Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Live Demo: Foundations of People-Centric Cybersecurity
    Live Demo: Foundations of People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Recorded: Oct 16 2019 39 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • Why Rip and Replace Your VPN if You Don’t Need to?
    Why Rip and Replace Your VPN if You Don’t Need to?
    Richard Greenberg, CISSP, OWSAP Foundation; Eitan Bremler - Co-Founder & VP Technology Safe-T Recorded: Oct 16 2019 33 mins
    VPNs have been a cornerstone of secure networking for the last 20+ years. While VPNs have stood the test of time, today, we now know that a true security architecture is hinged upon the concept of Zero Trust Network Access.

    Most organizations have already poured a great deal of time and resources into building out their VPN infrastructure. Considering that the technology does exactly what it’s supposed to do, ripping and replacing it may not make much sense.

    What if we tell you that you don’t have to rip and replace your VPN in order to start your journey towards Zero Trust Network Access? Join us to this webinar to find out how.
  • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Gabe Gumbs, Chief Intelligence Officer at Spirion and Ben Rice, VP of Business development at Bitglass Recorded: Oct 16 2019 42 mins
    Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solutions already in use in your organization. Want to learn more?

    Join Spirion’s and Bitglass data protection experts in our joint webinar: Getting Ahead of the Game in Data Protection: Discover, Classify and Manage on October 16, 1 PM ET.

    What you will learn?

    •Data protection challenges to be mindful of
    •Managing digital transformation and unstructured data proliferation
    •How Bitglass and Spirion's solutions work together to protect your data
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    K. Eric Gentry, Managing Principal, VTRAC Recorded: Oct 16 2019 79 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the social attacks and the current cybersecurity threat landscape.

    We’ll cover:
    •The most common social engineering attacks
    •New insights on phishing attacks
    •Top threat actors in social attacks

    Our Verizon Threat Research Advisory Center presenters will be:
    •K. Eric Gentry, Managing Principal, VTRAC
    •David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • DNS as a Foundational Security Architecture for Digital Transformations
    DNS as a Foundational Security Architecture for Digital Transformations
    Jerry Wong, Systems Engineer, Infoblox Recorded: Oct 16 2019 57 mins
    The perimeter has shifted. Your users directly access cloud applications from everywhere and data no longer reside only in data centers. Digital transformations like SD-WAN, IoT and cloud make securing your infrastructure, applications and data complicated. SD-WAN enabled branches directly connect to the Internet, but they don’t have the ability to replicate a full HQ security stack. IoT leads to an explosion of non-standard devices using non-standard protocols, making them harder to secure. Every new change doesn’t equal need for a new security tool.

    What’s needed is a scalable, simple, and integrated security solution that leverages existing infrastructure that organizations already own. DNS is critical to the fabric of the internet and any IP based communication (on-premises, cloud, SD-WAN and IoT environments). It serves as the perfect foundation for security because it is simple to deploy, ubiquitous in networks, is needed anyway for connectivity and can scale to the size of the Internet.

    Join Infoblox and (ISC)² on Oct 16, 2019 (Wed) at 14:00 (GMT +8) to learn how leveraging DNS as a foundational security architecture for digital transformations can:

    • Protect your brand by securing your traditional networks and transformations like SD-WAN, Cloud and IoT
    • Reduce time and cost of your enterprise threat defense
    • Automate response when it sees things happening and provide data to the rest of the ecosystem

    Presenter: Jerry Wong, Systems Engineer, Infoblox
    Moderator: Sam Goh, CISSP, GM for Korea and Japan, Ensign InfoSecurity
  • SMBs Market Overview and Technology Buying Trends (EMEA)
    SMBs Market Overview and Technology Buying Trends (EMEA)
    Sue Gilkes, CompTIA Faculty, CompTIA Recorded: Oct 15 2019 40 mins
    ** This is an EMEA focused webinar **

    Small businesses are rightly described as the lifeblood of the global economy. This isn’t hyperbole, as SMBs account for the vast majority of business entities while serving as a key driver of job growth and innovation. Success as a small business owner means overcoming challenges on many fronts, but also embracing new opportunities in technology and business.

