Hi [[ session.user.profile.firstName ]]

IT Security

  • Conducive Environments for Successful Threat Hunting (Hunter Spotlight)
    Conducive Environments for Successful Threat Hunting (Hunter Spotlight) Jason Smith, Security Operations Investigator Manager at Cisco Recorded: May 24 2017 32 mins
    Veteran threat hunter Jason Smith will detail:
    • How to structure your Security Operations Center (SOC) and network to help uncover hidden threats
    • Best practices to make hunting data accessible and fluid
    • Essential tools and tips from Jason's hunting experiences

    About the hunter:
    Jason Smith has a background in physics and has built everything from particle
    accelerators to explosive neutralizing robots used by the military. He has worked in multiple US Department of Defense SOCs and has worked with the largest security vendors to operationalize security in the world's largest
    organizations. Jason co-wrote Applied Network Security Monitoring and maintains the open source project FlowBAT, a graphical flow data analysis tool. Jason currently works remotely for Cisco from his home in Nashville, TN.
  • Cyber Attack Detection for AWS
    Cyber Attack Detection for AWS Matt Curie, Solution Architect at Alert Logic Recorded: May 24 2017 26 mins
    Want to keep your cloud-based web applications in Amazon Web Services from getting hacked? Then you do not want to miss this live webinar with a demonstration of Alert Logic Cloud Defender.

    With the rapid rise of web application attacks, which is the number one source of data breaches, securing cloud-based web applications is a challenge. In order to fully protect your web applications in the cloud, it is important to know the risks, select the right security tool, and understand your role in the shared responsibility for security.

    Join Matt Curie, Solution Architect at Alert Logic, for an in-depth discussion on steps that you can take to harden your environment against modern cyber threats.

    In the webinar you will learn:
    - How the threat landscape has changed with the emergence of public cloud
    - How Alert Logic can help organizations deal with increasing web application attacks
    - View a live demo of Alert Logic Cloud Defender
  • Securing Containers for Production-Ready Environments
    Securing Containers for Production-Ready Environments Amy DeMartine, Principal Analyst, Forrester Research and Rani Osnat, VP Marketing, Aqua Security Recorded: May 24 2017 52 mins
    “Containers Are Not Just Small Virtual Machines; They Need New Security Strategies.” - Forrester report: Ten Basic Steps to Secure Software Containers, April 17, 2017.

    While the rise of the Docker runtime environment and container format has brought standardization to container environment - according to the Forrester report, 31% of enterprise cloud developers are using containers during design and testing - risks to containers are on the rise as well. In this webinar, we will go over ten security steps to secure containers.

    Join our webinar to learn how to:
    • Secure containers now, before they put your customers at risk
    • Understand the distinct security implications of the layered container stack
    • Master the 10 tasks to protect your container environment

    Aqua Security webinar featuring Forrester Research.
  • Malware in Disguise & How to Spot It [Ransomware, Phishing]
    Malware in Disguise & How to Spot It [Ransomware, Phishing] Alex Holden, CISO of Hold Security Recorded: May 24 2017 56 mins
    On the surface, spotting malicious attacks can be difficult. Hackers are expanding their malware distribution networks by exploiting commonly used applications to carry and distribute their malicious software. In the wake of the three major attacks Wanna Cry, DocuSign, and Google Docs malware outbreak we will examine how malware is distributed and provide guidelines on how to secure infrastructures against the next attack.

    About the Presenter:
    Alex Holden is the founder and CISO of Hold Security. Holden is credited with the discovery of many high profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, and the independent discovery of the Target and Yahoo breaches. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.
  • Turn Disruption into Differentiation with your Digital Transformation Strategy
    Turn Disruption into Differentiation with your Digital Transformation Strategy Sheryl Kingstone 451 Research, Bill Hurley CMO CenturyLink Recorded: May 24 2017 55 mins
    Join 451 Research and CenturyLink May 24th at 1pm ET to discuss how enterprises are choosing and using digitization initiatives for business gain.

