Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Joel Sierra, Security Sales Engineer, Proofpoint Recorded: Aug 21 2019 38 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Digital Transformation Discussion with Forcepoint Connectivity and Security
    Digital Transformation Discussion with Forcepoint Connectivity and Security
    Jim Fulton, Forcepoint Solution Director & David LePage, Forcepoint Solution Engineering Manager Recorded: Aug 21 2019 64 mins
    Digital transformation is driving change across the world, creating new opportunities to boost business productivity, while cutting the costs of infrastructure and operations. Increasingly distributed organizations are re-architecting their networks and security to move their most valuable data and applications to the cloud, in order to give their users much richer, faster, less expensive access than ever before. Enabling remote sites and off-network users to securely connect direct-to-cloud is the new challenge facing enterprises and government agencies. 

    How can distributed organizations achieve the reliable, secure connectivity to the cloud they need? Many are now using internet technologies for connect all of their users to cloud-based applications more productively and cost-effectively than ever before.

    Included in this session:

    • How to accelerate the adoption of productivity-enhancing SaaS/cloud apps
    • How to overcome MPLS limitations including costs and issues with speed
    • How to quickly add security to direct-to-cloud SD-WAN deployment to keep intruders out and protect use of web content and cloud apps
    • How to streamline operations by integrating connectivity and security across thousands of sites in the cloud and on-premises from one console
    • Demonstrations of Forcepoint SD-WAN Connectivity, Securing Internet Access and Use, Operating at Scale to Drive Better Business Outcomes
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Recorded: Aug 21 2019 81 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Creating the Future of Work - Empowering a cloud-enabled workforce
    Creating the Future of Work - Empowering a cloud-enabled workforce
    Tony Muraki-Hart, Enterprise Architect, CANCOM & Toby Brown, Lead EMEA Domain Specialist, Citrix Recorded: Aug 21 2019 42 mins
    In collaboration with Microsoft & Citrix, CANCOM have developed this Webinar to help you pursue your cloud with confidence.

    Business is transforming, and IT is leading the charge into the digital age. Cloud computing is a critical enabler of this digital transformation. Now, the hub of worker productivity — the desktop — is transitioning to the cloud, thanks to innovations from Citrix and Microsoft.

    What's driving cloud investments today?
    Improving the speed of IT service delivery
    Greater flexibility to react to changing market conditions
    Enabling business continuity
    Improving customer support or services

    Watch this webinar to find out how you can:
    Deliver easy, secure access across devices
    Connect people and places, securely
    Reduce time to market for new products

    Start your transformation today. https://info.cancom.co.uk/move_to_cloud_with_citrix_microsoft
  • Why financial and professional services firms must get flexible working right
    Why financial and professional services firms must get flexible working right
    Kirsty Leighton Recorded: Aug 21 2019 51 mins
    Financial service companies will need to lead the charge in flexible and remote working if they are to attract the best possible talent. Something that has never been more important against a backdrop of Brexit and a growing millennial and Gen Z workforce.

    Today, only one in six (15%) employees work in businesses that don’t offer flexible working. What used to be a perk is now a mandatory offering.
    Alongside the importance of employee satisfaction, the UK is also facing a productivity challenge, on average the UK is 31% less productive than France.

    Join Mark Elwood, Director at TeleWare, Dr Lucy Green, CEO & Business Development Expert at Larato and David Mellard, Director and Founder at Bedrock HR, as they discuss:
    •The flexible working challenges financial services companies face – including security and data protection
    •Can financial services companies safely implement a bring your own device (BYOD) policy?
    •How to use tech to increase productivity
    •Scalable IT solutions for growing companies
  • 제로트러스트 세상에서 보안 태세 정의하기
    제로트러스트 세상에서 보안 태세 정의하기
    김 현 도, Senior Solution Engineer, Akamai Technologies; 한 준 형, Technical Account Manager, Akamai Technologies Recorded: Aug 21 2019 57 mins
    일반적으로 제로트러스트 접근방식에는 접근시도과 신원 확인, 그리고 기기확인이라는 3가지 핵심 축으로 살펴볼 수 있습니다.

    이전 웨비나에서는 아이덴티티 기반 접근 방식을 클라우드 프록시와 함께 사용하여 내부 어플리케이션에 보다 안전하게 액세스 하는 방법을 살펴보았습니다.

    이번 웨비나는 두가지 파트로 나뉘어 집니다. 첫번째 부분에서는 앞서 언급한 3가지 제로트러스트 접근 핵심축에 대해 좀 더 자세히 알아보고 사용자와 접근 장비에 대한 의미에 대해 더 살펴보는 과정을 통해 제로 트러스트 아키텍처를 구현하는 방안에 대해 알아보겠습니다.

