Hi [[ session.user.profile.firstName ]]

IT Security

  • いま企業全体に求められるゼロトラストモデル 〜5つのステップとフォアスカウト のアプローチ〜
    いま企業全体に求められるゼロトラストモデル 〜5つのステップとフォアスカウト のアプローチ〜
    フォアスカウト テクノロジーズ SE寺川 Recorded: Jun 5 2020 22 mins
    ウェビナーについて:
    2010年Forrester Research社により開発、推奨されているゼロトラスト ネットワークの定義について詳しく解説。複雑に構成された現代の企業ネットワークにおいて、既存の境界ベースセキュリティモデルでは、巧妙化したセキュリティ攻撃に対応するには不十分である事が浮き彫りになってきています。今ウェビナーでは、このような事実を踏まえ、なぜ今後ゼロトラストネットワークモデルが有効とされているのかを5つのステップで解説していきます。

    - ゼロトラストとは?
    - なぜゼロトラストモデルが必要か?
    - ゼロトラスト実現に向けて5つのステップ
  • Forget cloud first - think cloud smart
    Forget cloud first - think cloud smart
    Sahil M Bansal, Senior Product Marketing Manager Recorded: Jun 5 2020 34 mins
    "One cloud, two clouds. Hybrid cloud, multi-cloud. Got an idea which really fits your needs? Do you have to pick one vs the other or can hybrid clouds, leveraging a cloud-like experience built on your datacenter, cohabit with multiple public clouds? This matchup has got you covered!
    In this webinar you will learn:
    What is a True Hybrid Cloud and how to build one
    Benefits of a hybrid cloud vs multi-public cloud strategy
    How to make cost-aware decisions when choosing private vs public clouds"
  • Hành trình chuyển đổi số an toàn, bảo mật cùng với Thales và Microsoft
    Hành trình chuyển đổi số an toàn, bảo mật cùng với Thales và Microsoft
    Vy (Gavin) Nguyen, Partner Technical Specialist, Microsoft, Huynh Tuan Kiet, Security Solution Manager, HPID Recorded: Jun 5 2020 62 mins
    Ngày nay, đối với hầu hết mọi tổ chức doanh nghiệp, việc áp dụng các dịch vụ đám mây (cloud services) ngày càng có xu thế mở rộng, đồng thời mở rộng hơn việc sử dụng mã hóa. Hãy tham gia buổi trò chuyện trong giờ café buổi sáng của bạn cùng chúng tôi, tìm hiểu cách bạn có thể bắt đầu hành trình chuyển đổi số an toàn và bảo mật cho hệ thống dữ liệu cũng như ứng dụng của bạn - cùng các giải pháp kết hợp của Thales và Microsoft.

    Nội dung chính:
    • Chương trình chuyển đổi lên cloud của Microsoft diễn ra như thế nào?
    • Microsoft quản lý dữ liệu khách hàng ra sao?
    • Giảii pháp quản lý khóa Bring Your Own Key(BYOK) và Your Own Encryption (BYOE) là gì?
  • How to quickly and securely verify consumer identities - APAC
    How to quickly and securely verify consumer identities - APAC
    Jenn Markey, Product Marketing, Entrust Datacard Recorded: Jun 5 2020 24 mins
    2020 has brought about a new normal. One of the biggest changes has been the rapid rise in businesses and consumers interacting and transacting online. While ecommerce, online banking, and other digital services are hardly new, many people and businesses that were slow to adopt such models now find themselves wanting, and in many cases, needing to go online. And that introduces the challenge of securely verifying customer identities, especially when an in-person identity check is not feasible.
    Modern identity proofing keeps your customers safe and protects your organization.

    Learn best practices to:

    - Securely verify consumer identities
    - Limit user friction in the verification process
    - Protect consumer identities
    - Minimize fraud exposure
  • Practice session to speak to support
    Practice session to speak to support
    Pramukh Ganeshamurthy (Palto Alto Networks) & Dov Lerner (Sixgill) Recorded: Jun 4 2020 9 mins
    Practice session to speak to support
  • Maximize Cortex XSOAR’s performance with Sixgill’s Darkfeed
    Maximize Cortex XSOAR’s performance with Sixgill’s Darkfeed
    Pramukh Ganeshamurthy (Palto Alto Networks) & Dov Lerner (Sixgill) Recorded: Jun 4 2020 28 mins
    Please join us to explore how Sixgill and Cortex XSOAR (previously Demisto) are enabling customers to scale and accelerate their incident prevention and response by combining deep and dark web intelligence with automation. Building simple, automated & effective cyber security, and executing it to the fullest extent, is critical in order to get the best outcomes and maximize business impact.

