The IT security community on BrightTALK is composed of more than 200,000 IT security professionals trading relevant information on software assurance, network security and mobile security. Join the conversation by watching on-demand and live information security webinars and asking questions of experts and industry leaders.
Andrew Homer, VP Business DevelopmentRecorded: Jan 17 202040 mins
Despite the increased security investments and proliferation of new infosec tools, the damage caused by cyber breaches continues to worsen. Meanwhile, the adversary plays by their own rules and evade detection by studying a static environment. They’ve had the luxury to decide when, where and how to attack, while organizations continue to remain in a reactionary defensive state.
This session looks at the most common methods used to bypass detection. It will also discuss how to combat against the adversary advantage with simple proactive approaches to prevention. Finally, it presents recommendations to reduce risk, including a look at innovative technologies with Moving Target Defense to prevent advanced threats fileless attacks and zero days.
Cameron Goedde - Client Solutions Field Marketing | Dell EMCRecorded: Jan 17 202042 mins
Smarter & faster experiences are the driver behind Dell’s 2019 Client Solutions lineup. We have the broadest portfolio to meet all needs. From highly configurable fixed solutions – our OptiPlex desktops and AIOs and our Wyse Thin clients. To the smallest, lightest mobile solutions including Latitude and the XPS to specialty systems – our powerful Precision workstations, including towers, racks and mobile workstations and finally our Rugged devices. We also have a full portfolio of displays and accessories to help build your entire ecosystem.
Erich Kron, James McQuigganRecorded: Jan 17 202049 mins
Tax season is upon us, which makes this prime time for hackers to target your unsuspecting users with the latest Business Email Compromise (BEC) scams. From evolved W2 fraud to tax-related spear phishing, cybercriminals capitalize on the first quarter of each new year with smarter, craftier attacks designed to convince your users to provide confidential information, authorize wire transfers, or enable malicious files.
In this webinar Erich Kron and James McQuiggan, KnowBe4 Security Awareness Advocates, discuss the new types of BEC scams you can expect to see, what your users should be on alert for this tax season, and how to protect your organization from these evolved threats.
You will learn:
- Real-world examples of the latest BEC attacks
- Common targets within your organization and techniques used to trick them
- Red flags your users need to know now to spot BEC attacks
- How to educate your organization so you don’t fall victim
Don't let your organization become a statistic this tax season! Join our experts to find out how to stop the bad guys before it's too late.
Dirk Thelen und Bastian SchwittayRecorded: Jan 17 202049 mins
Security Teams stehen heutzutage vor gewaltigen Herausforderungen - in Silos agierende Sicherheitssysteme generieren Unmengen von Alarmen ohne den notwendigen Kontext, um Angriffe schnell und umfassend erkennen, verstehen und stoppen zu können. Cortex XDR setzt diesem Dilemma einen neuartigen Ansatz entgegen, der auf der Analyse reichhaltiger, integrierter Daten über Endpunkte, Netzwerk und Cloud hinweg basiert - als erste XDR-Plattform für sichere Prävention, automatisierte Erkennung und schnelle Untersuchung und Eindämmung von Cyberangriffen.
In diesem Webinar stellen Ihnen Bastian Schwittay und Dirk Thelen vor, wie die neue Version 2.0 von Cortex XDR mit der Einbindung von Daten aus Drittquellen, einem vollkommen neuen Device Control-Modul und umfassend verbessertem Benutzerinterface einen weiteren Meilenstein erreicht und die Messlatte für XDR ein weiteres Mal erheblich höher gelegt hat. Außerdem geben wir Ihnen einen Einblick in die neue Lizenzierung.
Dave Ochoa, Manager of Information Security Operations & Senior Director of User Support, Janet HuntRecorded: Jan 16 20204 mins
Learn how Apria Healthcare secures 10,000+ laptops, desktops, and tablets and stays compliant with industry regulations by using Absolute software.
- Persistent security controls:
Apria Healthcare is a leading provider of home respiratory services and certain medical equipment, with over 400 locations and 8,000 employees throughout the United States.
In this interview, Senior Director of User Support, Janet Hunt, discusses the unique differentiator that Absolute offers: protection from the BIOS. The result is superior, more accurate asset tracking.
The team at Apria Healthcare has visibility into the status of every device, with a persistent connection that cannot be seen or removed by the user. As Dave Ochoa, Manager of Information Security Operations, says, “I can’t protect what I don’t know exists”.
- Proving compliance:
In cases of lost or stolen devices, Absolute acts as a kind of insurance policy. The InfoSec team presents regulators with a full profile of the device, including its location, encryption status, other controls, and a list of freeze or wipe commands if the device goes back online.
Absolute records a snapshot of each device every fifteen minutes, which Apria Healthcare can provide to auditors as proof of a full history of protection.