    두번째 부분에서는 Web에서 API로 전환되는 보안의 트렌드에 대해 살펴보겠습니다.
    여기서 우리는 모바일 어플리케이션의 폭발적인 증가와 함께 웹에서 API로 공격이 이동하는 API의 공격 트랜드와 Credential Fraud의 라이프 사이클을 살펴볼예정입니다.

    발표자: 김 현 도, Senior Solution Engineer, Akamai Technologies
    발표자: 한 준 형, Technical Account Manager, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Aug 20 2019 31 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • ¡No es Magia, Es DevSecOps!
    ¡No es Magia, Es DevSecOps!
    Ronen Riesenfeld, Sales Engineer Checkmarx Recorded: Aug 20 2019 61 mins
    La seguridad perimetral, el análisis dinámico y otras soluciones de seguridad no estática dan una incorrecta percepción de que las aplicaciones están seguras, percepción que reduce el sentido de urgencia por la implementación holística de la seguridad. Las soluciones de seguridad estática, fortalecen los cimientos de las aplicaciones sin entorpecer los procesos e integrándose de manera orgánica como por arte de magia, facilitando así el desarrollo seguro a alta velocidad

    ¿QUÉ APRENDERÁS EN ESTE WEBINAR?

    Aprenderá que nos motiva a la prevención y su relación con la seguridad en aplicaciones; se explicará que es la seguridad en las Aplicaciones, su importancia y mejores prácticas de la industria.
    Se explicarán las distintas soluciones de seguridad en aplicaciones dentro del ciclo de desarrollo y las tendencias actuales en seguridad en desarrollo de aplicaciones.
    Descubrirá las distintas maneras de integrar la seguridad en aplicaciones dentro del ciclo de desarrollo y las maneras más eficientes de remediar vulnerabilidades.
    Conocerá sobre la administración del Software Expuesto y su integración dentro de DevSecOps
  • HTTPS: SSL Certificates and Phishing (EMEA)
    HTTPS: SSL Certificates and Phishing (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Aug 20 2019 32 mins
    ** This is an EMEA focused webinar **

    When we see HTTPS at the beginning of a URL, or the accompanying lock icon in our browser’s address bar, we tend to think it means we’re safe from harm. But HTTPS isn’t really about security. It’s about privacy. That lock icon simply means any information we transmit on that site is encrypted. It makes no guarantees the destination itself is safe.

    Cybercriminals know users are trained to look for the lock icon in the address bar, and have been working hard to take advantage of that trust.

    Join our 30-minute webinar to learn more about the tradeoffs between privacy and security, and discover why HTTPS may not really be as secure as we think.
  • Cloud Security: Learn How to Protect Your Cloud Users with a CASB Innovator
    Cloud Security: Learn How to Protect Your Cloud Users with a CASB Innovator
    Ryan Kalember, SVP of Cybersecurity Strategy - Proofpoint. Garrett Bekker, Principal Analyst Info Security - 451 Research. Recorded: Aug 20 2019 59 mins
    In case you missed it, we wanted to share a recent webinar about how to use a Cloud Access Security Broker (CASB) to protect your organization from next generation cloud attacks.

    Join Garrett Bekker, Principal Security Analyst at 451 Research, and Ryan Kalember, EVP of Cybersecurity at Proofpoint, for a discussion about:

    • The different CASB use cases, features and architectures
    • What the most prevalent cloud attacks are, and how they target your VAPs, or Very Attacked People
    • What to look for in a CASB solution to mitigate your cloud risks
  • Facilitating Secure DevOps
    Facilitating Secure DevOps
    Herb Mehlhorn Recorded: Aug 19 2019 23 mins
    The unyielding demand facing all IT professionals today is to accelerate the ability to meet the needs of the business. Achieving that goal requires deploying applications for your internal and external constituents at a faster rate while meeting stricter and stricter compliance and security requirements. This webinar provides insight into how Layer7 SiteMinder can support that goal today and how it will evolve to simplify that support in the future.
  • Deliver a Better Digital Workspace Experience featuring Forrester
    Deliver a Better Digital Workspace Experience featuring Forrester
    Calvin Hsu, VP of Product Marketing at Citrix, Andrew Hewitt, Analyst Serving Infrastructure & Ops Professionals at Forrester Recorded: Aug 15 2019 65 mins
    As your enterprise looks for better ways to drive employee productivity through a better technology experience, the infusion of intelligence, automation, and personalization into the digital workspace offers exciting potential. In this webinar, digital workspace thought leaders Andrew Hewitt (Forrester Analyst/Guest speaker) and Calvin Hsu (Citrix VP of Product Marketing) will explore the impact of digital workspaces powered by intelligence and automation.

    Attendees of the webinar will learn:
    -The top challenges organizations face in creating a technology experience that enables productivity
    -The evolution of digital workspace technology, and particularly the impact of intelligence and automation within the workspace
    -A day-in-the-life scenario of a digital workspace end user that shows specific processes and advantages
  • From Skeptics to Champions: Selling the Value of Security Awareness Training
    From Skeptics to Champions: Selling the Value of Security Awareness Training
    Dale Zabriskie, Security Awareness Training Evangelist & Joe Krock, Cyber Training and Awareness Leader Recorded: Aug 15 2019 106 mins
    The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.

    Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.

    Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:

    - Best practices for selling the value of security awareness training internally
    - Preparing a business case for your training program
    - Engaging employees through creative programming, recognition, and incentives
  • Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Ed Maguire, Principal Partner, Momenta Partners & Bill Ruh, CEO of Digital Business at LendLease Group Recorded: Aug 15 2019 58 mins
    Bill Ruh is CEO of Digital Business at Lendlease Group, a global developer and construction company for high rise and other real estate developments. Previously, he was the Chief Digital Officer for all of GE and CEO of GE Digital. Our conversation explored the nature of digital transformation, the considerations for creating goals and aligning the organization for success. One of the key insights is that transformation for industrial firms draws from best practices of technology companies, and the core principle is that technology companies’ missions are tied to asset optimization and better outcomes. He also shared how large companies need to think of transformation in two speeds – shorter term and longer term, where Speed 1 is the quarter to quarter focus and Speed 2 is the long term “moon shots”. He compares and contrasts the innovation mindset and approaches between startups and established companies, and shares best practices for larger companies to bridge the cultural gaps between their legacy and digital businesses. He also shares his views of the future of the construction and real estate industries enabled by the transformative impact of new technologies, which he is spearheading in his new role at Lendlease.
  • Why your Contact Center needs a Conversational AI Platform
    Why your Contact Center needs a Conversational AI Platform
    Pranav Deshpande, Product Marketing - AI/ML @ Twilio and Ricky Holtz, Sales Engineer Recorded: Aug 15 2019 53 mins
    Conversations powered by AI allow your contact center teams to deliver more of a personal and faster customer experience while improving operational efficiency. So why do 60% of customers try to skip IVRs to get to a human agent as soon as they can?
  • DevOps Transformation: The value of automation in deployment pipelines
    DevOps Transformation: The value of automation in deployment pipelines
    Julian Fish, Director of Product Management, Micro Focus Recorded: Aug 14 2019 55 mins
    Enterprises undertaking a DevOps transformation must look to implement tool-chains and pipelines to streamline application delivery. However, tool-chain integration and pipeline management provide little value if delivered in isolation.

    Join Julian Fish, Director of Product Management, in this live webinar to see how an orchestrated and automated pipeline can drive multiple tool-chains and be implemented in minutes. Please join us to learn:

    • How to quickly create a deployment pipeline that spans build, deployment, and test
    • Best practices for component reuse, artifact management, and process definition to simplify repeatability
    • How application, database, and test automation can be orchestrated from a single, easy to use dashboard
  • APIs & Microservices for a Modern and Integrated Enterprise
    APIs & Microservices for a Modern and Integrated Enterprise
    Renu Motwani Recorded: Aug 14 2019 23 mins
    Digital Transformation starts with the need for modernization of legacy systems and/or integration of the existing systems with the modern cloud. APIs form the first logical step in undertaking that journey. The underlying implementation: business logic, integration with the vast variety of data sources - both new and legacy, follows as the next important undertaking – and that defined the role of Microservices. In this session we'll dive deeper into how APIs and Microservices can help define a modern, digital enterprise.
  • 数据泄露事件及对中国企业的启示
    数据泄露事件及对中国企业的启示
    李岳霖, 技术顾问, Akamai Technologies; 郑伟, 大中华区产品市场部经理, Akamai Technologies Recorded: Aug 14 2019 63 mins
    2018年5月25日,《欧盟数据保护通用条例》(General Data Protection Regulation,简称“GDPR”)正式生效。但条例生效后的1年多,欧洲各国监管机构尚未对违规企业作出巨额罚款。终于,在2019年7月8日与9日,英国信息监管局(Information Commissioner’s Office,简称“ICO”)先后对英国某航空公司和某知名连锁酒店开出1.83亿英镑和9920万英镑的巨额罚单,拉开GDPR强硬执法的序幕。

    • 航空公司和酒店的数据泄露事件,公司网站被劫持,谁该负责?
    • 对中国企业,特别是有出海业务的国内企业有什么启示?

    参加Akamai Technologies和 (ISC)² 在8月14日下午2:00至3:00的在线研讨会,此次演讲将为您带来对这些问题的解答,敬请期待!

    演讲人: 李岳霖, 技术顾问, Akamai Technologies
    演讲人: 郑伟, 大中华区产品市场部经理, Akamai Technologies
    主持人: 丁斐, CISSP, (ISC)² 南京准分会会长

    *本次在线研讨会将以普通话进行
  • Intro to Messaging at Scale
    Intro to Messaging at Scale
    Dave Esber, Product Marketing @ Twilio and David Lowes, Solutions Engineering @ Twilio Recorded: Aug 13 2019 39 mins
    Nine in 10 customers want to message with a business. Yet, messaging at scale is hard. In this three-part webinar series, we outline some of the key concepts you should consider as you scale your customer messaging and considerations for the future.

