Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Data Protector zum Wochenstart: Data Protector Neuerungen – Mai Release
    Data Protector zum Wochenstart: Data Protector Neuerungen – Mai Release
    Sprecher ist ein Technical Consultant mit Spezialisierung auf Data Protection Recorded: May 25 2020 84 mins
    In den Webinaren „Data Protector zum Wochenstart“ stellt Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vor. Aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery fließen ebenfalls in die Webinare mit ein. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand.

    Je nach Thema dauern die Webinare zwischen 60 und 90 Minuten.
  • 情報セキュリティプロフェッショナル認定資格「CISSP」のご紹介
    情報セキュリティプロフェッショナル認定資格「CISSP」のご紹介
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan Recorded: May 22 2020 47 mins
    CISSPは(ISC)²が認定を行っている国際的に認められた情報セキュリティ・プロフェッショナル認定資格です。情報セキュリティの共通言語とも言える『(ISC)² CISSP CBK』を理解している情報セキュリティ・プロフェッショナルのみに与えられる資格で、CISSPの取得は、国内外において、個人および所属組織の信用・信頼の獲得につながります。Webinarでは、このCISSPについてわかりやすく説明します。
  • Best practices for verification to support reduced certificate lifetimes
    Best practices for verification to support reduced certificate lifetimes
    Dathan Demone, Director Verification Services, Entrust Datacard Recorded: May 22 2020 35 mins
    Join us for our "Road to 398" webinar that discusses upcoming certificate lifetime reductions.

    During this 30-minute webinar, our verification expert will share tips, tools, and best practices for verification processes that support reduced TLS/SSL certificate lifetimes and maintain compliance.

    • Updates on CA/B Forum requirements for verification around shorter certificate lifetimes
    • Tools for renewing certificates in bulk with fewer touch points
    • Methodologies for streamlining certificate verification
    • Insights and best practices from some of our other customers
  • How to effectively secure your remote workforce - Asia Pacific
    How to effectively secure your remote workforce - Asia Pacific
    Jenn Markey, Product Marketing, Entrust Datacard Recorded: May 22 2020 24 mins
    2020 has introduced many new normals, working from home being one of them. This also increases the threat landscape for IT. Employees are connecting to company resources in a different way, many using their own devices. Then there are the added distractions that come with working from home. Attendees will learn authentication best practices to:

    - Keep corporate assets secure
    - Protect and verify worker identities
    - Help remote employees stay productive
    - Reduce the administrative burden on IT

    Jenn Markey leads product marketing for Entrust Datacard’s authentication business segment. She is responsible to help build the company’s authentication market profile, customer footprint, and strategic business value. Over the duration of Jenn’s career, she has held senior marketing, product management, and business development positions with several dynamic technology companies across the software (including SaaS), security, video production, telecom, and semiconductor industries. Jenn resides in Ottawa, where she is also a practicing yoga teacher.
  • Mobile App & API Access Attacks: A New Security Frontier for Financial Services
    Mobile App & API Access Attacks: A New Security Frontier for Financial Services
    Joe Krull, Senior Analyst, Aite Group | Paul Dant, Senior Security Engineer, Arxan Technologies Recorded: May 21 2020 31 mins
    When it comes to finance, mobile banking or payments apps, maintaining customer trust is crucial to protecting brand equity and revenue. But according to recent analyst research, a majority of mobile finance apps lack the security controls and code hardening necessary to prevent applications from being compromised. And relying on legacy methods – like network or perimeter protection that is incapable of detecting these kinds of attacks – can have dire consequences.

    In this webinar, Aite Senior Analyst Joseph Krull and Arxan senior security engineer Paul Dant will discuss how the growing demand by mobile apps for API access is changing the security landscape, and what you can do to protect your organization from a costly breach (hint: it starts with protecting your applications).

    You’ll learn:
    -How easily mobile apps can be reverse engineered - the first step in circumventing traditional security approaches
    -How common app vulnerabilities and development mistakes can lead to data exposure
    -What’s necessary to implement a comprehensive mobile app security strategy
  • Porting code to Arm SVE – HPC Webinar
    Porting code to Arm SVE – HPC Webinar
    Florent Lebeau, Staff Solution Architect Recorded: May 21 2020 28 mins
    Arm Scalable Vector Extension (SVE) is an instruction set for the Arm v8-A architecture that introduces customized features for improving High Performance Computing (HPC), including vectorization and increased floating point performance. This webinar presents the main concepts of SVE, showing how your applications can benefit from it and how easily you can port your code – even before getting access to an SVE based processor. We’ll also provide tips on how to optimize and evaluate the benefits of different vector widths.
    In this webinar, Florent Lebeau, Solutions Architect from Arm, will demonstrate how to:
    • Compile applications for SVE
    • Run SVE applications on non-SVE hardware while you wait for processor availability
    • Analyze SVE applications to tune for maximum performance
  • How ServiceNow IT delivers great employee experiences
    How ServiceNow IT delivers great employee experiences
    Rajeev Sethi, Mirza Baig, Bruce Randall Recorded: May 21 2020 56 mins
    Delivering a great employee experience is more than a good idea - it’s essential to maximizing productivity to maintain your competitive edge. We’ve seen the benefits ourselves by using our own Enterprise Service Management solutions. The key lies in increasing automation to boost your overall efficiency.

