Hi [[ session.user.profile.firstName ]]

IT Security

  • Scaling Security at DevOps Speed Scaling Security at DevOps Speed Mike Goldgof, VP of Marketing at WhiteHat Security Live 60 mins
    Seamlessly integrating AppSec testing into CI processes earlier in the SDLC has become the holy grail of DevOps and security teams. Achieving this means apps are not only more secure and can be deployed more quickly, but companies are also able to reap substantial cost and resource savings.

    Join Mike Goldgof, WhiteHat Security’s VP of Marketing, to learn about best practices and what’s needed to fit security testing into highly-automated Agile DevOps processes, that are transforming the development world and speed of delivery dictated by businesses today.
  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Key Security Insights: Examining 2016 to predict what's coming in 2017 Ken Dang Live 60 mins
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • Security Myths Debunked: Running Your Business In the Cloud Security Myths Debunked: Running Your Business In the Cloud Adrian Sanabria, Senior Analyst, Information Security at 451 Research & Aaron Newman, CEO & Founder at CloudCheckr Live 60 mins
    Organizational efficiency and convenience were the initial appeal of the cloud: add servers when you need them, get rid of them when you don't. Offering businesses the ability to automatically scale with workload and application needs, the cloud offers endless potential to grow at scale. As cloud technology continues to evolve and diversify—from public to private, hybrid to multi-cloud—the use cases and potential benefits have also expanded. And, unlike traditional IT, cloud performance and capacity drivers also tend to improve infrastructure security. During this webinar, we'll explore:

    *Using cloud security as a competitive advantage for your business
    *How focus on performance, agility, and efficiency in cloud mutually benefits security
    *The changes in thinking and design necessary to unlock the cloud’s potential for improving security
    *Practical strategies for automation, monitoring, mitigation and incident response

    Join 451 Research and CloudCheckr for an exclusive webinar to discuss trends, challenges, and opportunities for organizations looking to leverage the true potential of the cloud.

    About CloudCheckr:
    CloudCheckr is a unified cost and security automation platform that gives you visibility, insight, and automation for your AWS environment. CloudCheckr delivers a suite of products for cloud operations, security and finance teams for Cost Management, Security and Compliance, Utilization and Inventory.
  • Detect Ransomware Before it’s Too Late with AlienVault USM Detect Ransomware Before it’s Too Late with AlienVault USM Jim Hansen Recorded: Feb 21 2017 61 mins
    By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.

    You'll learn:

    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • Quantum Safety and Your Corporate Network Quantum Safety and Your Corporate Network Michael Brown, CTO & Co-Founder of ISARA Corporation Recorded: Feb 21 2017 52 mins
    The rise of Artificial Intelligence (AI) is helping to fuel the fire to build Quantum Computers because they will be a great tool for areas such as Machine Learning (ML).

    Public Key Cryptography as we know it today ceases to be effective when the age of quantum computers begins. With practical examples and an emphasis on network technologies like VPNs, this presentation will explore:
    - The new quantum safe solutions that will replace and augment your existing security systems
    - Where and when you’ll need them
    - How to make the transition

    About the Presenter:
    Michael Brown is the Chief Technology Officer and co-founder of ISARA Corporation. At ISARA, Mike is focused on the technical vision and direction.

    Mike was most recently the Vice President of Security Product Management and Research at BlackBerry, where he co-founded the product security practice and was responsible for the vision and execution of security for all BlackBerry products. Mike has spoken at global security events including RSA, CTIA, GTEC, Bloomberg, APECTEL and InfoSec Europe.
  • Tech Demo - Imperva Application Protection Portfolio Tech Demo - Imperva Application Protection Portfolio Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer Recorded: Feb 21 2017 52 mins
    Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
  • Top Trends That Will Shape Your Cybersecurity Strategy in 2017 Top Trends That Will Shape Your Cybersecurity Strategy in 2017 Mark Weatherford (vArmour), Ann Barron-DiCamillo (AmEx), Paul Kurtz (TruSTAR), Leo Taddeo (Cryptzone), Usman Choudhary(VIPRE) Recorded: Feb 21 2017 75 mins
    Discover the latest trends in cyber attacks and how they are shaping the security strategy across industries and on a national level.