    Anyone can send their first message with just a few lines of code and a credit card, but with Twilio just a few tweaks to your code can help you send millions of messages to customers around the world. In this webinar, we touch on a few key messaging concepts like queueing, status callbacks, segments, concatenation, transcription, and phone number types. These SMS practices will help you set up your infrastructure to scale as your business grows.
  • Securing the Multi-Cloud in the Age of Threats
    Securing the Multi-Cloud in the Age of Threats
    Raj Mallempati (CloudKnox Security) | Chris Schueler (Trustwave) | Tim Choi (Proofpoint) | Nathan Wenzler (Moss Adams) Recorded: Aug 8 2019 55 mins
    How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about:
    - Multi-cloud reality
    - Addressing your cyber risk
    - Managing vulnerabilities, detecting breaches and responding to incidents
    - Automating security tasks across multiple clouds and applications
    - Recommendations for improving enterprise cloud security

    Speakers:
    - Raj Mallempati, COO, CloudKnox Security
    - Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
    - Tim Choi, VP, Product Marketing, Proofpoint
    - Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams
  • Webisode 4: Proofpoint Demo - Enterprise Information Archiving
    Webisode 4: Proofpoint Demo - Enterprise Information Archiving
    Tom Mahoney, Senior Archiving Sales Specialist; Jason Colvin, Senior Systems Engineer Recorded: Aug 8 2019 29 mins
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us for the last of four webisodes to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance
  • Progressive Web Apps Simplified - All You Need to Know
    Progressive Web Apps Simplified - All You Need to Know
    Faizan Khalidi, Sr. Director of Product Management at Kony Inc. Recorded: Aug 8 2019 38 mins
    Progressive Web Apps (PWAs) are becoming more popular and gaining adoption in companies of all sizes. Many of us are still curious and learning on when and how to implement a PWA. Listen to this webcast to learn how to simplify the development of PWAs for mission-critical apps while avoiding some of the most common pitfalls. Source: Application Architecture Summit. Integration Development News.
  • IoT Security in 2019: Risks and Cyber Resilience
    IoT Security in 2019: Risks and Cyber Resilience
    Chris Morales (Vectra) | Jason Soroko (Sectigo) | Todd Weber (Optiv) | Rudolph Araujo (Awake Security) Recorded: Aug 7 2019 48 mins
    As the Internet of Things continues to grow, so do the security and privacy risks and vulnerabilities associated with IoT devices on enterprise networks. Organizations worldwide are looking to assess and manage their risk, implement basic cyber hygiene, and improve their security posture. Discover the best strategies for achieving security at every level, including IoT.
    Join this interactive panel with industry experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Speakers:
    - Chris Morales, Head of Security Analytics, Vectra (Moderator)
    - Jason Soroko, CTO of IoT, Sectigo
    - Todd Weber, Chief Technology Officer, Optiv
    - Rudolph Araujo, VP Marketing, Awake Security
  • Webisode 5: Proofpoint Demo - Ramping Up People-Centric Cybersecurity
    Webisode 5: Proofpoint Demo - Ramping Up People-Centric Cybersecurity
    Craig Morell, Security Sales Engineer, Proofpoint Recorded: Aug 7 2019 36 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    - Identify and remediate account compromise attacks
    - Solve for data loss through email
    - Make your users more resilient against attacks through awareness training
  • Let's Fix the Internet Routing Security Problem
    Let's Fix the Internet Routing Security Problem
    Aftab Siddiqui, Internet Technology Manager in Asia Pacific Regional Bureau, Internet Society Recorded: Aug 7 2019 64 mins
    Internet routing failures happen every day. The most recent high-profile incident involved Verizon, causing outages at Cloudflare, Facebook, Amazon, among others, for nearly three hours in June. A few weeks prior, another routing failure, this time by China Telecom, lasted two hours and caused massive disruption in Europe. There is a clear need for network operators and the wider security community to improve routing security - the backbone of the Internet.

    In this webinar, we will explain why network operators should consider the Mutually Agreed Norms for Routing Security (MANRS), a community-driven global initiative that prevents such glitches by taking on security as a shared responsibility among networks. This webinar will give a technical overview of the related challenges and risks, and show the impact of recent incidents, followed by the four actions operators can adopt.

    Join Internet Society and (ISC)² on Aug 7, 2019 (Wed) at 14:00 (GMT +8) to learn about internet routing security.

