Hi [[ session.user.profile.firstName ]]

IT Security

  • [PODCAST] Containerization Kubernetes for the Enterprise with GM Financial & Nir
    [PODCAST] Containerization Kubernetes for the Enterprise with GM Financial & Nir
    Jeff Lloyd Recorded: Jan 18 2019 8 mins
    Live From KubCon: Complex Workloads and Containers with GM Financial

    In this episode of Keeping Up With Kubernetes, GM Financial Emerging Data Technology Lead Jeff Loyd speaks with JoAnne McDougald about how the evolution of managing complex development workloads has led us to containerization, and how containerization and VMs have completely changed the game.
  • [PODCAST] State of Security for Kubernetes with Twistlock & Nirmata
    [PODCAST] State of Security for Kubernetes with Twistlock & Nirmata
    John Morello Recorded: Jan 18 2019 7 mins
    Live From KubCon: Twistlock’s John Morello on Kubernetes Security

    In this episode of Keeping up with Kubernetes, Twistlock CTO John Morello speaks with Joanne McDougald and Nirmata’s Ritesh Patel about the state of security for Kubernetes as well as the close integration Niramata and Twistlock have developed to bring container security to Nirmata’s powerful cross-provider container management platform.

    Learn More: https://www.nirmata.com/
  • Optimizing Your Global Supply Chain
    Optimizing Your Global Supply Chain
    Michael Human, Vice Presidio Global Services, Presidio Recorded: Jan 18 2019 44 mins
    Presidio helps global organizations address various procurement, logistics and service issues by providing innovative, practical solutions, efficiency, control, risk mitigation, and visibility, all supported via our global team and expertise. We have a dedicated team of global commerce and logistics professionals available to assist with any unforeseen roadblocks or challenges.
  • [PODCAST] Kubernetes: Present and Future with Portworx & Nirmata
    [PODCAST] Kubernetes: Present and Future with Portworx & Nirmata
    Venkat Ramakrishnan Recorded: Jan 18 2019 9 mins
    Live From KubCon With Portworx: Kubernetes Reigns Supreme in 2019

    In this episode of Keeping Up With Kubernetes, Portworx VP of Engineering Venkat Ramakrishnan speaks with JoAnne McDougald and Nirmata’s Jim Bugwadia about where containerization is in 2019, what it takes for enterprises to adopt containers for their development process, how Kubernetes is clearly becoming the dominant route in that adoption process, and how Nirmata and Portworx together offer enterprises a straightforward path to Kubernetes.

    Learn more: https://www.nirmata.com/
  • [PODCAST] Kubernetes at Scale and Multi-Cloud Management with Diamanti & Nirmata
    [PODCAST] Kubernetes at Scale and Multi-Cloud Management with Diamanti & Nirmata
    Sean Roth Recorded: Jan 18 2019 15 mins
    Live From KubCon: Containers in 2019 With Diamanti and Nirmata

    In this episode of Keeping Up With Kubernetes, Diamanti Director of Product Marketing Sean Roth speaks with JoAnne McDougald and Nirmata’s Anubhav Sharma about why KubCon has grown so drastically year over year, and what we can expect from containerization in 2019, as well as how Diamanti and Nirmata have partnered to offer a complete solution for enterprises to adopt Kubernetes.

    Learn more at: https://www.nirmata.com/
  • [PODCAST] Dynamic Infrastructure and Kubernetes Clusters with Spotinst & Nirmata
    [PODCAST] Dynamic Infrastructure and Kubernetes Clusters with Spotinst & Nirmata
    Amiram Shachar Recorded: Jan 18 2019 8 mins
    Live From KubCon With Spotinst: Bringing the Spot Market to Kubernetes

    In this episode of Keeping Up With Kubernetes, Spotinst Founder and CEO Amiram Shachar speaks with JoAnne McDougald and Nirmata’s Ritesh Patel about how Spotinst has partnered with Nirmata to bring the dynamic infrastructure qualities offered by the Spot instance market to Kubernetes.

    Learn more: https://www.nirmata.com/
  • The evolution of modern digital workloads
    The evolution of modern digital workloads
    Stephen Dixon, Product Manager at UKCloud Recorded: Jan 18 2019 18 mins
    Are you facing challenges with your traditional application deployment? Higher consumer expectations have led to a strong need for organisations to offer constant updates & high availability whilst reducing costs to remain competitive.

    Join Product Manager Stephen Dixon in this new addition to our Data Centre Modernisation Series as he guides you through the evolution of modern digital workloads so you can gain a better understanding of what your organisation needs to do to meet the high expectations of consumers.