    Join this keynote panel session for an interactive discussion on the emerging technologies and tactics used by attackers, the role of artificial intelligence and machine learning in cyber attacks and cybersecurity, and the best practices for improving security for your organizations.

    Moderator:
    - Mark Weatherford, Chief Cybersecurity Strategist at vArmour

    Panelists:
    - Ann Barron-DiCamillo, VP Cyber Threat Intelligence & Incident Response at American Express
    - Paul Kurtz, CEO of TruSTAR
    - Leo Taddeo, CSO of Cryptzone
    - Usman Choudhary, SVP & CPO at ThreatTrack (VIPRE)
  • Partnerworks Office Hours: Enterprise Data Warehouse Optimization Partnerworks Office Hours: Enterprise Data Warehouse Optimization Sean Roberts, Hortonwokrs Mar 21 2017 3:00 pm UTC 90 mins
    Drive enterprise value via accelerated EDW optimization using the Hortonworks Connected Data platform. In this session we will provide an overview of:
    1) Key EDW challenges and opportunities for optimization
    2) Accelerate EDW optimization with Hortonworks connected data platform spanning:
    a. Data Modelling
    b. Data Ingestion
    c. Data Analytics
    d. Data Mart
  • [Video Interview] RSA 2017 - Ian Glover, President, CREST [Video Interview] RSA 2017 - Ian Glover, President, CREST Josh Downs, Community Manager, BrightTALK; Ian Glover, President, CREST & Rowland Johnson, MD, Nettitude Feb 24 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • How to Get the Best Out Of DevSecOps - From The Security Perspective How to Get the Best Out Of DevSecOps - From The Security Perspective Colin Domoney, Sr Product Innovations Manager at Veracode Recorded: Feb 21 2017 45 mins
    With application security rapidly moving towards a DevSecOps approach, it's important to understand from each team's perspective how to be the successful in the new agile process.

    Join this webinar to understand from the security perspective both the challenges and benefits of a DevSecOps approach, and how to integrate with the rest of the developer and operations teams.
  • Panel Discussion: Cyber Security Strategies and Trends in 2017 Panel Discussion: Cyber Security Strategies and Trends in 2017 Jeff Costlow, ExtraHop Networks; Francois Raynaud, DevSecCon; Rami Mizrahi, TopSpin Security & Josh Downs, BrightTALK Recorded: Feb 21 2017 48 mins
    These days it's not a matter of if you'll be breached, but when. Security teams in the modern enterprise must accept that as well as efforts to protect their perimeter, they must also focus on understanding their east-west traffic.

    This panel discussion will look at the trends and technologies influencing cyber security strategy in 2017, in particular those that deal with effectively monitoring your network to ensure your organisation handles vulnerabilities and stays breach free.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - Jeff Costlow, Director of Security, ExtraHop Networks