    Learn how combined Cortex XSOAR and Darkfeed can:
    - Automatically integrate and enrich a data stream of industry-related indicators of compromise (IOCs) from closed-access sources in the cyber underground
    -Receive automated early warnings of new threats before they are deployed in the wild
    -Hunt for malicious IOCs on corporate networks from a single dashboard
  • Cryptocurrency Exposure Management: Regulation, Compliance, and Security
    Cryptocurrency Exposure Management: Regulation, Compliance, and Security
    Stephen Ryan, co-founder & COO of Ciphertrace; Rebecca Aspler, Director of Product Management – Blockchain at Unbound Tech Recorded: Jun 4 2020 54 mins
    As digital assets move into the mainstream, regulation and compliance has become more important than ever for custody providers.
    In this fireside chat, Stephen Ryan, co-founder and COO of Ciphertrace, and Rebecca Aspler, Director of Product Management – Blockchain at Unbound Tech, will discuss:

    + Cryptocurrency intelligence – tracing, risk scoring and threat detection
    + AML and anti-fraud as it applies to digital assets
    + Technical enablers to AML and anti-fraud policy enforcement
  • Take Full Advantage of Your PowerVault ME4 Investment
    Take Full Advantage of Your PowerVault ME4 Investment
    Tim Carlson | Dell Technologies Recorded: Jun 4 2020 47 mins
    Are you getting all you can out your PowerVault ME4? Even as an entry-level array, it empowers businesses to be able to support a variety of use cases including HPC, Surveillance, Backup/Recovery, Virtualization, VDI, and more. In this webinar session, we’ll explore configuration optimization for your applications, when to run Virtual or Linear mode, the extended management ecosystem, whether to use as an RBOD (RAIDED array) or as a server attach JBOD and much more.

    Presented by: Tim Carlson

    An IT veteran with over 35 years’ experience in HPC and Enterprise DataCenters, specializing in storage and filesystems, Tim has a unique combination of expertise in sales, pre-sales, professional services and support from large corporations to smaller businesses. With hands-on experience in large SAN, heterogeneous filesystems, HPC and performance tuning, Tim is currently the Product Line Manager for PowerVault in EMEA.
  • Maximizing F5 BIG-IP Uptime & Security with Keyfactor Certificate Automation
    Maximizing F5 BIG-IP Uptime & Security with Keyfactor Certificate Automation
    Jack Palivoda, Senior Solutions Engineer and Ryan Sanders, Product Marketing Manager Recorded: Jun 4 2020 30 mins
    If you’ve deployed multiple F5 BIG-IP appliances to run your business applications, you know how important – yet complex – it is to manage keys and digital certificates. Keyfactor enables enterprises to automate requests, provisioning, and renewal of certificates across F5 appliances to avoid certificate-related outages and improve security.

    Join Jack Palivoda, Sr. Solutions Engineer, and Ryan Sanders, Product Marketing Manager, for a 30-minute discussion and live demo of the Keyfactor + F5 BIG-IP integration.

    In this webinar, you’ll learn:
    -The importance of keys and certificates in F5 deployments
    -How to avoid costly downtime and automate distribution of certificates
    -How Keyfactor integrates with F5 appliances at scale
  • Grow Revenue with Managed Service Offerings for App Performance & Security
    Grow Revenue with Managed Service Offerings for App Performance & Security
    Mariana Agache, VP Managed Services, F5 Recorded: Jun 4 2020 21 mins
    Applications are your enterprise customers’ capital. F5 can help you bring new managed services to market that allow you to help your enterprise customers ensure the performance and security of their applications no matter where they run—in the cloud, in their private data centers, or on premises in the enterprise. In this session, you will learn how to offer an Advanced WAF managed service for increased application security as well as other services you can offer to differentiate and grow revenue. We’ll also introduce the new Managed Service Program, which can help you accelerate your time to market for new services and grow revenue.

    Register Today
  • [Lessons for Cybersecurity from the Pandemic] Between Two CTOs: Lloyd vs. Lloyd
    [Lessons for Cybersecurity from the Pandemic] Between Two CTOs: Lloyd vs. Lloyd
    Mike Lloyd, RedSeal CTO and Wayne Lloyd, RedSeal Federal CTO Recorded: Jun 4 2020 30 mins
    Join us for the inaugural broadcast of Between Two CTOs: Lloyd vs. Lloyd, an informal discussion of current issues in cybersecurity.

    This 20-minute discussion will focus on “Lessons for cybersecurity from the pandemic.”