    Organizations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation is playing out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and Centurylink to learn how some global enterprises are making assured first steps, and hear the following:

    •Understand how companies with more progressive Digital Transformation strategies are prioritizing their efforts for competitive differentiation, changing the nature of their business with innovative technologies that are becoming more easily accessible with a lower barrier to entry.

    •Insights and recommendations from a major survey of enterprises worldwide about IT priorities and how to make service provider choices to accelerate digital transformation mandates such as the role of cloud and other IT infrastructure options that are built for availability, speed, and resilience.

    •Identification of key shifts in business context that will continue to shape digitization efforts, and how these need to be reflected in a digital transformation roadmap for IT organizations.
  • NSA Hacking Tools Exposed Pt 2: Are You Protected?
    NSA Hacking Tools Exposed Pt 2: Are You Protected? Cody Mercer, Senior Threat Research Analyst Recorded: May 24 2017 31 mins
    The ‘Shadow Brokers’ have recently released a new cache of malware exploits into the wild in which our NSF Threat Intelligence Researchers were able to reverse engineer and ‘sandbox’ for analytical purposes. With this noted, very sophisticated malware strains developed at the ‘State-Sponsored’ level by such entities as NSA are now readily available and primarily targeting vulnerabilities identified in Microsoft OS’s and MS applications.

    This will be the second installment to my previous BrightTalk presentation that will take a deeper look into specific exploits released by the Shadow Brokers and their attributed TTP’s (Techniques, Tactics, Procedures) and how NSFOCUS’s Threat Intelligence can assist in securing your security posture.

    Join NSFOCUS in this event to discuss:

    •What are the exploits Fuzzbunch, Dandersprit, and OddJob and their associated campaigns?

    •How can NSF’s Threat Intelligence Portal and Reputation Feeds protect you and your company against these recently released malwares?

    •Gain a better understanding of TI components to include ‘Strategic’ and ‘Tactical’ information and how knowledge of these exploits will help protect your company from future compromise.
  • Intelligence-First:  How Intelligence Enriches Security Consulting Services
    Intelligence-First: How Intelligence Enriches Security Consulting Services Jeff Berg, Sr. Manager, Cyber Threat Intelligence & Brad Bell, Mandiant Principal Consultant Recorded: May 24 2017 54 mins
    Join Jeff Berg, Sr. Manager of Cyber Threat Intelligence, and Brad Bell, Mandiant Principal Consultant, as they share the role of cyber threat intelligence in strategic security consulting services and why services based on compliance-based best practices and industry standards may not be an effective way to protect your organization against a rapidly evolving threat landscape. 

    Key takeaways:

    • The role cyber threat intelligence plays in strategic security consulting services
    • Why services rooted in compliance-based best practices and industry standards aren’t effective
    • Case studies where different types of intelligence added value to service portfolio
  • Securing O365 Using AI-based Advanced Threat Protection
    Securing O365 Using AI-based Advanced Threat Protection Mike Bruchanski, Director of Product Management - Platform, Cylance & Karthik Venna, Product Manager, Bitglass Recorded: May 24 2017 40 mins
    Office 365 has garnered widespread adoption from enterprises due to its advantages such as ease of deployment, lower TCO, and high scalability. Additionally, it enables end-users to work and collaborate from anywhere and on any device. Although Office 365 enables IT to shift the burden for app and infrastructure to the cloud vendor, data security remains the responsibility of the enterprise. Given the limitations of native malware protection on Office 365, should the enterprise rely on Office 365 to protect their data from malware and ransomware?

    Join Bitglass and Cylance for a discussion on malware protection solutions for Office 365. We will cover the limitations of native Office 365 malware protection as well as the benefits of AI and machine learning based approaches. We will wrap up the session by discussing how CASBs, with Advanced Threat Protection (ATP) capabilities, are uniquely positioned to protect cloud apps and end-points from malware attacks and proliferation.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you
    WanaCrypt0r Ransomware – How Palo Alto Networks protects you Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42 Recorded: May 24 2017 46 mins
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Mobile Security: Perceptions vs Device-harvested Reality
    Mobile Security: Perceptions vs Device-harvested Reality JT Keating, Holger Schulze Recorded: May 24 2017 42 mins
    This webinar discusses mobile device security fact vs perception. We will dive into the findings of a recent mobile security research study of over 1,900 cybersecurity professionals’ perceptions on mobile threats and contrast these opinions against mobile threat realities from Zimperium’s Global Threat Report, with real-word data driven from millions of licensed mobile endpoints around the world.