    Discover how you can put the same solutions to work in your organization and:

    -Use virtual agents to provide consistently great service, freeing up your staff to focus on other priorities.
    -Gain full visibility with built-in dashboards and analytics for real-time, actionable information you can use.
    -Discover the proven best practices for consolidating inefficient service delivery tools into a single, streamlined cloud workflow.
  • IoT at the Edge
    IoT at the Edge
    Karthikeyan Gunasekar, Category Lead EMEA Aruba, a Hewlett Packard Enterprise company Recorded: May 21 2020 59 mins
    Aruba leads Internet of Things (IoT) with Smart Edge Computing and Security.

    Join us to know how Aruba opens new value added services, great user experience and use case driven approach with our IoT as Gateway solution. As more data is being generated at the edge, Aruba’s Wi-Fi 6 products, AI Driven operation system and enhanced security helps bridge connectivity with compute and analytics at the edge and bring value to today’s business needs for LoB’s and ITOps in different verticals.
  • Email Security: Protecting your #1 Threat Vector - APAC
    Email Security: Protecting your #1 Threat Vector - APAC
    Omer Lahav Principal Sales Engineer, Proofpoint APAC Recorded: May 21 2020 31 mins
    In 2020, what is a cyber criminal’s weapon of choice? As attacks against your organisational firewalls fade away, what’s next? Leading research from the FBI and Forrester Wave shows that email is today's number one threat vector and the threat email poses changes and evolves more rapidly than ever before. If you work in Information Security, you already know that you and your team have a hard time keeping up with the volume of attacks coming from email.
    Join Omer Lhav of Proofpoint to discover how to keep pace within this rapidly moving threat landscape and best practice ways to protect your people and data from email attacks, and in particular you will learn:
    - The latest threat data and trends for email cyber attacks- How best to defend your people and data with Proofpoint Targeted Attack Protection- How to streamline your incident response process for emails
    Join us as we go deep and show you how to better protect against email, the number one threat vector for your business
  • How to Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
    How to Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
    Kevin Poniatowski, Principal Security Engineer & Trainer Recorded: May 20 2020 62 mins
    To ensure critical data can only be accessed by authorized personnel, it is paramount to integrate security best practices during development. It’s equally important to protect deployed systems, especially in CI/CD (continuous integration and deployment) and DevOps environments.

    Attend this webcast to learn techniques to define, design, develop, test, and maintain secure systems. Particular focus will be paid to software-dependent systems.

    Topics include:
    • Identifying and risk-rating common vulnerabilities
    • Applying practices such as least privilege, input/output sanitation, and system hardening
    • Implementing test techniques for system components, COTS, and custom software
  • HP Z2 SFF G4 –The World’s Most Powerful and Secure Small Form Factor Workstation
    HP Z2 SFF G4 –The World’s Most Powerful and Secure Small Form Factor Workstation
    Jonathan Palis, HP Z2 Product Manager and Joe Marenin, HP Workstation Roadmap Lead Recorded: May 20 2020 60 mins
    You’d be hard-pressed to do your office work without a computer. It’s a tool that your office must use, purchase, and maintain. Research from Sharp has uncovered that the average worker wastes at least 21 days each year due to slow or outdated technology. Which is why an entry-level PC workstation with Intel® Xeon®™ processor, ECC Memory, dedicated graphics processing power, etc., such as the HP Z2 SFF is a smart investment that enables new capabilities that can help increase productivity, improve reliability, and limit downtime.

    Listen in as we discuss the benefits of purchasing a PC Workstation vs. a traditional desktop PC and how the Z2 SFF is built for high performance and heavy workloads that enables new capabilities that can increase productivity, improve reliability, and limit downtime.

    Here's what we'll go over:
    • Why is a HP Z2 SFF PC Workstation more reliable than a traditional PC
    • Why does HP Z2 SFF PC Workstation offer more performance than a traditional PC
    • Why is the HP Z2 SFF the most secure PC workstation in the world

    Speakers
    - Jonathan Palis, HP Z2 Product Manager
    - Joe Marenin, HP Workstation Roadmap Lead
  • Webroot Threat Report: 2020 and Covid-19
    Webroot Threat Report: 2020 and Covid-19
    Tyler Moffitt, Senior Threat Research Analyst Recorded: May 20 2020 60 mins
    How is COVID-19 affecting cybersecurity? How are cybercriminals capitalizing on a thirst for information—and the desire to help others—to turn a quick buck? Join Tyler Moffit in our latest webinar as we analyze the new threat activity due to COVID-19 from malware, phishing and crypto jacking. Keep up to date with the newest threats and see how you can be cyber resilient
  • Flattening the Cyber Risk Curve in the Work From Home Age
    Flattening the Cyber Risk Curve in the Work From Home Age
    Moderated by Dr. Neil Daswani, Co-Director, Stanford Advanced Computer Security Program and former-CISO of LifeLock Recorded: May 20 2020 62 mins
    In a world that has changed forever in the span of a few months, organizations have been forced into a digital transformation, whether or not they were ready for it. How will organizations manage their businesses and cyber risk in the current climate? More importantly, when this emergency has passed, will organizations make the right decisions when embracing “the new normal”, or fight it and try to go back to the way things used to be?