    Presenter: Aftab Siddiqui, Internet Technology Manager in Asia Pacific Regional Bureau, Internet Society
    Moderator: S.C. Leung, Member, (ISC)² Board of Directors
  • Kristin Demo Test
    Kristin Demo Test
    Kristin Casey, Director Marketing, WWT Aug 22 2019 5:00 am UTC 7 mins
    This is to demo the BT platform to the team so everyone can see how it works. We want to make sure it doesn't have the same challenges we have with webex event center.
  • IAST Stories From the Field
    IAST Stories From the Field
    Michael Haddon IAST Evangelist for North America Aug 22 2019 6:00 am UTC 39 mins
    As DevOps continues along its path of domination, organizations are seeking to make use of application security testing tools that leverage automation and easily scale up.

    With that, we see that Interactive Application Security Testing (IAST) is gaining increasing momentum.

    Join industry-experts Michael Haddon for insights on:
    •Why customers are seeking IAST solutions
    •Common IAST use cases
    •How customers are using IAST successfully
    •The benefits customers gain from using IAST
  • Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Ed Maguire, Principal Partner, Momenta Partners & Dr. Richard Soley, Chairman and CEO of the Object Management Group Aug 22 2019 4:00 pm UTC 46 mins
    Richard Soley is Chairman and CEO of the Object Management Group, Executive Director of the Industrial Internet Consortium (IIC) and founding partner of the IoT Solutions World Congress. In this special edition of the Edge Podcast recorded on site in Barcelona, he shares some of the notable developments coming out of the conference.

    The IoT Solutions World Congress is differentiated from other events through the focus on end users and case studies, showcasing test bed work shepherded by the IIC. In our conversation, Richard Soley shares stories and examples of notable work underway, the potential for productivity gains across industries, and the view that manufacturing represents the industry with the most to gain from connecting assets and advanced analytics. Additionally he discusses the launch of the IIC’s new Resource Hub. Finally he shares a fascinating story about standards that connected the design of Space Shuttle booster with the Ancient Romans.
  • How to Design an Adaptable, Flexible and Compliant Social Selling Program
    How to Design an Adaptable, Flexible and Compliant Social Selling Program
    Roman Tobe, Product Marketing Manager Proofpoint & Jeremy Goldstein, Sr. Solutions Consultant Hootsuite Aug 22 2019 5:00 pm UTC 60 mins
    Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.

    If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?

    Join Hootsuite and Proofpoint as our experts share:

    - How top firms balance compliance with their adviser experience
    - What experts believe is in store for social selling and compliance in the future
    - How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms
  • Airheads Tech Talks: SD-WAN-Health Check and Dynamic Path Selection
    Airheads Tech Talks: SD-WAN-Health Check and Dynamic Path Selection
    Rajesh P, Aruba TAC Aug 27 2019 9:00 am UTC 90 mins
    Health checks must be enabled to determine the path availability of each WAN uplink. When enabled, the gateway will send UDP or ICMP probes to an IP or FQDN of a host to determine if the path is available to accommodate traffic. The primary use case for health checks is to verify that each ISP’s network is operational and prevent branch traffic from being forwarded into a black hole.

    Aruba gateways can implement DPS policies to determine the WAN uplinks that are selected for specific users, applications, and destinations. The selected forwarding path could be a single WAN uplink or traffic could be load balanced between a group of WAN uplinks. The destination IP address of the traffic will determine if the traffic is steered towards a VPN tunnel or forwarded directly to the Internet. The DPS policy effectively selects an uplink and the gateway’s routing table or policy-based routing (PBR) rules will determine the next hop.

    Agenda:

    1. Introduction to Health Check and DPS
    2. Features and basic setup requirements
    3. Uplink health check configurations
    4. DPS Policies Configurations
    5. DPS policies verification
    6. DPS Traffic Verification
    7. Flow with routing plus DPS
  • Building a Culture of Security within Healthcare Organizations
    Building a Culture of Security within Healthcare Organizations
    Gretel Egan, Security Awareness Training Strategist, and Ryan Witt, Managing Director Healthcare Industry Practice Aug 27 2019 5:00 pm UTC 59 mins
    Are you taking a patient-centric approach to cybersecurity? As a patient yourself, you no doubt care about the quality of your care... but you also want your personal data and medical history to remain private. Patient care is about more than caring for the body and mind. It’s also about data security.

    In this webinar, we will discuss the importance of visibility and agility when it comes to identifying end-user vulnerabilities, and how healthcare organizations can efficiently implement security awareness training and build a culture that prioritizes data, device, and patient security.

    Join us to learn:

    - What we mean by a “patient-centric” cybersecurity mindset
    - How to overcome common training obstacles and deliver the most effective cybersecurity education program
    - How to understand the current state of healthcare cybersecurity and the challenges faced by the industry
  • Optimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
    Optimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
    Dennis Drogseth, VP of Research, EMA and Mark Levy, Product Marketing Director, Micro Focus Aug 27 2019 5:00 pm UTC 60 mins
    What separates successful DevOps initiatives from unsuccessful ones? The answer to this and many other questions will be examined in this new research webinar presented by leading IT analyst firm Enterprise Management Associates (EMA).