    Our speakers are two of the most engaging people we know:
    - (Dr.) Mike Lloyd, RedSeal CTO. His career has focused on modeling complex systems, beginning with epidemiology and moving to networks. He provides a unique perspective on our current situation.
    - Wayne Lloyd, RedSeal Federal CTO. He’s a long time federal government cybersecurity practitioner, with a background working for…well, we can’t tell you that
  • Proactive public cloud management and security with Red Hat Linux on AWS
    Proactive public cloud management and security with Red Hat Linux on AWS
    Jimmy Alvarez and David Duncan Recorded: Jun 4 2020 41 mins
    Cloud adoption has many benefits, including improved resilience, reduced cost of ownership, and greater infrastructure and business agility. However, many organizations remain concerned about providing adequate security and privacy for applications and data in cloud environments.

    An operating system for the cloud without good management can be a challenge, but there is an alternative. Red Hat® Insights provides proactive management of Red Hat Enterprise Linux® instances, pinpointing potential security, performance, availability, and stability risks so that you can try to resolve them before they cause downtime or other operational impacts. Since May 2019, Insights has been included as part of a Red Hat Enterprise Linux subscription at no additional cost.

    Join this webinar to learn about Insights support built into Red Hat Enterprise Linux for Amazon Web Services (AWS).

    In addition to covering the capabilities of Insights, we’ll:

    • Highlight the solutions and demo them.
    • Show you how to get started on your own.

    Featuring:
    Jimmy Alvarez, Principal Technical Marketing Manager, Red Hat;
    David Duncan, Partner Solution Architect, Amazon Web Services
  • ISSA Thought Leadership Series: Women in Security Special Interest Group
    ISSA Thought Leadership Series: Women in Security Special Interest Group
    ISSA International Recorded: Jun 4 2020 61 mins
    Jari will share her professional and personal experience to help you at any stage of your career in cyber security. She will share her own standouts, how those apply to her hiring and to her own career success—and yours.

    •You will gain insights and best practice in this series on how you can build new skills, while staying engaged for the long haul in our current global turmoil. We’ll bring to the table with our Guest Expert Speakers, successful strategies and approaches to security today and going forward, for women—and anyone—globally

    •You will be able to apply these to your current and future career in our field, to sustain or grow, at entry, mid-career, senior and executive level, or in transition, whether you hold a senior role, or aspire to something different than where you are today.

    •Think Big! And yet, at the smallest detail, what can you do to improve your opportunities at any stage? Our executive women will help you become more conscious of where opportunities best exist today for any of us, as an employee, executive, consultant, business owner, entrepreneur, or hiring manager. We will help you sustain for today, and build for your future.
  • Unleash the Full Potential of your Application Ecosystem with SD-WAN
    Unleash the Full Potential of your Application Ecosystem with SD-WAN
    Heather Paunet Recorded: Jun 4 2020 23 mins
    It is more important than ever for businesses to get the most out of their digital stack. Businesses continue to invest in cloud based applications or other software tools to connect with customers and increase how employees can maneuver through their work day.

    Heather Paunet, VP of Product goes in depth about how SD-WAN technology can help businesses unleash the full potential of their application ecosystem, giving employees more of what they need to increase productivity and efficiency during this time.
  • Webinar: Cómo garantizar la seguridad en tiempos de trabajo remoto
    Webinar: Cómo garantizar la seguridad en tiempos de trabajo remoto
    Alberto Vazquez. Solutions Architect Latinoamérica. Recorded: Jun 4 2020 44 mins
    Acompañenos a este webinar en el cual hablaremos de las diferentes soluciones de seguridad que son importantes en la época actual, para que su marca y su negocio estén protegidos contra los ataques de estos criminales cibernéticos. 
  • Composable Infrastructure: Data Center Architecture for AI
    Composable Infrastructure: Data Center Architecture for AI
    Marius Tudor, VP of Sales, Liqid, Inc. Recorded: Jun 4 2020 44 mins
    Join Liqid VP of Sales Marius Tudor as he discusses the benefits that composable infrastructure solutions deliver for AI workloads.

    Liqid composable infrastructure enables IT users to orchestrate, deploy and change hardware configurations of previously static servers. Disaggregated trays of GPU, NVMe, FPGA, Intel® Optane™, networking, and CPU are managed through software, across multiple fabrics, including PCIe, Ethernet, and Infiniband to provision and augment bare-metal servers in seconds.

    Data has gravity. Learn how composable IT enables users to provision resources independently to meet the requirements specific to each stage of the AI workflow, providing business agility and infrastructure elasticity, while in tandem minimizing silos and hardware sprawl. Outcome: faster time to meaningful data at improved economics together with adaptive infrastructure.

    Marius will discuss recent deployments by organizations such as the University of Illinois at Chicago, which is now using Liqid solutions to manage global research for visually intensive computing, including AI deployments for scientific research.

