On May 16 we will be kicking off our CISO Career Development Series with AMTRAK’s CISO, Ron Baklarz. Ron will be discussing the salient points of his career path while touching on how the typical CISO career path has changed over the last decade. Specifically, he’ll venture into how the CISO role
On May 16 we will be kicking off our CISO Career Development Series with AMTRAK’s CISO, Ron Baklarz. Ron will be discussing the salient points of his career path while touching on how the typical CISO career path has changed over the last decade. Specifically, he’ll venture into how the CISO role itself has morphed from purely technical to a more holistically business-minded position. He’ll touch on typical challenges that new CISOs encounter as well as some best practices that have served him well over his long career.
RecordedMay 16 201249 mins
Your place is confirmed, we'll send you email reminders
Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.
Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.
With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.
The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
•Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
•Better Security: Helps protect identity, data and devices against modern security threats
•Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications
Watch this webcast to:
•Discover Windows 10 productivity, security and manageability features that new hardware lights up
•Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
•Get additional resources to evaluate when it might be time for new devices and what devices are right for you
Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.
While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.
Key takeaways include:
• Why the shift to Office 365 increases criticality of email security
• Common pitfalls to avoid in the planning stages
• Key security capabilities to protect from advanced threats
Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.
Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
Gartner stated that they expect 75% of mobile security breaches to come through mobile apps instead of the OS, but few are talking about the risk, how it happens, and how to be protected from the mobile risk.
Join us for a live demonstration of TAP Mobile Defense, the newest addition to the Proofpoint Advanced Threat Platform, as we discuss and demonstrate the technology including:
•Why these dangerous mobile apps get through app stores
•How to immediately see the risks facing your organization due to mobile apps
•What countries are receive your sensitive data from your mobiles apps
•How to take action against these mobile threats via few easy clicks and configurations
With Agile and DevOps practices in the forefront, the approach to the software development lifecycle demands a constant shift-left/right. It’s no secret that release cycles are accelerating. But how do you keep pace with the demands for faster, better, more complete testing?
Agile and DevOps testing teams need to:
• Collaborate to accelerate test design and maintenance
• Share the same IDEs, tools and templates
• Integrate with other testing processes and open technologies for continuous delivery
To achieve this you need a solution specifically built for continuous testing and continuous integration.
HPE Lean Functional Testing (LeanFT) is a powerful and lightweight tool that is perfect for developers, testers and automation engineers who practice Agile and DevOps. This web event will deep dive on the drivers for migrating to LeanFT, and challenges that you would encounter when implementing this transformation from a people, process and technology standpoint in the context of your current organization. It will also decipher the secret sauce to take a systematic approach to drive transformation (re-engineer process, people and technology) on your current automation initiative.
It may be a mobile-first world, but the truth is, consumers are device-agnostic. Depending on their circumstances, they’ll easily transition from cell phone to laptop and from iPad to smart TV. Similarly, they’ll move easily among communication channels from email to push notification to social platforms on those same mobile devices. For marketers, this makes for a complex maze of touch-points and engagement, not to mention signals and data – and unless you’re focused on creating a seamless omnichannel experience, you’re likely to leave money on the table and your customers feeling you really have no idea what they’re doing from one moment, or channel, to the next. Whether you're just building your mobile marketing strategy or still pulling levels to try to cram your standard messaging into the mobile platform, we're here to help.
Now is the time to master the omnichannel challenge – and in this webinar we’ll look at the trends that winning companies are capitalizing on and the solutions necessary to create a seamless omnichannel customer experience -- whether you're mobile first, mobile only or mobile-sometimes.
In this webinar you'll:
* Learn why today’s mobile marketing automation solutions fall short of customer expectations
* Craft winning omnichannel marketing strategies balance mobile push notifications, in-app messages, email, and social communications
* Understand users on a personal level, and not device level, and why that is critical in mobile
* Prepare for the transition from “Mobile Marketing” to “Communicating” in your organization -- and beyond.
* Mark Josephson, CEO, Bit.Ly
* Sean Blankenship, CMO, Coldwell Banker
* Heather Marie, CEO, Shoppable
* Stewart Rogers, director of marketing technology, VentureBeat
* Wendy Schuchart, moderator, VentureBeat
Join Kevin Burden, 451 Research's Vice President of Mobility and Data Strategy and Declan Lonergan, Vice President of Mobile Telecom for a webinar on the state of the global wireless market. This interactive session will highlight key service trends driving the global mobile industry forward. It will focus on the metrics that benchmark mobile network operator performance including the growth in registered lines, 4G migration, prepaid/postpaid trends and growth in cellular data consumption.