    You’ll learn more about
    -The problems with traditional scale up architecture
    -The pros & cons of scale out architecture
    -How cloud workloads have evolved & more about the Utopia that is the “Twelve Factor App”

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Kaspersky Lab’s APT review of 2018: the most active groups, the top targets
    Kaspersky Lab’s APT review of 2018: the most active groups, the top targets
    Vicente Diaz and Costin Raiu, security researchers in Kaspersky Lab’s Global Research and Analysis Team Recorded: Jan 18 2019 53 mins
    Kaspersky Lab experts will present their annual, exclusive review of advanced persistent threat activity across the world in 2018, based on the company’s threat intelligence research throughout the year. These findings provide the foundations for the threat actor predictions published on November 20 and provide an invaluable insight into how APTs are evolving over time.
  • Comment rendre votre passage au cloud plus rapide et plus sûr
    Comment rendre votre passage au cloud plus rapide et plus sûr
    Stephane Juhles Recorded: Jan 18 2019 57 mins
    Vous envisagez de migrer vers le cloud ? Avez-vous la certitude que votre infrastructure cloud et vos applications métier sont sécurisées ?
    Participez à un webinaire exclusif où des experts SonicWall vous diront comment protéger votre infrastructure cloud public et privé contre les menaces évoluées modernes.
    Découvrez :
    •Comment faire bénéficier votre infrastructure cloud public et privé et vos applications métier d’une sécurité de nouvelle génération
    •Comment obtenir une visibilité totale sur votre environnement virtuel pour la prévention des menaces
    •Quelles nouveautés apportent les produits NSv et WAF
  • 10 Resolutions to Strengthen Your Phishing Defense Program in 2019
    10 Resolutions to Strengthen Your Phishing Defense Program in 2019
    Tonia Dudley, Security Solutions Advisor, Jeffrey Rogers, VP Customer Success, at Cofense Recorded: Jan 17 2019 36 mins
    New year. New resolutions. Every year we make the pledge to eat healthier and get more exercise. What is good for the waistline is also good for your phishing defense posture. With more than 90% of breaches attributed to successful phishing campaigns – now is the time to think about how to prepare and prevent attacks. In this session, you’ll hear about 10 resolutions for your phishing defense programs that will make your organization more secure.

    Some of the topics covered include:

    - How to empower humans to be part of the solution
    - Best practices to balance automation with human intuition
    - How the latest features and technologies can make your life easier
  • How to Build a Zero Trust Network
    How to Build a Zero Trust Network
    John Kindervag, Field CTO, Palo Alto Networks Recorded: Jan 17 2019 61 mins
    “Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks

    Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?

    High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.

    Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.

    Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:

    • Learn specific outcomes of implementing a Zero Trust architecture
    • Hear recommendations on where to start when planning and implementing a Zero Trust framework
    • See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
    • Get your questions answered in our Live Q&A
  • Sunset of Windows Server 2008: Migrate with Docker Enterprise
    Sunset of Windows Server 2008: Migrate with Docker Enterprise
    David Hamdani, Docker Recorded: Jan 17 2019 33 mins
    The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.

    Attend this webinar to learn how Docker can help you meet migration deadlines by providing a validated methodology for containerizing legacy Windows applications, quickly. The combination of the Docker Enterprise container platform and purpose-built tools, allow you to upgrade and improve application security and reliability; all while cutting costs by up to 50%.
  • XG Firewall: See It. Stop It. Secure It.
    XG Firewall: See It. Stop It. Secure It.
    Chris McCormack, Firewall Product Specialist, Sophos Recorded: Jan 17 2019 60 mins
    Sophos XG Firewall gives you everything you need to secure your network against advanced threats like ransomware, bots, worms, hacks, breaches and APTs. In addition, you get unparalleled network visibility that no other firewall on the market can deliver.

    Join this webcast to see how XG Firewall can transform your network security and performance. You’ll see:

    - How the threat landscape is evolving
    - How ransomware gets onto your network and spreads – fast
    - Essential protection you need in your firewall to secure your network
    - Best practices for deploying your firewall to provide a solid defense
  • AWS Security: Visualizing Security Data in 2019
    AWS Security: Visualizing Security Data in 2019
    Chris Murdock, Security Architect at Conga Recorded: Jan 17 2019 36 mins
    In a world of evolving, complex cloud infrastructure – there is no shortage of advanced security technologies that monitor for potential threats. People look for better ways to gain security insights from large datasets and are tasked with the responsibility of communicating associated business risk throughout the entire organization.