    Please join Holger Schulze, Founder of the Information Security Community, and JT Keating, Vice President of Product Strategy at Zimperium, for an interactive webinar that will outline:

    ● The latest mobile security perceptions from Information Security’s 2017 Spotlight Report.
    ● Mobile risk and threat realities from Zimperium’s Global Threat Report, with data driven from millions of licensed mobile endpoints around the world.
    ● Detailed descriptions of device, network and application attacks and vulnerabilities, along with brief recommendations of how to prevent and remediate each.
  • Building Next-Generation WANs to Support People, Places & Things
    Building Next-Generation WANs to Support People, Places & Things Lee Doyle of Doyle Research and Todd Krautkremer of Cradlepoint Recorded: May 24 2017 62 mins
    Digital transformation is driving the increased deployment of cloud-based applications, a mobile workforce, and IoT. A new WAN architecture is required to support this digital transformation and deliver reliable, secure connectivity to people, places, and things.

    In a live webinar on May 24, 2017, Lee Doyle of Doyle Research and Todd Krautkremer of Cradlepoint will discuss the technologies enabling the next-generation WAN, including SD-WAN, Software-Defined Perimeter (SD-P), and LTE.
  • APT32: New Cyber Espionage Group
    APT32: New Cyber Espionage Group Nick Carr, Sr. Manager Incident Response, Mandiant, a FireEye Company Recorded: May 24 2017 57 mins
    Learn more about APT32 (OceanLotus Group), a Southeast Asian cyber espionage group threatening multi-national companies operating in Vietnam. After long-term monitoring and response of their activities, FireEye has given this threat actor the newest APT designation.

    Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:

    • Who is part of APT32, where they are based, whom they target and how they operate
    • Advice on how to defend against, hunt for and respond to APT32
    • How your organization can improve your ability to detect, prevent and remediate APT32 attacks
  • GDPR: Countdown to Day0
    GDPR: Countdown to Day0 Neil Thacker, Forcepoint, Moyn Uddin, Cyber Counsel, Jonathan Armstrong, Cordery, Adrian Davis, (ISC)² EMEA Recorded: May 24 2017 60 mins
    With the EU General Data Protection Regulation entering into force and becoming applicable from the 25th May 2018, this webcast, featuring an expert panel, will focus on key milestones to become ready for the new regulation and what we have learned to date with 1 year to go.

    Topics for discussion will include obligations to:

    · Maintain a personal data inventory
    · Map Data flow vs. Data Transfer Agreements
    · Incident Response and obligations for mandatory data breach notification
  • [VIDEO] Man & Machine: Analytics as a Defence Against Advanced Cyber Threats
    [VIDEO] Man & Machine: Analytics as a Defence Against Advanced Cyber Threats Ross Brewer, vice president and managing director EMEA, LogRhythm & Josh Downs, Senior Community Manager, BrightTALK Recorded: May 24 2017 30 mins
    As technology advances, so does the threat landscape, with cyber criminals effectively exploiting weak points on an almost daily basis. When malware infiltrates an organisation’s first layer of defence, it can spread quickly throughout the network, exposing data and weakening security - and in most cases this happens faster than analysts or administrators have time to react to. Indeed, with reams of data being generated and transferred over networks, organisations are having a hard time monitoring everything, which means potential threats can easily go unnoticed.

    Organisations need to rely on machines to detect and respond to threats more quickly and efficiently. Even enterprises with a dedicated security team that monitors the latest security threat trends and understands the blueprint of evolving attack vectors still need to continuously monitor all network activity. The sheer volume of processes, services and applications running on a corporate network is just too much for human beings to monitor alone. However, this doesn’t mean that human analysis is not important.

