Hi [[ session.user.profile.firstName ]]

IT Security

  • Tech Refresh: Out with the Old
    Tech Refresh: Out with the Old Nextgov | Dell EMC & Intel Mar 29 2017 3:00 pm UTC 60 mins
    The Department of Defense uses 8-inch floppy disk drives to manage nuclear forces. The Treasury Department has 56-year-old computer code to update taxpayer accounts. And the Department of Homeland Security and Department of Veterans Affairs rely on COBOL for a number of their agency functions. To address these aging systems, in October 2016 the Office of Management and Budget proposed a series of guidelines to help agencies assess their IT modernization needs.

    But as federal workers determine how to refresh their technology during 2017, they’ll need to parse through the good and the bad that comes with old legacy systems and determine what comes next. Tune in on March 29 as we talk with agency experts about what’s necessary for an IT system to succeed and how to implement these changes.
  • Introducing the industry's first Secure Internet Gateway in the cloud.
    Introducing the industry's first Secure Internet Gateway in the cloud. Brian Roddy, Engineering Executive, Cloud Security and Bobby Guhasarkar, Director Product Marketing, Cisco Umbrella Mar 29 2017 3:00 pm UTC 60 mins
    The world is evolving… from how we work to where we work and how we access our sensitive data. Is your security keeping pace with the changes?

    Find out how you can block threats like never before with the industry’s first Secure Internet Gateway in the cloud.

    Join Cisco Security Experts: Brian Roddy, Engineering Executive, Cloud Security and Bobby Guhasarkar, Director Product Marketing, Cisco Umbrella, on Wednesday, March 22nd at 10am PT for a can’t miss review of what needs to be your first line of defense in 2017.

    Attendees will see why Cisco Umbrella provides visibility unlike any other security platform:

    -Protects users on and off network
    -Provides broadest coverage of malicious destinations and files
    -Defends against known and emergent threats over all ports and protocols

    Register and learn why you need a Secure Internet Gateway that’s easy to deploy and manage, uncovers attacks before they launch AND integrates with your existing security investments.

    Your security starts here.
  • How to automate security investigation and remediation for real time response
    How to automate security investigation and remediation for real time response Barak Klinghofer, Co-Founder and CPO, Hexadite and Steven Forsyth, RnD Manager, HPE Security ArcSight Mar 29 2017 4:00 pm UTC 60 mins
    The effectiveness of a security system depends on how quickly it detects and responds to threats. Is your security system able to tackle security challenges in near real time, while reducing false positives so analysts can focus on critical events and Indicators of Compromise (IOCs)?

    HPE Security ArcSight ingests large volumes of security events and correlates against IOCs in real time to identify potential threats. Hexadite Automated Incident Response Solution (AIRS) takes these security alerts in real time and performs investigation and remediation at scale.

    Learn how the combination of these two systems gives you the ability to:
    • Gain visibility across the entire IT footprint
    • Detect security threats in real-time
    • Automate incident investigation
    • Perform automated or semi-automated remediation actions
  • How to Approach Portfolio Risk Aggregation
    How to Approach Portfolio Risk Aggregation Samit Shah Mar 29 2017 5:00 pm UTC 45 mins
    Join us on Wednesday, March 29th has Samit Shah, BitSight's Insurance Solutions Manager discusses how cyber insurers should approach portfolio risk aggregation and how other businesses can use this mindset to decrease risk across their portfolio of vendors.
  • Protecting Yourself from Top Threats in 2017
    Protecting Yourself from Top Threats in 2017 Charles Johnson, Alert Logic Sales Engineering Manager Mar 29 2017 5:00 pm UTC 45 mins
    In 2016 attackers raised the stakes and became more organized in the effort to monetize pirated systems and proliferate data.  We’ll cover the trends and some of the new interesting exploits while providing strategies on how to best defend against what may come in 2017.  Whether you’re an individual hoping for more privacy or a business owner looking to stay out of the headlines, you’ll be better equipped to guard your data and information systems after this presentation. 
  • The Rise of IoT Botnets and How to Defend Against Them
    The Rise of IoT Botnets and How to Defend Against Them Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS Mar 29 2017 5:00 pm UTC 60 mins
    Nobody thought it was possible to spawn a 1Tbps+ DDoS attack by hijacking connected devices. Connected Internet of Things (IoT) devices are smart, convenient and notoriously lacking in security. IoT devices can be easily exploited due to their inherent security gaps. Soon these IoT-based attacks will become everyday occurrences for service providers and enterprises the like.