    In this webinar, Security Architect Chris Murdock from Conga will explore how to democratize the security of your next-gen infrastructure by building measurement directly into systems, factoring in security-related KPIs and OKRs. Tune in to learn how to securely scale your infrastructure while continuing to enable innovation at the speed of business.
  • Employing Users as Your Quality Control
    Employing Users as Your Quality Control
    Josh Bartolomie, Dir, Res & Dev, Cofense; Sharon Smith, Fndr, C-Suite Results; Theresa Frommel, Act Dep CISO, State of MO Recorded: Jan 17 2019 58 mins
    Process automation delivers a lot of promises. A car can be assembled in less than a day and vegetables can go from vine to can in hours. Sensors look for obvious flaws, but at points in the production process there is human oversight in the form of quality control. The same holds true for protecting against phishing threats. Automation can help weed out some of the bad stuff, but bad actors and new threats constantly outsmart the latest sensors. Join Cofense and (ISC)2 on January 17, 2019 at 1:00PM Eastern for a panel discussion examining strategies on how to enable your workforce to be quality control when it comes to malicious emails to know when something isn’t right and what to do when they see something.
  • [Earn 1 CPE]  Critical Actions to Survive a Data Breach in 2019 and Beyond
    [Earn 1 CPE] Critical Actions to Survive a Data Breach in 2019 and Beyond
    Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace. Recorded: Jan 17 2019 65 mins
    With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.

    Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:

    - Implement security analytics for incident detection and response.
    - Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
    - Leverage AI to autonomously respond to emerging threats before they can do serious damage.
    - Understand key information that needs to be communicated to various stakeholders in the event of a breach.
    - Apply a “standard of due care” in order to prove compliance to regulatory agencies.
  • Get Recruited for a $100K+ Cybersecurity Job in 2019!
    Get Recruited for a $100K+ Cybersecurity Job in 2019!
    Dr. V.N. Berlin, CEO, Mission Critical Institute Recorded: Jan 17 2019 34 mins
    Looking to break into or advance your career in the lucrative field of cybersecurity? Want to know how to get recruited by employers for $100K+ cybersecurity jobs? Join our webinar to find out!

    Mission Critical Institute is an industry leader in producing job-ready, cybersecurity experts through our academic and training partners. Our innovative programs are custom-built to meet industry standards and advance your cybersecurity career.

    There is a growing shortage of trained cybersecurity professionals, with over 3.5 million unfilled jobs projected by 2021, and employers need candidates now. Join us and learn how to start your cybersecurity today!

    Sign up for this webinar to learn:

    • How do you get recruited for a $100K+ cybersecurity job?
    • What are employers looking for in cybersecurity professionals?
    • What certifications do you need to get recruited?
    • What experience do you need to become a cybersecurity professional?
    • Why are companies willing to pay $100K+ for trained cybersecurity professionals?

    Join our webinar today and learn how you can be the next $100K+ cybersecurity professional!
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security
    Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVault Recorded: Jan 17 2019 60 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.

    In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.

    Join us for this webcast to learn:

    - The most common challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - The core security capabilities you need to demonstrate compliance
    - How AlienVault Unified Security Management can simplify the compliance process

    Hosted By
    Sanjay Ramnath
    VP of Product Marketing at AlienVault
    Jacques Lucas
    Qualified Security Assessor (QSA) with Terra Verde
    Zuri Cortez
    Sales Engineer at AlienVault
  • Measuring Cybersecurity through Behavioral Analytics - an Outside-In Approach
    Measuring Cybersecurity through Behavioral Analytics - an Outside-In Approach
    Jasson Casey - CTO at SecurityScorecard Recorded: Jan 17 2019 62 mins
    Please join us on the 17th of January as Jasson Casey, CTO at SecurityScorecard, describes the state of cybersecurity in the modern world, and what best practices are for measuring it - differently. He will discuss the importance of behavioral analytics, and how to make use of an “outside-in approach” when measuring cybersecurity.

    He will relate how to apply security analytics to different facets of our business, including devops. With 20 years in the industry, Jasson will discuss his perspective on what tactics work, and which do not. Please join us to learn more.
  • Fix your Leaky Onboarding Funnel with Online Identity Verification
    Fix your Leaky Onboarding Funnel with Online Identity Verification
    Dean Nicolls, VP of Marketing, Jumio Corp. Recorded: Jan 17 2019 27 mins
    Customer acquisition is top of mind for most financial service organizations and their boards. Normally, when banks and other financial service institutions think customer acquisition, they think about launching a new advertising campaign with the hope of driving more online or in-branch traffic -- but these campaigns are iffy at best.

    Instead, why not rethink your online account opening process where FSIs lose about 20% of their prospects through abandonment. If you can plug that leaky funnel, you will see an immediate improvement in customer acquisition.

    Join us for this informative “how-to” webinar and discover how to…

    - Dissect the abandonment problem
    - Reduce the number of identity verification screens & clicks
    - Cast a wider net with omni-channel verification
    - To say “no” to verification “maybes”
  • Breaking Down the PCI SSC’s New Guidance for Protecting Telephone-Based Payments
    Breaking Down the PCI SSC’s New Guidance for Protecting Telephone-Based Payments
    Wayne Murphy, Sec-1 Ltd.; Ben Rafferty, Semafone Recorded: Jan 17 2019 47 mins
    Over the last seven years, the technologies used by call and contact centers to communicate with customers and complete card transactions have changed drastically. Networking methodologies like VoIP have since become widely adopted, while the number of applications organizations employ to process customer information has risen dramatically. For this reason, the PCI SSC recently released their highly anticipated updated “Guidance for Protecting Telephone-Based Card Payments” for the first time since 2011, offering several much-needed clarifications for organizations looking to achieve PCI DSS compliance inside their contact centers.

