ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
ESET North America & Michael Aguilar, Business Product Technical Lead
Winter is coming. Our three-eyed raven answers your top 5 IT security questions based on our most recent survey including email security, ransomware, protecting IoT and more. Additionally, here's your chance to ask our in-house cybersecurity expert, Michael Aguilar, your most challenging questions to help you defend the wall. It’s an open forum just for you!
With a personal record of 34 questions in 30 minutes, Michael will torch your questions like Drogon. Sign up today and get those questions ready.
Michael Aguilar, Business Product Technical Lead, ESET North America
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
ESET senior security researcher Stephen Cobb and Larry Ponemon of the Ponemon Institute discuss a new study on healthcare security addressing causes, costs and potential cures for soaring cybercrime rates.
Are you considering a Next-Gen AV solution? Before you make a decision, attend this webcast with an ESET engineer who will examine vendors’ claims and supporting technologies.
Key takeaways include:
1.Next Gen AV technologies – making sense of their claims
2.A deep dive into ESET technology
3.The difference between reactive vs. proactive technologies
4.How ESET leverages the Cloud
5.Best practices in evaluating AV technologies
How is the landscape changing for cybersecurity and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cybersecurity for the upcoming year and discusses the tools and resources available to protect against them.
End users are increasingly shifting their IT services to managed service providers and the scope of both technology and services offered by MSPs is constantly evolving. Join ESET and LabTech Software, the industry-leading IT automation software, as we explore these changes and what it means for businesses.
The EMV Compliance Mandate is set to take effect in the United States in October 2015. These new credit card processing procedures mean big changes for retailers and businesses. Is your company ready? Find out what you need to know.
Is antivirus dead? Absolutely not. Join Distinguished Researcher, Aryeh Goretsky, as we explore how antivirus is evolving to adapt to modern threats and why it is still a critical layer to a complete security solution. This webcast will look at trends reported at the annual Virus Bulletin conference in Prague.
Security Researcher, Cameron Camp, discusses seven ways in which malware threatens your virtual systems and the increasingly mission critical data and services that those systems handle. Given a thriving black market in stolen information, and the wide availability of the tools with which to acquire it, no virtual attack vector is likely to be neglected by the bad guys, from compromised executables in virtual server images to virtual networking connections between mobile end points. Drawing on the latest malware research, Camp looks at how malicious code is adapting, and may be adapted, to penetrate virtual systems.
Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.
•How Hacking Team’s mistakes mirrored those made by Sony
•How employees’ weak passwords helped facilitate the breach
•How transparency would have helped Hacking Team’s credibility
•Why every company must review what might be exposed in a breach
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>
Hear how wellness corporation Curves Jenny Craig extended an enterprise-wide service delivery strategy beyond the four walls of IT - reducing costs by over $1M annually and improving customer satisfaction. Following up on her successes in leveraging the Cherwell Service Management dashboard capabilities to improve service experience and demonstrating service center value to senior management, Jamie Houlihan will share her recent achievements and insights gained by expanding Cherwell Service Management beyond the IT department to facilities, supply chain, self-service, and human resources.You will learn how Cherwell Service Management enabled Curves Jenny Craig to streamline and organize departmental operations and ultimately increasing the overall efficiency of their organization's many business processes.
Immer größer wird die Anzahl der Unternehmen die ihre IT-Services teilweise oder ganz an Clouddienstleister abgeben. Dies führt zu einem erhöhten Aufwand und einigen Komplikationen wenn es zu Sicherheitsvorfällen kommt.
In diesem Webinar präsentiert Mathias Fuchs Strategien wie Unternehmen trotzdem effizient Sicherheitsvorfälle untersuchen und eindämmen können. Anhand einer Fallstudie wir gezeigt wie sich cloudbasierte Untersuchungen von herkömmlichen unterscheiden.
Recently the president of the American Medical Association referred to healthcare IT as the “snake oil” of the 21st century. He referenced ineffective electronic health records, an explosion of direct-to-consumer digital health products, and apps of mixed quality.
In this webinar, leading healthcare expert, Marion Jenkins, will cover the major causes of this sorry state of affairs, and discuss how healthcare technologies can actually help medical practices deliver better patient care.
Major areas to be covered:
1.Who is to blame? There is plenty to go around. Physicians? Healthcare IT vendors? The government? The solution must get past blame and address solutions.
2.How can clinical users and executives “break through” the logjam of sub-optimal IT systems, poor implementation, and ineffective workflows?