    Join Us! One lucky attendee will receive a $100 gift card to the grocery delivery or food delivery service of their choice.
  • Better Endpoint Defense with CrowdStrike and Attivo Networks
    Better Endpoint Defense with CrowdStrike and Attivo Networks
    Joseph Salazar, Technical Deception Engineer | Attivo Networks Recorded: Jun 4 2020 47 mins
    Join Attivo Networks as we reveal how the integration between the ThreatDefend® platform and the CrowdStrike Falcon Insight EDR solution combines accurate in-network detection with automated response actions to isolate attackers and empower organizations to respond quickly to attackers already inside the network.
    The integrated solution provides organizations an advanced level of visibility and improves overall incident response to block and quarantine attackers before they spread. The solution works by accurately detecting attackers as they attempt to move laterally and quarantining the compromised systems either manually or automatically.

    Hear how our joint solution can provide your organization with:
    •Advanced detection of threats that evade existing security controls
    •Enhanced visibility into attack activity early in the attack cycle
    •Accurate, event-based alerts with detailed attack forensics
    •Automated incident response to mitigate attacks
    •Increased operational efficiency
    •Collection of company-centric threat intelligence to improve defenses
  • Secure SD-WAN Architecture: Comprehensive Integrated Security
    Secure SD-WAN Architecture: Comprehensive Integrated Security
    Sunil Ravi, Chief Security Architect for Versa Networks Recorded: Jun 4 2020 61 mins
    Security expectations and technologies continue to evolve as part of an end-to-end Enterprise network. Learn how a comprehensive integrated security architecture can drive dramatic improvements in threat protection, performance, and application experience.

    Join Sunil Ravi, Chief Security Architect for Versa Networks for a live webinar where you'll learn:
    + Security architectures for SD-WAN
    + Details of NGFW design in SD-WAN
    + Universal Threat Management (UTM) architectures with SD-WAN
  • PerimeterX #3: Limiting the Damages Resulting from Carding Bots
    PerimeterX #3: Limiting the Damages Resulting from Carding Bots
    Liel Strauch, Dir, Cyber Security Research, PerimeterX; Deepak Patel, VP Security Strategy, Brandon Dunlap, Moderator Recorded: Jun 4 2020 59 mins
    Stolen payment card information usually needs to be validated before they can be used to run larger fraudulent transactions or be sold on the black market. Typically, automated bots run these tests or validation through smaller websites that lack anti-bot defenses. Join PerimeterX and (ISC)2 on June 4, 2020 at 1:00PM Eastern as we discuss how to detect and stop fraudulent transactions originating from carding bots and save thousands of dollars in payment processing charges. We’ll also cover :

    ● Carding attacks from the wild

    ● How carding attacks evade detection

    ● Trends leading into the holiday season
  • Roadmap to building a successful Information Security Program.
    Roadmap to building a successful Information Security Program.
    Alex Leon, CISO at Dime Community Bank Recorded: Jun 4 2020 62 mins
    Building an information security program that meets the business needs of your organization and its continuance, while protecting the institution’s assets, is a venture all CISO’s have to endure. During this webinar, a bank CISO with over 25 years of experience in the Financial Services industry will share his knowledge on how to build a successful program for various size organizations. This session will cover the GRC framework (Governance, Risk and Compliance) will blend with the Cybersecurity framework (Identify, Protect, Detect, Respond and Recover) creating a unique formula for success.

    Alex Leon is the CISO at Dime Community Bank, a $6 Billion institution located in Brooklyn, New York. Alex has over 25 years of experience working in the Financial Services industry, including 18 years at Citibank and 4 years at Mitsubishi UFJ Trust and Banking. He has experience working in all 3 Lines of Defense (IT/IS, Risk, Audit). He has some of the most recognized Information Security certifications such as: C|CISO, CISSP, CISM, CISA, CRISC, CGEIT, CBCP, CTPRP and CSX-f. Alex has a Master of Science in IT Management from Colorado Technical University; and also earned a CISO Executive Program Certification from Carnegie Mellon University’s Heinz College of Information Systems and Policy. He is a Cybersecurity Advisory Board Member at Rutgers University, New Jersey. Alex is the first CISO at Dime Community Bank and reports directly to the Chief Risk Officer. He briefs the Bank’s Board of Directors at least quarterly. In his free time he shares his knowledge and industry experience with those entering the cybersecurity field. He is a Learning Tree Cybersecurity Instructor and enjoys skydiving during the summer months.
  • DCOI For Dummies: A candid conversation on the old and new DCOI initiatives
    DCOI For Dummies: A candid conversation on the old and new DCOI initiatives
    Anthony Vicinelly, Technology Director, Nlyte Software Recorded: Jun 4 2020 21 mins
    Join this candid conversation on the NEW Federal DCOI Initiative.