    Join Semafone and Sec-1 Ltd. for this insightful webinar into the most pertinent changes, featuring two of the members of the PCI SSC’s Special Interest Group – Ben Rafferty, Chief Innovation Officer at Semafone, and Wayne Murphy, Senior Security Consultant at Sec-1 Ltd. We’ll cover the following:

    • How to avoid scope-creep inside the contact center during PCI DSS compliance
    • How Pause and Resume call recording solutions create more problems than they solve
    • How most 3rd party services are now in scope for PCI DSS compliance
    • How devices that control SIP Redirection are now also in scope
  • Staying a Step Ahead: Security Predictions and Preparations for 2019
    Staying a Step Ahead: Security Predictions and Preparations for 2019
    Alert Logic Recorded: Jan 17 2019 50 mins
    Hear predictions from our security experts about the evolving threat landscape so you can get prepared with actionable recommendations to improve your cybersecurity posture for 2019.

    The attack landscape is shifting with increased automation and cunning new distribution methods. There’s no discrimination when it comes to a security breach any more: everyone is at risk. How are you preparing to stay ahead of attackers, and not just for their existing attack methods but new and emerging ones as well?

    Alert Logic security experts have a front row seat on current and emerging attacks across more than 4,000 clients. Join this webinar to hear their predictions for 2019 along with practical guidance on how you can stay a step ahead and better protect your business.
  • Securing Digital Transformation: How to Close Major Loopholes
    Securing Digital Transformation: How to Close Major Loopholes
    Corie Chung - Chief Strategy Officer; Shlomi Levin - Co-founder and CTO; Michael Aminov Co-founder & Chief Architect Recorded: Jan 17 2019 47 mins
    Nearly 90% of businesses are pursuing a digital-first strategy as their processes become digitized as data-driven.

    However, with the promise of great leaps in growth and productivity, also come major security loopholes. From new communication channels to problematic security policies to legacy systems, there are many ways in which the digital-first business may be exposed - a risk brands simply can't afford to take.

    Join our founders to learn more about the digital transformation phenomena, its IT enablers, and how to close some of the major loopholes leaving organizations exposed.
  • The Threats of 2019
    The Threats of 2019
    Bogdan Botezatu, Director of Threat Research and Reporting, Bitdefender Recorded: Jan 17 2019 49 mins
    What threats can we expect to see in 2019, and how do we make sure we're prepared?

    Join Bitdefender Director of Threat Research and Reporting, Bogdan Botezatu to discuss research-based predictions on the biggest threats of 2019. He'll walk through the future of cryptojacking, advanced persistent threats (APTs), network-level exploits, IoT attacks, and others and provide recommendations on the industry's best defenses against these threats.
  • Automate security with integration between SIEM and IAM
    Automate security with integration between SIEM and IAM
    Greg Foss (LogRhythm) and Randy Franklin Smith (UWS) Jan 21 2019 10:00 am UTC 90 mins
    In this webinar Randy Franklin Smith (UWS) and Greg Foss (LogRhythm) take a real-world example of a SIEM, in this case LogRhythm, and an IAM, Okta, and demonstrate how their integration matures an organisation’s security posture.

    We’ll dive into how Security Analysts can make more informed decisions and perform better investigations when they have a full picture of IAM events spanning on-prem and cloud-based activity and how organisations can respond rapidly to security alarms with automatic protective measures.

    In this webcast, discover how to:
    • Visualise and analyse data from Okta in your SIEM
    • Identify accounts that have compromised credentials by monitoring for successful authentications paired with failed multifactor logins
    • Utilise the Okta API to automate security tasks
    • Build upon identity monitoring to work towards a “Zero Trust” architecture
  • A CISO, CIO, and Compliance Officer Grab Coffee
    A CISO, CIO, and Compliance Officer Grab Coffee
    Paul Chapman, Chief Information Officer | Joel De La Garza, Chief Information Security Officer | Crispen Maung, VP Compliance Jan 21 2019 10:00 pm UTC 47 mins
    What are the best ways to keep your cloud stack secure, your business compliant, and your users safe? Getting straight (and useful) answers to these simple questions isn't always easy.

    Watch a candid discussion with Box CIO Paul Chapman and his counterparts in Security and Compliance as they reveal how they work together every day to tackle the complex security and compliance challenges every global business faces today. They'll share best practices, pitfalls to avoid, and answer your hardest questions.