    Join Stephen Gates, Chief Research Intelligence Analyst at NSFOCUS, and learn about IoT-based botnets, how to detect them and how to better protect your connected devices.

    Viewers will learn about:
    - An exclusive overview of the Mirai malware and how it’s being used against your organization
    - The latest tactics, techniques, and procedures hackers are using in the escalation of IoT-based botnets
    - How to detect and defeat these attacks via cloud and on-premises defenses
  • ISACA Certifications Information and Update
    ISACA Certifications Information and Update Kim Cohen Mar 29 2017 5:00 pm UTC 60 mins
    Becoming ISACA certified is one of the best ways to prove you have the knowledge and expertise to secure the modern enterprise against escalating IT-related threats and get ahead in your career. Attend this webinar and learn about the CISA, CISM, CGEIT, CRISC certifications, as-well as ISACA’s CSX performance-based cyber security products.
  • Identity & Access Management in Healthcare: Strengthening IT Security
    Identity & Access Management in Healthcare: Strengthening IT Security Craig Eidelman & Alfred Ojukwu, US Health and Life Sciences, Microsoft Corporation Mar 29 2017 6:00 pm UTC 60 mins
    Help strengthen security through effective identity management, monitoring, and protection

    Microsoft solutions can help strengthen security through effective identity management, monitoring and protection. We’ll provide an overview of the capabilities of Azure Active Directory, and Microsoft’s Identity and Access Management cloud solution (IDaaS). With capabilities including Identity Protection, SSO to thousands of SaaS apps, conditional access policies, self-service password reset, discovery and many more, Azure Active Directory is the most comprehensive IDaaS solution.

    Join this webcast to learn how to:
    • Enable single sign-on to any cloud and on-premises web app, even with iOS, Mac OS X, Android, and Windows Devices
    • Easily extend Active directory to the cloud and continue protecting sensitive user information, data and apps
    • Protect on-premises web apps with secure remote access, simultaneously reducing cost and enhancing security with self-service

    This webcast is part of our Modern Workplace in Healthcare webcast series. Sign up for this session, or the entire series today!
  • The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale?
    The Hybrid IT Balancing Act: Is Your Cloud Provider Tipping the Scale? Bob Hicks, SVP and General Manager, TierPoint Mar 29 2017 6:30 pm UTC 45 mins
    Are you employing a balanced approach to Hybrid IT in the changing multi-cloud landscape? In this webinar, Bob Hicks, Senior Vice President, Operations discusses four cornerstones to consider to reduce risk. Through his 30-year career in IT and data center operations management, Bob has accumulated a deep understanding of the forces affecting hybrid infrastructures and has helped demystify the complexities surrounding Hybrid IT and cloud environments for organizations of all sizes.
  • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic
    Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks Mar 30 2017 2:00 am UTC 60 mins
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
  • Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic
    Prevention Week Pt 3: Use Automation to Prevent Evasive Threats and C2 Traffic Scott Simkin, Sr. Manager Threat Intelligence at Palo Alto Networks Mar 30 2017 8:00 am UTC 60 mins
    Turn Raw Threat Intelligence Into Context and Action

    Attackers don’t stand still; your defenses shouldn’t either. See how multi-method threat prevention can be used to detect and prevent the most evasive threats and command-and-control traffic, and open up any source of threat intelligence to be used for automated prevention. These capabilities drive up the cost of successful data breaches for attackers, making their efforts too expensive to consider.