- Visibility and control:
Absolute has transformed how Apria Healthcare manages its devices, and how it keeps sensitive patient data secure.
Janet Hunt summarizes the partnership by saying, “If Absolute were to disappear, I would retire because I would have no idea where anything was. That was the greatest thing about bringing Absolute in.”
Erich Kron, David LittmanRecorded: Jan 16 202055 mins
It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.
So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
As another year passes, Apple's commitment to empowering business and education organizations is unquestionable. Evolved management capabilities and strategic partnerships aim to help more students, teachers and employees enjoy the unmatched capabilities of the Apple ecosystem than ever before.
Before you finalize your technology plans for 2020, join us for a brief recap of the major milestones Apple has hit in 2019, and take a sneak peek at what Apple IT trends you can expect in the next year.
- Apple IT accomplishments in 2019
- Predictions for Apple IT trends in 2020
- IT initiatives to consider and how to implement
Neera Desai, Threat Researcher & Marc Larson, Senior Intelligence AnalystRecorded: Jan 16 202046 mins
Each year, the cybersecurity industry is bombarded with threats to be concerned about. In the beginning of 2019, we heard about threats like artificial intelligence, machine learning, and ransomware attacks that would plague cyber professionals all year long. As we move into the new year, we want to look back at the trends that stood out to LookingGlass researchers, how they were different than the threats of years past, and which type of threats we can expect to see in 2020. Join LookingGlass’ Neera Desai, Threat Researcher, and Marc Larson, Senior Intelligence Analyst, at 2 pm on January 16th for our next webinar.
Attendees will be eligible for one hour of CPE credit.
Payal Singh, Solutions Architect, F5 Networks, and Ahmed Dessouki, Sr. Manager, Product Management, CiscoRecorded: Jan 16 202060 mins
Learn how to manage the F5 BIG-IP in your ACI + BIG-IP deployment by leveraging F5’s automation toolchain and ACI’s programmable App Center framework.
This simple and native integration aims to solve important real world use cases:
1) Deep infrastructure visibility into the ACI and F5 deployment, and
2) Network as well as application management on BIG-IP.
Each use case can be automated due to the SDN capabilities provided by Cisco APIC.
Join us to understand how you can leverage APIs to achieve end-to-end network automation workflows and learn how different personas within your organization can benefit from these features and functionalities.
A “Resource Module” is defined as a specific discrete network function mapped to a single Ansible module. This session will shed light on how resource module benefits Network Operators/Developers/Architect by returning common payload and tunable output to match the life cycle phase of the playbook, therefore building consistency and transparency. It introduces new state operations and facts integration. The module eases Brownfield device onboarding by returning facts in the similar shape as the respective resource module’s argspec.
In this presentation we will be doing deep dive with demonstration into the following:
- Why Resource Module.
- What a Resource module is.
- How a playbook with resource module and new states looks like.
- What common payload resource module returns.
- How facts is integrated with the module.
Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product MarkeRecorded: Jan 16 202057 mins
IT transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business.
We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
Bob Welshmer, Senior Sales EngineerRecorded: Jan 16 202012 mins
Who in your organization needs to use sensitive data? Who manages it? Who defines acceptable levels of data privacy for different uses? Who ensures those levels are achieved every time? If you’re unsure, chances are you’re not utilizing your data to its fullest potential.
Enter: the Privacy Center of Excellence, a team of executive members, policy implementers and data consumers who work together to find the balance between data utility and data privacy.
Join Privitar’s Solutions Engineer, Bob Welshmer, to find out what it takes to set up a high-functioning Privacy Center of Excellence.
Join this session to learn:
· Who the main players are in the Privacy Center of Excellence
· Roles and responsibilities in the Privacy Center of Excellence
· How the Privacy Center of Excellence players work together to maximize data utility while maintaining privacy
Director of Security Strategy | AbsoluteRecorded: Jan 16 20208 mins
Data Privacy is today's greatest challenge for IT and security teams, and with 35% of sensitive data out-of-sight on endpoints, there has never been a stronger need for persistent endpoint visibility and control.
> DATA PRIVACY EXPLAINED
Data privacy is a big concern for individuals and organizations alike. The EU’s General Data Protection Regulations (GDPR) has brought the topic to the forefront of society’s collective consciousness recently.
People have always been conscientious about their personal privacy; however, with The Digital Transformation of our world, who we are has become a collection of individual pieces of data called Personally Identifiable Information (PII). And our PII is everywhere. Business, government, school, research, and even friend-to-friend interactions, all happen in the digital sphere making our data easily accessible and open to exploits by cybercriminals.
> DATA PRIVACY LAWS
Learn how the laws designed to protect the privacy of personal information.