    This isn't your typical webinar. No slides. No pitches. No filters. Just a candid discussion with the guys who are safeguarding the data for over 80,000 businesses — including 67% of the Fortune 500 — as they share best practices and insights.

    Here's what they'll discuss:
    -How to get executives and users to care about security and compliance
    -Top of mind security or compliance issues (and tackling them)
    -The toughest challenges they faced
  • Ready for the future? Boost your digital transformation with cloud-managed IT
    Ready for the future? Boost your digital transformation with cloud-managed IT
    Simon Tompson, Product Marketing Lead Jan 22 2019 10:00 am UTC 25 mins
    Increasing digital consumption by your customers and modern-day technology provides your business with unlimited opportunities! The challenges of digitalization vary, but each digital infrastructure requires one thing above all: a strong network foundation. Join us for a webinar to learn more about cloud-managed IT and accelerate your digital journey!
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Jan 22 2019 11:00 am UTC 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • Infoblox Part 1: Remediating Threats by Bridging Islands of Security
    Infoblox Part 1: Remediating Threats by Bridging Islands of Security
    Brandon Dunlap, Moderator, (ISC)². Chris Marrison, System Engineer, Infoblox Jan 22 2019 1:00 pm UTC 60 mins
    Most organisations have multiple products and services, from multiple vendors and suppliers to address their cybersecurity needs. The lack of integration and inability to share critical information results in silos of technology that cause inefficiency, lack of agility, limited visibility and a poor security posture. How can an organisation solve and streamline this improve their cybersecurity operations? Join Infoblox and (ISC)² for an examination of how Infoblox and Fortinet have joined together to assist organisations in improving their security operations and reducing time to containment.
  • Accelerating Digital Transformation with BMC Remedyforce and OneLogin
    Accelerating Digital Transformation with BMC Remedyforce and OneLogin
    OLIVIER SEGERS - Sr. Technical Marketing Lead at BMC Remedyforce, NATHAN CHAN - Solutions Engineer at OneLogin Jan 22 2019 3:00 pm UTC 60 mins
    Together, BMC and OneLogin provides a best-in-class identity management solution for securing access and simplifying user management across your IT Service Management (ITSM) solution stack.

    OneLogin’s Unified Access Management platform integrates seamlessly with BMC Remedyforce to help organizations accelerate business transformation. Hundreds of customers today leverage the joint solution to take complete control over user access to applications, connect Remedyforce to common IT directories, add a second factor of authentication, and enforce access security policies for Remedyforce and other SaaS tools.

    In this webinar, you will learn:

    - How to automate identity management processes for BMC Remedyforce, such as real time user provisioning and de-provisioning
    - Best practices for improving security of user access with SSO, MFA, directory integration, and more
    - Improving user engagement and experience across digital tools
  • Digital Trust in the Age of Normalized Data Breaches
    Digital Trust in the Age of Normalized Data Breaches
    Jason Reed, Senior Industry Analyst, CyberSecurity, Frost & Sullivan Jan 22 2019 4:00 pm UTC 60 mins
    In a time when major data breaches have become a routine feature of the news cycle, digital consumer trust is an intangible and highly consequential metric for any organization conducting business online.

    With a focus on 10 major global markets, this session will show the results of groundbreaking research that quantifies this difficult-to-measure concept and outlines the business implications of building or losing trust.

    Key Takeaways:

    • Do perceptions of customers in the business community align with consumer reality?
    • What makes (or breaks) consumer digital confidence in organizations?
    • Find out the regional variations in the degree of trust consumers have in online services—and the impacts on consumer behavior.
  • Darktrace Antigena:  AI-Powered Autonomous Response
    Darktrace Antigena: AI-Powered Autonomous Response
    Justin Fier, Darktrace Director of Cyber Intelligence and Analytics Jan 22 2019 5:00 pm UTC 45 mins
    As we enter a new era of machine-speed attacks, stretched security teams are hard-pressed to deploy the best technologies to respond to cyber-threats before they do damage.

    Relied on by hundreds of customers globally, including City of Las Vegas and Trek Bicycles, Darktrace’s cyber AI technology has already proven crucial in autonomously neutralizing subtle and fast-acting cyber-threats. The launch of Darktrace Antigena Version 2 has enhanced its powerful capabilities to fight back against malicious emails before they reach the target user.

    In this webinar, Darktrace’s Director of Cyber Intelligence and Analytics, Justin Fier, will explore Antigena’s newest features and deliver a short demo of the technology in action.
  • ISSA International Series: 2018 Year in Review
    ISSA International Series: 2018 Year in Review
    ISSA International Jan 22 2019 5:00 pm UTC 120 mins
    2018 was worse than 2017 for cyber security. This year every month was filled with even more major breaches, hacks, and attacks surfacing then 2017. The nature and range of the attacks varied from email hacking to zero days, from minor incursions to (potentially) everyone’s data being stolen. 2018 will probably go down as the new worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2019 bear the full weight and impact of the events of 2019, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2019 landscape?