    You will learn more about:

    •How an evasion-resistant analysis environment defeats whole classes of VM evasion techniques.
    •Threat prevention capabilities that automate the blocking of command-and-control traffic in a way that previously required teams of signature writers.
    •How to enable security teams to gain leverage from any source of threat intelligence and drive automated prevention.
  • Sécuriser ses applications web dans un environnement Cloud complexe
    Sécuriser ses applications web dans un environnement Cloud complexe Leif Kremkow, Directeur Technique, SEMEA Mar 30 2017 8:00 am UTC 60 mins
    Avec des entreprises qui déploient et gèrent de plus en plus leurs applications web dans le Cloud, sécuriser ses applications web est devenu complexe.

    Les nouvelles technologies comme JavaScript frameworks et SPAs complexifient les opérations de scan des applications web ; et parallèlement collecter, traiter, classer est devenu une opération laborieuse, chronophage et sans fin.

    L’objectif de ce webcast est de vous montrer en 3 points comment Qualys peut vous aider à
    * Scanner, découvrir et indexer des applications quelque soit l’environnement cloud, et ce aussi bien pour les vulnérabilités que les sites web mal configurés.
    * S’adapter en permanence à la complexité des technologies des applications web.
    * Construire un programme de scan, ergonomique, précis et évolutif via une infrastructure réseau et des applications web.

    Inscrivez-vous au webcast et découvrez comment Qualys peut vous aider à sécuriser vos applications web.

    Session question/réponse.
  • Block The Risk Of Ransomware
    Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec, and Q&A with Gavin Fulton and Robert Arandjelovic Mar 30 2017 10:00 am UTC 30 mins
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that isn’t enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.
    Register Now!
  • Ransomware Wins! User Awareness Doesn't Work! What Do you Do?
    Ransomware Wins! User Awareness Doesn't Work! What Do you Do? Amar Singh & Industry Experts Mar 30 2017 1:00 pm UTC 60 mins
    Nope this is NOT another webinar on How to Protect Against Ransomware blah blah blah.

    If you reckon that users (yes that includes you and me) are the first line of defence against ransomware! Sorry to break it to you but you are WRONG! We are all humans and we make mistakes and ransomware creators know that.

    You have a choice.Hope and or pray that your awareness training protects your employees and your business from becoming a ransomware victim OR attend this webinar and learn what you can do to protect your business.

    Note: This is not your typical webinar. Cyber Management Alliance’s unique and interactive approach to webinar’s allows everyone to have a say and share their knowledge. The host, Amar Singh firmly believes that every member of the audience has valuable input and that each attendee brings their own context and perspective. So, join in, share and learn.
  • The Blueprint for Managing Small Business Cybersecurity Risk
    The Blueprint for Managing Small Business Cybersecurity Risk Emory Simmons, President of CMIT Solutions of South Charlotte Mar 30 2017 3:00 pm UTC 60 mins
    Over the last few months, cyberattacks have dominated the news, creating uncertainty about how best to protect the value small business owners have worked to create. In this webinar, Emory Simmons, President of CMIT Solutions of South Charlotte, outlines today’s online threats and lays out a plan small businesses can use to manage risk.

    Invest an hour to attend, The Blueprint for Managing Small Business Cybersecurity Risk, on March 30th at 11:00 am EDT as we cover the following topics:

    - Current cyberthreats facing small businesses
    - Case study of a recent attack that took a business down for 1 week
    - The blueprint your business can follow to manage cybersecurity risk
    - Actionable steps you can start taking immediately
    - Resources to help you perform a risk assessment
  • Stroke of genius; The only known way to fully protect against keystroke loggers
    Stroke of genius; The only known way to fully protect against keystroke loggers Peter Ridgley, President, Verterim inc. CJ Brunet, President, Advanced Cyber Security Mar 30 2017 3:00 pm UTC 60 mins
    Reduce the costs and risks associated with incident response through stronger prevention. According to the 2016 Verizon Data Breach Report, the majority of confirmed data breaches involved stolen passwords. Learn what your peers are doing to reduce the impact of stolen credential breaches and other sensitive data right at their fingertips.  Join Peter Ridgley President of Verterim and CJ Brunet, President of Advanced Cyber Security on March 30th at 11 a.m. est. for an overview on overcoming the business challenges and preventions for advanced cyberattacks. Learn how encryption at the keystroke level can help prevent these attacks and address PCI, Healthcare, Financial Services and other regulatory requirements at the same time.
  • FireEye in 2017
    FireEye in 2017 Grady Summers, EVP & CTO Mar 30 2017 3:00 pm UTC 45 mins
    Over the years the security market has evolved, as has the threat landscape. The threats have changed from being a nuisance, to ones that are specifically targeted to carry out activity such as theft of intellectual property, exposure of sensitive customer data, or holding the victim to ransom. Organisations need to keep evolving their security program to keep up.