3.Is it possible to utilize new technologies to improve patient care, without breaking the bank and further hurting the clinician/patient experience?
4.What are the necessary changes that enable technology to actually provide benefit in a healthcare setting?
Load balancers occupy an important position (in the path of application traffic) on the enterprise network. Yet, traditional application delivery controllers (ADCs) are unable to provide meaningful application insights to drive business decisions. Avi Networks’ software-defined architecture for load balancing separates the control plane (management layer) from the data plane (load balancers) to generate continuous insights about applications.
In this 30 minute presentation from Avi Networks, learn how you can get rich analytics and actionable insights into end user experience, application performance, resource utilization, security, and anomalous behavior. See how you can benefit from:
• A “Network DVR” to record and replay traffic events to pinpoint app issues
• At-a-glance view of all virtual services throughout the system
• Real-time visibility into DDoS attacks, SSL versions and ciphers used in transactions
• Health scores that give you immediate feedback on application performance
For many businesses, the ability to be agile, offer great customer experiences and create innovations hits a roadblock with EDI. The famously complex messaging standard can hinder effective B2B communication.
But one integrated transportation and logistics company, Redwood Logistics, based in Chicago, partnered with MuleSoft to not only innovate on top of EDI, but harness digital transformation to create an entirely new platform service offering
In this webinar attendees will learn about:
– The business and technical landscape that led Redwood Logistics to pivot to a new service offering and create a better business intelligence platform
– How they overcame the challenges presented by B2B/EDI
– Best practices to apply API-led connectivity to B2B communication
– The positive business outcomes from Redwood’s digital transformation initiatives
IT organizations are being asked to cut costs while increasing productivity and identifying new ways to generate revenue. The first step in delivering value to an organization is empowering IT with the gift of sight. Sure, you can measure just about anything, but should you? More metrics does not equal better metrics. Not tracking trends over time, not setting goals, and not sharing metrics reports are common mistakes. The right metrics, tracked consistently, allow you identify areas for improvement and act on them. Join us as we discuss how an effective IT service management solution, coupled with the right metrics on your radar, can bring a new level of efficiency to IT.
Metrics we’ll focus on: Cost Per Ticket, Customer Satisfaction, Agent Utilization, First Touch Resolution, and Mean Time to Resolve.
To be a high performing business, you require effective metrics and measurements that will help you gain valuable performance insights which will help drive informed and strategic decisions for your organization. Join Andy Jordan, ProjectManagement.com as he discusses what people are doing wrong when it comes to Agile metrics and provide guidance on how to get it right – the first time. Andy will also discuss the risks of using common metrics between Agile and waterfall approaches as well as why organizations need to focus on value-based metrics rather than arbitrary metrics of progress.
This session is approved for 1 Project Management Institute (PMI) PMP PDU Credit.
Insurance companies today are soon to witness their own version of Uberization. In this webcast you will learn...
•The kind of experiences that can stir instant customer love and loyalty
•With customer data everywhere, how can you wisely give your customers the power of decision making?
•Best CX practices to prevent customer break ups
To get an overview on how you can uber-revolutionize your CX, join Finny, Head, Aspire Systems Digital on this webcast.
Chat is an excellent channel to improve service desk productivity, but when dealing with complex issues, it’s sometimes not enough. If your chat solution is implemented in a standalone silo, then customers may have to transfer to phone support when their issues go beyond the point of text, resulting in a disjointed customer experience. But if the chat transitions directly into a screen-sharing session, the support agent can instantly see and resolve the issue while maintaining a seamless conversation. This session will outline how to increase the value and power of chat through integrating it with other solutions such as remote support, knowledge bases, CRM and more. Turn your service desk into a one-stop-shop with a modern, integrated approach to support.
In our first Helion Cloud Suite web event, we introduced you to the new software suite from HPE that brings together a full range of hybrid cloud capabilities, enabling you to deliver and manage the full spectrum of applications and technologies -- from traditional, virtualized, cloud native and containers -- across a broad range of infrastructure environments.
Join this web event for a deeper dive, and be the first to see this new suite in action:
Manage hybrid and multi-cloud environments
Develop, deploy, and scale cloud-native applications
Drive business performance with focused analytics
More than just a hybrid cloud management platform, the HPE Helion Cloud Suite can help you manage any cloud, any environment, and any technology for any application. Go beyond cloud management, and learn what it means to become a cloud master.
View Part 1 of this 2 part series at: http://www.vivit-worldwide.org/members/group_content_view.asp?group=103644&id=600517