    Join us, make notes, and then check back in a year to see how our panel of experts did in providing insight and making predictions for the 2019 challenges to InfoSec.

    Moderator:
    James McQuiggan, Product & Solutions Security Officer, Service Americas Division, Siemens Gamesa Renewable Energy

    Speakers:
    Ricky Allen, CISO, Critical Start
    Ira Winkler
    Patrick Miller, Managing Partner, Archer International
  • 2019 Next Gen Data Protection
    2019 Next Gen Data Protection
    Andrew Miller and Jeremy Wittkop Jan 22 2019 6:00 pm UTC 60 mins
    Despite the best efforts of many well-meaning data security professionals, data breaches are up 75% over the last two years. Every passing week seems to bring a new large scale data breach to the headlines. Most organizations deploy data protection controls to identify and prevent sensitive information loss, but are frustrated by the lack of proactive measures they can take. Understanding open source tools from both an attacker’s and a defender’s perspective will help organizations identify vulnerable data before it is exploited as well as helping to build better response processes.

    Join InteliSecure Senior Program Analyst, Andrew Miller, and Chief Technology Officer, Jeremy Wittkop as they discuss some of the open source tools adversaries use to attack you, and how you can leverage them to build better defenses.

    Specific discussion topics include:

    - Open Source tools for data theft available to attackers and defenders
    - Understanding how exposed data is found and exploited from an attacker’s perspective
    - What you should do if you identify a potential data breach
  • Want Better Network Visibility with Less Complexity? Here's How!
    Want Better Network Visibility with Less Complexity? Here's How!
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Jan 22 2019 6:00 pm UTC 60 mins
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • SD-WAN Predictions for 2019
    SD-WAN Predictions for 2019
    Ritesh Mukherjee, Vice President Product Management at 128 Technology Jan 22 2019 6:00 pm UTC 60 mins
    Rohit Mehra, Vice President of Network Infrastructure at IDC and Ritesh Mukherjee, Vice President of Product Management at 128 Technology will discuss the important trends for SD-WAN in 2019.
  • Encryption Lunch and Learn
    Encryption Lunch and Learn
    Alper Kizar, DataMotion; Nathan Ware, Rain Networks Jan 22 2019 7:00 pm UTC 45 mins
    Resellers, join us on Tuesday, January 22 for a webinar with DataMotion! For nearly 20 years DataMotion has provided users with an easy to use secure email delivery system. With SecureMail Desktop, you can send emails that are encrypted and secure, helping to meet any compliance regulation requirements. The best part is that this can all be done via an easy to install plug-in. During the webinar, we will be discussing the following topics with a Q&A at the end:
    •DataMotion's balance between security and ease of use
    •How DataMotion helps customers stay in compliance with regulations like HIPAA, GLBA, FISMA, and more.
    •Beyond email: SSO, file transfer, inbound communications and APIs
    •DataMotion's Partner Program
  • The Software-Defined Data Center: A Foundation for Digital Transformation
    The Software-Defined Data Center: A Foundation for Digital Transformation
    David Hines, Vice President of Architecture and Engineering - TierPoint Jan 22 2019 9:00 pm UTC 60 mins
    As reported in Forbes last year, 73% of companies are planning to move to a fully software-defined data center within two years.

    A software-defined data center is based on a virtualized environment of compute, storage, networking and security in conjunction with policy-based management and automation. The evolution from a traditional data center architecture to one that is software-defined can take months if not years but can yield immense benefits for the business.

    Join us for a discussion on the progress toward the fully software-defined data center, including benefits of infrastructure as code and overcoming challenges associated with traditional workflows.
  • Network considerations for hybrid cloud
    Network considerations for hybrid cloud
    Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Valerie DiMartino, Sr. Product Marketing Manager, Citrix Jan 23 2019 10:00 am UTC 45 mins
    Moving to a hybrid-cloud strategy offers many benefits like flexibility and agility but can also bring challenges to securing your network and infrastructure as the traditional data center perimeter dissolves. Users are working from anywhere and the applications and data they’re accessing have moved to the cloud. Remove barriers to hybrid-cloud migration with a new secure networking and infrastructure approach that delivers investment protection. Learn how you can protect your users and deliver your applications and data to stay in control with centralized management, performance, visibility and analytics.

