Welcome to the mobile computing community on BrightTALK! With the consumerization of IT and the widespread adoption of mobile devices across the globe, mobile computing has become an important part of many people's lives in a culture of bring your own device (BYOD). With mobile devices doubling as work phones and more employees working from home, businesses need to provide secure access to data and work applications from anywhere at any time. Join this growing community and hear from industry thought leaders in webinars and videos as they share their insight on mobile computing research and trends.
The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:
In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.
Implementing a digital identity strategy can be complicated. Let CA help.
Office 365 est en France et en Europe une solution collaborative de plus en plus adoptée par les organisations.
La messagerie fait partie des services déployés en priorité.
Les clients Office365 sont confrontés à deux soucis majeurs :
1 Obtenir la meilleure sécurité possible contre les attaques sur les courriels, qui représentent encore aujourd’hui 93% des vecteurs de menaces sur vos données et vos postes de travail,
2 Conserver une continuité de service lorsqu’Office 365 est indisponible.
Lors de ce webinaire, nous présenterons entre autre comment Proofpoint, fournisseur de solutions de cybersécurité « people-centric » adresse les défis suivants :
-Protection des identifiants utilisateurs ciblés par du phishing O365 de plus en plus sophistiqué
-Contrer la fraude email (attaques au président, FOVI) qui n’est pas traitée par O365, quel que soit l’offre souscrite
-Donner une visibilité en temps réel des attaques
-Pouvoir faire des corrélations d’attaques qui deviennent de plus en plus multi-vectorielles (liens vers du partage de fichiers dans le Cloud : Box, OneDrive, SalesForce, Sharepoint, GSuite, etc…)
Adding automation to your IT environment is one of the best ways to fight cloud sprawl and help eliminate service outages. In this 15-minute webinar, Accudata’s Director of Technology Solutions Vid Sista will explain:
How automation solutions enable you to proactively identify service issues
Why cloud sprawl is a major threat to IT security – and how you can stop it
What businesses can do to automate their IT services lifecycle
70% of organizations are in the midst of plans to digitally transform the way they conduct business for more process efficiency, reduced cost, optimized customer experience and competitive advantage. Experiences not price or products will be the battleground of the future. But where to begin? Robotic Process Automation promises to automate repetitive, manual tasks normally done by humans. Cognitive Document Automation provides related benefits, but for documents and emails – typically a challenge for RPA. Together, RPA and document automation deliver the one-two punch that organizations need to succeed in their digital transformation initiatives. Join us to understand how RPA and document automation work together to automatically and efficiently acquire, understand and deliver content in critical business processes.
Don’t miss this webinar where we will discuss:
•The state of Leaders and Laggards of Digital Transformation
•Business benefits of RPA and Cognitive Document Automation
•Applying software platforms for common use cases
For this month's theme of 'Cyber-Espionage and Threat Hunting' we'll here from Chris Novak, Director, Investigative Response on cyber-espionage and threat hunting as seen across the Investigative Response Team caseload. We'll then transition into a Q&A session with Jihana Clemetson, Senior Analyst, Threat Intelligence, and Marcus Cymerman, Senior Analyst, Network Forensics to dig further into our cyber-espionage cases and discuss typical indications of being a victim of cyber-espionage, the components of threat hunting, and the approaches to investigating cyber-espionage incidents.
Following the cyber-espionage insights, we'll cover the following topics:
Email Fraud is one of the oldest yet most successful threats against your organisations. Proofpoint Email Fraud Defense (EFD) can help you protect your organisation and your customers, leveraging the power of email authentication.
Join this product demo to discover how you can protect your organisation and people by leveraging the power of EFD.
•Block malicious emails spoofing your domains before they reach your employees and customers
•Monitor all emails (inbound and outbound) from your domains and those of third parties
•Accurately distinguish between legitimate emails and fraudulent emails
Between Edward Snowden, the NSA, and the FBI we’ve all been hearing the term “encryption” thrown around a lot. But what do you really know about encryption? And as a business, what do you need to know? How does it work, and what are your options?
In this 60 minute session, Andy Nieto, IT Strategist for DataMotion, provides a clear, simple overview of encryption, and will include plenty of time for questions, Topics include:
The who, what, where, why, when, and how’s of encryption
The difference between proprietary and open source encryption
Encrypting data at rest
Encrypting data in motion
Mobile devices and encryption
Organizations that use cloud services to handle the Internet of Things often employ one of the three largest hyperscale providers — Microsoft, Google or AWS. In this webinar, we reveal the results of an extensive study, using machine-learning methods, to identify what factors drive the cloud-related costs of Internet of Things deployments, and in what scenarios each cloud provider has a cost advantage.