- The EU’s General Data Protection Regulation (GDPR),
- Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA)
- In the US: HIPAA (for health information) and S-P and S-ID statutes for financial records, enforced by the SEC. There is also the California Consumer Privacy Act (CCPA). But no national privacy standard. Yet.
> DATA PRIVACY TIPS
Thwart attackers and stay audit-ready with these three steps:
1. See everything
2. Analyze the risk
3. Apply rapid response
Learn tips and strategies for maintaining data privacy and data protection with confidence.
Ryan Terry, ProofPoint; Derrick Butts, Truth Initiative; Michael Weisberg, Garnet River, LLC; Brandon Dunlap (Moderator)Recorded: Jan 16 202059 mins
According to the FBI’s Internet Crime Complaint Center, Business Email Compromise (BEC) resulted in more than $26 Billion in losses since 2016. Bad actors impersonating or using stolen trusted identities use a variety of attack vectors to defraud targets out of money and sensitive information. The problem is only getting worse, as these attacks are increasing due to a larger attack surface and the ability to move quickly through an organization. Detection can be difficult. What can be done to combat this fast growing and moving threat? Join ProofPoint and (ISC)2 on January 16, 2020 at 1PM Eastern for a Roundtable discussion on BEC, the threats it poses and strategies to defend against it.
Todd Bernhard, CloudCheckr Product Marketing DirectorRecorded: Jan 16 202030 mins
Amazon Web Services now offers a discount model called AWS Savings Plans. This program offers flexible pricing for EC2 Instances and AWS Fargate in exchange for a usage commitment (dollars/hour) over a set time period of 1 or 3 years.
With this resource purchasing model now on the table, businesses are comparing Reserved Instances (RIs) vs AWS Savings Plans to find out which model offers the deeper discount and whether that makes sense for their global investment strategy. In this webinar, we cover the use cases for RIs, AWS Savings Plans, and Spot Instances, and how they impact your overall cloud cost optimization efforts.
Join CloudCheckr’s Director of Product Marketing, Todd Bernhard for “How to Lower Your AWS Bill with RIs, AWS Savings Plans, and Spot Instances”. Understand how to use RIs vs AWS Savings Plans to lower our cloud bill, the percentage discounts you actually receive, and where Spot Instances fit into the picture.
Jeff Olson (Product Solutions Marketing - Aruba), Luke Pfaffinger, VP of Business Technology at PrimeGroupRecorded: Jan 16 202051 mins
Join us, Jan. 16, 2020 at 10am Pacific as Luke Pfaffinger, Vice President of Business Technology at Prime Group, shares hares how his newly deployed Aruba SD Branch solution, managed by the Aruba Central cloud management platform, enables his business to:
•Enjoy a 20X WAN performance improvement using SD-WAN versus MPLS
•Slash branch deployment times by more than 50 percent
•Resolve help desk issues up to 40 percent faster
This webinar will also include an Aruba Central demo and eligible attendees could qualify for a complimentary access point and a 90-day trial of Aruba Central.
Carolyn Crandall, Chief Deception Officer & CMO and Joseph Salazar, TME at Attivo NetworksRecorded: Jan 16 202058 mins
Deception Technology was one of the most researched hot topics in 2019, only second to Zero Trust. Analysts have also increased their coverage and endorsement of cyber deception as a foundational threat detection solution for organizations of all sizes. Deception has materially changed in its capabilities as well as operational efficiency over the last decade. It is now a far cry from the original honeypot. Join this webinar for insight into what deception will look like in 2020 and what criteria to consider when selecting the right solution for you.
Topics to include:
• Evolution from honeypots
• Coverage capabilities, both environmental and attack vector
• Modifying attacker behavior during recon, lateral movement, and Active Directory queries
• Value in threat intelligence programs
• Automation and role in SOAR
Deception users are typically tight-lipped about their use of the technology, often driven by its application for catching insider threats and legal requirements to avoid tipping off attackers. Attivo Networks is 2-years running as a top 100 fastest growing tech company on the Deloitte Fast 500, demonstrating its impact in derailing threats early and the for being a force multiplier to current security defenses.
Sign up now to learn what this technology can do for you to reduce risk and attacker dwell time significantly.
Alex Berger and Christer Swartz, with Host Karin ShopenRecorded: Jan 16 202062 mins
The modern data center is complex. A variety of workload types - from mainframes to virtual machines, bare metal servers to containers, physical desktops to virtual desktops - are commingled across multiple data centers, branch locations, and public clouds. They are connected by a combination of physical and virtual networks, all managed by different teams within IT. And as the cliche goes, “complexity is the enemy of security”.
In this webinar, our experts will:
explore the reality of securing modern data centers and hybrid clouds
discuss best practices for holistically and consistently securing physical, virtual and public cloud environments
offer practical insights into use cases and scenarios that we’ve encountered from our years of guiding customers through their cloud transformation journeys.