    Learn how Citrix networking solutions for hybrid cloud can deliver:

    •Contextual and secure access to applications
    •Website and application protection from internal and external threats
    •Application and network visibility and intelligent analytics
    •Flexibility and performance
  • Cyber Risk Management
    Cyber Risk Management
    Per-Olof Persson Jan 23 2019 11:00 am UTC 60 mins
    See how Synopsys started the software security journey and is taking an active role in providing industry expertise to help organizations deliver robust software security solutions. We will focus on identifying cyber risks and equip you with solutions to overcome security issues. If you want more than our Q&A at the end of the webinar, visit us in Copenhagen, Denmark. Synopsys will be hosting the Copenhagen Security Symposium at the Carlsberg Museum 6th February 2019.
  • Ubiquitous Open Source Makes for Security Challenges
    Ubiquitous Open Source Makes for Security Challenges
    Rami Sass (WhiteSource) | Baruch Sadogursky (JFrog) | Cindy Blake (Gitlab) Jan 23 2019 1:00 pm UTC 29 mins
    You don’t need an expert to tell you that open source software will be ubiquitous in the enterprise in 2019. You also don’t need an expert to tell you that this will present security challenges either. But what can you do in 2019 to ensure your open source software is as secure as you can make it? Best practices, processes and tools are coming into focus. 2019 is the year you need to implement and use them.

    Join the panel of experts as they share their best advice to help make 2019 a secure year for your open source use.
  • Uno sguardo al futuro: la Cyber Security nel 2019 e oltre
    Uno sguardo al futuro: la Cyber Security nel 2019 e oltre
    Marco Riboli, VP Southern Europe di FireEye Jan 23 2019 1:30 pm UTC 45 mins
    Il 2018 sta volgendo al termine e, come di consueto, ecco il nostro aggiornamento sull’evoluzione del mondo della cyber security nel 2019 e oltre. Sappiamo che gli attaccanti attaccheranno e che i difensori faranno di tutto per fermarli. Dobbiamo però essere pronti ad affrontare le minacce imminenti, oltre a restare un passo avanti rispetto agli attaccanti, se non addirittura precederli.

    Marco Riboli, VP Southern Europe di FireEye, offrirà una panoramica sulla sicurezza del mondo cyber nel 2019. In questo webinar, Marco affronterà diversi punti trattati nel report ‘Facing Forward: Cyber Security in 2019 and Beyond’, frutto dell’esperienza e delle conoscenze dei nostri senior leader, degli analisti di FireEye iSIGHT Intelligence, degli esperti di Incident Response di Mandiant, e dei Labs di FireEye. Partecipa per saperne di più su:

    •Minacce nel settore dell’aviazione, compreso lo spionaggio informatico e il cybercrime
    •Come le grandi nazioni e i paesi emergenti affronteranno i rischi cyber
    •Come gli attaccanti stanno modificando le loro tattiche per essere sempre un passo avanti rispetto alle strategie di difesa

    Registrati subito per scoprire cosa ci riserva il futuro della cyber security.
  • Live panel: How to Secure your Business from Network to Cloud
    Live panel: How to Secure your Business from Network to Cloud
    Rob Daniels, GM, security portfolio strategy & propositions, & David Simpkins, GM, managed services & public cloud Jan 23 2019 2:00 pm UTC 30 mins
    You’re under immense pressure for digital transformation. Moving to the cloud presents new possibilities: but the security of your data and apps is critical. It’s not all plain sailing because the cloud requires a fundamentally different approach to security. If you dig your heels in, you’ll find that Shadow IT increases and people will circumvent you. It’s also increasingly difficult to keep an eye on your entire network, so you’ll need to continually reassess where you’re most exposed.

    In this webinar, live from the studio, you’ll discover how to:
    - Create a security strategy that works as an enabler to support your cloud migration, not a separate work stream or standalone function
    - Take steps to protect your new cloud infrastructure as well as your legacy network
    - Avoid certain pitfalls when it comes to cloud migration that could open up new vulnerabilities and threats
  • Enabling the Second Line of Defence with Effective Policy Management & Oversight
    Enabling the Second Line of Defence with Effective Policy Management & Oversight
    Michael Rasmussen Jan 23 2019 3:00 pm UTC 60 mins
    The Three Lines of Defence is a popular framework for managing Governance, Risk Management & Compliance (GRC). In our first webinar on the Three Lines of Defence we explored the policy implications of the first line of defence – the front line employees. In this webinar we now explore the second line of defence, the risk, security, and policy owners and managers and their job in ensuring that policies are current and understood in the organization.

    Continual growth of regulatory requirements, complex business operations, and global expansion demand a well thought-out and implemented approach to policy management that is governed by the second line of defence. In order to achieve effectiveness, efficiency, and agility in policy management, organizations need to define a structured governance framework and process. However, effectively managing policies is easier said than done. To consistently manage and communicate policies, the second line of defence is turning toward defined processes and technologies to govern policies and implement an effective policy management lifecycle.