Aruba lays the foundation for educational excellence at leading UK independent school, Bryanston School, providing a secure and collaborative environment with pervasive connectivity across 400 acres and over 30 buildings.
Amadria Park, Croatia's leading hotel venue turned to Aruba Network Solutions when seeking to enhance the guest experience. Aruba's comprehensive hospitality wi-fi coverage and security were there to help.
It only takes one errant tap to compromise a mobile device. This short video clip highlights the threats and how inconspicuous a phishing attack on a mobile device can be. You will also be able to download our latest whitepaper to understand mobile phishing facts that will help you make informed decisions on how to protect corporate data.
Much of the improvements for iOS 12 focused on security and reliability. What prompted these changes and how will it affect the path forward? Join our discussion on Tuesday as Tony Ramirez, Mobile Security Analyst, shares about the following:
+ Learnings & remediations from iOS 11
+ Predictions coming out of WWDC
+ How we see the newest software update, iOS 12, affecting mobile app security testing
We can expect to see higher shifts from the on-premise market to the cloud contact center market in the next 12-18 months. While it is still early days, the vendors in this space are already closing deals for real cloud deals, and these are across healthcare, education, retail, government and financial services. The market has seen an entry of new players in 2018 and these players were traditionally not from the contact center segment. Competition is expected to heighten from 2019 onwards. These new breed of players are offering end to end contact center capabilities coupled with analytics and artificial intelligence capabilities.
· Get an in-depth view of emerging players introducing new platforms to disrupt the traditional players
· Learn about the benefits of the cloud contact center model
· Understand what's driving growth in this market and what's inhibiting the growth
If you are deploying Microsoft Office 365, you owe it to yourself to see how Box can help you power a best-of-breed digital workplace.
Tens of thousands of businesses running Office 365 choose Box over OneDrive and Sharepoint so they can improve user and IT productivity, improve content security and protection, and reduce infrastructure costs. At this webinar, you’ll hear in detail why Box and Office 365 make such a winning combination. Box offers a single cloud content management platform for securely managing all your content in one place, including a:
- Better user experience —users can share, edit and collaborate on all their content with all of their teams inside Box without needing to switch between different tools
- Better admin experience — more granular controls, more simplified management of all your content
- Better security — a central platform for consistent security and governance
- Better integrations — Box is integrated with more than 1,400 popular applications like Salesforce, Slack, NetSuite and Okta
1. Why TLS and OAuth2 are not enough to secure your APIs
API Security has a much wider spectrum and even if you are using OAuth today, you may not use it in a way that is adapted to the risk taken when exposing Open banking APIs. What about API attacks protection ? PKCE ? Message confidentiality and integrity ?
2. Why API security must be declared and not coded
Developers should not have to master security standards such as OAuth and OpenID Connect and try to implement them properly into their APIs. Instead, they should rely on proven, reliable policies approved by the bank’s security team and simply apply those policies on top of their APIs.
3. How declarative security helps with consistency and automation
42Crunch's innovative tagging mechanisms can be used by developers to express security constraints on top of their Open API definitions (aka Swagger). Those tags are translated automatically, either via the UI or in the CI/CD pipeline into policies which are applied on APIs requests/responses, making it possible to apply security as early as possible in the API lifecycle and find security vulnerabilities early.
4. How to enforce security in a scalable way using micro-firewalls
We will show how to deploy the 42Crunch API Firewall at run-time whether on premises, in the Cloud or in a hybrid environment and how to monitor the system through real-time security dashboards.
By leveraging the power of the cloud, artificial intelligence and machine learning, mapping devices are getting smarter over time, recognizing patterns and farming insight from contextualized data. And that means smart cities and data-based Location of Things navigation is becoming a reality.
Cities can analyze and improve congested traffic. Freight companies with connected trucks can better manage logistics, optimize fleets, and track customer engagement. And cars will learn to make split-second decisions on our behalf, making the call on turning left or hitting the breaks when it recognizes a pedestrian is in the crosswalk.
To find out more about how cloud-based, AI-powered location technology is creating the highly accurate and always up-to-date maps that can revolutionize everything from autonomous cars to connected cities, don’t miss this VB Live event!