    The new DCOI M19-19 mandate expands on the previous DCOI M19-16 by further improving federal data center initiatives as well as provide a path for Modernization, implementing a Cloud First initiative, and performing Application Rationalization.

    What you will here is:
    - What is new and improved in the new initiative
    - Best practices in implementing a DCOI program
    - How DCIM is the Rosetta Stone in getting your agency on board with the federal mandate
  • Cutting Endpoint Management Costs In Half: A How-To Lesson
    Cutting Endpoint Management Costs In Half: A How-To Lesson
    Cy Englert Recorded: Jun 4 2020 18 mins
    The BigFix Endpoint Management Platform can perform multiple functions that have previously required many disparate tools. We'll look at building a business case for BigFix by identifying infrastructure cost savings, productivity improvements, operational efficiencies, and other benefits.
  • Fight and Prevent Ransomware | Live Virtual Panel
    Fight and Prevent Ransomware | Live Virtual Panel
    Matt Robertson, Andrew Miller, Sohil Merchant, Charles Johnson Recorded: Jun 4 2020 59 mins
    Ransomware alone impacted the 2019 economy by $11.5 billion. With no signs of slowing down, ransomware continues to be a growing fear in today’s environment. Accudata has assembled a panel of cybersecurity experts to discuss the threats facing organizations today.

    Tune in to our panel June 4 at 11 a.m. to learn about tangible best practices that you can implement in your environment to fight and prevent ransomware. Our expert panel includes:

    -Matt Robertson, principal SE, Pure Storage
    -Andrew Miller, principal SE, Pure Storage
    -Sohil Merchant, senior practice manager, data center & cloud applications, Accudata Systems
    -Charles Johnson, cybersecurity practice manager, Accudata Systems
  • [Panel Talk] Navigating the New Normal: Cyber & Cloud Best Practices
    [Panel Talk] Navigating the New Normal: Cyber & Cloud Best Practices
    Cindy Stanton,VP Product Marketing; Scott King, Director Security Advisory Services; Derek Abdine, Director Security Research Jun 5 2020 9:00 am UTC 32 mins
    As communities around the world start to discuss reopening, it poses a lot of questions for organizations:
    Is the virtual workforce here to stay, and what does it mean for your security posture? Which of the emergency security practices you enacted are working, and which are not? What role does the cloud play in all of this? Should you be accelerating migration plans, what immediate threats do you need to watch for, and the list goes on.
    These are all equally important and valid questions, but knowing where to start can feel daunting.
    Join Rapid7’s Vice President of Product Marketing, Cindy Stanton; Senior Director, Security Advisory Services, Scott King; Senior Director, Security Research, Derek Abdine; and series moderator, Vice President Global Growth Marketing and Operations, Tom Rogers as they discuss industry trends and research they’ve been collecting, how they’re approaching security as it relates to reopening Rapid7, cloud best practices, and more.
  • Cybersecurity Enterprise Education for Your Business
    Cybersecurity Enterprise Education for Your Business
    Ariel Evans Jun 5 2020 12:00 pm UTC 60 mins
    Join us for a live webinar to learn more about Cyber Intelligence 4U's new Cyber Certificate offerings at Pace University Seidenberg School Of Computer Science and Information Systems.

    We'll provide more information about the program, including the format, requirements, and registration process.

    Improve your organization's cyber resiliency, sharpen your cyber skills and expand your cyber knowledge. Our wide range of courses fits to company's and student's skill levels, business roles, and topic of interest.

    The online Enterprise Cybersecurity Program kicks off in May! Learn more about our offerings her
  • Unattended Test Automation: Bringing down costs without sacrificing quality
    Unattended Test Automation: Bringing down costs without sacrificing quality
    Rajesh CP, Practice Head for Enterprise Test Automation at Wipro Digital; Alex Drag, Product Marketing Lead at Tricentis Jun 5 2020 3:30 pm UTC 60 mins
    Join this webinar where Wipro and Tricentis together share insights to ways enterprises adopt and accelerate through ‘Unattended Test Automation’.
  • Using the 128 Technology PCLI for Investigating Issues
    Using the 128 Technology PCLI for Investigating Issues
    Justin Melloni Senior Manager of Education Services at 128 Technology Jun 5 2020 4:00 pm UTC 60 mins
    Although the 128 Technology GUI is very powerful, there are many people who still prefer to use the PCLI to do their troubleshooting. The PCLI offers many useful “show” commands. But, which of the many show commands are the most useful to use for your network?