    This webinar focuses on how to effectively manage and govern policies and enable the second line of defense in your organization through effective policy oversight.
    Attendees will learn:
    • GRC and policy management in the context of the Three Lines of Defence Model
    • How the second interact with the first and third lines of defense to protect the organization
    • How to effectively manage and maintain polices in the organization
    • Methods for second line employees to to ensure that first line of employees are aware of policies
    • How technology can automate and enable the second line of defence
    • Driving efficiency, effectiveness and agility into all three lines of defence

    Enabling the First Line of Defence Webinar: https://goo.gl/accjxb
  • The Veracode Community: Powering Your AppSec Program
    The Veracode Community: Powering Your AppSec Program
    Asha May, Customer Engagement at Veracode Jan 23 2019 4:00 pm UTC 45 mins
    Veracode continues to build and expand a strong community to support the people and teams that make your organization’s software secure. The Veracode Community provides a resource and forum for customers as well as developers or security professionals seeking best practices about securing applications throughout the development lifecycle.

    Join this webinar to see how the Veracode Community can help you tackle tough application security issues while paving the way for an optimized program. We will provide:
    •An overview of the community – a space for developers and security practitioners to find answers and collaborate on application security best practices
    •Tips for community members to access resources, customer support, and forums for collaboration
    •Updates on latest community enhancements including newly-available access to all Veracode Integrations-related content and support
  • Strengthen your security posture with SonicWall virtual firewalls
    Strengthen your security posture with SonicWall virtual firewalls
    Srudi Dineshan, Product Marketing Manager & Mallikharjun Vatti, Sr. Product Manager, SonicWall Jan 23 2019 4:00 pm UTC 45 mins
    With cloud adoption growing each day, next-generation firewall capabilities are essential to protect workloads in the cloud from advanced threats via automated real-time detection and protection

    Join our product team, to learn more about how SonicWall Network Security virtual (NSv) firewall series can help strengthen the security posture of your hybrid and multi-cloud environments.
  • After the incident: investigating and responding to a data breach
    After the incident: investigating and responding to a data breach
    EDRM and AccessData Jan 23 2019 4:00 pm UTC 56 mins
    Back by popular demand, we're providing you another chance to view this popular webinar from Fall of 2018. Enjoy the replay!

    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Defending IP and Trade Secrets: Shaping Positive Outcomes with eDiscovery
    Defending IP and Trade Secrets: Shaping Positive Outcomes with eDiscovery
    John Wilson, ACE, AME, CBE and Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA Jan 23 2019 5:00 pm UTC 75 mins
    Even in the most clear-cut matters, defending IP and trade secrets can be difficult. And when digital evidence is obfuscated through direct and indirect efforts, these defenses can be downright daunting. However, with a comprehensive and integrated discovery plan supported by a team of experts with digital investigative experience augmented with targeted eDiscovery technologies, legal teams can quickly, effectively, and economically gain and maintain the legal high ground in these critical corporate matters.

    This expert presentation will present actionable approaches and best practices for counsel to consider as part of forensic collection, early case insight, and legal document review efforts during IP and trade secret matters. Shared through the lens of an example matter based on an aggregate of actual experiences, this webcast will help legal teams as they seek to proactively shape positive eDiscovery outcomes.

    Webcast Highlights:

    + Organizing for Success: From Complaint to Discovery Plan
    + Accelerated Execution: Translating Data into Evidence
    + Advancing on Smoking Guns: Advanced Technologies and Assisted Review
    + Reviewing Right: Accelerated Legal Document Review
    + Decisive Differences: The Benefit of an Integrated eDiscovery Provider

    Presenting Experts:

    + John Wilson, ACE, AME, CBE

    As President of Forensics at HaystackID, John provides consulting and forensic services to help companies address various matters related to electronic discovery and computer forensics including leading forensic investigations, cryptocurrency investigations, ensuring proper preservation of evidence items and chain of custody.

    + Michael Sarlo, EnCE, CBE, CCLO, RCA, CCPA

    Michael is the Vice President of eDiscovery and Digital Forensics for HaystackID. In this role, Michael facilitates all operations related to electronic discovery, digital forensics, and litigation strategy both in the US and abroad while working on highly complex forensic and e-Discovery projects.
  • Why You Need a Cloud Native Security Solution and How to Evaluate One
    Why You Need a Cloud Native Security Solution and How to Evaluate One
    Benjy Portnoy, CISSP, CISA, Aqua Security Jan 23 2019 5:00 pm UTC 60 mins
    Benjy Portnoy, Director of DevSecOps at Aqua Security, has spent the past 3 years working with dozens of organizations on securing their deployments of Kubernetes, Docker, Red Hat OpenShift and other cloud native technologies.

    In this webinar, Benjy will share his experiences to help you figure out:

    • What to expect from platform providers, security-wise, and what gaps remain
    • The maturity curve of securing cloud native applications (containers, serverless and what’s in between) – from the most basic controls to advanced runtime controls
    • What to expect from a cloud native security platform: Key criteria to consider
    • How to ensure that your organization is ready to go into production across various stake holders and teams