    MODERATOR:
    Dr. Neil Daswani, Co-Director, Stanford Advanced Computer Security Program and former-CISO of LifeLock

    PANELISTS:
    - Nimesh Mehta, CIO of National Life Insurance
    - Ruben Vega, Director of IT Infrastructure at Unified Women’s Healthcare
    - Jason Lish, CISO at Advisor Group

    Sponsored by: SecureAuth, Ironscales and Entreda
  • Live Demo - Protecting Your Data Against the Insider Threat Risk
    Live Demo - Protecting Your Data Against the Insider Threat Risk
    Mike Griffin, Sales Engineer at Proofpoint Insider Threat Management Recorded: May 20 2020 30 mins
    As the workforce rapidly shifts to remote work, the complexity of protecting IP and sensitive data has grown exponentially. Old models of locking down the perimeter no longer apply. Instead, a modern, people-centric approach to Insider Threat Management can complement existing information protection programs, while providing greater visibility and context into both user behavior and data movement. In this webinar with our expert Mike Griffin, we’ll explore the unique risks of insider threats and how to combat them. We will cover:

    - The types of insider threat profiles and how to address them. For example, organizations may not know how that more than 60% of insiders are negligent.
    - Why insider threats are unique, and require context into both user and data activity.
    - How to reduce response time by accelerating investigations. The longer the response times, the costlier an incident can get.
  • Automatically Build tinyML Solutions on Embedded Devices
    Automatically Build tinyML Solutions on Embedded Devices
    Tina Shyuan, Senior Product Marketing Manager, Qeexo & Mary Bennion, Arm AI Ecosystem Manager, Arm Recorded: May 20 2020 67 mins
    AI on Arm Partner Webinar
    Qeexo and Arm IP Teach You How to Automatically Build Machine Learning Solutions for Embedded Devices with Qeexo AutoML

    See how easy it is to automate "tinyML" machine learning development for sensor modules with Arm Cortex-M-0-to-M-4 microprocessors – without having to write a single line of code! Qeexo's automated, end-to-end AutoML platform enables engineers, data scientists, and product managers to build multiple machine learning models in under 5 minutes.

    In this workshop-style webinar, we will:
    • Give an overview of the benefits & challenges of doing machine learning at the Edge
    • Walk attendees through the installation and setup of Qeexo AutoML. (Please come with a Windows or Mac laptop with the Google Chrome browser installed.)
    • Demo the simple data collection and visualization with our Qeexo AutoML interface
    • Build multiple machine learning models and deploy them to an Arm Cortex-M4-powered sensor module for live-testing with just a few clicks

    As a bonus for attending, select attendees* will receive a 30-day trial of Qeexo AutoML and supported Renesas RA MCU sensor module (Arm Cortex-M4) to try it out for yourself. Register today!

    *first 300 attendees to email Qeexo with the "secret word" from the webinar
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Dave Kennedy, Managing Principal, Open Source Intelligence Recorded: May 20 2020 66 mins
    Topic: Cloud Related Security Challenges

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss cloud related security challenges and the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will cover:
    •Responding to incidents in the cloud
    •Best practices and logging capabilities
    •Server-less computing and progressive web applications

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • How to securely enable remote working
    How to securely enable remote working
    Edward Rowley SE manager of EMEA, Proofpoint; Mark Edge Cloud Security Specialist EMEA, Proofpoint Recorded: May 20 2020 51 mins
    The Threat Landscape has changed drastically recently as employees around the world are mandated to work from home. Working safely and securely has never been more important.

    How do you enable this enormous challenge while maintaining compliance and reducing business exposure?

    Get practical tips on:
    • Providing employees with secure remote access to applications
    • Securely transitioning a remote workforce
    • Keeping malicious code away from corporate devices.
  • Securing Your Business in the COVID-19 Era of Remote Working
    Securing Your Business in the COVID-19 Era of Remote Working
    Perry Chu, Regional Senior Solutions Consultant, BeyondTrust Recorded: May 20 2020 63 mins
    So, your workforce has gone remote. Now what?

    The COVID-19 pandemic has led to a surge in cybercrime, but this is no surprise. Attackers use people’s fears to prey on businesses and individuals.

    In times of crisis, good security practices are often the first thing to go. As employees across Asia Pacific and ANZ are being asked to work from home, companies, universities and government organisations are being forced to implement new remote working policies. However, an expanding remote workforce can increase your security risk, especially if IT and Support employees use non-secure remote access tools as temporary measures.

    Join this special webinar with BeyondTrust and (ISC)² on May 20, 2020 (Wed) at 10:00 (GMT +8) to learn:
    - Risks and security considerations related to an extended remote workforce
    - The vulnerability risks posed by remote working tools, like BYOD and free Shadow IT solutions
    - Practical guide on how to quickly implement and scale strong security protocols to enable long-term remote work
    - Technology Demonstration: Key Use Cases for a successful Secure Remote Access strategy

    Presenter: Perry Chu, Regional Senior Solutions Consultant, BeyondTrust
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • 2020 Data Breach Investigations Report CISO Panel Discussion
    2020 Data Breach Investigations Report CISO Panel Discussion
    Mike Johnson, Christopher Porter, Alex Pinto, David Grady Recorded: May 19 2020 65 mins
    The 2020 Verizon Data Breach Investigations Report, now in its 13th year, is an annual industry benchmark for information on global cyber security breaches and threat patterns—information used by organizations to make critical security program decisions. Join our panel of CISO experts and Alex Pinto for a discussion about 2020 DBIR key findings and what those mean for the cyber security industry. The answers you want, straight from the experts.