    There are several challenges that FireEye has observed that reduce the ability to self-discover and operationalise response to breaches: lack of visibility, lack of intelligence, too many tools, too many alerts or not enough expertise.

    Join us in a live webinar and listen to Grady Summers, FireEye’s CTO, as he describes how FireEye in EMEA can support organisations in overcoming all these challenges, learn about the new platforms FireEye has to offer and the intelligence required to build a next generation security program.
  • Symantec Monthly Threat Webinar - March update
    Symantec Monthly Threat Webinar - March update Jeff Barto, Trust Evangelist at Symantec Mar 30 2017 3:30 pm UTC 60 mins
    Hear the latest on the current website security threats for March 2017 from Symantec.
  • Machine Learning and Time Sensitive Networking in the Smart Factory
    Machine Learning and Time Sensitive Networking in the Smart Factory Paul Didier, Internet of Things Solutions Architect at Cisco; Dan Isaacs, Director Connected Systems at Xilinx Mar 30 2017 4:00 pm UTC 60 mins
    Machine Learning and Time Sensitive Networking in the Smart Factory: How the IIoT makes critical data available when & where it is needed.

    In today’s digital age, the rapid emergence of IoT is changing operations throughout the manufacturing domain. Machines and systems have become more intelligent and more connected, and the proliferation of sensors generates a non-stop flow of data. This wealth of actionable information provides the key to unlocking higher efficiency and increased reliability of machines and systems. The opportunity lies in harvesting the data.

    Join IIoT experts from the Industrial Internet Consortium to discover exciting developments in the field of machine learning -- products and systems taking action on their own -- and how this self-optimization will play a pivotal role in enhancing the intelligence of the factory. We will also showcase the Time Sensitive Networking (TSN) testbed and the technology used to support real-time control and synchronization of high performance machines over a single, standard Ethernet network.

    What you will learn:
    -How IIoT connectivity has enabled data from the operational domain (OT), to become more accessible to the information technology (IT) domain.

    -How Machine Learning will lead to real-time, self-optimization of Industrial Systems and help reduce downtime via predictive and preventative maintenance.

    -How TSN capabilities are extending standard Ethernet (IEEE 802.1 & 802.3) to enable more devices, applications, and deterministic potential to manufacturing networks.
  • Why an MTA Gateway Can't Protect Office 365: Email Security in the Age of SaaS
    Why an MTA Gateway Can't Protect Office 365: Email Security in the Age of SaaS Gil Friedrich, CEO Avanan, The Cloud Security Platform Mar 30 2017 5:00 pm UTC 45 mins
    Email security used to mean a gateway. With Office365 and Gmail, this is clumsy. What's the alternative? Just moving a gateway appliance to the cloud does not make it cloud-native.

    • What is the difference between 'cloud-based' and 'cloud-native' security?
    • What are the drawbacks of MTA-gateway security for email?
    • How do you protect the full Office 365 and GSuite applications beyond email? File sharing, apps and collaboration need protection too!

    This webinar discusses the next generation of API-based 'cloud-native' security tools that offer complete SaaS security.

    • Protects all SaaS—from Office 365 and Google to Slack and Amazon,
    • Protects all the entire SaaS—from email and file sharing to chat and collaboration apps,
    • Protects from all types of threats—malware, phishing, data leakage, encryption and lost credentials.