Eric Ledyard, Sr. Technical Product Marketing Manager at ServiceNow, and Tameem Hourani, Principal at RapDevRecorded: Jan 16 202056 mins
Change has always been a constant. But the pace of change is accelerating dramatically. For today’s DevOps teams, the challenge is to deliver innovation at the pace the enterprise needs without compromising quality and reliability.
Join ServiceNow expert, Eric Ledyard, Sr. Technical Product Marketing Manager, and ServiceNow Partner, Tameem Hourani, from RapDev as they discuss how DevOps teams can reduce the internal friction that slows effective change management.
- Learn how to tap into information already in their systems for the insight they need to speed up change while maintaining control, transparency, and integrity.
- Learn more about the evolving best practices for speeding up change while meeting service and quality expectations.
- Find out how development teams can collaborate more effectively with IT Operations to deliver quality solutions that adhere to enterprise policy and standards.
- Get more information on the ServiceNow solutions available to address the challenge of accelerating change while ensuring discipline and transparency.
Brian Russell, Co-chair, CSA IoT Working Group & Gonda Lamberink, Global Senior Business Development Manager, ULRecorded: Jan 16 202050 mins
The market for IoT products continues to expand, with increased quantities of devices being integrated into consumer and business networks. These products are turning into always-on services that incorporate cloud connectivity and expose many points of interconnection. Automation is beginning to take hold on top of this layer of pervasive connectivity and users are becoming ever more reliant on workflows enabled by these systems. Even as the reliance on IoT systems continues to increase, manufacturers are still not getting cybersecurity right. There are still far too many instances where even basic security controls are not enforced in IoT products. This is concerning especially given the adoption of safety-critical and health-critical devices being introduced onto the market, and growing risk of data breaches and related security compromises next to an increasing prevalence of botnets and large-scale automated, distributed attacks.
As the future unfolds, the ‘attack surface’ will only grow larger and the public will be put at increasing risk if strategic changes do not occur immediately. To this extent, UL and the Cloud Security Alliance (CSA) have partnered to better understand the current state of IoT cybersecurity regulations, standards and best practices through primary research. Our aim is to identify gaps in coverage that could lead to deployment of insecure IoT services and systems. In this webinar, we will share the results of that research and discuss our strategic approach to fixing the current state of IoT security based on constant collaboration between industry stakeholders, government agencies and enterprise users.
Hadas Lahav, Roi Alon Product Management & Sigalit Kaidar, Product Marketing, TufinRecorded: Jan 16 202046 mins
Enterprises are adopting SDN in order to align network operations and network security with the needs of the business. As networks become too complex to manage securely and effectively, many of them seek a central solution that offers visibility, compliance and automation within the SDN fabric and beyond – across the hybrid network.
Tufin provides superior visibility and automation for the leading SDN platforms, and Tufin Orchestration Suite R19-3 GA complements essential capabilities. Join the webinar to learn about the highlights of this release, including:
•Complete support for VMware NSX-T to ease the adoption and migration from NSX-V
•Superior visibility and path analysis for Cisco ACI – within and beyond the fabric
•Enhancements to zero-touch automation across vendors and platforms
Imran Idrees | Product Marketing Manager | Cisco MerakiRecorded: Jan 16 202063 mins
Join us for a webinar to learn how Meraki is redefining education by providing IT teams with the networking infrastructure they need to support students and teachers in a constantly evolving classroom environment. Eligible attendees receive a free wireless access point!
Steve Garson is the president and founder of SD-WAN Experts.Recorded: Jan 16 202036 mins
Cut WAN costs, improve performance, increase security — SD-WAN seems to do everything right, but is it too perfect? Find out as we take a hard look at the myths and realities of SD-WAN.
In our next webinar, long-time WAN consultant, Steve Garson, president of SD-WAN Experts, speaks with Dave Greenfield, Cato’s secure networking evangelist, about the truth and fiction of SD-WAN.
Join us for a free-wheeling, no holds barred conversation into SD-WAN’s dirty little secrets including:
Why SD-WAN won’t improve your network performance
Why reducing WAN costs isn’t a realistic goal for most SD-WAN deployment — and why that shouldn’t matter
When you need a provider to run your SD-WAN service.
What SD-WAN vendors mean when they say “security,” and why that’s still not enough security for your organization
Jane Frankland (CISO Advisor), Daniel Wahlen (Indeed), Andrey Evdokimov (Kaspersky)Recorded: Jan 16 202062 mins
Most IT security leaders (70%) say that an emphasis on risk management has been a key change to their role, followed by the belief that business acumen now matters more than depth of technical expertise. This means that CISOs need to develop new skills, while keeping up with complex IT architecture and a growing threat landscape.