    - Rami Mizrahi, VP of R&D, TopSpin Security

    - Francois Raynaud, Founder, DevSecCon

    Tune into this panel conversation if you're a network or security professional looking to hear the latest trends and security best-practices to defend against a constantly evolving opponent.
  • Au-delà du GDPR –Une cyberdéfense intégrée Au-delà du GDPR –Une cyberdéfense intégrée Zoltán Précsényi, Director European Government Affairs – Symantec EMEA ; Hervé Doreau, Directeur Technique - Symantec France Recorded: Feb 17 2017 57 mins
    Comment éviter que le GDPR ne devienne qu’un simple surcoût pour votre entreprise?Profitez-en pour remettre à plat vos stratégies de sécurité des informations et de confidentialité des données.Pourquoi?Le GDPR se fonde sur le principe de la bonne gouvernance des données. En l’adoptant, ce concept vous aidera à respecter plus facilement la réglementation tout en réduisant d'autres risques pour l’entreprise.En matière de protection des données, le choix d’une stratégie de long terme solide apportera des avantages permanents, en particulier à l’heure où les cybermenaces et la protection des données figurent parmi les plus grands risques pour les organisations.En intégrant la protection et la sécurité des informations dans votre plan GDPR, vous pourrez exploiter l’infrastructure existante pour apporter des améliorations dans des domaines jugés prioritaires.Notre panel de spécialistes vous expose les principaux obstacles à franchir pour les entreprises et explique comment les surmonter grâce à l’intégration technologique.Ce webcast vous présentera les grandes lignes du règlement GDPR, identifiera l’une des approches possibles pour mettre au point votre plan, et évoquera les atouts des différentes technologies disponibles pour améliorer la protection des données.Nos experts examineront également les répercussions à plus long terme, notamment en ce qui concerne la culture de la sécurité et le processus de conception, pour que vous puissiez mettre en œuvre votre stratégie avec succès.
  • Combattez les cybermenaces grâce à la sécurité réseau adaptative SonicWall Combattez les cybermenaces grâce à la sécurité réseau adaptative SonicWall Florian Malecki Recorded: Feb 17 2017 62 mins
    Les ransomwares sont une forme de logiciels malveillants qui bloquent l’accès au réseau/aux données jusqu’à ce que la victime s’acquitte d’une rançon. Ils se sont propagés à une vitesse record en 2016. Les cybercriminels en usent activement pour prendre en otage des entreprises, des institutions et même des particuliers. Les experts en sécurité parlent à cet égard de nouvelle crise de la cybercriminalité.
    Participez à notre webcast en direct où un expert en sécurité vous dira :

    •comment les cybercriminels peuvent exploiter les vulnérabilités de votre réseau ;
    •quelles mesures prendre pour prévenir et stopper cette menace dangereuse et potentiellement coûteuse ;
    •quelles sont les entreprises les plus à risque ;
    •comment protéger vos données où qu’elles circulent.
  • Rapid7 AppSpider Product Demo - APAC Rapid7 AppSpider Product Demo - APAC Hollis Howell Recorded: Feb 17 2017 23 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.
  • Climbing the Corporate Ladder… in (Tasteful) High Heels Climbing the Corporate Ladder… in (Tasteful) High Heels Jo Stewart-Rattray (BRM Holdich) & Theresa Grafenstine (US House of Representatives) Recorded: Feb 16 2017 62 mins
    For many years, women have represented roughly half of all university graduates. Yet, there is a lingering imbalance of women that progress to senior leadership positions.

    Join two industry trailblazers, Jo Stewart-Rattray, the first woman to serve as CIO with responsibility for both operational and business IT in the Australian utilities space and Theresa Grafenstine, the first woman to serve as the Inspector General of the US House of Representatives, as they discuss how they cracked through the proverbial glass ceiling.

    Attendees will get practical advice on becoming a trusted advisor, building your personal brand, joining the “Old Boys Club,” and the art of gaining influence.

    Jo and Theresa will also reflect on their careers and share lessons learned on the bumps and bruises they encountered along the way with “What they wished they knew 20 years ago…”

    At the end of what will surely be a spirited discussion, attendees will have a chance to pose questions to these two role models who blazed a trail for women in the IT profession.
  • Rapid7 AppSpider Product Demo Rapid7 AppSpider Product Demo Hollis Howell Recorded: Feb 16 2017 23 mins
    While today's malicious attackers pursue a variety of goals, they share a preferred channel of attack - the millions of custom web, mobile, and cloud applications companies deploy to serve their customers.

    Join us for a live demo of Rapid7's AppSpider, to explore its capabilities of dynamically scanning applications for vulnerabilities across all modern technologies.