    Moderator:

    David Grady
    Security Evangelist
    Verizon Business Group

    Speakers:

    Alex Pinto
    Distinguished Engineer and Team Manager
    Data Breach Investigations Report (DBIR)
    Verizon Business Group


    Christopher Porter
    Chief Information Security Officer (CISO) at Fannie Mae

    Michael Johnson
    Chief Information Security Officer (CISO) at Fastly
  • Replay: TEM Expo Webinar 3 - Managing Wireless Expenses
    Replay: TEM Expo Webinar 3 - Managing Wireless Expenses
    Hyoun Park Recorded: May 19 2020 24 mins
    This 30 minute webinar will provide a framework for managing wireless as Smartphones are now Tweens. This webinar is a preview for Amalgam Insights' Technology Expense Management Virtual Expo on June 11 to help IT to solve its 3 key problems in the Time of Corona:

    1) conserving cash
    2) supporting remote workers, &
    3) protecting the company

    TEM Expo Pre-Event Webinar Schedule

    April 21 - 6 Stages CIOs Must Consider to Manage COVID IT
    April 23 - Telecom and Network Expenses
    April 28 - Managing Wireless Expenses
    April 30 - Managing SaaS Expenses
    May 5 - Managing IaaS: The Mixed Blessings of Overwhelming Detail
    May 14 - Payment and Invoice Processing
    May 21 - Managing IT Finance
    May 26 - Benchmarking TEM Metrics
    June 2 - Managing Service Orders
    June 9 - Building IT Inventory

    And the Big Event, TEM Expo 2020, is July 14 at https://amalgaminsights.com/temexpo/
  • Continuing the Conversation: What We’ve Learned From the COVID-19 Outbreak
    Continuing the Conversation: What We’ve Learned From the COVID-19 Outbreak
    John Carnes, Erik von Geldern, Kris Rosson, Brandon Dunlap, Moderator Recorded: May 19 2020 62 mins
    On April 28, 2020, (ISC)2 hosted a diverse panel of cybersecurity professionals who discussed the impact the COVID-19 pandemic has had on their IT operations and cybersecurity teams. The first webcast, in this series, generated a great deal of interest, discussion and questions from the audience. We will continue the conversation on May 19, 2020 to tackle the questions and discussions that continue to be raised during this ongoing crisis. This second webcast will be devoted to the economic impact (budgets slashed with no revenue coming in) due to the shutdown caused by COVID-19. In addition, we’ll discuss what re-opening an office may look like and how the current situation affects individuals both physically and emotionally. Join the conversation to share your thoughts and gain insight into how your team can continue to handle this changing situation.
  • Apple Device Management for Beginners
    Apple Device Management for Beginners
    Jim Grandbois Recorded: May 19 2020 35 mins
    While some are already familiar with Apple device management, many of you are diving in for the first time and seeking guidance on ways to properly deploy, manage and secure the growing number of Mac, iPad, iPhone and Apple TV devices joining your environment. If you fall into the “I want help” camp, we are here for you.

    In our webinar, Apple Device Management for Beginners, we’ll teach you the basics and help you build, and ultimately master, your Apple management skills.

    You’ll learn:

    What Apple services and programs are available
    The stages of Apple lifecycle management
    Best practices for infrastructure planning
  • 2020 Data Breach Investigations Report (DBIR) Key Findings
    2020 Data Breach Investigations Report (DBIR) Key Findings
    Alex Pinto and Gabriel Bassett Recorded: May 19 2020 64 mins
    This is the 13th edition of the Data Breach Investigations Report (DBIR). Join the discussion with Alex Pinto and Gabriel Bassett, as they reveal key findings on global cyber security breaches and threat patterns faced by businesses and organizations.

    Speakers:

    Alex Pinto
    Distinguished Engineer and Team Manager
    Data Breach Investigations Report (DBIR)
    Verizon Business Group

    Gabriel Bassett
    Data Breach Investigations Report (DBIR) Co-author
    Verizon Business Group
  • Panel: Driving Business Opportunities with IoT at the Edge
    Panel: Driving Business Opportunities with IoT at the Edge
    Jeanne Morain, iSpeak | Steve Smith, CoreSite | Ken Hosac, Cradlepoint | Karthikeyan Gunasekar, Aruba Recorded: May 19 2020 49 mins
    Today, 90% of all data is created and processed inside traditional centralized data centers or clouds. However, according to Gartner, by 2025, 75% of data is going to be processed at the Edge.

    With such a massive shift, what business opportunities will IoT at the Edge bring? Join this panel where experts explore the impact of IoT and Edge - including challenges as well as opportunities - in:

    - Smart cities
    - Retail
    - Manufacturing
    - Healthcare

    Panel:
    Jeanne Morain, Founder, iSpeak Cloud (moderator)
    Steve Smith, CRO, CoreSite
    Ken Hosac, VP of IoT Strategy & Business Development, Cradlepoint
    Karthikeyan Gunasekar, Category Lead EMEA, Aruba, a Hewlett Packard Enterprise company
  • Webroot Threat Report 2020 and Covid-19
    Webroot Threat Report 2020 and Covid-19
    Tyler Moffit Recorded: May 19 2020 61 mins
    How is COVID-19 effecting cybersecurity? How are cybercriminals capitalising on a thirst for information—and the desire to help others—to turn a quick buck?

    You’re invited to join Webroot security analyst Tyler Moffitt for a webinar analyzing threat activity including malware, phishing, and cryptojacking that’s arisen in response to COVID-19.

