On May 16 we will be kicking off our CISO Career Development Series with AMTRAK’s CISO, Ron Baklarz. Ron will be discussing the salient points of his career path while touching on how the typical CISO career path has changed over the last decade. Specifically, he’ll venture into how the CISO role itself has morphed from purely technical to a more holistically business-minded position. He’ll touch on typical challenges that new CISOs encounter as well as some best practices that have served him well over his long career.
Data preparation is occasionally referred to as data plumbing, suggesting that it is dirty grunge work that is an unglamorous necessity. We will see how this point of view misses entirely the discovery potential, value, and “thrill of the chase” that data preparation can offer. Data prep includes the all important first step in any analytics project: “Know Thy Data” (which is one of the fundamental principles of data science). We discuss data profiling, data transformations and normalization, feature selection and engineering, and more data prep approaches that empower you to begin learning from your data right out of the “starting gate” on your analytics project. Learning from Data (i.e., data science) doesn’t begin after data prep, but right from the start.
In 2011 Mark Andreessen stated “software is eating the world." Fast-forward to 2015, and it’s mobility eating the world. Today's mobile applications ignite business innovation and customer engagement. Success means transforming IT while engaging the business in mobile. Join HP software ADM, and see the latest App Delivery Management innovations. Explore a fast path to mobile software innovation and time to market. Learn how to deliver amazing mobile apps with confidence now.
Are you a data scientist working on a project with constantly changing requirements, flawed changing data and other disruptions? Guerrilla Analytics can help.
The key to a high performing Guerrilla Analytics team is its ability to recognise common data preparation patterns and quickly implement them in flexible, defensive data sets.
After this webinar, you'll be able to get your team off the ground fast and begin demonstrating value to your stakeholders.
You will learn about:
* Guerrilla Analytics: a brief introduction to what it is and why you need it for your agile data science ambitions
* Data Science Patterns: what they are and how they enable agile data science
* Case study: a walk through of some common patterns in use in a real project
Low-code platforms have become a critical factor in helping AD&D organizations rapidly deliver applications to win, serve and retain customers.
With these platforms, enterprises are routinely delivering apps much faster than conventional methods. But can these platforms truly scale across the full modern app lifecycle? What are the top use cases for deploying a low-code platform?
Join John Rymer of Forrester Research for an engaging discussion about the innovative ways organizations are utilizing low-code platforms across the app lifecycle. Hear from IT executives with Autoliv, Estafeta and NES Financial as they talk candidly about how low-code platforms have driven growth and competitive advantage in their organizations.
IT security risks are changing, and undoubtingly increasing in complexity and frequency. Enterprises across the globe are struggling to not only keep up, but to maintain a secure network environment. From a recent breach by hackers to gain sensitive information of more than 100,000 taxpayers, to the breach of 110 million consumer records, the cyber threat landscape is getting worse every year. Hackers are faster, and organizations are taking longer to discover the breaches, giving thieves hours, days, and even weeks to explore the most private and sensitive company data.
Gemalto has identified key steps to help secure your enterprise network, certainly one of the first areas fraudsters attempt to infiltrate.
Join us on September 28th for an informative presentation that will help you plan a strategy to protect your most critical assets.
VMware Horizon View allows IT organizations to deliver virtual or hosted desktops and applications through a single platform to users. The success of these virtual desktop deployments is linked to the user experience: virtual desktops have to deliver better performance than physical desktops.
The heterogeneous, multi-tier, inter-dependent nature of the underlying infrastructure makes performance monitoring, diagnosis and reporting a challenge. When users complain that “the virtual desktop or application is slow”, IT administrators often struggle to determine the actual cause of the problem. Is it the network, database, application, virtualization platform, connection server, storage or the virtual desktop?
This webinar will help you learn how to unlock the benefits of desktop and application virtualization by enabling your organization to monitor, diagnose and report on the performance of your VMware Horizon View infrastructure.