    This webinar will go over:
    1. How to log into the PCLI
    2. How to view the help in the PCLI
    3. How to read many of the show command tables
    4. How to use Linux commands while inside the PCLI
  • Optimizing Email Security with Rapid7 InsightConnect and Mimecast
    Optimizing Email Security with Rapid7 InsightConnect and Mimecast
    Jadon Montero, Senior Product Manager, SOAR, Rapid7 & Devin Hamilton, Product Manager API & Alliances at Mimecast Jun 5 2020 4:00 pm UTC 18 mins
    As security teams continue to evolve, adapt, and innovate at a rapid rate, the struggle to balance increasing workloads with limited resources, complex ecosystems, and rising threats has never been greater. Security orchestration and automation (SOAR) helps teams improve their security posture and create efficiency—without sacrificing control of important security and IT processes.

    Learn how you can automate your security program from end-to-end by deeply integrating Mimecast with the rest of your security stack using Rapid7’s SOAR solution, InsightConnect.
  • History of Hackers: How Hackers Changed Everything
    History of Hackers: How Hackers Changed Everything
    David Jacoby, Security Evangelist at Kaspersky Jun 7 2020 2:00 pm UTC 5 mins
    Technological progress, new devices and tools have evolved in the past 40 years, but how did the methods and targets actually change? What is new?

    Watch a quick overview of how hacking has changed over the past decade, presented by David Jacoby, a security evangelist from Kaspersky’s GReAT, at #SASatHome, the online version of the renowned Security Analyst Summit, which took place on 28-30, April.
  • Prevent “Certificate Sudden Death”: VIA Venafi Stops Certificate-Related Outages
    Prevent “Certificate Sudden Death”: VIA Venafi Stops Certificate-Related Outages
    Michael Thelander, Director of Product Marketing, Venafi Jun 8 2020 9:00 am UTC 45 mins
    Certificate-related outages, whether from expired or misconfigured or unknown TLS certificates, are the bane of digital transformation. Perfectly functioning applications and services can be rendered inoperable. Worse still the security controls you rely on, from traffic inspection devices to web application firewalls, can’t protect you when a certificate-related outage shuts them down.

    Venafi has helped over 360 global customers eliminate certificate-related site and service outages. The resulting approach, based on a deep understanding of people, processes and technology needed to achieve this outcome, is VIA Venafi, the Venafi Way. VIA Venafi gives our customers the Visibility, Intelligence and Automation they need to stop outages. It also provides the world’s only guarantee against certificate-related outages: the VIA Venafi No Outage Guarantee.

    In this session you will:
    • Learn about some of the most troublesome certificate-related outages that have led to site failures and breaches in recent years
    • Gain an understanding of what’s needed to ensure against outages
    • Understand Venafi’s eight-step process to stopping certificate-related outages
    • Learn about our VIA Venafi No Outage Guarantee
    • See how a platform that delivers Visibility, Intelligence and Automation can achieve this outcome in a way that is not only affordable and manageable....but achieves it in a way guarantees results

    Register today!
  • Rock, Paper, Scissors: Images in Investigations
    Rock, Paper, Scissors: Images in Investigations
    Paul Slater Jun 8 2020 2:00 pm UTC 60 mins
    Getting to the (meta)data by applying the Nuix Engine to the photographs and videos in your evidence set - particularly those from mobile devices - drawing a wealth of information known as "EXIF data" from those files.

    In this webinar, you'll learn how to quickly show any of the images containing GPS information in order to help put the device (and therefore its owner) at a location or crime scene.
    We'll also cover how you can further enrich the data processed by the Nuix Engine by utilizing several built-in technologies, including:
    - Skin tone analysis. Automatically identify or eliminate images based on the presence of skin tone present.
    - Facial identification. Identify persons of interest through cutting-edge facial identification capabilities.
    - Child exploitation. Take advantage of Microsoft's donated PhotoDNA engine, which helps to fight the horrendous creation and distribution of indecent images of children through the amazing work of organizations such as Project VIC.
    - Deep learning. Use a neural network trained with over a million images that can classify pictures into categories like paper, rock, scissors...or categories more relevant to criminal investigations, such as guns, drugs, knives, etc.
  • Liteconfigurator by FIRELITE
    Liteconfigurator by FIRELITE
    Alonso Aguilar Jun 8 2020 3:00 pm UTC 120 mins
    En este Webinar aprenderemos a usar la herramienta gratuita de configuración Liteconfigurator; esta herramienta es de gran utilidad para centralizar la información de sus proyectos, la configuración de su sistemas en cuanto a cantidad, capacidad y compatibilidad de sistemas FIRELITE además de generar de una manera sencilla listados, reportes y cálculos de baterías.
  • Pre- CertificacionPAVA Sesion 1- CS Description: Entrenamiento Comercial
    Pre- CertificacionPAVA Sesion 1- CS Description: Entrenamiento Comercial
    Sebastian Martínez Jun 8 2020 7:00 pm UTC 120 mins
    Entrenamiento Comercial INTEVIO y X-618
  • Understand mobile risk: Lookout Mobile Threat Defense
    Understand mobile risk: Lookout Mobile Threat Defense
    Marius Rohart, Security Sales Engineer EMEA, Lookout Jun 9 2020 12:00 am UTC 46 mins
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • (APAC) Comparing CASB Technologies: What's the Difference?
    (APAC) Comparing CASB Technologies: What's the Difference?
    Jacob Serpa Jun 9 2020 1:00 am UTC 60 mins
    Cloud access security brokers (CASBs) have emerged as go-to solutions for organizations to secure their cloud services. CASBs provide a breadth and depth of functionality that is indispensable for securing your data across applications, devices and networks.