    User and entity behavioural analytics (UEBA) is essential in keeping up with continuously evolving threats and making sense of anomalous network behaviour. Security approaches that utilise both machine learning and human analysis enable all threats to be analysed for effective detection and response, ensuring all data is accounted for and including the human element to help reduce the opportunities for false positives. To keep up with the ever-changing security landscape, companies need to integrate internal and external threat context in their environment by updating processing rules for operating systems, applications, and network devices in order to strengthen the accuracy of real-time machine analytics.
  • Vulnerability Intelligence Eine wichtige Komponen
    Vulnerability Intelligence Eine wichtige Komponen Thomas Todt, Senior Sales Engineer DACH, MEA & Eastern Europe Recorded: May 24 2017 35 mins
    Software Vulnerability Management ist eine Herausforderung für die IT- und Informationssicherheitsstrategie Ihres Unternehmens. Hunderte neue Schwachstellen pro Woche machen das Thema zu einem Albtraum für Sicherheitsprofis. Die Informationen zu sammeln, zu prüfen und sie den relevanten Personen als Grundlage für die Risikobewertung zur Verfügung zu stellen ist eine weitere Herkules-Aufgabe. Doch es geht auch einfacher:

    *Was ist Vulnerability Intelligence?
    *Wie kann Vulnerability Intelligence Manager eingesetzt werden, um die Herausforderungen zu meistern?
    *Wie managen Sie Software Vulnerabilities effektiv?

    Nehmen Sie an diesem Webinar teil, um einen Überblick über Vulnerability Intelligence und den Wert für Ihr Unternehmen zu gewinnen. Lernen Sie, wie Sie die Sicherheit Ihrer Anwendungen mit Vulnerability Intelligence Manager effektiv steigern.
  • Countdown to GDPR - Reduce your Risk
    Countdown to GDPR - Reduce your Risk Darron Gibbard, Managing Director, EMEA North at Qualys & Jonathan Armstrong, Partner at Cordery Recorded: May 24 2017 60 mins
    This is a must-attend webcast for anyone working for an organisation within Europe and responsible for the security of personal data.

    You are probably already thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover.

    For organisations headquartered across EMEA, GDPR is a key focus for the next 12 months as the 25 May 2018 deadline approaches. Qualys solutions can help your organisation prepare and comply with GDPR.

    During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery, will answer any compliance questions and highlight the key areas to consider. Darron Gibbard, Managing Director, EMEA North at Qualys, will show you how to know and control your data, assets and suppliers.

    You will get practical advice on:

    - What you need to focus on: data, assets, suppliers
    - Who you should involve: key stakeholders and departments
    - How you can automate processes with Qualys Security Assessment Questionnaire

    This webcast will include a live Q&A session.
  • State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends
    State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends Nick Rieniets, Senior Security Specialist, Akamai Technologies Recorded: May 24 2017 60 mins
    As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks up to 650 Gbps. Our security experts analyze this information and share trends, observations, and findings in our quarterly State of the Internet / Security Report. We will present this information and associated insights in this webinar series.

    In this webinar, you will learn:

    • A summary of global findings from the State of the Internet Report
    • Attack statistics for APJ
    • How IoT botnets have changed the attack topology in APJ
    • The responsibilities for security of IoT

    Join Akamai and (ISC)² on May 24 (Wed) at 13:00 (Singapore time) for an overview and analysis of traffic and trends from Distributed Denial of Service (DDoS) and web application attacks.
  • Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention]
    Changing the Game in Public Cloud Security with AutoFocus [Breach Prevention] Michael Lam, Systems Engineer, Palo Alto Networks Recorded: May 24 2017 53 mins
    Security remains a top concern as you transition more workloads to the public cloud, with cyber attackers attempting to compromise sensitive data and resources wherever they reside. Providers will profess that your applications and data are more secure in the cloud, but how can you be sure? Join this Cloud Breach Prevention Week webcast spotlighting how the AutoFocus™ threat intelligence service can help you identify and take action on threats targeting the public cloud, including how VM-Series virtualized firewalls can protect your organization with next-generation security.
     