    CompTIA’s latest research explores the business relevance of technology to SMBs and the factors affecting their perceptions, decisions, and investments in established and emerging technologies. We also explore the professional services industry, taking a look at their decision to offer technology to their own customers.
  • Top 3 Ways to Maximize Network Performance and Reduce Help Desk Tickets
    Top 3 Ways to Maximize Network Performance and Reduce Help Desk Tickets
    Cherie Martin - Product Marketing, Aruba Recorded: Oct 10 2019 53 mins
    Join us October 10th at 10am PDT as we discuss how to:
    •Consistently deliver high-quality network and application services
    •Reduce help desk tickets
    •Identify and resolve issues before they affect your users

    This webinar also includes a live demo of Aruba Central, our cloud managed networking solution.

    Attend and you may qualify for a free Aruba Instant Access Point and a 90-day trial of Aruba Central.
  • Enterprise IoT Security: Connect and Protect
    Enterprise IoT Security: Connect and Protect
    Momenta Partners Oct 24 2019 4:00 pm UTC 60 mins
    Security remains a top priority in today’s connected world. The market landscape is dynamic, innovative and confusing at the same time. Navigating the ever emerging threats requires vigilant expertise, which is always in short supply in a digitally accelerated world. Every connected device and service has potential vulnerabilities. Join Momenta Partners as we highlight the most relevant issues of today in Enterprise IoT Security: Connect and Protect.

    In this webinar, Momenta's Managing Director Ken Forster will be joined by a panel of IoT security experts; Duncan Greatwood, CEO of Xage Security, Nicole Ford, VP, Chief Information Officer of Carrier, and Julie Fitton, VP, Digital Product Security of Stanley Black & Decker Inc. to discuss these key themes in digital security:

    - What is enterprise IoT security?
    - Current state of the security market
    - What are the risks?
    - IT - OT gap
    - Solutions and use cases
  • Ask the Malware Expert: Ethics in AI
    Ask the Malware Expert: Ethics in AI
    Alexey Malanov, Malware Expert, Kaspersky Lab Recorded: Oct 10 2019 48 mins
    Alexey Malanov joined Kaspersky Lab in 2004, where he began his work as a virus analyst. He has since been appointed Head of Kaspersky's Anti-Malware Team and in 2012, shifted his focus to analyzing technology trends and risks.

    The threat posed by a Strong AI (artificial intelligence where the machine's intellectual capability is functionally equal to a human's) is well-considered in many science fiction films. But the invention of a Strong AI will take many years, so we can afford not to hurry with the study of "laws of robotics."

    However, we are already facing growing concerns. The use of machine learning in various fields has shown that algorithms often make strange, discriminatory and difficult-to-understand decisions. Moreover, it has been clearly demonstrated that a person can cheat algorithms to achieve desired results.

    Alexey addresses some of the looming issues surrounding the AI algorithms that are becoming a part of our daily lives, and will increasingly affect us and our decisions.
  • DevOps Transformation: Value Stream Management – Insight and Control
    DevOps Transformation: Value Stream Management – Insight and Control
    Julian Fish, Director of Product Management, Micro Focus Recorded: Oct 9 2019 62 mins
    High performing enterprises have used DevOps transformations to improve efficiency, increase delivery velocity, and reduce time to market. Practices such as Agile project management, continuous integration, and continuous delivery and automation have simplified lifecycle management and application delivery. But as organizations continue to mature, lifecycle management improvement practices such as Value Stream Management have increasingly gained traction as a way for enterprises to align IT & business goals, validate IT deliverables, and track enterprise process efficiency.

