provided credential library
    • Create policies to automate assessment and initiate mitigation actions (alert, limit, block and segment)
  • FinTech Security: Cyberthreats Today and Tomorrow
    FinTech Security: Cyberthreats Today and Tomorrow Guy Rosefelt, Director of PM May 29 2018 5:00 pm UTC 60 mins
    This is an opportunity for all Fintech security professionals to take a deep dive into the current and future threats targeting the technology that drives the financial sector.
    This briefing will present highlights of the joint NSFOCUS and Ping An Financial Security Research Institute authored report “2017 Fintech Security Analysis Report”. Topics include:

    •An analysis of Fintech from the perspective of the Internet
    •The development history of and current trends in Fintech
    •Typical Fintech cybersecurity threats, data security threats, and business security threats
    •The current security posture of Fintech institutions and the security trends that they should be aware of.

    Reserve your seat today to learn how to better arm yourself against the next generation of threats against Fintech.
  • Medical Grade Security for your Unpatchable Medical Devices
    Medical Grade Security for your Unpatchable Medical Devices Mick Coady, PwC, and Matt Mellen, Palo Alto Networks May 30 2018 2:00 am UTC 60 mins
    Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network.

    The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves.

    Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments.

    In this webinar, you will discover:
    •The cybersecurity risks posed by unpatchable and hard-to-patch medical devices
    •How to successfully mitigate medical device security risks
    •Strategies you can implement today to secure medical devices
  • So liefern Sie transformatorische Geschäftsprojekte mithilfe des Projektportfoli
    So liefern Sie transformatorische Geschäftsprojekte mithilfe des Projektportfoli Oliver Stöeckl - Software Senior Solution Consultant May 30 2018 8:00 am UTC 60 mins
    Angesichts der immer schneller voranschreitenden digitalen Transformation steht Ihr IT-Team mehr denn je unter Druck, neue Initiativen zu ergreifen. Aber wie priorisieren und führen Sie Transformationsprojekte mit eingeschränkter Transparenz in Bezug auf Kosten, Nachfrage, verfügbare Ressourcen und Geschäftsauswirkungen durch?
    In diesem Webinar erfahren Sie, wie Sie mit der neuen PPM-Lösung von Cherwell Ihre Unternehmensziele durch eine verbesserte Projektpriorisierung, bessere Planung und fortlaufende Transparenz erreichen.
    Wir demonstrieren Ihnen wichtige Funktionen, mit denen Sie:
    •Priorisieren Sie alle Ideen und Projektanfragen durch eine Bewertungsmatrix
    •Visualisieren Sie den Status und die Gesundheit von Projekten in Ihren Portfolios
    •Sehen Sie sich auf einen Blick den Status einzelner Projekte an und erfahren Sie mehr über bestimmte Projektdetails
    •Bewerten Sie die Ressourcenkapazität und Verfügbarkeit für Ihre Projekte
  • Medical Grade Security for your Unpatchable Medical Devices
    Medical Grade Security for your Unpatchable Medical Devices Mick Coady, PwC, and Matt Mellen, Palo Alto Networks May 30 2018 9:00 am UTC 60 mins
    Because security is often an afterthought when medical devices are designed and maintained by the manufacturer, they are the most vulnerable devices in a hospital’s network.

    The medical device community is beginning to improve the security of their products, but it will take years for legacy devices to be upgraded or replaced. Until then, healthcare organizations need to develop strategies for mitigating the cybersecurity risks these unpatchable devices pose to their patients and the organizations themselves.

    Join Matt Mellen, a healthcare security architect and former security lead for a hospital network, and Mick Coady, a partner in the Health Information Privacy and Security Practice at PricewaterhouseCoopers, as they discuss how to approach and mitigate the challenges associated with securing medical devices in hospital environments.

    In this webinar, you will discover:
    •The cybersecurity risks posed by unpatchable and hard-to-patch medical devices
    •How to successfully mitigate medical device security risks
    •Strategies you can implement today to secure medical devices
  • Epic CA Fails: How Quickly Can You Restore Trust? (EMEA Focus)
    Epic CA Fails: How Quickly Can You Restore Trust? (EMEA Focus) Mike Dodson, VP WW Customer Security Strategy and Solutions, Venafi May 30 2018 10:00 am UTC 60 mins
    What happens when a certificate authority compromise or error leaves you scrambling to find and replace large numbers of certificates? Many organizations put their skills to the test when Google recently decided they would no longer trust certificates issued by Symantec. With the first set of Symantec distrust deadlines just around the corner, do you know if your organization will be impacted?