    You will see:
    •Breaking public cloud threats found by AutoFocus
    •How the VM-Series and AutoFocus automate targeted threat identification and prevention
    •Key differences between the VM-Series and other cloud security offerings
  • Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention]
    Protect Software-Defined Data Center From Advanced Attacks [Breach Prevention] Charles Woo, Systems Engineer, Palo Alto Networks May 25 2017 2:00 am UTC 60 mins
    The sophistication of attacks against corporate and government data centers continues to grow at an alarming pace. New security approaches, such as micro-segmentation and advanced security controls within the data center, are actively being embraced by security practitioners. In this webinar, learn about these advanced attacks within the data center through real examples and different approaches to both combating them and protecting your applications and data.
  • Next-generation Security for the Public Cloud
    Next-generation Security for the Public Cloud Matt Keil, Director of Product Marketing at Palo Alto Networks May 25 2017 8:00 am UTC 60 mins
    As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.

    Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.

    The webinar will cover:
    • Overview of the VM-Series next-generation firewall
    • How the VM-Series prevents cyberattacks in the public cloud
    • Key differences between the VM-Series and other cloud security offerings
  • iGov Survey Results: GDPR Compliance and Creating a 360 Citizen View
    iGov Survey Results: GDPR Compliance and Creating a 360 Citizen View Guy Bradshaw from Entity Group and Informatica May 25 2017 9:30 am UTC 60 mins
    This webinar will present the latest research project from iGov.

    This research considers the challenges and benefits for public sector organisations as they prepare for the EU’s forthcoming General Data Protection Regulation (GDPR).

    This webinar will illuminate:

    • The current state of Public Sector readiness in the light of GDPR’s introduction on May 25th 2018.

    • How present data management capabilities, illustrated by the iGov survey findings, could be affected by the new regulations.

    • How GDPR could affect Public Sector organisations when it comes to collecting and maintaining personal data.

    • Discussions regarding a realistic roadmap for GDPR compliance based on the survey findings.

    Registrants will also receive a complimentary copy of the survey report - to benchmark against other participating Public Sector organisations.

    Presented by
    Guy Bradshaw and Kate Tickner from Entity Group and Informatica
  • Cut the Work From Your Workflow: An Analytics-First Approach
    Cut the Work From Your Workflow: An Analytics-First Approach ExtraHop Team May 25 2017 10:00 am UTC 60 mins
    The digital business is growing at a rate IT can’t match without over-worked staff and costly data storage. Over the next few years, more reliance on cloud hosting and SDN will send your stress levels up and your IT visibility down… unless you take advantage of a smarter workflow designed to scale IT with real-time insight on-prem and in the cloud. Backed by machine learning for “always-on” anomaly detection, the ExtraHop platform redefines analytics for a more productive—and proactive—you.
  • Turning the Table on Hackers through Situational Awareness
    Turning the Table on Hackers through Situational Awareness Jason Hart, CTO Data Protection, Gemalto, Adrian Davis, Managing Director, (ISC)² EMEA May 25 2017 11:00 am UTC 60 mins
    Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations, and identity theft. According to Gemalto's Breach Level Index, the number of stolen, compromised, or lost records increased by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

    Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a finger on the pulse of what is going on. It seems too simple to be true, but it goes back to the age-old principle "information is power". Getting the information comes from being aware of one's surroundings. To become situationally aware, companies need to change their mindset—building a walled garden isn't an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

    •What we can learn from Jason Bourne about knowing one's surroundings
    •What we can learn from hackers to better protect valuable data
    •What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability, and confidentiality
    •How to change our mindset in a new era of a hacker-driven gold rush
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife May 25 2017 2:00 pm UTC 60 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance
  • Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready
    Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready Derek Brink, VP, Research Fellow, Information Technology May 25 2017 3:00 pm UTC 60 mins
    Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you’re going to address it.