This session will answer key questions such as:
• Which mobile markets will have the strongest growth in connections over the next five years?
• Can the growth in connections compensate for declining ARPU levels to keep service revenue growing?
• How will data traffic grow over the next five years and which types of devices, services and air interfaces will see the highest growth and volume during that period?
• How quickly will the data consumption per device double from the 2.6GB per month average it currently tops off at in the US and are there regions that will double even faster?
Hewlett Packard Enterprise brought together 60 business leaders to discuss about digital disruption. With a killer keynote by Geoffrey Moore, a lively panel of top executives and a thought-provoking session by IDC’s Thomas Meyer, the evening turned out to be inspiring and rich of insights.
Enterprise wide area networks span tens, hundreds, thousands and even tens of thousands of branch offices resulting in a large hardware footprint, high power consumption, and significant cooling demands. It is no wonder that these networks can have a substantially negative impact on expenses, time and the environment.
Join this webinar to learn how a cloud-delivered software-defined wide area network (SD-WAN) is green, lowers carbon footprints and is good for the environment and Earth. Gain a better understanding of how reducing cooling and power requirements in the branch, lower carbon emissions and fewer devices is helping businesses do more for the environment while at the same time saving money.
Policy is the corner stone of any risk-based security programme. Policies are put in place not only to govern the way organisations operate, but also to mitigate risks, and as such require board level backing and sign-off. Yet when it comes to security programmes information risk, both internally and externally, is often presented in terms un-meaningful to the board of directors. Using real world example, this session will present a model for effective risk-based security that engages senior executives.
The business of cyber security is here today and growing. Innovations in technology have provided organizations with numerous opportunities for new products, markets, and distribution channels. At the same time these innovations have dramatically increased the risk profiles for companies of all sizes and across all industry segments.
The biggest vulnerability we face today and in the future is the misperception of risk. A perfect storm of risk has been brewing for decades and has hit with full force the past few years. It has moved from a backroom issue to the boardroom and many have not been prepared. Many more still aren’t prepared.
This discussion will be about cyber risk leadership exploring the threat and vulnerability cycle and the potential future trends as they related to Information and Technology risk. We will discuss the risks so that a non-security person that is in the c-suite can comprehend cyber risks. It will be communicated not from the doom and gloom that many in the security industry so readily create to scare people in to purchases but in the context of the enterprise risk and the top 10 universal business risks. We will also discuss what everyone needs to look for in security solutions to ensure they meet what is required to achieve the goals of the business.
The lessons from this interactive session will allow you to not only provide ideas on how to capitalize on technology to improve your business but also offer practical ways to protect the business so that you can survive and thrive in this new environment.
Did you know a New Zero-Day vulnerability is discovered each week? This is twice the Rate of a Year Ago as Advanced Attackers Exploit, Stockpile and Resell High-Value Vulnerabilities!
A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track.
Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 21st edition and invite you to join this webcast to develop company-wide security culture and the best ways to mitigate your most pressing risks; driving your security program.
Our webcast agenda includes:
• How attacker techniques are evolving
• Why vulnerabilities are still being exploited
• The dramatic rise in ransom ware
• Our simple steps that can yield big improvements across your security
If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation.
A recent study by Ponemon showed that the likelihood of an enterprise data breach of involving more than 10,000 records is approximately 22%. This risk, with an average associated cost of $3.79 million, has catapulted cloud security into an executive and board level.
What key metrics should you track and share with your board? How should you structure your cloud security strategy to best protect your organization?
Join Skyhigh Networks and CSA for a discussion of best practices that leading enterprises have embraced for managing and communicating cloud risk with the board.
In this session, you’ll learn how to:
• Develop a comprehensive cloud security and governance framework
• Map your organization’s maturity based on current practices
• Identify key business outcomes across the 4 pillars of cloud security
• Implement best practices for presenting cloud security metrics to the board
Registrants will also receive a “Cloud Security and Governance Report for Executives and the Board” template to jump start the discussion. We look forward to seeing you at the webinar!
Security is not rocket science. Developing an effective and efficient enterprise security program starts with strong culture and risk communication. Ditch the old school security ways and embrace the millennial approach. The pillars of the millennial approach to security are: developing a positive security culture, making secure business processes easy, fostering enduring business relationships, constant communication with executives, and getting the biggest bang for your limited bucks with risk prioritization.