    Ensure your clients are resilient against this new strand of attacks by joining our webinar.
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout May 26 2020 12:00 am UTC 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Security Awareness Training – Your best line of defence
    Security Awareness Training – Your best line of defence
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ May 26 2020 1:00 am UTC 39 mins
    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
    So how can you better protect yourself, your organisation, and your end users?
    Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
  • Por qué le llaman SD-WAN cuando lo que necesitas es SD-Branch?
    Por qué le llaman SD-WAN cuando lo que necesitas es SD-Branch?
    Pedro Martinez Busto May 26 2020 2:30 am UTC 58 mins
    Por qué le llaman SD-WAN cuando lo que necesitas es SD-Branch?
  • Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz May 26 2020 8:00 am UTC 48 mins
    Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
    Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?

    In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:

    - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
    - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
    - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
    - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können

    Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.

    Deutsch
  • Security Awareness Training –Your best line of defence
    Security Awareness Training –Your best line of defence
    Paul Down, Director & Matt Cooke, Cyber Security Specialist May 26 2020 9:00 am UTC 31 mins
    How susceptible are your users to email attack?
    Join our experts to discover new highly-crafted lures and tricks used by cyber criminals in 2020.
    Learn how to strengthen your last line of cyber defence : your people

    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.

    So how can you better protect yourself, your organisation, and your end users?

    With this webinar you’ll get a better understanding of:

    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)

    Join us to review 2020 best practice in security awareness training

    ABOUT PROOFPOINT
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout May 26 2020 9:00 am UTC 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • SD-WAN Orchestration
    SD-WAN Orchestration
    Maniraj Durairaj: Technical Lead – ERT May 26 2020 11:00 am UTC 60 mins
    Aruba Central, a highly scalable cloud-native management system, includes an SD-WAN Orchestrator. This allows IT to quickly and efficiently set up routes and tunnels—based on business policy—across the entire organization: branch offices, headquarters, enterprise data centers, and even virtual private clouds (VPC) inside providers such as Amazon Web Services (AWS) or Microsoft Azure.
  • Formation de sensibilisation à la sécurité /dernière ligne de défense / Français
    Formation de sensibilisation à la sécurité /dernière ligne de défense / Français
    Quentin Habert, Expert en cybersécurité, France & région SEMEA, Proofpoint May 26 2020 12:00 pm UTC 34 mins
    Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.

    D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
    Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?

    Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.

    Dans ce webinaire, vous découvrirez comment :
    • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
    • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
    • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
    • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).


    Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.

    Présenté en Français.
  • What's new in UFT 15.01?
    What's new in UFT 15.01?
    Warren Fisher, iOCO May 26 2020 1:00 pm UTC 60 mins
    Recently Micro Focus announced the release of Unified Functional Testing (UFT) 15.01. This version sees the introduction of several new and noteworthy capabilities for existing customers - and new prospects - looking for a solution in the highly dynamic domain of application functional testing. In this webinar we will outline these new features and their benefits. We will include a short demo and overview of UFT, the new features and how UFT can be used in your CI/CD pipelines to simplify and automate application testing. Please join us and feel free to ask any questions related to UFT and application testing that you may have and we will use the Q&A session at the end of the webinar to address these.
  • Master the Art of Zero-Touch Deployments
    Master the Art of Zero-Touch Deployments
    Jim Grandbois May 26 2020 2:00 pm UTC 25 mins
    In the era of zero-touch deployment, IT can now successfully deploy Mac, iPad and iPhone to users directly without ever having to open the box. Apple’s deployment programs enable this by automating enrolment and configuration from a central location — eliminating the need to ever physically touch the device.

    In this webinar, Master the Art of Zero-Touch Deployments, we will demystify Apple’s deployment programs and walk through what it takes to implement these programs in your organisation.
  • Security Awareness While Working Remotely
    Security Awareness While Working Remotely
    Ken Thon May 26 2020 3:00 pm UTC 60 mins
    Has being at home made us more lax about cybersecurity? At work 49% of respondents said they had clicked links to messages from unknown senders so, what does this mean for employees working remotely? Join Ken Thon to see how you can keep yourself security aware while working remotely.
  • Hear about the ServiceNow Agile transformation journey
    Hear about the ServiceNow Agile transformation journey
    Debbra McGrath, Rani Pangam, Nick Tudisco May 26 2020 4:00 pm UTC 54 mins
    Like any enterprise, ServiceNow has a growing portfolio of IT projects and needed a way to improve quality of services and accelerate delivery cycles — ultimately creating value for business stakeholders. Our IT organization’s journey to adopt Agile transformed IT project management to enable smarter use of time, expertise, and resources.

    In this webinar, hear our IT practitioners discuss how our IT organization adopted Agile and SAFe® practices and solutions to transform IT project management and make smarter use of time, expertise, and resources. We’ll discuss our Agile journey, including the challenges we faced, the lessons we learned, and our future plans.

    Attend this webinar to….