    In this webinar, join Derek Brink, vice president and research fellow for Aberdeen Group, and Neil Cooper, Regional Sales Manager, UK&I, for Thales eSecurity, as they share the following helpful insights:

    • Short synopsis of the timeline and key provisions of GDPR
    • Quantify the business risk of GDPR, in terms of both the likelihood and the business impact of non-compliance
    • Summarise the six fundamental strategies for safeguarding sensitive data
    • Identify the three most important capabilities for addressing GDPR requirements
  • Why cybersecurity is everyone’s responsibility in today’s FS organization
    Why cybersecurity is everyone’s responsibility in today’s FS organization Steve Holt, EY EMEIA Head of Cybersecurity Financial Services May 25 2017 3:00 pm UTC 60 mins
    This webinar will discuss the global cybersecurity landscape, and the threats and opportunities cybersecurity is presenting for financial services organizations. Given the panel is being held exactly one year before the official General Data Protection Regulation (GDPR) implementation date, panelists will be reflecting specifically on the implications of this regulation for FS organizations.

    Panelists

    * Cheri McGuire, Group Chief Information Security Officer, Standard Chartered Bank
    * Simon Hales, Group Head of ISR, HSBC
    * Tony de Bos, EY EMEIA Financial Services, Data Protection and Privacy Leader

    Topics for discussion:

    * Talent and awareness - building a culture that makes cybersecurity part of everyone’s job and rethinking the role of the Chief Information Security Officer (CISO)
    * Strategy and innovation - putting cybersecurity at the heart of business strategy and ensuring that new digital innovation includes cybersecurity at the outset
    * Regulation - assessing the impact GDPR will have on your organization’s people, processes and technology ahead of the 2018 implementation date
    * Resilience and scalability - being prepared to recover rapidly from a cyber-breach while holding up your ecosystem to the same cybersecurity standards that you follow as an organization

    This publication contains information in summary form and is therefore intended for general guidance only. It is not intended to be a substitute for detailed research or the exercise of professional judgment. Member firms of the global EY organization cannot accept responsibility for loss to any person relying on this article.
  • Symantec Monthly Threat Webinar - May update
    Symantec Monthly Threat Webinar - May update Jeff Barto, Trust Evangelist at Symantec May 25 2017 3:30 pm UTC 60 mins
    Hear the latest on the current website security threats for May 2017 from Symantec.
  • Improve healthcare workflows with Imprivata’s OneSign® SSO & PCoIP Zero Clients
    Improve healthcare workflows with Imprivata’s OneSign® SSO & PCoIP Zero Clients Matt Erich, Dir. of Pre-Sales, Imprivata & Slaven Boskovic, Systems Analyst, Teradici , May 25 2017 3:30 pm UTC 30 mins
    As healthcare organizations look to improve workflows to enable clinicians to spend more time with patients, IT organizations must find ways to keep patient data secure; while providing convenient access.

    Join us for an informative session on how Imprivata OneSign® Single Sign On and PCoIP Zero Clients have improved clinician productivity and resulted in time savings for IT and medical staff; all while enhancing the security of patient data.

    This open Q&A forum will cover how to:
    •Streamline clinical workflows with No Click Access®
    •Increase security to ensure the protection of electronic patient information
    •Meet healthcare compliance requirements with joint solutions from Imprivata and Teradici
    •Provide a consistent user experience that follows clinicians to the point of care

    Q&A will follow at the end of the session.
  • How Financial Services can Leverage the Cloud Securely to Drive Business
    How Financial Services can Leverage the Cloud Securely to Drive Business Miguel Ramos of Forcepoint May 25 2017 4:00 pm UTC 60 mins
    Though one of the most mature industries in cybersecurity, the Financial Services industry has seen some of the largest explosion of innovation and technology. While startups and innovators are focused on speed to market and leveraging cloud infrastructure and cloud platforms as a service, the need for security in financial technologies is paramount.