In this webinar you'll learn:
* How to leverage the power of the cloud, AI, and machine learning across devices by contextualizing location data in real time
* Understand the role of location-based data mapping in the "Location of Things"
* The application of data-enriched mapping to industries like retail and automotive
* How "Location of Things" powered by geographical data can be used to connect autonomous driving, smart mobility, and smarter cities
* Chris Pendleton, Principal PM, Azure Maps
* Peter Frans Pauwels, Co-founder, TomTom
* Jennifer Belissent, Principal Analyst, Forrester
* Rachael Brownell, Moderator, VentureBeat
Proofpoint hat seinen neuen Faktor Mensch Bericht für das Jahr 2018 veröffentlicht, der untersucht, wie Bedrohungsakteure ihre Herangehensweisen mit Social Engineering und ausgeklügelten Angriffen verfeinern, die selbst versierte Benutzer regelmäßig täuschen.
Melden Sie sich jetzt zu unserem Live-Webcast Der Faktor Mensch 2018 am 5. Juni 2018 um 10:00Uhr an und informieren Sie sich über die wichtigsten Erkenntnisse des diesjährigen Berichts.
Der jährliche Proofpoint Bericht basiert auf der Analyse von Angriffsversuchen bei mehr als 6.000 weltweiten Unternehmenskunden während des gesamten Jahres 2017 und bietet Einblicke in Angriffstrends über E-Mail, Cloud-Anwendungen und soziale Medien hinweg, um Unternehmen und Benutzern die Sicherheit zu gewährleisten.
Themen des Berichtes:
-Soziale Engineering: Wie Social Engineering auf den Faktor Mensch abzielt
-Bedrohungs-Trends: Malware, Phishing und E-Mail-Betrug: Dropbox, Docusign & Co
-Trends zu gezielte Angriffen: Spam-Kampagnen bis zielgerichteter E-Mail-Betrugs
-Neue digitale Risiken: Collaboration-Tools als neue Angriffsziele
-Angriffe über Cloud Dienste: Cyberangriffe über Cloud-Dienste und -Apps
Adopting privileged access management typically means forcing users to use named accounts instead of root and administrator accounts. As a result, the volume of privileged "named user" accounts in the enterprise is increasing. Fortunately, with effective role management and certification review, organizations can streamline and reduce excessive access.
Join Naresh Persaud, Senior Director of Security at CA Technologies as he explains the challenge of privileged user governance, explores solutions, and presents a demo on how to manage privileged "named users."
As Agile teams are growing exponentially, companies are looking to adapt new process and tools, to integrate, optimize and manage hybrid (Agile, Waterfall) portfolio of applications. There is a need to increase visibility and collaboration while enabling insight into their organization’s process to maintain governance, avoid compliance issues, deliver quality and optimize resource and investments.
Join this webinar to learn more about:
• Integrated Portfolio Management focus on product development,
including new what if scenarios
• New capabilities to support Enterprise Agile frameworks
• Consolidated time and resource management for Agile and waterfall projects
Since 25 May, the General Data Protection Regulation (GDPR) is now officially enforceable. By now, most of the companies dealing with data should have taken the necessary steps to comply with the regulation and stay out of trouble. And this is all good but, have you thought about how your employees are using their mobile phones or devices to access your company data? How do you protect your organization from an employee's phone being hacked? The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.
By popular demand, we're replaying this webinar hosted by Aaron Cockerill, Chief Strategy Officer at Lookout and his guest, Kabir Barday, CEO at OneTrust.
On the agenda:
- Why mobile is a problem for GDPR compliance
- Understanding the threats & risks to GDPR compliance from mobile
- Finding & stopping mobile threats to GDPR compliance
Did you know?
84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.
31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.
63% of enterprise employees say they access their organization's customer, partner, data and employee data while on their mobile device.
Traditional network and app security approaches are no longer sufficient to protect high-value apps running in untrusted environments. Knowing the status of apps running in the wild and whether they are under attack is key to responding to the ever changing threat landscape. Visibility into when, how and from where an attack is happening, and the ability to optimize your response in real time can mean the difference between stopping a threat before it spreads or picking up the pieces after the fact.
In part three of our application security series, we’ll share best practices for app protection and mitigation, plus how Arxan’s comprehensive app protection and alerting capabilities can help prevent reverse engineering, code tampering, IP theft, and help level the playing field with attackers.