Kaspersky brings together cybersecurity and HR professionals to discuss what expertise is required for modern CISOs and those who would like to enter this industry, as well as the main HR challenges and further career paths.
The panelists will include Jane Frankland (CISO Advisor, Author, Keynote Speaker), Daniel Wahlen (Senior Evangelist & Senior Marketing Manager, Indeed), Andrey Evdokimov (Head of Information Security, Kaspersky). The panel discussion will be moderated by Alena Reva (Head of Human Resources, Kaspersky North America & Europe).
Dania Ben Peretz, Product Manager (AlgoSec)Jan 19 20203:00 pmUTC35 mins
Complex networks take significant resources to get projects from A to B. There’s a lot of hands-on, manual effort required to manage networks and keep them secure. Network management is demandingly ‘high-touch.’
There is a better way. ‘Zero-touch’ solutions can accelerate change requests, with request generation to implementation taking just minutes. But, preparing for zero-touch network automation isn’t a zero-touch process. Preparation is needed, especially if you have a complex hybrid network: on-premise, in the cloud, and/or using an SDN.
In this webinar, Dania Ben Peretz, AlgoSec Product Manager, will reveal technical tips and tricks and the steps needed to get zero-touch network automation up and running.
Learn how to:
• Get a comprehensive view of your network
• Automate each step in the change process
o Discover which security devices are in the path and blocking traffic
o Define the allowed connectivity between zones
o Plan changes, naming conventions, and change policies
o Push changes to devices
o Validate changes and detect out-of-band changes
• Accelerate application changes and have application owners and IT managers speak the same language
Fedor Sinitsyn and Orkhan Mamedov, Kaspersky Advanced Threats Research and Detection TeamJan 19 20208:45 pmUTC58 mins
Ransomware, or malicious cryptors, are among the most active types of malware in 2019: This year, they’ve been paralyzing the infrastructure of cities, commercial and public entities. Fedor Sinitsyn and Orkhan Mamedov, Kaspersky Advanced Threats Research and Detection Team will summarize their experience and share insights on what we learned this year, and what is coming up on the threat landscape.
The following topics will be covered during the webinar:
- Overview of active ransomware families and groups in 2019
- The main vectors of cryptor distribution
- Detailed analysis of the most popular and advanced cryptor families
- Targeted attacks on organizations
- Use of legitimate software by cryptors
- How to avoid becoming a victim (using products to protect an organization's infrastructure)
- What to do if an organization becomes a victim of a cryptor
Sprecher ist ein Technical Consultant mit Spezialisierung auf Data ProtectionJan 20 20208:00 amUTC90 mins
In den Webinaren „Data Protector zum Wochenstart“ wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen.
Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.
Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.
Je nach Thema dauern die Webinare zwischen 60 und 90 Minuten.
Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product MarkeJan 20 20201:00 pmUTC57 mins
T transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business.
We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
Lassen Sie sich vom SonicWall Security Experten Fabian Freundt einen Einblick in die menschliche Seite einer modernen Ransomware-Zelle vermitteln. Sie erhalten Ratschläge, wie Sie Hacker vom Eindringen in Ihre Organisation, von der Verschlüsselung Ihrer Endpunkte und von der Verbreitung auf andere Laufwerke und Segmente Ihres Netzwerks abhalten können.
Kaspersky's Dr. Amin Hasbini, Head of Global Research & Analysis Team for META and Maher Yamout, Senior Security ResearcherJan 21 202010:00 amUTC54 mins
During the webinar Dr. Amin Hasbini, Head of Global Research & Analysis Team for META at Kaspersky, and Maher Yamout, Senior Security Researcher at kaspersky, will talk about the evolving threat landscape in the Middle East, Turkey and Africa. The webinar will explore some of the key trends in terms of tools, techniques and processes likely to be used by such groups against government organizations, enterprises, critical infrastructure, society at large, and more – and consider what that means for organizations, the security community and international cyberspace. In addition to that, the web meeting will be focused on the outlook for the 2020 and new challenges that cybersecurity industry will possibly face on the edge of a new decade.
Dr. Amin Hasbini
Head of Global Research & Analysis Team for META, Kaspersky
Terry McMahon, Sr, Systems Engineer & Jacob Wild, Sr. Archiving SpecialistJan 21 202010:00 amUTC48 mins
Legal, compliance and security pressures are evolving in the face of today’s data growth, and developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content. So what is the best way for you to develop and implement a new secure approach to your data archiving challenges?