    Join us as Dennis Drogseth, VP of Research at EMA provides observations and recommendations for successful DevOps implementations. Dennis will draw from a recent EMA survey of 400 global respondents spanning development, operations, IT service management (ITSM) teams and executive IT.

    This webinar will address DevOps initiatives from many perspectives. Topics covered will include pipeline activities, stakeholders, technological impacts including analytics and automation, roadblocks in terms of both tools and teams, organizational perspectives, best practices, and more.
  • DevSecOps: The Journey of Security in a DevOps Environment
    DevSecOps: The Journey of Security in a DevOps Environment
    Scott Van Kalken, Systems Engineer, F5 Networks Aug 28 2019 6:00 am UTC 60 mins
    IT automation and orchestration, the key enabler of digitization is the number one IT initiate globally according to our state of application services report 2019. In addition, Zero Trust and Security-By-Design are key imperatives of organizations pursuing digital transformation as these organizations accelerate adoption of cloud technologies to gain speed, scale and accessibility to innovative technologies like AI and blockchains.

    In this webinar, we will look at the changing landscape of DevOps and explore the practice of scaling application security, controlling vulnerabilities and controlling advanced threats with the web application firewall in CI/CD environments. We will also take a look at how the technologies enable close collaboration between security teams and development teams on securing APPs without requiring application teams having in-depth knowledge of security.

    Join F5 Networks and (ISC)² on Aug 28, 2019 (Wed) at 14:00 (GMT +8) to learn about web application firewall in a CI/CD workflow.

    Presenter: Scott Van Kalken, Systems Engineer, F5 Networks
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Improve SMB Productivity with Aruba Wi-Fi for UCC Applications
    Improve SMB Productivity with Aruba Wi-Fi for UCC Applications
    Kevin Crehan, Aruba - Lead Technologist, EMEA Aug 28 2019 10:00 am UTC 55 mins
    As workforces become increasingly mobile, the reliable delivery of Unified Communication and Collaboration (UCC) applications like Skype for Business is of utmost importance. Cloud-based business applications are cost efficient alternatives for small and medium business (SMB) – are your customers able to support this transition?

    Join this webinar to learn how Aruba’s Wi-Fi solutions enhance your customer’s network infrastructure, reduce costs, and improves productivity by providing reliable connectivity when using cloud-based business applications like Office 365, Skype for Business and other UCC applications.

    During this session we will cover:

    •Network trends and challenges impacting cloud-based business applications
    •Benefits of Skype for Business and other UCC applications paired with Aruba Wi-Fi solutions
    •Resources, promotions, and tools to leverage
    •Q & A
  • What the Symantec Acquisition Means for Your Email Security Future
    What the Symantec Acquisition Means for Your Email Security Future
    Ryan Kalember, EVP of Cybersecurity Strategy for Proofpoint Aug 28 2019 4:30 pm UTC 60 mins
    It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats.

    As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn:

    - How the email threat landscape has changed with attackers evading legacy approaches
    - How leaders like Proofpoint have innovated to keep up
    - How we have helped customers migrate from legacy products to Proofpoint
  • Analytics Driven Security
    Analytics Driven Security
    Richard Leadbetter, Technical Sales Specialist, EMEA Aug 29 2019 9:00 am UTC 29 mins
    What can CISOs do to stay secure while giving users the freedom they need? The answer is Analytics driven security. Automated Analytics Driven Security that takes a user-by-user, behaviour-based security approach to assessing risk, all without compromising personal user data or needing to rip-and-replace your existing network security measures.
    Included in webinar is demonstration where you will be able to see how to deal with onboarding and controlling any devices that are connecting to your networks.
  • Ad Tech: Competitive Advantage through a Better Database
    Ad Tech: Competitive Advantage through a Better Database
    Jim Nail, Principal Analyst, Forrester and Jonathan LeDuc, Lead Project Manager, Adition Aug 29 2019 9:00 am UTC 55 mins
    Whether you are a DSP, an SSP, or a DMP - you are looking to process massive amounts of data in just milliseconds. Doing so can optimize effective cost per click (or action), optimize open auctions, or improve your customers’ Ad targeting, user profiling, look-alike modeling, or audience analytics. All of these point to the bottom line.