    -Get insight into how our PMO and Agile delivery teams are accelerating time-to-market while increasing quality, employee satisfaction, and velocity by implementing an Agile methodology.
    -See how Agile and SAFe allowed us to improve planning accuracy, forecast work levels with more precision, and easily manage stories across sprints, backlogs, and epics.
    -Learn how Agile solutions provide a platform to pull software development lifecycle workflows together in one system and connect them to other activities already taking place in our enterprise.
  • Arm Mini Webinar Series: A Deployer's Route to IoT at Hyperscale
    Arm Mini Webinar Series: A Deployer's Route to IoT at Hyperscale
    Dr. Juan Nogueira-Nine, Jack Ogawa, Charlene Marini, Pete Swabey & Bob O'Donnell May 26 2020 4:00 pm UTC 60 mins
    Webinar 1: Managed IoT Devices with simple security, efficiency and AI
    Join experts from Vodafone, Flex, Atos, Cypress (An Infineon Technologies Company), Altair Semiconductor, Arm and The Economist to learn more.

    The current crisis is showing us the importance of precise and reliable data. It has highlighted how thinking it's obvious what's in a box marked 'PPE' and being certain of its contents can be at odds. How vital it is to track production line operations in real-time when stoppages cannot be tolerated, and how data-driven processes across any system can be fine-tuned when every element of the system is connected and manageable. It's not a test anyone wanted to see but we are now seeing the true potential of a global IoT, and the data-driven insight and actions it can enable.

    But driving a pervasive IoT to take connected industries, businesses and people to the next level of value and control is not simply a case of deploying more devices. Considerations such as clearly defined objectives, security, component interoperability, speed to market and turnkey vs tailored solutions are all areas that must be tackled before embarking on a commercial IoT journey.

    Join two webinars with industry experts at the cutting edge of IoT evolution debating what they think happens next. How they imagine the vision of a Hyperscale IoT can become a reality.

    Hear about the compute curve is driving up the potential for IoT but how opportunities must be weighed against the need to protect system value through choices made at the outset of any IoT deployment.

    Panelists:

    Global device maker Flex's Senior Director of Connectivity Dr. Juan Nogueira-Nine

    Senior Director of Embedded Products Jack Ogawa, Cypress, An Infineon Technologies Company

    Arm’s VP/GM of the Devices IoT Platform BU Charlene Marini

    The Economist Intelligence Unit's Editorial Director Pete Swabey

    With panel moderator Bob O'Donnell from analyst firm TECHnalysis
  • TEM Expo Webinar 8 - Benchmarking TEM Metrics
    TEM Expo Webinar 8 - Benchmarking TEM Metrics
    Hyoun Park May 26 2020 5:00 pm UTC 30 mins
    This 30 minute webinar will provide a framework for benchmakring technology expense management efforts. This webinar serves as a preview for Amalgam Insights' Technology Expense Management Virtual Expo on June 11 to help IT to solve its 3 key problems in the Time of Corona:

    1) conserving cash
    2) supporting remote workers, &
    3) protecting the company

    TEM Expo Pre-Event Webinar Schedule

    April 21 - 6 Stages CIOs Must Consider to Manage COVID IT
    April 23 - Telecom and Network Expenses
    April 28 - Managing Wireless Expenses
    April 30 - Managing SaaS Expenses
    May 5 - Managing IaaS: The Mixed Blessings of Overwhelming Detail
    May 7 - 6 Stages CIOs Must Consider to Manage COVID IT (repeat)
    May 12 - Building IT Inventory
    May 14 - Telecom and Network Expenses (repeat)
    May 19 - Managing Service Orders
    May 21 - Managing Wireless Expenses in the Tween Years (repeat)
    May 26 - Benchmarking TEM Metrics
    May 28 - Managing SaaS Expenses (repeat)
    June 2 - Payment and Invoice Processing
    June 9 - Managing IT Finance


    And the Big Event, TEM Expo 2020, is July 14 at https://amalgaminsights.com/temexpo/
  • 코로나 19 시기에 원격 접속과 비즈니스 보안
    코로나 19 시기에 원격 접속과 비즈니스 보안
    강 민 석, 기술 이사, 네스랩 (비욘드트러스트(BeyondTrust) 공식 배급사) May 27 2020 1:00 am UTC 60 mins
    코로나 19의 전 세계적 유행이 사이버 범죄를 급증시키고 있는 것은 그리 놀라운 일은 아닐 것입니다. 공격자들은 사람들의 공포를 이용하여 비즈니스 정보와 개인 정보를 노립니다.

    이러한 위기의 시기에 제일 먼저 선행해야 할 과제는 올바른 보안의 강화일 것입니다. 아시아 태평양 지역의 많은 직원들이 재택 근무를 해야 하는 상황이 되면서 회사, 대학 그리고 정부 기관들은 새로운 원격 근무 정책을 수립해야 합니다.

    하지만 원격근무를 확대함에 따라 보안 위협도 증가하며, 특별히 IT와 지원 인력들이 임시적으로 보안 상 안전하지 않은 원격 접속 툴들을 사용하고 있습니다.

    BeyondTrust와 (ISC)²가 2020년 5월 27일 오전 10시 (한국 시각)에 준비한 특별한 웨비나에 참석하십시오.
    - 원격 근무 확장에 따른 위협들과 고려해야 할 보안 요소들
    - 원격 접속 툴들의 취약점 및 위협 요소들 (개인 디바이스 및 관리 되지 않은 솔루션들)
    - 장기적으로 원격 근무를 지원하기 위해 강력한 보안 정책을 확장하기 위한, 그리고 빠르게 구축하기 위한 올바른 정책 가이드
    - 기술 시연: 성공적인 보안이 전제된 원격 접속 정책을 위한 실 사용 예

    발표자: 강 민 석, 기술 이사, 네스랩 (비욘드트러스트(BeyondTrust) 공식 배급사)
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • Keep Connected Series Episode 2: Keep Contact Centres Connected
    Keep Connected Series Episode 2: Keep Contact Centres Connected
    Craig Palmer, John Greenwood, Nick Simms and Cary Cusumano. May 27 2020 3:00 am UTC 49 mins
    Welcome to ‘Keep Contact Centres Connected’.