    In this session, Miguel Ramos will use case studies and his experience to outline key steps that can be taken to secure financial technology innovators, and explain how traditional, cloud and potentially even blockchain technologies can be used by corporations to ensure the security they need to drive business forward.
  • Learning from the RSA Conference 2017 - Uncover Data Security Blind Spots
    Learning from the RSA Conference 2017 - Uncover Data Security Blind Spots Ulf Mattsson, CTO Atlantic BT Security May 25 2017 4:00 pm UTC 60 mins
    The RSA conference is a unique and valuable event for IT security experts from around the world. With cyber-attacks on the rise, securing your data is more imperative than ever. The RSA conference pointed out that revisions to PCI (Payment Card Industry) DSS (Data Security Standard) is increasingly focusing on Rugged DevOps or SecDevOps, and the different approach called DevSecOps, embracing the speed of DevOps and continuous delivery in a secure environment. DevOps does affect security, and you can use it to your advantage. As cloud, big data and DevOps disrupt traditional approaches to security, new capabilities emerge to automate and enhance security operations.
    Join this session and learn how to automatically address these data security blind spots and how security can be built into the development process and IT platforms. We will discuss how security can be built into Rugged DevOps,SecDevOps, DevSecOps, Scrum, SAFe, DAD and use in Large-scale Development.
  • Should you build or buy your security? Midmarket survey findings
    Should you build or buy your security? Midmarket survey findings Sridhar Karnam, Director of Product Strategy May 25 2017 4:00 pm UTC 60 mins
    A deep dive into the findings and implications of a survey taken by IT professionals in the midmarket space. 100% of respondents indicated they're cybersecurity could improve in one or more areas such as information security, user security training, threat intelligence, overall risk management, and more. And of the threats, viruses, malware, professional cybercriminal, data theft, and phishing are among the top 5 threats facing their organizations.

    Get the results and takeaways from the survey and gain insight into whether it is best for your organization to build or buy a security operations center (SOC) in this interactive webcast.
  • Cloud Security Strategies for SMBs: Top Trends and Tips
    Cloud Security Strategies for SMBs: Top Trends and Tips Stephen Helm, Product Marketing Manager, and Jason Vendramin, Senior Product Manager May 25 2017 4:00 pm UTC 60 mins
    Small and mid-sized businesses are a driving force behind cloud adoption, and it’s no wonder: cloud benefits are BIG, with substantial cost savings around hardware, software, paper, storage, and automations.
    But for all the convenience that moving to the cloud provides, where does security come into play? What steps should SMBs take to ensure their move is a safe one? Join Stephen Helm, product marketing manager, and Jason Vendramin, senior product manager, as they explore top cloud challenges, trends, and tips in this informative webinar.
  • Using Windows Security Events to Detect Intruders in Your Network
    Using Windows Security Events to Detect Intruders in Your Network Randy Franklin Smith (Windows Security expert), Chris Martin (Security Engineer), Caitlin NoePayne (LogRhythm Sr. TPM) May 25 2017 5:00 pm UTC 90 mins
    Over time, any given computer on your network will establish a pattern of systems it does and doesn’t talk to. If you can properly baseline that behavior and detect when the computer deviates from normal activity you can produce critical early warnings of a potential incident.

    In this webcast, LogRhythm’s senior technical product manager, Caitlin NoePayne, and principal sales engineer, Chris Martin, join Randy Franklin Smith, Windows Security subject matter expert, to discuss detecting computers on your network talking for the first time using Windows Security Events. They will also demonstrate LogRhythm behavioral analytics rules and case management features that help analysts follow up on suspicious activity alerts.

    Learn how to:

    • Configure your audit policy to generate relevant security events
    • Establish baseline behavior of the machines on your environment
    • Monitor and detect traffic patterns to detect an attacker embedded in your network using Windows Security Events
    • Speed up investigation and response with Security Automation and Orchestration