    Join this webinar, where guest speaker Jim Nail, Principal Analyst at Forrester, and Jonathan LeDuc, Lead Project Manager at Adition, will cover:

    - An overview of the latest complexities the Ad Tech industry faces, from both the analyst and vendor perspectives
    - How industry leaders are managing their omnichannel touches across search, display, mobile and the ability to move across these domains just as their customers do
    - Their firsthand experience working with ad tech data at scale, dealing with operational challenges, and what the benefits of an improved database infrastructure yield
  • Low-Code Without Limits- - Avoiding the Low-Code Brick Wall
    Low-Code Without Limits- - Avoiding the Low-Code Brick Wall
    Matt Terry, Sr Vice President Product Management + Carlos Carvajal, CMO Aug 29 2019 4:00 pm UTC 75 mins
    All low-code solutions enable companies to build applications faster. Starting fast is great but not if you have to compromise on flexibility, scalability, or user experience. Join this webinar to learn essential architecture requirements that your low-code solution should support to avoid hitting a brick wall in the future.
  • Are Your Network and Business at Risk of Attack?
    Are Your Network and Business at Risk of Attack?
    Cherie Martin, Aruba Product Marketing Manager and Brian Sieteski, Aruba Systems Engineer Aug 29 2019 5:00 pm UTC 46 mins
    Midsized companies like yours are using mobile applications and IoT to help their business grow. But just as these solutions attract customers, streamline operations, and increase business agility, they also create new attack surfaces and vulnerabilities. Join us for a webinar on August 29th,10am Pacific where we’ll review how to reduce the risk of these attacks to your network and business.

    Attend to learn:
    · Key business-class security features your network should possess
    · How the right network security innovations can keep your business safe
    · Why midsize companies trust Aruba to mitigate attacks and improve security standards for everyone

    Qualified attendees with receive a free Aruba Instant Access Point and a 90-day trial license of Aruba Central networking cloud management solution.
  • Introducing the Verizon Incident Preparedness and Response Report
    Introducing the Verizon Incident Preparedness and Response Report
    John Grim, Sr. Manager, VTRAC Aug 29 2019 5:00 pm UTC 75 mins
    For 12 years, we've written the book on data breaches. Literally. Now, we've written the book on data breach response. Introducing the VIPR Report, the Verizon Incident Preparedness and Response Report. The VIPR covers a three-year review of our IR Plan assessments and data breach simulation exercises across various industries. In this session, we'll discuss the top 20 key takeaways for incident preparedness and response as it relates to the six phases of incident response:

    Phase 1 – Planning and Preparation
    Phase 2 – Detection and Validation
    Phase 3 – Containment and Eradication
    Phase 4 – Collection and Analysis
    Phase 5 – Remediation and Recovery
    Phase 6 – Assessment and Adjustment

    Speakers will include:
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
  • How to Put the ‘Sec’ in Mobile DevSecOps
    How to Put the ‘Sec’ in Mobile DevSecOps
    Brian Lawrence, Solutions Engineering Manager // Brian Reed, Chief Mobility Officer Aug 29 2019 6:00 pm UTC 60 mins
    There are more than 4.5 million apps and counting in the Apple® App Store® and Google Play™, many of which release weekly or even daily. Success in continuous delivery calls for removing friction from the pipeline. However, mobile app DevSecOps teams must contend with several security and privacy challenges.

    Join us for insight and best practices for achieving the DevSecOps goal of continuous security. You’ll learn:
    +The most common security and privacy issues found in mobile apps
    +How to partner with mobile app security, risk and compliance teams
    +Approaches for automating security in the CI/CD pipeline.
  • EMEA Threat Landscape: Volumes, Focus, & Shifting Targets
    EMEA Threat Landscape: Volumes, Focus, & Shifting Targets
    Ed Rowley, Senior Technical Engineer and Dan MarleyCook, Team Lead, Sales Engineer Sep 3 2019 9:00 am UTC 24 mins
    2019 is the year where individuals in organisations are taking center stage in the cybersecurity threat landscape. Bad actors have shifted their strategies beyond perimeter and endpoint attacks and now look at high value individuals who have privileged access or handle sensitive data.

    While not everyone is a VIP, anyone can be a VAP (Very Attacked Person). In this webinar, we explore the shifts in the EMEA threat landscape in the first quarter of 2019, the threats targeting VAPs, and share ways in which organisations can protect identified VAPs from targeted attacks.
  • How to Prevent Breaches with Phishing Threat Intelligence
    How to Prevent Breaches with Phishing Threat Intelligence
    Ryan Jones, Principal Sales Engineer, APAC, Cofense Sep 4 2019 6:00 am UTC 60 mins
    Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognise phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.

    This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, organisations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.

    Join Cofense and (ISC)² on Sep 4, 2019 (Wed) at 14:00 (GMT +8) to learn about:
    - The constantly changing threat landscape
    - Turning active, real threats into learning moments for your users
    - Speeding up response with timely, actionable intelligence

    Presenter: Ryan Jones, Principal Sales Engineer, APAC, Cofense
    Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • Live Demo: Security Awareness Training
    Live Demo: Security Awareness Training
    Sean Walker, Enterprise Account Executive Sep 5 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • The Digital Workspace, what’s holding you back?
    The Digital Workspace, what’s holding you back?
    Nico Zieck, Workspace Architect Sep 10 2019 8:00 am UTC 45 mins
    Gartner predicts that over the next several years, the greatest source of competitive advantage for 30% of the organizations will come from the workforce’s ability to creatively exploit emerging technologies. If you are considering introducing digital workspace into your organization you know it enables new, more effective ways of working; raises employee engagement and agility; and exploits consumer-oriented styles and technologies. But what is keeping you?