Robots and drones have captivated us for more than half a century. When you think about a robot, you might automatically think about Rosie from the Jetsons. However, the next revolution of robotics will be very different than what you think. Robotics will enhance everyday life by enabling a broad range of applications from smart home to healthcare and transportation.
Why now? Historically, robots have been pre-programmed to complete tasks in industrial settings, but thanks to the same technology powering our smart phones, robots are poised to evolve into intelligent, intuitive machines capable of processing their environments quickly and efficiently - both on the ground and in the air. Robots will be seamlessly integrated with everyday life, handling tasks once too time-consuming or tedious for us.
In this webinar, we'll discuss:
*The key consumer and commercial applications of robots and drones
*The role robots will play in societies and economies
*How smartphone technologies will pave the way to robotics' future
* How cognitive technologies will transform our lives and business
* How Qualcomm is fostering innovation and helping the ecosystem
* The foundation of many IoT applications in shaping the way to robotics
Jim McGregor, Principal Analyst, Tirias Research
Andra Keay, Managing Director of Silicon Valley Robotics
Anthony Lewis, Senior Director of Technology, Qualcomm
Maged Zaki, Director of Technical Marketing, Qualcomm Technologies, Inc.
There are many ways in which people approach adding real-time communications with WebRTC to their service. While the dominant approaches are probably self development and using a WebRTC PaaS vendor, there’s a wider range of approaches.
In this session, Tsahi Levent-Levi, consultant and analyst of everything WebRTC, will go over the various approaches, revealing their advantages along with real vendor use cases.
We've all heard how DevOps can greatly accelerate velocity and efficiency. The challenge is how to transform an enterprise which was not born with the cloud, with established processes and systems. Join us on this webinar and hear how HP IT is making the move from:
• organizational silos to integrated teams and continuous delivery pipelines
• physical systems and storage to cloud infrastructure and Docker containers
• templates and forms to infrastructure-as-code
• change requests to change records
Jonathan Smith, Application Security Specialist, WhiteHat Security
This presentation will demonstrate the value of manual business logic assessments and provide an example of a vulnerability that scanners cannot find because the problem isn’t in the code or framework.
We will provide a real life instance of a business logic flaw at a major high-end clothing retailer. The flaw allowed malicious users to purchase negative amounts of expensive merchandise, and credit thousands of dollars to their accounts.
Watch a cyber-attack unfold live to show you how your vendors can unwittingly leave the door open to your network and understand how to prevent these by managing, controlling and auditing all vendor access This webcast will offer best practice recommendations on how to secure vendor access to your organization. Hear top tips on how to protect your company and customer data, infrastructure and assets from cyber-attacks by securing vendor access while improving productivity.
This webinar will offer best practice recommendations on how to secure vendor access to your organisation. Hear top tips to protect your company and customer data, infrastructure and assets from cyber-attacks by securing vendor access whilst improving productivity
Also learn how to secure vendor access in action. Hear how Meander Medical Centre provides secure and audited access to its 80 suppliers to comply with government healthcare information regulations
Sunil Choudrie and Laurence Pitt – Security Solution Specialists
Understand what happened, and get back on track fast
Identifying and neutering a breach is only half of the work that needs to be done – now the business needs to know what systems were impacted, clean up the damage and get things back to normal. Advanced threat technology has visibility from the cloud into network and onto endpoints. This means unparalleled visibility into not only what happened, but also what was affected and how best to clean up after a breach. A complex attack will not be simple, and it will have spread fast, but being able to understand the route taken into the network makes it simpler, and faster, to deploy a security response, and use what has been learned to ensure better preparation for the future.
Missed the first 2 webcasts?
