On May 16 we will be kicking off our CISO Career Development Series with AMTRAK’s CISO, Ron Baklarz. Ron will be discussing the salient points of his career path while touching on how the typical CISO career path has changed over the last decade. Specifically, he’ll venture into how the CISO role
On May 16 we will be kicking off our CISO Career Development Series with AMTRAK’s CISO, Ron Baklarz. Ron will be discussing the salient points of his career path while touching on how the typical CISO career path has changed over the last decade. Specifically, he’ll venture into how the CISO role itself has morphed from purely technical to a more holistically business-minded position. He’ll touch on typical challenges that new CISOs encounter as well as some best practices that have served him well over his long career.
RecordedMay 16 2012
Your place is confirmed, we'll send you email reminders
* Brian Boroff, Head of Customer Success and User Operations, Asana
* Jon Ferrara, CEO/ Founder Nimble
* Stewart Rogers, Director Marketing Technology, VentureBeat
Customer experience is a tough one -- we all have seen those businesses who think they're building a great scalable customer experience, but have customers who might not have the same opinion. And it's not enough to build a great product -- we define ourselves in the marketplace through each and every interaction we have with the customer.
You might understand that the reason you're doing something is for a very valid business reason, but the customer may interpret that action entirely differently. And your world class customer service can sometimes start to falter as your startup organization adds more resources and more layers -- good for your growth but sometimes risking the very people who made your company successful. Ouch.
Customer engagement doesn't take costly tools and high priced business analysts -- but it's also not always intuitive. We're going to show you some no-nonsense ways to keep customers loyal and driving growth while also building amazing customer experience that scales along with your business. Our panel of experts will share tactics and strategies that will help you kick start and refine your approach to delivering service -- and helps your company grow even faster.
In this webinar you'll:
* Understand what your customer wants and needs throughout the product lifecycle.
* Learn strategies for rethinking the role of customer service within the organization
* Create a new process for empowering employees to retain a top tier customer experience
* Identify potential obstacles that may be causing customer attrition
Your workforce is using 3+ devices, is working from many locations, uses both business apps and a plethora of personal apps, and all while expecting to access their data easily and securely. How do you implement a solution that empowers your workforce while protecting your Corporate assets and resources? Discover Enterprise Mobility Suite (EMS) - a comprehensive cloud solution designed specifically to address the challenges of a mobile workforce.
Join this webcast to learn:
What components make up EMS
How to get up and running with EMS
How to provide secure access to corporate data
Protect everything—across devices, operating systems and applications
Proofpoint stellt neue dynamische Sicherheitslösung gegen betrügerische Emails vor
Erfahren Sie in unserem Live-Webcast am 31. Mai, mehr über die Motivation und Folgen betrügerischer E-Mails und wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.
Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.
Erfahren Sie in dem Webcast
• Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
• Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
• Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen
Let’s face it. Most consumers are less likely to click on keyword searches served up by Facebook than they are to run in place to get their 10,000 steps on FitBit. Does it pay to pay for social advertising marketshare? That is the existential dilemma faced by all social media marketers.
Take Instagram. Once upon a time, they were the darling of social advertising and engagement, but a recent report indicates a 40% drop off in the interaction rate in 2015. According to some experts, one of Instagram’s biggest changes was an increase in advertising; namely that instagram ads were pushed out to everyone around the world. Like a warning to social advertisers everywhere, the all ads all the time approach resulted in a dramatic decrease in engagement.
With more engagement comes more responsibility and an increasingly intelligent audience will be quick to yawn and then to resent an overly aggressive advertising effort. Join us for a discussion of what went wrong and how to do social advertising right.
In this webinar you’ll learn to avoid similar mistakes, including how to:
* Use not abuse user engagement
* Target and personalize ads to maximize ROI
* Understand the difference between social advertising and advertising
* Identify which social channels are most effective for which advertising
Register for free today!
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Travis Wright,Chief Marketing Technology Officer, CCP Global
* Nancy Smith, CEO Bevy.co
Most games need to make money. It’s a simple reality. In free-to-play games, this can be a formidable challenge when players are under no obligation to pay. Forcing players to pay is not a good plan - they’ll only leave disgruntled. The trick is to inspire player engagement, long-term retention, and multiple payments. But that’s easier said than done, right?
We can show you how to rock a bottom line without turning off your best players, and make cash hand over fist in the process. The secret lies in data - what to measure, what to ignore, and which actions to take based on those KPIs.
Using data has been proven to increase profits and player satisfaction. Sound too good to be true? Join the webinar and discover how data covers all bases you need for a lucrative game.