    Join us for this live webinar as Julian Fish, Director of Product Management, explains:
    • How Value Stream Management practices can positively affect your organization
    • How to align DevOps practices with business objectives
    • How end to end value can be delivered in an efficient manner
  • Key Considerations for Your Future Email Security Solution
    Key Considerations for Your Future Email Security Solution
    Cheryl Tang, Product Marketing Director Recorded: Oct 8 2019 50 mins
    The Broadcom acquisition of Symantec’s Enterprise Security Business creates uncertainty for your email security strategy. Unsettled by the acquisition, many Symantec email security customers are reevaluating their email security solution. As you evaluate your options, you may be wondering what critical capabilities your next email security solution must have. One thing is certain. With today’s threat actors continually refining their tactics, you need an email security solution that can keep pace with today’s rapidly changing threat landscape. But what else do you need to defend against the No. 1 threat vector?

    Join Proofpoint for an educational webinar to learn:

    - What the threat landscape looks like today
    - What key capabilities you should look for to future proof your email security
    - How Proofpoint we’ve helped customers with their email security
  • How Is Your Enterprise Artifact Manager Working Out For You?
    How Is Your Enterprise Artifact Manager Working Out For You?
    Daniel Sauble, Head of Product, npm, Inc. Recorded: Oct 8 2019 24 mins
    Every software ecosystem has its own artifact and dependency manager. Enterprises are looking for a single, one-size-fits-all solution that can solve security, compliance, and automation requirements across multiple teams and ecosystems.

    In theory, that sounds like a great silver bullet. But, how does it work out in practice?

    Join Daniel Sauble, head of product at npm, on October 8, 10:00AM Pacific, 1:00PM Eastern, to discuss the ups and downs of working with a polyglot artifact manager and how npm can help. We will also discuss how polyglot artifact managers handle––or fail to handle––supply-chain security issues specific to the software ecosystem you're working in.
  • Cybersecurity: Malware Mayhem (EMEA)
    Cybersecurity: Malware Mayhem (EMEA)
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Recorded: Oct 8 2019 60 mins
    ** This is an EMEA focused webinar **

    One thing is certain: the threats facing small and medium-sized businesses keep changing.

    This webinar looks at the threats Webroot, our MSP partners, and SMB clients are experiencing and the impact to their business. The aim of this webinar is to provide threat information you can easily share with your business colleagues or managed service clients to reassure them you have the knowledge and the tools to look after their endpoints.
  • Live Demo: Security Awareness Training
    Live Demo: Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Oct 3 2019 28 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • TLS/SSL certificate management Best Practices
    TLS/SSL certificate management Best Practices
    Dave Corbett, Senior Manager, Sales Engineering Recorded: Oct 3 2019 42 mins
    Join DigiCert's Solutions Engineering expert Dave Corbett to uncover the 4 key phases of best-in-class TLS/SSL certificate management. During this 30-minute webinar, you will learn how to:

    - Identify your entire SSL landscape with a baseline inventory
    - Remediate and remove any weak keys, cipher suites and hashes
    - Protect your assets and prevent outages with process automation
    - Monitor your certificate suite with reliable tools and resources

    Don’t miss this opportunity to learn how to implement a robust TLS/SSL certificate management strategy, and to directly ask your questions to our subject matter expert.
  • 2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe
    2019 Human Factor: Today's Cyber Attacks Target People - How to Keep Them Safe
    Patrick Wheeler, Director of Threat Intelligence, Proofpoint Recorded: Oct 2 2019 52 mins
    More than 99% of attacks we see in cybersecurity require some form of human interaction to succeed. The "Human Factor" of curiosity and trust that leads well-intentioned people to install malware, transfer money or hand over sensitive data is simply more reliable and lucrative to cyber criminals than expensive and quickly patched automated exploits. So how can you better protect yourself, your organization, and your end users from attacks that rely more on social engineering than system vulnerabilities?

    Join our Director of Threat Intelligence, Patrick Wheeler, as we examine the key findings of Proofpoint's 2019 Human Factor Report. We'll take a close look at how threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that trick even savvy users.