    The ‘Keep Connected’ series was created to help businesses achieve continuity – and even discover better ways of working – in today’s increasingly uncertain landscape. In the second instalment, our panellists will be discussing how to keep contact centres connected and in touch with customers.

    In light of recent events, contact centres have been facing new pressures and have been all the more crucial to how organisations reach their audience. At the same time, contact centre teams are adapting to working from home and new processes.

    In this webinar, our online panellists will be talking you through the steps to take when your contact centre is adapting to change. They’ll be discussing fundamental considerations around whether your environment is set up to allow home workers to take payments, as well as practical challenges, for example, if your employees have the right equipment at home to enable them to do their jobs.

    They’ll also be exploring how to use social channels and automation to improve response times, and looking at the customer experience as a whole.

    Join us, as our panellists explore the key considerations in keeping contact centres connected in unusual times.

    Moderator:
    Craig Palmer – Director of Contact Centre Solutions, Verizon EMEA.

    Panellists:
    John Greenwood – Director of Thought Leadership, Compliance3 Limited.
    Nick Simms – Operational Resilience Director, Cornwood Consulting.
    Cary Cusumano – Customer Experience Designer, Verizon.
  • 无惧前行-新数字经济场景下的特权访问管理
    无惧前行-新数字经济场景下的特权访问管理
    路军龙 (Sam), CISSP, CCSP, 解决方案架构师, CyberArk May 27 2020 3:00 am UTC 60 mins
    随着客户需求不断变化,企业数字化转型正当时: 云优先策略,持续集成、持续交付的DevOps理念逐渐被采用:

    - 拥抱新技术的同时企业面临的技术风险是什么?
    - 为什么特权访问管理变得越来越重要 ?
    - 如何使用特权账号安全方案避免风险?
    - 如何消除传统应用和容器化应用内嵌特权账号,避免滥用特权账号带来的重大安全隐患,保障业务不停顿运行?
    - 与时俱进的解决方案、解除第三方软件开发商远程特权会话安全接入风险的长久之道

    参加 CyberArk 和 (ISC)² 在5月27日上午11:00的在线研讨会《无惧前行-新数字经济场景下的特权访问管理》,通过“像攻击者一样思考”,您将了解到如何快速化解企业的特权账号安全和风险管理挑战,从而积极主动地防御外部恶意攻击并增强合规性。

    演讲人: 路军龙 (Sam), CISSP, CCSP, 解决方案架构师, CyberArk
    主持人: 阎光, CISSP, (ISC)² 上海分会会员主席

    *本次在线研讨会将以普通话进行
  • Future Of Entertainment: #1 Benefits & Options with Android TV Operator Tier
    Future Of Entertainment: #1 Benefits & Options with Android TV Operator Tier
    Magnus Lindhe (Tele2) & Pierre Donath (3SS) May 27 2020 2:00 pm UTC 30 mins
    Join the Masterclass of our new series "Create the Future of Entertainment" with Magnus Lindhe (Tele2) and Pierre Donath (3SS). In this 30 min live webinar, we will share our experiences from deploying Com Hem Tv Hub as the first hybrid Android TV Operator Tier Custom Launcher worldwide, and focus on the benefits and options for operators. We will wrap up with an open live Q&A, where we will answer your burning questions.

    Together we’ll answer:
    ➡️ Why should I choose Android TV?
    ➡️ What is the difference between Custom and Standard Launcher?
    ➡️ How does the collaboration with Google work?
    ➡️ What are the key success factors to ensure to launch in time and budget?

    Let's create the Future of Entertainment together!
  • Exploring SASE and the Future of Network Security
    Exploring SASE and the Future of Network Security
    Dave Barnett, Dynamic Edge Sales Specialist Director, Forcepoint & Mike Smart, Director of Product Marketing, Forcepoint May 27 2020 4:00 pm UTC 32 mins
    SASE (Secure Access Service Edge) is a way to re-architect secure connectivity and is designed to help security and risk management leaders address the changes posed by digital transformation.

    Forcepoint experts Dave Barnett and Mike Smart discuss shifting infrastructures and the benefits of a single cloud-first platform. Security and IT leaders can discover key use cases for SASE:

    - Improved branch office and remote user connectivity
    - Simplified protection of users wherever they sit
    - Visibility and control of cloud-based apps and data
  • How to quickly and securely verify consumer identities online
    How to quickly and securely verify consumer identities online
    Jenn Markey, Product Marketing, Entrust Datacard May 27 2020 4:00 pm UTC 30 mins
    2020 has brought about a new normal. One of the biggest changes has been the rapid rise in businesses and consumers interacting and transacting online. While ecommerce, online banking, and other digital services are hardly new, many people and businesses that were slow to adopt such models now find themselves wanting, and in many cases, needing to go online. And that introduces the challenge of securely verifying customer identities, especially when an in-person identity check is not feasible.
    Modern identity proofing keeps your customers safe and protects your organization.