Join us for a live demo as we take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:
In this demo, we'll share how you can:
- Mitigate reputational risk
- Stay compliant with industry rules and regulations
- Improve visibility into your archived data
Antonio Reche, Solution Architect at VeracodeJan 21 202010:00 amUTC45 mins
Durante diez años, Veracode ha estado siguiendo el estado de la seguridad del software. En nuestro estudio en el décimo aniversario, confirmamos que los equipos están haciendo especial énfasis en la reducción de la deuda de seguridad. Este seminario web analiza algunos de los desafíos más comunes que afrontan los desarrolladores, y ofrece razones reales para el optimismo. Comenzamos Veracode con la misión de asegurar el software del mundo. Hoy, esa misión permanece, con el enfoque adicional de permitirle crear, innovar y "cambiar el mundo" con software, sin ser frenado por preocupaciones de seguridad.
En este seminario web:
- Conozca la realidad de seguridad que enfrentan los responsables de aplicaciones: la mayoría de las aplicaciones no cumplen con los estándares de la industria
- Vea qué lenguajes son los peores infractores de seguridad
- Observe qué fallos son las más frecuentes, con qué frecuencia se corrigen, cómo se explotan y qué categorías conducen a la mayor cantidad de incidentes.
- Comprenda cómo los equipos pueden alcanzar una reducción de 5 veces en la deuda de seguridad
- Obtenga información sobre cómo los desarrolladores pueden reducir el "tiempo medio de remediación" (MTTR) en más del 70%
Organisations with limited IT resources, yet with an enterprise’s needs - scalability, security, and reliability - often struggle to deliver a robust wireless experience. In this live webinar, we will show how cloud computing brings simplicity and effectiveness to wireless networks.
Virgilio Cervantes, Data Protection Compliance Manager, Countrywide PLCJan 21 20201:00 pmUTC45 mins
The GDPR principle of storage limitation determines that personal data must be erased (or anonymised) when 'no longer necessary'.
As such, data controllers must embed appropriate technical and organisational measures into operations, to allow for the periodical review of personal data and to the erasure (or anonymisation) of any 'non-necessary' data, thus achieving compliance with GDPR's data storage requirements.
An overview on the impact of the 'storage limitation' principle on organisations' operations will be undertaken, considering:
- Storage limitation (structured, unstructured data);
- Data minimisation (data collection, data hygiene);
- Time limitation (retention policies, procedures and time schedules);
- Risks of non-compliance (Data subject rights, data breaches).
This session will thus provide a holistic and pragmatic framework-based approach to storage limitation and its ongoing compliance.
Virgilio Lobato Cervantes holds an LLB Honours degree in Law and a Master of Arts degree in International Tourism and Aviation Management. He is a certified Data Protection Officer by the University of Maastricht (ECPC-B DPO). Currently pursues a Doctorate degree in law at the University of Reading. Virgilio’s research focus is in EU data protection and privacy law.
England and Wales Qualified Paralegal Lawyer, member of the Professional Paralegal Register (PPR Tier 3) and the Institute of Paralegals (Q.Inst.Pa.), specialised in Data Protection and Privacy Law, Virgilio presently takes on the role of Data Protection Compliance Manager at Countrywide PLC, the UK’s largest property services group.
CrowdStrike’s 2019 Falcon OverWatch Mid-Year Report provides unique insights into the targeted, state-sponsored and criminal campaigns the CrowdStrike team has encountered in the first half of 2019.
Join this webcast and hear CrowdStrike Technology Strategist, Zeki Turedi provide detailed accounts of real-world incidents the CrowdStrike team have observed, including the trends, adversaries and techniques that were most prominent in the last 12 months. You will also gain valuable information on the industries and regions most impacted by cyberattacks.
-Why “speed” is the new critical metric in cybersecurity.
-How organisations are using the MITRE ATT&CK framework to shorten the time to investigate and understand threats.
-Trends in adversary tradecraft, as seen across 1000s of real-world intrusion attempts.
-Action plans that you can use to ensure your organisation is ready to anticipate and defend against the most dangerous threats of tomorrow.
Akhilesh Dhawan, Matt Brooks, Robin Manke-Cassidy, & Wesley ShepherdJan 21 20202:00 pmUTC70 mins
Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT operating costs. However, it can also create IT security and app performance headaches.
Join us as two Citrix experts in the fields of networking and IT provide industry perspective and their experiences on:
-How hackers use different techniques to exploit weaknesses in your SaaS, web, and other applications
-How Citrix can reduce SaaS and web security threats with an integrated solution
-Key factors that influence SaaS and web app performance
-How Citrix can improve application performance for more than 4,000 SaaS apps, including O365
-Why a Citrix-differentiated security approach with a people-centric focus extends the digital perimeter
Dr. Heiko Klarl, CMO, iC Consult Group and Gerhard Zehethofer, Vice President IOT, ForgeRockJan 21 20203:00 pmUTC39 mins
Fahrzeuge werden zunehmend intelligenter und vernetzter. Um das Kundenerlebnis bestmöglich zu personalisieren und zu sichern, baut ihre Technologie auf digitale Identität. Für den Fuhrpark-Manager, den Versicherer, den Verbraucher und alle anderen Akteure im Connected Car Ökosystem ist es wichtig zu wissen, "wer" auf "was" zugreifen kann.