Learn how to:
* Target the right players, and the key engagement strategies that work
* Maximize profits from ads and IAP, and which players are most receptive
* Predict and measure the lifetime value of players by acquisition channel
* Apply killer strategies, taking lessons from the most successful games
* Unlock the lesser-known data secrets behind monetization
Sign up now!
* Dean Takahashi, GamesBeat editor, VentureBeat
* Stefano Melucci, VP of Product, Thumbspire
* Mark Robinson, CEO, DeltaDNA
* Jon Burg, Product Marketing Lead, AppsFlyer
Attackers today do not just use one channel to launch their targeted attacks – they use all of them. Emails, links posted to social media, and even apps in public app stores are all part of the modern cybercriminal’s arsenal, and many of these attacks are invisible to traditional security tools. Join this webinar and learn how to protect the cloud-enabled, mobile-friendly, and socially networked way users work today.
In un momento in cui le iniziative IT corrono di pari passo col business, l’abilità di comunicare i requisiti di business in un modo che sia direttamente comprensibile all’IT diventa un imperativo. CA ARD utilizza l’approccio Model Driven Testing per eliminare ambiguità nei requisiti, ottimizzando i cicli di test garantendo totale test coverage.
You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
Join an ESET business product technical lead to learn:
•How ransomware has evolved and spread
•Why mobile phones and Apple OS X are increasingly vulnerable
•Best practices for avoiding and dealing with ransomware
•Why to implement backup and recovery solutions now
Poor application performance and crashes cost millions of dollars to businesses globally. Yet, recent surveys show that only 26% of application teams will proactively examine user experience metrics in production. 72% of app teams first learn of UX issues through user complaints.
Today’s impatient and intolerant user is quick to abandon slow performing, crashing and error prone apps. So it is up to application teams to quickly isolate issues, understand what went wrong and know how to fix it fast.
Join us for this webinar and learn how HPE AppPulse Trace cuts through the complexity of isolating transaction performance issues. During this live webcast, user experience experts will demonstrate how to correlate performance issues from the user action to service code execution and diagnose issues down to the line of code and log messages.
During this Webinar, you will learn how to:
Quickly drill down to server-side transactions for rapid investigation of performance bottlenecks
Trace transactions from the browser or mobile app all the way to the backend
Trace all aspects of transaction execution including end-to-end flow, code timing, contextual logs, exceptions and database queries
Every person on the planet has a mobile phone, but 2 Billion people are “Un-banked”.
Banks and telecoms are in a Gold Rush to bank the unbanked, but many obstacles remain. Money transfers are some of the most popular transactions made by both the banked and the unbanked. However, building trust in this new service is definitely a challenge.
Join this panel where discussion points will include:
-Who has the upper hand: Banks or Carriers?
-How can Fintech companies ensure trust and security when it comes to mobile money transfers?
-Global ISO Standards Authenticate ID and Asset Verification
-ISO Reduces Fraud and Speeds up Asset Transfers
-What are some of the security challenges new payment services are able to overcome?
-Are “Standards” emerging to reduce implementation and compliance costs?
-How do you create cross-border and Inter-bank/carrier transactions?
-How can banks and telecoms successfully bank the unbanked?
With more and more people using their phones to conduct business and make transactions, concerns around security have also increased.
During the session, we will discuss:
Is hardware security a thing of the past?
Will tokenisation solve security issues or introduce new problems?
How do you secure your app?
How do you balance security with convenience?
Will biometrics make secure solutions easier to use?
The end user perspective - are consumers driven by security or by trust?
Future outlook - are we heading in the right direction security wise?
John Morgan (Sales Representative), Jeff Melnick (Manager of Sales Engineering)
According to the Global State of Information Security Survey 2016, in 2015, the number of security incidents grew by 38% compared to 2014’s levels. Today, it is clear that traditional security measures are no longer as effective as they need to be and that even advanced techniques can be bypassed. Companies have realized the need to develop new security strategies that will help them address contemporary cyber-threats.
Join Netwrix experts John Morgan (Sales Representative) and Jeff Melnick (Manager of Sales Engineering) to learn how IT auditing helps solidify your security strategy. During the session, we will talk about:
• Today’s data breaches and security experts’ predictions;
• How auditing complements cyber-threat defense mechanisms;
• Proven recommendations for what should be audited and why.
Stick around for a live Q&A session for answers to your questions!
Don Smith, SecureWorks, Ian Glover, CREST & Peter Wood, First Base Technologies
The rise in targeted threats means that security teams must move beyond a general understanding of the threat landscape, to a detailed understanding of their own context and the ability to spot threats targeted at their specific organisation.