    Learn best practices to:

    - Securely verify consumer identities
    - Limit user friction in the verification process
    - Protect consumer identities
    - Minimize fraud exposure
  • Live Demo: Ramping Up People-Centric Security for BEC & EAC
    Live Demo: Ramping Up People-Centric Security for BEC & EAC
    Joel Sierra, Sales Engineer at Proofpoint May 27 2020 5:00 pm UTC 45 mins
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric security journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people from impostor email attacks, like business email compromise (BEC)
    - Investigate and respond to the risks of email account compromise (EAC), including internal email threats sent from compromised accounts
    - Prevent risks associated with personal webmail and risky websites sent via corporate email
  • BubbleUp: Ask Any New Question. Again & again.
    BubbleUp: Ask Any New Question. Again & again.
    Michael Wilde, Kelly C. Gallamore May 27 2020 5:00 pm UTC 60 mins
    Your users are experiencing latency now. You have all of these tools. And still: finding the issue—and then the solution!—is so. very. hard. Too often, troubleshooting service latency just feels more guesses in the dark.

    Running queries and getting results fast should be table-stakes. Honeycomb’s unique BubbleUp feature visualizes outliers over baseline behavior, allowing you to investigate across services, ask novel questions, and drill down to the culprit of sub-optimal performance. Ask any question and get results fast, no matter how many fields, without writing new code.

    In this episode, we will show how BubbleUp helps surface anomalies to show unexpected behavior. Achieving observability like this has never been more accessible. Come join us live and ask us questions. It’s better with you there.
  • SSCPオンラインチャレンジセミナー
    SSCPオンラインチャレンジセミナー
    小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan & 安田良明, CISSP, SSCP, (ISC)² 認定講師 May 28 2020 7:00 am UTC 120 mins
    CISO や CSIRT の設置により、情報セキュリティ体制を強化している組織が増えてきている中、情報セキュリティやリスクマネジメントを実践しているが情報セキュリティが一向に向上しないのはなぜだろうか、現場の情報システム・情報セキュリティ実務者を育成しているが、情報セキュリティの運用がうまくいかないのはなぜだろうかなど課題を抱えている組織が多いのが現状です。

    現場の実務を支える実務者の育成は耳ざわりがよい知識と技術を身に着ければよいというわけではなく、「組織」という観点を理解し、情報セキュリティ専門家や経営陣とコミュニケーションを図れる人材でなければなりません。そのため、IT全体にわたる知識とスキルがあり、ネットワークやシステムの開発・運用などに従事する人に必要な知識に加え、確実なセキュリティ対策を実装・維持できる技術的な観点だけではなく「組織」という観点から情報セキュリティを理解している必要があります。

    SSCPの7ドメインは、情報セキュリティの運用から基本的な情報セキュリティの実務に必要な知識を取り扱い、情報セキュリティを専業としていない実務経験年数が少ない方にとっても、より実践に近い内容をグローバルの標準に則って理解することが期待できます。今回のオンラインセミナーでは、「現場の情報セキュリティ担当者に必要な情報セキュリティの知識と考え方」として、IT全般のエンジニアやサポート技術者、アナリスト担当者が知っておくべき情報セキュリティの知識をわかりやすくお教えします。

    SSCPを受験させてみたいけど、どのような内容になっているのかわからないというユーザー企業の管理職の皆さんにも理解しやすい内容で提供させていただきます。

    システム開発や情報システム担当者の皆さんにも効果的な内容となっています。

    Speaker: 小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan
    Instructor: 安田良明, CISSP, SSCP, (ISC)² 認定講師
  • Protégez votre vecteur de menaces N°1 :  le courrier électronique (en français)
    Protégez votre vecteur de menaces N°1 : le courrier électronique (en français)
    Nicolas Godier, Principal System Engineer, Proofpoint France May 28 2020 8:00 am UTC 60 mins
    Selon le Data Breach Investigations report 2019 de Verizon, 32 % des incidents entrainant une violation de données impliquent le phishing, et 94 % des malwares sont transmis à partir d’un courrier électronique. Au vu de ces chiffres, il est clair que l’email continue d'être une surface d'attaque importante mais également un vecteur significatif quant à la fuite de données sensibles. Quelle est la meilleure façon pour les organisations de protéger leurs employés de ce vecteur d'attaque fréquemment exploité ?
     
    Assistez à la présentation de Nicolas Godier pour découvrir comment suivre l’évolution rapide du paysage des menaces et les meilleures pratiques pour protéger vos collaborateurs et vos données des attaques par courrier électronique. 
     
    Au cours de ce webinar, nous partagerons :
    - Les dernières données sur les menaces et les tendances en matière de cyberattaques par courrier électronique
    - Comment défendre au mieux vos collaborateurs et vos données contre les attaques ciblées
    - Comment rationaliser votre processus de réponse aux incidents

    Webinaire en Francais
  • Modern Uses of Thermal Imaging and Computer Vision Technologies
    Modern Uses of Thermal Imaging and Computer Vision Technologies
    Michael Knight, Global CTO, Safety and Security – Industry Edge, Dell Technologies May 28 2020 3:00 pm UTC 30 mins
    Welcome back to Dell Technologies Innovation Webinar Series. In this conversation we will explore and focus on the “Modern Uses of Thermal Imaging and Computer Vision Technologies”. The next generation of safety and security solutions such as thermal imaging and computer vision are being used in novel ways in today’s world, and we believe this is only the beginning.