    Yet not all CASBs are created equal, and it can be a challenge to identify which solution to deploy. From capabilities to the security of underlying architectures, there is much to consider.
  • 5 Reasons to Outsource Detection & Response Operations
    5 Reasons to Outsource Detection & Response Operations
    Chris Hartley - Regional Director for UK & Ireland, Rapid7, and Warwick Webb - Security Practitioner, Rapid7 Jun 9 2020 1:00 am UTC 38 mins
    Security has played a positive role in enabling business over the recent weeks. This has been demonstrated by allowing remote workforces to remain productive and the hard work of security teams to keep operations running. However all this is putting a strain on the internal resources trying to protect their critical business assets from both external attackers and insider threats.

    At Rapid7 we are taking a practical role in helping ensure security advice and guidance is available for all, and we will be running a series of talk tracks to help provide a measured perspective on how to remain secure and operational with the resources you have.

    Join us for this live talk where Chris Hartley, Director at Rapid7 UK & Ireland, and Warwick Webb, Security Practitioner, will discuss the top 5 reasons why some organisations are looking to augment or outsource their threat detection and response operations including:

    · Talent shortage in cybersecurity and why specialisation is key
    · Business continuity and the impact of ‘always on’
    · Threat intelligence and global visibility of the threat landscape
    · Role of threat hunters in incident response

    We’ll also be joined by customer, Simon Parry from the Development Bank of Wales to reveal how they are using managed services in their own environment and which elements of managed detection and response are most important the success of their security program.
  • The Analytics and AI Approach to the Customer Experience
    The Analytics and AI Approach to the Customer Experience
    Melanie Turek VP of Research and Fellow, Connected Work, Frost & Sullivan Jun 9 2020 1:00 am UTC 35 mins
    With the rise of mobile and social technologies, customers are more knowledgeable and empowered than ever before. Their ability to access and share information gives them enormous control—and they know it.

    As a result, they expect data-driven, personalized interactions at every stage of the customer experience. Frost & Sullivan research shows that one of the clearest trends in customer engagement is the shift from traditional to digital interactions. Buyers like self-service, automated channels because they want easy access to information, on their time line, from anywhere. At the same time, agents want to discard the routine tasks that lower job satisfaction and lead to boredom and churn.

    AI and ML help companies leverage real-time and historical information to deliver a contextual, relevant and highly personal customer experience while improving agent morale. This webinar will show you how.
  • Secure the Edges of Your Business Network with Secure SD-Branch
    Secure the Edges of Your Business Network with Secure SD-Branch
    Chris Hinsz - Director Product Marketing, James Allen - Director of Products & Solutions Fortinet Jun 9 2020 1:00 am UTC 50 mins
    Learn how to take branch locations to the next level with a truly Secure SD-Branch and a deeper understanding of how to extend edge security to branch locations while streamlining management. Plus, take a look at what an extended architecture that goes a step beyond edge security can achieve with secure access points, phone and camera systems, switches, and more that can increase efficiency without compromising protection.
  • An Intelligence Driven Approach to Security Validation
    An Intelligence Driven Approach to Security Validation
    Shashwath Hegde, Solutions Architect, APAC Jun 9 2020 2:00 am UTC 60 mins
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
    We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
  • How Internet Isolation Eliminates Threats that Evade Sandboxes
    How Internet Isolation Eliminates Threats that Evade Sandboxes
    Vinay Pidathala, Director of Security Research - Menlo Security Jun 9 2020 2:00 am UTC 57 mins
    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. Sandboxes observe machine behavior and any deviation from the norm is flagged as suspicious and blocked. On the other hand, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. So as attackers improve their evasion techniques, how do you prevent and protect your business?

    In this webinar, Vinay Pidathala, Director of Security Research at Menlo Security, will discuss the techniques actively being used by attackers to evade sandboxes. He will also share how Internet Isolation defends against these by helping companies achieve a Zero Trust Internet.