Webcast 1: If a breach is inevitable, what should I do? How best to prevent attack, and keep bad stuff out - https://www.brighttalk.com/webcast/5691/170123
Webcast 2 - I’ve been breached, what happened? What happens when bad stuff gets in, how to react fast - https://www.brighttalk.com/webcast/5691/170133
We live in a world where technological change is rapid. There is a race against time to be faster and better than the competition. Businesses will need to change as a result of technology disruption or risk becoming irrelevant to their customers. It is during these times of tumultuous change and uncertainty when the unexpected - new attack opportunities and tools - are presented to cybercriminals to steal, harm or destroy the digital assets of organisations in an unprecedented way and scale.
In this presentation, Rik will identify the top disruptive technologies to government and business today and examine the impact of such innovations on the cybersecurity of corporate networks. He will also provide recommendations to assist organisations to prepare for the unexpected threats and challenges that will arise from technology disruption in the future.
Many security vendors claim to have access to the security intelligence and analytical capabilities needed to identify the trace elements of malware activity before cyber-attacks take place.
They claim the ability to identify threats and data breaches at the earliest possible stage. Even accepting that the average time to detect a breach has halved over the last eighteen months, a discovery and remediation timeline that is still close to 200 days is by any standards far too long.
This presentation looks at what can be done to improve things and what businesses should be demanding from there security service providers.
Patrick Grillo, Senior Director, Security Solutions, Fortinet
Advanced Threat Protection is built on the principle of Prevention, Detection and Mitigation. However, if the different technologies within each of these areas operate independently, there will be gaps between the different elements, gaps that can and will be exploited during an attack.
This session will focus the concept of bringing together all of the elements of Advanced Threat Protection to form a holistic, collaborative solution that encompasses all of the network.
Barry Fisher, Sr. Product Marketing Manager OpenDNS, now part of Cisco
Next-generation firewalls and sandboxes stop attacks at various steps, but they only react to malicious communications and code after attacks have launched.
There’s another way—observing where attacks are ‘staged’.
We’re going to demonstrate how we can visualize Internet infrastructures for visibility into where attacks will emerge. Then, we’ll know where advanced malware will be downloaded and where compromised systems will callback—before attacks launch.
In this live session, you’ll learn:
7 steps of an attack and how you can use this data to get ahead of new security events.
3 ways to uncover malicious activity by looking at domain names, IP addresses, and autonomous system numbers (ASNs).
How to apply this intelligence to your current defenses.
Amar Singh, Chair of ISACA's UK Security Advisory Group, Exec. Board Member & Consultant to UK's National MBA in Cyber Sec.
Wishful thinking or a cursory security assessment may have worked in the past but dealing with persistent and advanced threats requires an equally sophisticated and mature approach.
While APT’s are on the rise and the use of zero-day vulnerabilities can be one of the weapons for such attacks, reality is that the large majority of incidents – advanced or not – occur using known vulnerabilities. Resolving these is, therefore, paramount to reducing the attack surface for cyber criminals.
Join Amar as he shares his tips on adopting a mature and continuing vulnerability management process that can help organizations reduce risk and be better prepared to respond to APT’s.
According to Verizon’s “2015 Data Breach Investigation Report,” the cyberattacks are becoming increasingly sophisticated. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. Under these conditions, what would be your approach to dealing with security threats?
Join us for a live webinar session and discover how auditing can help mitigate the risk of data breaches and solidify your security strategy overall. During the session, we will talk about:
- The latest data breaches and their ramifications;
- How auditing complements threat-defense mechanisms;
- What should be audited and why.
Today’s cyber attacks have become increasingly more sophisticated, requiring organisations to embrace an agile and ever more adaptive approach to their cyber security strategy. Join our webinar as we discuss the changing landscape of advanced threats in EMEA, look into the anatomy of APTs and explain why conventional security methods are no longer equipped to deal with these advanced attacks. In addition, we’ll share insights into real-life case studies of advanced threat actors using zero-day attacks and how an adaptive defense model allows FireEye to quickly respond, detect and remediate such attacks.
Jason Creasey, Information Security Consultant, Jerakano
Jason will introduce some of the major challenges associated with monitoring and logging cyber security events, highlighting the need to identify indicators of compromise at a much earlier stage and in a more consistent, insightful manner.