E-Mail-Betrug, auch CEO-Fraud oder BEC (Business Email Compromise) ist weit verbreitet und kostet Unternehmen Milliarden. Dabei ist ein Großteil dieser E-Mail-Angriffe vermeidbar. Diese Bedrohungen beginnen meist mit einer E-Mail, die von einer hochrangigen Führungskraft, aber auch von Partnern oder Lieferanten zu stammen scheint. Diese E-Mail weist Mitarbeiter an Gelder zu überweisen oder sensible Daten zur Verfügung zu stellen. Die Empfänger erfüllen pflichtbewusst die übertragenen Aufgaben, überweisen zb das angeforderte Geld – und lernen erst später, dass sie betrogen worden sind.
Erleben Sie in unserem Webinar anhand eines CEO Fraud Live Hack, wie leicht Ihre Mitarbeiter dazu gebracht werden, die betrügerischen Anfragen auszuführen. Anschließend zeigen wir Ihnen auf, wie Proofpoint Ihre Mitarbeiter und Ihr Unternehmen anhand eines mehrstufigen Schutzkonzeptes vor derartigen Angriffen schützen kann.
Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.
Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:
--Threats: credential phishing, email fraud, targeted attacks etc
-- Enabling secure digital transformation: people centric security at the heart of the transformation
-- Solutions: regulatory compliance and tools to implement
During this presentation, you'll learn about deep learning, the history of artificial intelligence, the history of malware management, and the current approach to eliminating malware threats to the enterprise using AI.
Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)² on Jun 27, 2018 (Wed) at 12:00 noon (Singapore Time) to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
A recent survey conducted by Ensono, in partnership with the Cloud Industry Forum, showed that 89% of respondents believed that legacy technology was a barrier to effective digital transformation. Given that many organisations operate a complex technology landscape often with elements in different locations, and with core components that are regarded as ‘legacy but critical’, there needs to be a clear and simple approach to overcoming these obstacles.
Breaking down the barriers requires effective change in people, process and technology to attain a viable level velocity that will enable transformation without being held back by perceptions of legacy issues.
Examining these issues, this webinar will provide insight and thought provoking approaches for organisations seeking to transform their operations against this backdrop.
Hyper-competition and digital-first initiatives are forcing organizations to reconsider how they do business. ‘Digital transformation’ has emerged to engage customers, improve efficiencies, and fend off threats from rivals. It’s driving the need to rethink application design that delivers information in context and automates tasks that must behave consistently across diverse mobile devices and all digital touchpoints. Common approaches include cloud-first and mobile-first strategies that accelerate the use of cloud services but also often forces an unwieldy redistribution of workloads across hybrid IT infrastructure.
APIs have emerged as integration enablers, and API management is now integral to IT and development discipline. But APIs are only part of a broader toolchain needed to deliver web and mobile apps. Emerging cloud-native app platforms for hybrid infrastructure represent the next-generation enabling technology needed by enterprises that seek transformative means to engage customers and craft new competitive advantages.
In this webinar Carl Lehmann, principal analyst at 451 Research and Sumit Sarkar, chief researcher at Progress will discuss the business and technical considerations for API management within a broader context of application strategies and hybrid IT integration by:
• Describing digital transformation and how it is used to create competitive advantage
• Identifying the critical technology enablers needed for execution
• Defining the role of APIs as accelerants to new ways of doing business
* Planning for rapid delivery of new application experiences in response to digital transformation
* Understanding backend requirements for web and mobile app delivery beyond API Management
AppDev, DevOps, integration and API development professionals alike will learn how to reconsider their development strategies and integration toolchains to become core enabling assets for digital transformation.
Innovative banking applications and comprehensive, instant insight into customer interactions are critical to competing in today’s disruptive competitive landscape. Not only do customer expectations continue to grow, but payment infrastructure evolution and compliance requirements mean access to highly contextual, real-time data is no longer a nice to have - it’s a must have.
Don’t miss this chance to hear from Richard Henderson at DataStax around how an operational data layer can meet the distributed, real-time, always available demands of the enterprise. Join live to hear real case examples of customers using DataStax Enterprise, the data management platform trusted by 9 out of the top 15 global banks.
You're charged with building a bulletproof, tier one secure network. If your Domain Name System (DNS) goes down, nothing else matters. And, DNS is the leading attack vector for cyber villains. Say “Hack no! ” to DNS threats.