    In this session we'll share:

    - Trends in volume and types of attacks, providing useful insights for both defenders and organizations
    - Refined techniques and new platforms used by attackers
    - The latest targets that make up an expanding attack including as Office 365 and other cloud accounts, as well as the schemes to which users are most likely to respond
    - The evolution of business email compromise and impostor threats
    - Best practices for layered defenses and user training when, in fact, end users represent the last line of defense against these threats

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • ゼロトラスト実現のポスチャー考察 & デシリアライゼーション対策の最適解
    ゼロトラスト実現のポスチャー考察 & デシリアライゼーション対策の最適解
    アジェイ・ミスラ, エンタープライズ・セキュリティー・アーキテクト, Akamai Technologies; 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies Recorded: Oct 2 2019 58 mins
    最新のセキュリティトピックを2部構成でお届けします。

    前半は、ゼロトラスト実現の重要な検討項目であるセキュリティポスチャー(体制)についてお話しします。ゼロトラスト・セキュリティの実現には、アイデンティティ、アクセス、およびポスチャーという3つの重要な柱があると考えられています。企業におけるユーザーとデバイスの状況を監視し、適応型の自動化されたセキュリティポスチャーを実現する方法を考察します。

    後半は、今話題となってるデシリアライゼーション脆弱性に関する攻撃手法をデモを交えながら解説します。この脆弱性は如何に危険なものかを説明し本脆弱性に対する防御に関してベストプラクティスを解説します。

    Presenter: アジェイ・ミスラ, エンタープライズ・セキュリティー・アーキテクト, Akamai Technologies
    Presenter: 金子 春信, CISSP, シニア・プロダクト・マーケティング・マネージャー, Akamai Technologies
    Moderator: 小熊慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Quantifying Mobile Risk in the Enterprise
    Quantifying Mobile Risk in the Enterprise
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC Recorded: Oct 1 2019 21 mins
    Protect your organization from threats targeting your corporate data. In today's webinar, our guest speaker Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC will discuss:
    - How organizations are preparing for digital transformation
    - What are the security priorities for CISOs through 2020
    - What platforms and technologies are seen as high risk for the next 5 years
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats
  • Quantifying Mobile Risk in the Enterprise
    Quantifying Mobile Risk in the Enterprise
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC Recorded: Sep 30 2019 21 mins
    Protect your organization from threats targeting your corporate data. In today's webinar, our guest speaker Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC will discuss:
    - How organizations are preparing for digital transformation
    - What are the security priorities for CISOs through 2020
    - What platforms and technologies are seen as high risk for the next 5 years
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats
  • The Risks From Unsecured Networks
    The Risks From Unsecured Networks
    Jonathan Barnett, Sales Engineer Recorded: Sep 26 2019 27 mins
    More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. These allow admins to take back control of their network, securing all devices, preventing internet misuse, and improving productivity. A filtered DNS solution is capable of blocking DDoS attacks, botnets, cache poisoning, and other threats.

    In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection can benefit your business and protect against attacks.
  • Realizing the benefits of 5G for business
    Realizing the benefits of 5G for business
    Lov Kher, Managing Principal & Master Architect, Enterprise Innovation and 5G Solutions Recorded: Sep 26 2019 59 mins
    5G is more than just a step up from current wireless technology. It’s a quantum leap that will bring an era of radically new possibilities across many areas of technology. During this webinar, you will learn how to begin your journey to 5G. Verizon will showcase the success stories and real use cases of our 5G services and how you can begin to embrace these benefits and put yourself one step ahead of your competitors. We will also share with you the retail store or branch of the future, possibilities in using 5G as a part of banking solutions and many more; we will also uncover which of these technologies can be realized to gain the full potential of your network in the future.
  • Email Security: Why Now Is The Time To Review Your Strategy
    Email Security: Why Now Is The Time To Review Your Strategy
    Adenike Cosgrove Cybersecurity Strategy, International and Matt Cooke, Cybersecurity Strategist Recorded: Sep 26 2019 58 mins
    Nearly 100% of attacks require a human to click. Cybercriminals target people, largely via email, rather than systems and infrastructure. Security teams are spending over half of their time responding to phishing attacks. It’s never been more critical to have an effective and accurate email gateway that can identify and stop these attacks and provide the right forensics and visibility into who your most attacked people are.