In dem gemeinsamen Webinar von iC Consult und ForgeRock erfahren Sie, wie Sie:
- Ihre Connected Identity-Strategie aufbauen können.
- Synergien mit anderen Geschäftsbereichen schaffen können.
- Beim Rollout von vernetzten Diensten als auch bei der Erforschung neuer Geschäftsmodelle die Geschwindigkeit erhöhen und die Time-to-Market verkürzen können.
Webinare / Webcasts
Mit Ihrer Registrierung erklären Sie sich damit einverstanden, dass wir Ihre Daten an den Sponsor dieses Webinars weitergeben, damit dieser Sie kontaktieren und Follow-up-Marketing betreiben kann. Die Rechtsgrundlage für die Verarbeitung Ihrer personenbezogenen Daten auf diese Weise ist unser berechtigtes Interesse gemäß Art. 6 (1) (f) DSGVO, das wäre die Teilnahme unserer Sponsoren, die einen großen Teil der Kosten für die Webinare / Webcasts übernehmen.
Dan Jeavons, General Manager of Data Science (Shell)Jan 21 20203:00 pmUTC25 mins
Shell has been an early adopter of artificial intelligence (AI), as it attempts to speed up its digital transformation. From machine learning to computer vision, deep learning to virtual assistants and autonomous vehicles to robotics, Shell has been focused on a range of technologies that have supported advances in AI.
Dan Jeavons joins us to detail Shell’s journey to data analytics excellence, focusing on the deployment of self-service analytics both for the data science teams who look to deploy mission-critical models for real-time use and for the longer-term strategy of filling the “data science skills gap.” Dan Jeavons is the General Manager of Shell’s Data Science CoE within the company’s central Digital Technology organisation. He is currently part of a leadership team tasked with leading Shell’s digital transformation.
James Penney - Chief Technology Officer, Device Authority and Juan Asenjo - Dir. Marketing, nCipher SecurityJan 21 20203:00 pmUTC60 mins
The Internet of Things (IoT) presents a business opportunity across almost every industry. But to be successful, IoT security must become a primary focus. IoT brings new security challenges introduced by the scale and pace of adoption, as well as the legal and safety consequences of compromised security.
It’s one thing to connect an IoT device, but how do you manage the security lifecycle of thousands, possibly millions of devices? Often devices are in the field for 5-10 years. The management of these devices can become a resource headache with high costs if dealt with manually. Not to mention the risk of human error.
Today there are various IoT platforms available to connect your devices, applications and data to in order to gain valuable insights. Microsoft Azure IoT is a popular choice and will be a focus point for the discussion.
Join this webinar to:
• Learn about at recent IoT breaches
• Discover key aspects of managing IoT security operations and applying IoT lifecycle management
• Explore best practice for building an IoT root of trust using Microsoft Azure
• Find out about HSM as a Service and its key benefits
• Learn about real IoT use cases: How to overcome/mitigate security risks in a cost-effective way
Aravind Ajad Yarra, Wipro Fellow and Danesh Hussain Zaki, Senior Member - Distinguished Member of Technical Staff, WiproJan 21 20203:30 pmUTC60 mins
Join this exclusive session by the editors of the State of Digital Integration 2019 report, to hear the key takeaways from the report and crack your enterprise integration puzzle.
‘State of Digital Integration’ is a global research and thought leadership report by Wipro to guide enterprises in crafting their integration strategy and amplify the outcomes of their Digital Transformation initiatives.
Craig Moores, Risk Advisory Practice DirectorJan 21 20204:00 pmUTC60 mins
SureCloud will explore the challenges that organisations face when achieving and maintaining compliance with PCI DSS, with a particular focus on how organisations can design and deploy a programme that aligns with wider business objectives and embeds compliance activities into business operations.
With headlines focusing on the evolution of PCI DSS 4.0, our session will target all levels of stakeholder involvement in the management of PCI compliance. Using our experience of delivering compliance applications, as an Approved Scanning Vendor, a penetration testing provider and critically from the experience of our ex-QSAs, we will share some of the shortfall’s that organisations have experienced, particularly focusing on the people, process and technologies critical in protecting an organisations’ payment channels.
Craig is responsible for SureCloud’s Risk Advisory Practice including engagement scoping, consultancy delivery and client relationships. Craig has experience in leading and delivering complex cyber security solutions aligned to strategic business objectives. Craig has broad cyber security experience including a strong technical, software development and project management background, with particular strengths in the areas of information risk management, PCI DSS, strategic planning and business auditing.