    But Symantec wasn't the first panic button and it won't be the last. Most security professionals think there will other events like this in the future, but they don't have the technology or information they need to respond quickly. Join our webinar to learn how you can prepare for large-scale certificate security events.

    You'll learn why certificates are poorly understood and weakly defended in many enterprise networks. And you'll see survey results that show why a surprising number of IT security professionals are relatively unconcerned about their ability to quickly find and replace groups of certificates.

    How does your organization stack up to industry peers? Are you agile enough to find and replace all certificates that chain up to a Symantec root?

    Attend this session to learn:
    - Which types of CA events can impact your certificates
    - Why it's difficult to locate and replace impacted certificates
    - Why most organizations aren't ready to react quickly
    - Four steps you can take now to build CA agility
  • Evolving security strategies:  It’s time for a people-centric approach
    Evolving security strategies: It’s time for a people-centric approach Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Akhilesh Dhawan, Principal Product Marketing Manager, Citrix May 30 2018 2:00 pm UTC 60 mins
    Attackers aren’t storming the walls of your DMZ or planning a full-scale assault on your firewall. They’re stealing information by targeting your employees and sneaking in under the radar. How do you combat that? By evolving your strategy from an attack-centric to a people-centric approach. Use a secure digital perimeter to surround users, apps and data with defenses to securely deliver digital workspaces that are centered around the people that use them—whether those resources are virtual, SaaS, hybrid or cloud.

    Attend this webinar and we’ll show you how you can:
    • Get visibility to mitigate growing security threats resulting from multi-cloud environments
    • Protect apps, data and network resources while maximizing user experience
    • Get insights into user behavior with rich analytics
  • The Automated Enterprise: Transforming IT Ops to Support Modern Business
    The Automated Enterprise: Transforming IT Ops to Support Modern Business Justin Nemmers, General Manager, Ansible, Red Hat May 30 2018 3:00 pm UTC 60 mins
    IT operations teams are increasingly challenged to deliver scalable, on-demand infrastructure and services to support developers, lines of business, and C-level initiatives - all while still ensuring security, compliance, reliability / and at timeframes once unimaginable.
    Faced with this, successful IT operations teams recognize that they need to adopt a new approach and modern, unified management and automation tools to remain relevant and effectively support business outcomes.
    Join Justin Nemmers, General Manager of Ansible, Red Hat, to learn how automation is at the center of IT operations transformation for your organization.

    Justin Nemmers, Red Hat® Ansible Automation General Manager, has spent a career helping organizations transform their IT environments by adopting new technologies and making better use of existing ones. Before joining Red Hat and leading a large services team, he held technical, sales, marketing, and product leadership roles at a number of organizations.
  • UCC Series [Ep. 5]: Conference Room of the Future
    UCC Series [Ep. 5]: Conference Room of the Future Robin Gareiss, President & Founder, Nemertes Research May 30 2018 3:00 pm UTC 60 mins
    At most organizations, conference rooms are less than perfect--and that affects the productivity of any meeting. Inconsistency is the cornerstone of meeting room space, whether it's the power outlet locations, wired or wireless connectivity, brand of digital whiteboard, or video conferencing capabilities. That's why many companies are investing in "Conference Room of the Future" initiatives.

    Nemertes recently conducted research among 600+ global organizations, and this webinar will focus on best practices.

    It will address the following:
    • What technologies are crucial to effective meetings?
    • Who should run the meeting-room overhauls for the most success --IT or facilities?
    • What are the differences between smaller, huddle rooms and large conference rooms, in terms of user expectations?
    • How do advanced technologies, such as artificial intelligence and Internet of Things, play a role in meeting rooms?
    • What should IT leaders look for in management and monitoring tools?

    We look forward to sharing this information with you and answering your questions!
  • Open Source Risk in the Financial Industry
    Open Source Risk in the Financial Industry RJ Gazarek, CA Veracode Product Marketing and Chris Widstrom, CA Veracode Product Management May 30 2018 3:00 pm UTC 45 mins
    Companies that operate within the financial services industry must optimize delivery of product and service applications to customers. As a result, many IT organizations are turning to open source components to leverage existing resources- introducing vulnerabilities that can compromise the security of your applications and your overall business. In light of recent rollouts of GDPR and the NYSDFS cyber regulations- requirements around application security are more likely to emerge.

    Watch this webinar to keep pace with these regulations and ensure that the open source components you use do not hinder your ability to achieve compliance. Join CA Veracode’s product experts as they help those affected by these requirements get up to speed on:

    •What these regulations entail
    •How best to approach these requirements
    •How Veracode can help with compliance