In a world of information-overload and an explosion in communication channels, how do you sift through the noise and identify true threats to your business?
•The challenges faced by organisations from the rise in targeted threats
•Limitations of security processes in protecting from targeted threats
•How to gain early visibility into the threats targeting your particular organisation
Don Smith leads the CTU™ Cyber Intelligence Cell: a team of experienced threat analysts who, through the application of established intelligence practices, deliver actionable and timely intelligence products on the threats most relevant to SecureWorks clients. Don also leads the CTU research team in EMEA.
Don joined SecureWorks in 2005 and, since then, has been instrumental in establishing a CTU presence in EMEA and building important relationships for SecureWorks in the region. His enthusiasm and threat expertise means that he regularly represents SecureWorks at industry events in EMEA. Don has 24 years’ experience in the IT industry and was previously responsible for security architecture and operations for a multi-billion enterprise, where he took a lead role in successfully integrating 14 acquisitions. He is a recognized subject-matter expert many areas of cybersecurity and advises SecureWorks and SecureWorks’ clients globally.
Sunil Choudrie, Solution Marketing and Paul Murgatroyd, Solutions Expert - Symantec
As recent high profile reports have shown, advanced threats are high on the security agenda. These complex attacks are defeating traditional defences and organisations need a different approach. Advanced attacks are exploiting people, technology and system vulnerabilities and to defeat this, you need an integrated approach. Point security products are not providing the required visibility: Security needs to evolve.
In this webcast, we discuss using customer examples, the nature of the new advanced threats, how to mitigate the impact of these attack, using advanced intelligence and correlation. And, should the worst happen, how you can be prepared with effective detection and recovery plans.
Patrick Grillo, Senior Director, Security Strategy
More and more solutions are crowding into the market but data breaches are still happening and there’s no end in sight. Is an over reliance of technology creating a false sense of “everything’s okay”? This session will focus on the three key aspects of comprehensive advanced threat protection; technology, awareness and in particular the role of threat intelligence.
Today’s threat environment is too complex and there is no way to prevent infection in the organization. The question now is how are you handling the threats already in your network? The presentation will focus on the changing security mindset; from ‘keep them out’ to ‘they’re in! Find them and deal with them.’ We will present the most advanced deception and detection technologies aimed at minimizing the time between infection and resolution, along with lessons learned from real-life deployments.
Distributed Denial of Service (DDoS) Attacks are a real threat for today’s organizations. Current trends indicate that these attacks are becoming increasingly more sophisticated, persistent and larger in scale, causing potential damage to your revenue, brand and productivity. Is your organization prepared for the next evolution of DDoS attacks?
Join Nishit Sawhney, Director, Product Management, Verisign to learn about the latest DDoS attack trends including attacker behavioral shifts, attack vectors and increased attack sizes. Nishit will also dissect a real-world example of a recent DDoS attack and best practices on how to prepare and defend against increasingly complex and sophisticated DDoS attacks that can overwhelm even the best equipped systems.
Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council, for this presentation on the importance of End User Training Programs, where most programs fall short, and how to create a secure workforce.
Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.
It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:
How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
How the architecture enables unique and specific security scenarios.
How the architecture supports a prevention-oriented approach.
Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The fourth webinar in the series will cover the topic of Leadership from an IS executive perspective. Technical expertise is a critical component of security leadership; however, the modern CISO must possess a myriad of fundamental business to run a successful program. This session will focus on non-technical areas in which the CISCO should be competent and communicate effectively: strategic planning, financial management, contracting, and vendor management.
Patrick Grillo, Senior Director, Security Solutions, Fortinet
IoT is everywhere these days and like most new and shiny things our attention is focused on its coolness factor.
However, behind that pleasing and shining exterior lurks a potentially devastating menace. In the rush to bring product to market, very few if any manufacturers are security conscious, and as more and more of these products are deployed in the enterprise, the risk of a successful network breach increases exponentially.
This session will focus on the potential dangers with IoT and look at the question of how and why IoT security is different from traditional IT security.
The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.
This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
Dynamic analysis of android apps is all about analyzing apps in real time, for the purpose of detecting application level vulnerabilities and for the sake of manipulating applications while they execute. It is often used as a last resort due to its complexity, when other pentesting techniques mainly focused on static analysis are not enough. Common usages of dynamic analysis are extraction of sensitive data from application memory variables, stealing encryption keys, manipulating signature mechanisms and so on.
During this talk we will focus on memory dumps, remote debugging, small debugging, native debugging, usage of ReFrameworker platform and other interesting things.
This talk is based on a similar chapter as part of the Android application hacking course given by the speaker at recent BlackHat USA 2015
Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.
Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.
Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.