(The session will be structured around our case study organisation, Bananas to help bring this use case to life.)
Key session takeaways:
•Understand some of the business challenges that organisations face when implementing and maintaining a PCI compliance programme.
•Gain real-world insight into the compliance management shortfalls and lessons learned by other organisations.
•Reflect on how the next release of the PCI DSS 4.0 provides an opportunity for organisations.
•Learn how to gain visibility of compliance using metrics and automation.
Ulf Mattsson, Head of Innovation, TokenExJan 21 20204:00 pmUTC60 mins
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.
This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.
Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.
Ready to grow your impact, influence and income through speaking? In this webinar, Beck will show you how to be more prolific with your speaking outreach - so you can "be everywhere" your clients are.
There are three sections we'll cover
1. Strategy: Who you want to get in front of, how you'll do it and what will happen as a result
2. Application: Actually doing the outreach and doing the gigs
3. Leveraging the gigs into content, clients, and collaborations
Bring your questions, and your speaking goals for 2020 - you don't want to miss this.
· Being prolific with applications and using tools like Innovation Women to secure gigs
· Email outreach strategies and tools to help keep you from being overwhelmed
· The art of leverage - importance of lead tracking and making money from speaking gigs
Andrew van der Stock, Senior Principal Consultant, Managed Services SIG Consulting, SynopsysJan 21 20206:00 pmUTC60 mins
Today’s security professionals and software developers not only have to do more in less time; they have to do it securely. This means mitigating risk and addressing compliance requirements in an environment where:
- The threat landscape continues to evolve.
- Application portfolios and their risk profiles continue to shift.
- Security tools are difficult to deploy, configure, and integrate into workflows.
- Consumption models continue to change.
How can your internal resources keep pace in this dynamic environment? Managed application security testing can be just the relief valve your organization needs. In this webinar, we’ll discuss the need for managed application security testing, the sweet spots where it offers maximum value, what you should look for in a managed application security testing provider, and highlights from Synopsys’ Managed Services offering.
Jill Reber, CEO & Chair | Kina Ratanjee, Delivery Director, Primitive LogicJan 21 20206:00 pmUTC45 mins
When GDPR first arrived, some companies addressed it by implementing data privacy measures solely for their EU data subjects — only to have to go through the same exercise for California residents when CCPA came along. With major data privacy laws now in effect on both sides of the Atlantic and more on the way (possibly including U.S. federal legislation), organizations must adopt a holistic approach to managing personal data in an ethical, compliant manner.
Join the data privacy experts from Primitive Logic to explore data management strategies for achieving and maintaining readiness for CCPA, GDPR, and other current and future privacy regulations.
You will learn:
- Why traditional master data management (MDM) can lay the groundwork for multi-regulation readiness, but won’t make you compliant on its own
- How to address common threads in data privacy legislation while maintaining flexibility to adapt to future requirements
- How to build a single source of truth for personal data as a cornerstone of your data privacy strategy
- Governance strategies for adapting to “triggers” in maintaining data privacy readiness
Dr. Christopher Pierson | Shahrokh Shahidzadeh | Michelle Drolet | George WrennJan 21 20206:00 pmUTC60 mins
How has the compliance landscape changed in 2020? Is your organization aware of the main differences in data regulations around the world?
Join this panel of industry leaders for an interactive Q&A roundtable to get a comprehensive look into the different data privacy and security requirements. The panel will also discuss what to expect in 2020 and beyond.
Viewers will learn more about:
- CCPA is now in effect and what this means for you
- The main differences between GDPR and CCPA
- Best tools, practices, required policies and cultural game changers for commercial and government environments
- Other data regulations on the horizon
- Recommendations for 2020
- Dr. Christopher Pierson, CEO & Founder, BLACKCLOAK
- Shahrokh Shahidzadeh, CEO, Acceptto
- Michelle Drolet, CEO, Towerwall
- George Wrenn, CEO & Founder, CyberSaint Security
Jeffrey Martin (Director of Product) and Dan Garfield (Chief Technology Evangelist at Codefresh)Jan 21 20206:00 pmUTC60 mins
Container images are based on many direct and indirect open source dependencies, which most developers are not aware of. What are the security implications of only seeing the tip of the iceberg? What are the challenges one faces when relying so heavily on open source? And how can teams overcome these?
Join Codefresh and WhiteSource, as they embark on a journey to tackle:
*The container iceberg - learn what are your blind spots
*The main security challenges when using open source in containerized applications
*The role of automation in open source security in containers
*A live demo showing how WhiteSource & Codefresh can allow you to automate open source security in containers throughout the DevOps pipeline