Join guest speaker Tony Scott, former CIO of the United States, Microsoft, and the Walt Disney Company, alongside leading practitioners from Aflac and McAfee in this live panel discussion. This unique gathering of industry experts will discuss their perspectives on building a safe, secure network and actionable best practices in this era of cloud and mobile. Moderated by Infoblox Chief DNS Architect Cricket Liu, this discussion will give you an opportunity to hear from the experts and ask questions about.
- What leading organizations are doing to secure their DNS
- When to best utilize DNS data, network context, and threat intelligence in your security operations
- How to integrate DNS data with your security ecosystem to accelerate threat mitigation and remediation
- How Aflac blocked nearly 37 million threat connections with < 100 false positives
Your users are like fine wine or good cheese: They get better over time. Which is why user retention is essential. With a steady retention rate your revenue just compounds over time. And increasing retention by just 10 percent will boost your business value by more than 30 percent.
That’s where artificial intelligence comes in. AI marketing tools let you anticipate customer needs, create personalized campaigns that make them feel seen and heard, lock on to essential customer purchasing patterns, deliver highly relevant messaging, marketing, and offers when and where they want to see them, and more. And with the volume of customer data you have at your fingertips, you can identify what characteristics make up high-value customers, so you know exactly where to put your focus.
Learn how tapping into your oil well of data and harnessing it via marketing automation platforms powered by AI and machine learning can strengthen your bottom line when you join this VB Live event!
In this webinar you'll learn:
* Key engagement strategies using AI
* How to use AI to strengthen campaigns (including creative, messaging, segmentation and personalization)
* The role of time-based triggering in automation and monetization
* The evolving trends in marketing automation and omnichannel marketing
* Kara Dake, VP Growth & Partnerships, Clevertap
* Rachael Brownell, Moderator, VentureBeat
* Stewart Rogers, Analyst-at-Large, VentureBeat
In its inaugural report, Tenable Research explores who has the first-mover advantage – cyber criminals or security teams? What’s the difference in time between when an exploit is publicly available for a given vulnerability and the first time that security teams actually assess their systems? And why does this even matter to your organization?
The research team analyzed the 50 most prevalent critical and high-severity vulnerabilities from just under 200,000 vulnerability assessment scans over a three-month period. What did they find?
Alarmingly, all too often, the attackers have the advantage. On average, they have a seven-day head start on defenders. Threat actors are sprinting ahead, exploiting vulnerabilities before security teams have even left the starting blocks – before businesses even know they’re at risk.
Join Tenable and (ISC)² on Jul 18, 2018 (Wed) at 14:00 (Singapore Time) to understand how and why cyber attackers are beating your defence.
Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.
Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
Brands in every industry and geography feel an urgency to meet the conversational needs of their customers. Executives walk the fiscal tightrope between exceptional customer experiences and operational efficiency. Today’s contact center, as the communications hub for customers, is caught in the middle of the battle. Customers value fast, frictionless convenience; executives must invest accordingly.
Join Opus Research Lead Analyst Dan Miller and Program Director Mitch Lieberman, with Abinash Tripathy, CEO and Co-Founder from Helpshift, as they address the urgent topics that help brands and enterprises supercharge customer service experiences, including:
* How digital messaging promotes operational excellence while meeting — and exceeding — customer needs
* Strategic steps necessary to support top-line growth and in-depth customer engagement
* How brands infuse intelligence, accuracy, and precision into company/customer conversations
* How to leverage investments and resources to build the next generation of customer service and support
Are you AI-ready? You need to be. Artificial intelligence marketing applications are delivering on their promise to source new insights to grow your business fast, AI technology is becoming available to any company looking for a competitive edge, and now’s the time to move, if you want to stay ahead of the curve.
But the challenge is not just in defining an AI strategy; it requires developing the infrastructure to support it.
Should you be developing in-house, or look to available technology and collaborate with outside experts? Keep deployment on-premise, or reach for the cloud? Can your current infrastructure, from server performance to processing power, stand up to the demands of increasingly complex AI applications?
Get ready to level up your marketing strategy with AI, advance your technological capabilities in smart, strategic ways, learn how to make sure your next infrastructure move helps you exploit the AI advantage and more when you join this VB Live event!
Register for free!
Attend this webinar and learn:
* How to tell if your marketing and IT departments are AI-ready
* The fundamentals of an AI-driven infrastructure
* The role of clean, definable data goals in successful AI implementation
* How to scale the AI workload