He will present a cyber-security monitoring framework, emphasising the benefits of taking a balanced, intelligence-led approach, based on fundamental log management and situational awareness. He will then look at what a cyber-security incident actually is and outline how to prepare for and respond to a cyber-security incident effectively – ensuring that it is properly followed up - helping to reduce the frequency and impact of future cyber security incidents.
Finally, Jason will introduce a cyber-security incident response maturity model, showing how you can measure the maturity of a cyber-security incident response capability.
The growing sophistication and evasiveness of cyber threats have redesigned the paradigms of the information security landscape. Since traditional signature-based technologies alone cannot keep the pace with advanced threats, a breed of new technologies has been developed to fill the gap in what seems an endless arms race against malware creators. In the same time, the volatility of the perimeter, direct consequence of the growing adoption of cloud services, dramatically broadens the vulnerability surface of the organizations, requiring a new approach for the CISOs in terms of both technologies and policies.
In this webcast we will analyse the current threat landscape related to advanced malware, demonstrating that, unlike what is commonly believed, it is not necessarily related to state-sponsored operations, but it is frequently used even in opportunistic attacks (and in several cases also available as a P/SaaS model).
After showing the characteristics that make a malware “advanced” (evasion at the endpoint and network level, polymorphism, etc), the webcast will outline the foundations of a multi-layered approach needed to detect, contain and mitigate the threats posed by advanced threats.
We caught up with F-Secure's Mikko Hyppoen to get his thoughts on the ever-relevant Privacy vs. Security debate.
Mikko discussed the sensitive equilibrium required to protect data and ensure it's privacy; the influence that the EU's Safe Harbour ruling will have and how security should be the responsibility of all, not just the government.
He also gave his one key piece of advice for keeping your data private and secure.
Most governments have already created, or are in the process of creating, regulations that impose conditions on the safeguard and use of Personally Identifiable Information (PII), with penalties for organizations who fail to sufficiently protect it. Organizations need to treat privacy as both a compliance and business risk issue, in order to reduce regulatory sanctions as well as reputational damage and loss of customers due to privacy breaches.
So how will organisations manage infrastructure across multiple domains without falling foul of emerging privacy and data management legislation, particularly when cloud services and personal devices are the norm?
During this webinar, Steve Durbin, Managing Director of ISF, will discuss how the security function and the board will need to work together to ensure that current regulatory trends and emerging technologies are aligned to maintain business effectiveness and connectivity.
Ginny Turley, Director of North American Marketing
While network security encompasses both the physical and software preventative measures to prevent and monitor unauthorized accesses or misuse of a computer network, the adoption of a password management policy and strategy can be foundational to the prevention of unauthorized uses of network resources. In many cases, simple password management is the weakest link. In this webcast, we'll explore what needs to be done to strengthen this important and oft overlooked aspect of network security and discuss password synchronization, and self-reset functions that can save time and money - and a lot of post-it notes as well.
Diana Garcia, Customer Onboarding and Training Manager, PhishMe
As spear phishing continues to be one of the top security threats, enterprises have looked to user training programs to bolster their defenses. One of the main challenges security awareness professionals face is implementing a phishing training program which shows continuous improvement and value to their organization. How do you start and build upon a training program to showcase continuous success?
The key to implementing an effective program is to focus on the biggest threats and leverage behavioral metrics to drive your program. During this webinar, Diana Garcia, Manager, Customer Onboarding and Training, will cover:
-How do you implement a phishing awareness program and run it continuously?
-What are the key elements of a successful program and what does it look like?
-How do you show the value this program and your trained users add to the security organization?
Araldo Menegon, Global Managing Director, Financial Services, Fortinet and John Bryant, CTO of Options
Fortinet protects the most valuable assets of the largest financial services institutions across the globe. Learn how they provide high-performance protection against cyber-threats by hearing from security experts and key customers.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.