    Discover:

    - How attackers bypass sandboxes and what is the best way to thwart these attacks
    - Real life examples of sandbox failures and how Internet Isolation protected against attacks
    - Why Internet Isolation is critical to a modern security architecture
  • 2020 Data Breach Investigations Report (DBIR) Key Findings
    2020 Data Breach Investigations Report (DBIR) Key Findings
    Alex Pinto and Gabriel Bassett Jun 9 2020 3:00 am UTC 75 mins
    This is the 13th edition of the Data Breach Investigations Report (DBIR). Join the discussion with Alex Pinto and Gabriel Bassett, as they reveal key findings on global cyber security breaches and threat patterns faced by businesses and organizations. A Q&A session will be hosted by Ashish Thapar after the presentation.

    Speakers:

    Alex Pinto
    Distinguished Engineer and Team Manager
    Data Breach Investigations Report (DBIR)
    Verizon Business Group

    Gabriel Bassett
    Data Breach Investigations Report (DBIR) Co-author
    Verizon Business Group
  • Transform IT to deliver more growth-oriented innovation
    Transform IT to deliver more growth-oriented innovation
    Darren Hamway, Portfolio Manager, Tiffany & Co. and Bruce Randall, Director, Product Marketing-ITSM, ServiceNow Jun 9 2020 3:00 am UTC 56 mins
    Digital transformation means transforming IT. Whether increasing productivity, driving insights, delivering innovation, or simply providing a consumer-like experience for employees; IT has proven to be an indispensable element in business success.

    Join Darren Hamway, Portfolio Manager/ IT Project Management Officer, Tiffany & Co. along with Bruce Randall, Product Marketing – IT Service Management Director, ServiceNow as they discuss how Tiffany & Co. has successfully increased IT throughput and productivity with ServiceNow.

    In this webinar you will also learn:

    - How modernised IT can help drive digital transformation for you and your business
    - How to deliver innovation without negative employee impact, or breaking the bank on infrastructure and resources
    - How combining IT Service Management and IT Business Management helps to deliver new innovations
    - How to transition from successful IT Service Management to successful IT Business Management
  • 3 Ways the Cloud is Reshaping EUC
    3 Ways the Cloud is Reshaping EUC
    Ruben Sprujit, CTO Frame Jun 9 2020 3:00 am UTC 42 mins
    Traditionally, end-user computing has been dominated by on-premises solutions like virtual desktop infrastructure (VDI). But the cloud has ushered in the emergence of desktop-as-a-service (DaaS), and many organizations have transitioned from a "design-build-support" model to an as-a-service model.

    Join us for this informative webinar to learn what the DaaS landscape looks like, including the differences between VDI and DaaS and why DaaS has become such a compelling option for IT teams.

    Ruben Sprujit, Sr. Technologist at Nutanix will lead you through:

    - Core DaaS technologies and their value.
    - Pros/cons of Azure, AWS, and GCP as Infrastructure-as-a-Service platforms for DaaS.
    - Tips for DaaS success
    - And more!
  • Data and Machine Learning in Financial Fraud Prevention
    Data and Machine Learning in Financial Fraud Prevention
    Kayla Hartman, Data Analyst, Alloy Jun 9 2020 3:00 am UTC 34 mins
    According to Capgemini’s World Payments Report 2017, global digital payments are expected to rise to roughly 726 billion transactions in 2020. The growth of digital financial services offers innumerable opportunities, expanding access to financial services products and allowing for essentially instantaneous feedback loops. With these opportunities, however, also come risks, including fraud. The threat of fraud requires financial services organizations to act proactively to minimize losses due to fraud. Analysis of data surrounding their customers and transactions is an essential effort to ensure the benefits of the digital payments space continue to outweigh the risks.

    In this webinar, Kayla Hartman will discuss the various ways data is used in fraud prevention. As a Data Analyst at Alloy, a fintech company that provides identity verification APIs for clients’ KYC (know your customer) and AML (anti-money laundering), she has firsthand experience in enhancing fraud prevention efforts through data analysis. She will dive into the ways the use of data is currently advantageous to fraud prevention, as well as the challenges that are presented in this quickly changing space.
  • Managing Digital Adoption: Banking & Payments in a Contactless World
    Managing Digital Adoption: Banking & Payments in a Contactless World
    Dr. Louise Beaumont | Simon Cureton, Funding Options | Matt Phillips, Diebold Nixdorf | Ioannis Mallios, Profile Software Jun 9 2020 4:00 am UTC 60 mins
    A discussion on open banking, the accelerating need for mobile and contactless payments, and how the ecosystem is being disrupted by COVID-19.