There is an assumption that the more you spend on security technology, the more secure you will be. However, it is evident from the media that even though organisations are spending many on security products they are still being breached. Majority of organisations are falling back on 'historical, layered defence strategies’ with the tendency to think that by merely upgrading software and building up walls, their organisation is safe, but what if the attacker dug underneath the wall?. Does this demonstrate they are spending effectively and keeping their organisation secure?
In this webinar, we will discuss why organisations don't need to spend more on security to be better protected but need to spend wisely with the budget they already have. Organisations continually need to think about how they readjust and refocus on strategies that enable them to be resilient and recover from a cyber-attack. The webinar will cover:
Spend vs Resiliency – is it proportionate?
Strategy for protecting what really matters
Focusing on the 5% of alerts that really matter
Join Richard Turner, FireEye President of EMEA, as he continues his discussion around taking the ‘Risk message of Cyber Secuirty to the board’
Ransomware is on the rise. Only in the first quarter of 2016 a dozen of new families have emerged with Locky leading the way. This webinar will summarize who are the new players, and their technical ability to perform in the ransomware market against the well-established TeslaCrypt and Cryptowall. We will also dive in on how companies can protect themselves against ransomware in general and some of this malware in particular.
Irene Michlin, Managing Security Consultant, NCC Group
Even the most security-minded organisation has limited budget and staff. How to decide where to spend these resources to provide maximum benefit to your organisation?
In this webinar Irene Michlin will discuss how your organisation can establish a repeatable process for decision making in such areas as:
•What and when to test
•Which threats urgently require mitigation
•What security training your staff needs
Hadi Hosn, Head of Security Strategy & GRC Consulting, EMEA
For many organisations, investments in new processes and technologies is on top of the priorities list. From behavioural analytics, big data solutions, and “one touch” processes that require no manual intervention, companies are always on the lookout for technology innovations that can achieve a considerable return on investment. When companies consider Cyber Security in such a technology dependent world, most ask, “How can we secure our business and comply with the changing legal and regulatory standards?” instead of “How do we make business focused, intelligent investments given the cyber security risks we face today?”
In this webcast, Hadi Hosn, Head of Security Strategy & GRC Consulting at Dell SecureWorks, will discuss the risk based Cyber Security operating model to help companies identify and protect their most critical information assets and business processes. Hadi will focus on the most critical actions for any organisation building a risk based security programme.
Key topics covered include:
· Prioritising information assets based on value to the organisation
· Identifying and prioritising risks to the assets
· Reduce risks with quick wins
· Build and deliver a security plan that aligns business and technology
· Ensure continuous business engagement on the topic of cyber security
As cyber security risks increase in sophistication and number, organisations need to switch from responding to incidents, to identifying them to prevent them before they occur.
Developing a robust risk based approach to security needs to focus on supporting organisations to prioritise threats, understand the techniques that may be employed as part of the attack and evaluate the capability of controls to prevent, detect and respond to an attack. Without this knowledge, an organisation would struggle to determine the level of exposure to particular threats and if their cyber incident response plans are structured and ready to address these threats when they arise.
During this webinar, Steve Durbin, Managing Director of ISF, will discuss the need for a risk based approach to security and why it is an essential component to today’s business.
Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The second webinar in the series will cover the topic of Board Presentations from an IS executive perspective. This session focuses on reporting the right metrics to the right people. What metrics should the CISO collect? Where do these metrics exist? What are the best ways to present this information to the board of directors and other organizational leaders?
J. Trent Adams, Director of Ecosystem Security, PayPal
Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.
Key Talking Points:
- Cloud security relies on standardized Internet security protocols.
- Developing Internet security protocols requires multistakeholder involvement.
- Key areas of focus include securing: transport, content, communication, and authentication.
- Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3
- Internet security is constantly evolving; adapt or perish.
Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The first webinar in the series will cover the topic of Asset Management from an executive perspective. This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage your asset information? What relationship do asset management and change management share?
Jim Reavis of CSA, David Baker and Arturo Hinojosa of Okta
According to the 2016 Top Threats report from CSA, the ramifications of poor cloud computing decisions is no longer an IT issue but rather a boardroom issue. Executives at the highest levels are under scrutiny about security posture, and their response to a breach, from stakeholders, regulators and consumers.
The growth of cloud and mobile technologies in the workplace has forced IT and security professionals to re-think their security strategy. A traditional network perimeter built on firewalls, VPNs, IDS, and DLP does not address the new threat landscape of phishing, social engineering, and data breaches.