    Watch now to learn how to use Windows Security Events and LogRhythm to detect when two computers on your network talk to each other for the first time.
  • Let the countdown begin: What does the GDPR mean for US companies?
    Let the countdown begin: What does the GDPR mean for US companies? Stephen Bailey, Head of Privacy at NCC Group, Terry Blake, SureCloud EVP – North America, and Nick Rafferty, SureCloud COO. May 25 2017 5:00 pm UTC 60 mins
    Exactly one year from the date of this webinar, the General Data Protection Regulation will take effect in the European Union. The GDPR applies to any organization that stores, processes or transfers the personal data of residents within the EU. It includes organizations located in and outside the EU. Non-compliance can result in fines of more than $20 million or 4% of worldwide revenues, whichever is greater. A recent survey found an alarming percentage of US-based companies are planning to reduce their presence in Europe or exit the European Union altogether rather than deal with the GDPR. Instead of tossing up their hands over the GDPR and going home, strategic US companies can follow the defined steps and adopt software solutions that can bring certainty to these uncertain times. In fact, they see another company’s exit from the EU as a potential opportunity to gain share. The good news is that you’re not too late in getting started to meet the GDPR deadline. But as the countdown begins, urgency escalates. The time to act is now.

    In this webinar, you will learn:
    What the GDPR means for you
    How to get started on your journey to compliance
    How the SureCloud GDPR Applications Suite can help you gain and demonstrate compliance and continuously improve your performance

    Agenda includes plenty of time to address your questions.
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife May 25 2017 5:00 pm UTC 60 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance
  • New Traps v4.0: Advancing Endpoint Security, Again!
    New Traps v4.0: Advancing Endpoint Security, Again! Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks May 25 2017 5:00 pm UTC 60 mins
    We’re excited to announce the availability of the new release of Traps™ advanced endpoint protection, version 4.0. This release is packed with new features and expanded multi-method prevention capabilities that deliver unsurpassed protection against known and unknown threats.

    Join us for a webinar to learn about these new capabilities and improvements in Traps v4.0, including:

    • Support for macOS™ and Android™
    • Protection from malicious macros
    • Prevention of script-based attacks
    • Exploit kit fingerprinting protection
    • Kernel privilege escalation protection

    Plus much more...
  • Unifying Data Protection both To and In the Cloud
    Unifying Data Protection both To and In the Cloud Dave Bull, Dir, Data Protection Srvs, McAfee, Raj Goel; Keith Young, Brandon Dunlap May 25 2017 5:00 pm UTC 75 mins
    Organizations continue to adopt cloud strategies and technologies at a dizzying pace. Many organizations now look at new IT projects with cloud optics. With the volume of data being transmitted to, from and existing in the cloud ever increasing, protecting that data can be challenging. How can this data, which is always on the move and in myriad locations, have a coordinated security strategy? Join McAfee and (ISC)2 on May 25, 2017 at 1:00PM Eastern for a discussion on how to unify data security across applications, clouds and various locations.
  • Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing
    Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing Brian Lawrence, NowSecure Solutions Engineer & Keith Mokris, NowSecure Product Marketing Leader May 25 2017 6:00 pm UTC 45 mins
    Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.

    Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:

    -- Address DevOps stakeholders' worries and concerns about integrating security testing
    -- Determine the right depth of analysis for continuous mobile app security testing
    -- Track mobile DevSecOps metrics over time to measure success
  • Hunting From Network to Endpoint (Hunter Spotlight)
    Hunting From Network to Endpoint (Hunter Spotlight) Ryan Nolette, Hunter and security technologist at Sqrrl May 25 2017 6:00 pm UTC 30 mins
    Ryan Nolette, Sqrrl's hunter and security technologist, will break down:
    • Determining what endpoints to investigate in a hunt
    • Pivoting from network to endpoint investigations
    • Essential tools and best practices for endpoint hunting

    About the hunter:
    Ryan is Sqrrl's primary security technologist and expert. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With over a decade in the infosec field, Ryan has been on the product and operations side of companies such as Carbon Black, Crossbeam Systems, SecureWorks and Fidelity. Ryan has been an active speaker and writer on threat hunting and endpoint security.
  • Lifecycle Container & Docker Security - The CISO's Perspective
    Lifecycle Container & Docker Security - The CISO's Perspective Dave Ginsburg, Ravi Rajamiyer, Izak Mutlu May 25 2017 6:00 pm UTC 60 mins
    Are containers & Docker secure? We look at best practices across their lifecycle, including image scanning within CI/CD process, container OS hardening, and orchestration security with Kubernetes. Guest speaker is Izak Mutlu, former CISO at Salesforce.