    Introducing a digital workspace does not necessarily mean a “rip and replace” of the existing technologies that you have invested in over the past year. Or you may be wondering how you can keep using legacy or custom applications in a unified workspace.

    Please join us for this live webinar and Q&A, hosted by Nico Zieck, Workspace Architect at Liquit, in which he will demonstrate how you move from a traditional, technology driven to a modern, unified workspace in three easy steps overcoming several of the most common obstacles.

    We look forward to welcoming you.
  • IT Security: from Complacent to Critical (EMEA)
    IT Security: from Complacent to Critical (EMEA)
    George Anderson, Director of Product Marketing, Webroot Sep 10 2019 3:00 pm UTC 60 mins
    ** This is an EMEA focused webinar **

    IT security for small to medium-sized businesses (SMBs) has turned from a situation where clients were complacent about IT Security to it now being a critical, high-demanded service offering.

    This presentation looks at what has driven this shift in client attitudes, and how IT security needs to rapidly evolve to give MSPs access to the expertise and security technology they need to thrive.

    Many MSPs are struggling with this new reality. This presentation will help you evaluate the IT security options open to you.
  • A New Approach to CIAM & Demystifying Deserialization
    A New Approach to CIAM & Demystifying Deserialization
    Fernando Serto, Head of Security Technology & Strategy, APJ; Ajay Mishra, Senior Enterprise Security Architect, Akamai Sep 11 2019 5:00 am UTC 60 mins
    Across the globe, forward-looking enterprises are fundamentally changing their approach to customer identity access management. Many are looking to leverage identity management technologies that enable them to securely store customer data and to provide GDPR-compliant consent management and better customer experience. When sensitive customer data is stored in an identity platform, you also need to make sure that platform is built with strong data protection capabilities and add-ons to protect against vulnerabilities.

    The second part of the webinar will cover our technical security research on deserialization attacks – a high severity vulnerability that can lead to remote code execution attacks.

    Join Akamai Technologies and (ISC)² on Sep 11, 2019 (Wed) at 13:00 (GMT +8) to know more about:
    - Customer identity access management that enables and secures the business
    - How a deserialization attack is performed via a demo
    - Best practices to mitigate deserialization attacks

    Presenter: Fernando Serto, Head of Security Technology and Strategy, Asia Pacific and Japan, Akamai Technologies
    Presenter: Ajay Mishra, Senior Enterprise Security Architect, Akamai Technologies
    Moderator: Tony Vizza, CISSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • Case Study: How Northwestern Mutual Stops Email Attacks w/ Email Fraud Defense
    Case Study: How Northwestern Mutual Stops Email Attacks w/ Email Fraud Defense
    Rich Wegner, Sr. Cybersecurity Engineer - Northwestern Mutual & Ryan Terry, Product Marketing Manager - Proofpoint Sep 12 2019 5:00 pm UTC 60 mins
    Email fraud has cost organizations of all sizes and in all industries billions of dollars in losses. As the number one threat vector to businesses, email must be authenticated to restore trust to business communications. So what is the best way to accomplish this?

    Join us for our case study with Northwestern Mutual as we examine how this financial services' leader is using Proofpoint's Email Fraud Defense (EFD) to help stop email spoofing attacks in their tracks.

    In this session, we'll share:
    - The benefits of deploying DMARC email authentication
    - How Northwestern Mutual is utilizing Proofpoint's EFD
    - How to strengthen your secure email gateway to better protect your end users
  • Cyberattacks: Q3 Review and Emerging Trends (EMEA)
    Cyberattacks: Q3 Review and Emerging Trends (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Sep 17 2019 10:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    This webinar will recap some of the major cybersecurity highlights of the past quarter.

    From high-profile attacks making a media splash, to emerging threat trends being tracked by our researchers, a Webroot threat analyst will take attendees through the highlights and lowlights of another busy quarter for cybercrime.
  • Introducing Visual Speech Recognition
    Introducing Visual Speech Recognition
    Dan Miller, Opus Research; Liam McQuillan (Co-founder and CEO) Fabian Campbell-West (CTO), Liopa Sep 17 2019 4:00 pm UTC 45 mins
    “Visual Speech Recognition” (VSR) is a game-changing technology that will prove invaluable as individuals, enterprises and government agencies expand their ability to understand spoken words in challenging environments. It is an example of how unprecedented computer power and data access can make everyday tasks easier in a "Voice-First" world. Learn more about VSR in this free webinar, September 17th.