Join CSA CEO, Jim Reavis and Okta CISO, David Baker, for a discussion on the top threats organizations face, how the landscape is changing and best practices for improving the security of your organization.
You’ll take away:
-Highlights from the CSA 2016 Top Threats report
-How to build a new security perimeter based on user identity, capable of detecting and stopping attacks in real time
-How to improve visibility into user behavior and implement controls without sacrificing productivity
Karna Bojjireddy Security Product Manager, SoftLayer, Manish Aggarwal Product Manager, IBM Cloud, Sunil Jain, Tech Lead Intel
Cloud security remains one of the top barriers to the adoption of cloud computing (Gartner top 3) and drives a need for new and broader security measures that go beyond traditional enterprise IT security tools and practices.
Join security experts from IBM, SoftLayer and Intel® for a comprehensive webinar about the cutting-edge products and services that deliver unparalleled control and data security in the cloud. In this webinar, you will receive:
Practical and technical advice can be applied immediately to help secure your organization's IT environment using SoftLayer's security-rich environment for deploying and running customer workloads.
A full overview of the chip-level Intel®TXT security available first in the cloud at SoftLayer. Lastly learn more about IBM Cloud Data Encryption Services™ about Data protection, resiliency, security and storage.
As organizations transition from on-premise data storage and device-centric security to the cloud, the need for a data-centric solution becomes critical. Organizations need the ability to protect data in the cloud, at access, on the network, and across all devices. While cloud app vendors now offer robust functionality, they lack the level of granular control and deep visibility many organizations need, either for compliance purposes or simply to enable an increasingly mobile workforce.
In this webinar, we'll discuss how CASBs leverage APIs and proxies to control data on both managed and unmanaged devices, enabling secure SaaS and BYOD. Join us to learn how Cloud Access Security Brokers can help protect data in the cloud by providing comprehensive security and real-time data protection.
Throwing a safety net over mobile cloud app usage leaves the enterprise having to balance manageability and security against the user experience. This session covers how you can gain visibility into mobile cloud app usage, defend against malware and threats, and enforce corporate policies for mobile—all while enabling BYOD and protecting the user experience.
Michael Kaczmarek, Sr. Director of Product Management, Verisign
Cyberattacks are a threat to businesses worldwide, and they are getting larger and more sophisticated. The industry’s approach to protecting against these threats must change fundamentally to stay ahead of this growing threat. For too long, the problem has been tackled piecemeal, using isolated devices or services, but protecting against advanced cyberattacks requires communication and coordination among many components – from networking equipment, to specialized appliances, cloud-based services, as well as actionable threat intelligence.
A shift in security architecture is needed, to an open platform where devices and services from different vendors can share, and act, on threat intelligence information, all in concert and in the proper context. It must be a hybrid platform; allowing on-premises security appliances to detect and mitigate attacks, locally, while automating alerts, and switchover, to cloud-based services should an attack threaten to swamp the business’ network connection.
Join Michael Kaczmarek, Sr. Director of Product Management, and learn how to assist with designing a resilient security ecosystem by maximizing an API-centric approach. In this session, Mike will discuss how to:
· Evaluate the Threat Landscape
· Design for Both Security and Flexibility
· Prepare for Incidents – Orchestrate Responses
· Expand to a Hybrid Premise and Cloud Security Architecture
Ransomware is an ever-increasing threat to enterprises and new strains are being seen on a regular basis. This presentation starts by tracing the history of ransomware from its roots as being not much more than an annoyance, to the current highly sophisticated encrypting varieties.
Following this will be a deep dive into how the malware is delivered to the victim, and an analysis of the different stages of an attack.
Finally, we will look at methods of mitigating the attack in order to minimise or eliminate the damage done.
Mitch Sherfey, Principal Product Manager, Data Center Automation
Join us for an exclusive preview of the new BMC product developed to address your security needs! Watch and see how you can eliminate risks and reduce your attack surface by providing Operations teams with actionable data combined with automation. Help your Security and Operations teams address threats and vulnerabilities based on impact and priority.
Watch as Principal Product Manager Mitch Sherfey demonstrates how the tool:
- Provides a customized “to do” list to address threats based on policy and impact – ensuring the most critical issues are fixed first
- Offers Security teams a first-time ever view into operational plans – providing visibility into planned actions, predictive SLAs, and burndown views
- Creates an automated and standard process for Security and Operations teams to enable the relentless pursuit of threats
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.