    Legacy solutions cannot provide this visibility and are behind the curve in stopped advanced email threats.

    Join us to gain insights into:
    How the email threat landscape has changed with attackers evading legacy approaches;
    How leaders like Proofpoint have innovated to keep up;
    Our recommendations on the steps you must take to protect your people from email-based targeted attacks.
  • Slashing Cloud Risk: 3 Must-Do's
    Slashing Cloud Risk: 3 Must-Do's
    Joe Basirico, SVP of Engineering at Security Innovation Recorded: Sep 25 2019 55 mins
    The cloud is a cost-effective way to provide maximum accessibility for your customers. However, organizations often fail to optimize and configure it properly for their environment, leaving them inadvertently exposed.

    Attend this webcast to learn proven techniques that reduce cloud risk, including:

    • Building applications to leverage automation and built-in cloud controls
    • Securing access control and key management
    • Ensuring essential services are running, reachable, and securely hardened
  • Cyber-Threats in Healthcare: Understanding and Protecting Against the Risks
    Cyber-Threats in Healthcare: Understanding and Protecting Against the Risks
    Roman Tobe, Product Marketing Manager Recorded: Sep 25 2019 52 mins
    Security is more critical than ever for healthcare organizations. At the same time, the sector has become one of the most easily targeted. Hospitals, for example, are falling victim to cyber-attacks such as ransomware and business email compromise (BEC). However, healthcare organizations attack surface extends beyond email.

    Cyber criminals create fake social media accounts and register fraudulent domains to attack their supply chain, defraud their customers and gain access to sensitive data. Join this webinar and learn how Proofpoint can help protect healthcare organizations from these targeted attacks.

    Join us to learn:

    - The state of cyber risks in healthcare
    - The latest trends in cyber threats targeting healthcare organizations
    - How Proofpoint can help protect your organization

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Oct 17 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Evan Kirstel's TECH Talks
    Evan Kirstel's TECH Talks
    Evan Kirstel & Tom Cross Oct 18 2019 4:00 pm UTC 60 mins
    This is a weekly one-hour livecast with Evan Kirstel and Tom Cross discussing the highlights of the week titled: What’s REALLY UP and Down For the WEEK in TECH
    with Topics for Each Week
    - Customer Experience - Good, Bad, Ugly
    - Tech – Up’s and Down’s
    - Gadgets – Love/Hate
    - Ideas for Action
    - Random Weird Events
    - Coming Soon - Future Thoughts
  • Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Six Ways to Keep your Business Safe from Cybercriminals (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Oct 22 2019 10:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    Cybercriminals keep finding ways to attack businesses regardless of their size.

    Join Webroot Sr. Threat Research Analyst Kelvin Murray for this 30-minute webinar covering six ways to keep your business safe from cybercriminals. Topics that will be discussed include:

    •Preventing and mitigating ransomware attacks
    •Coping with the spectre of information theft
    •The latest in cybercrime featuring real incidents and case studies
  • Airheads Tech Talks: SD-WAN-Routing(Underlay and Overlay) and PBR Enhancement
    Airheads Tech Talks: SD-WAN-Routing(Underlay and Overlay) and PBR Enhancement
    Karthikeyan Mookkandi, Aruba TAC Oct 29 2019 10:00 am UTC 90 mins
    Aruba’s SD-Branch solution leverages WAN services that interconnect hub and spoke sites to establish VPN tunnels which encapsulate and forward corporate traffic. Each WAN service is referred to as the underlying network while the VPN tunnels form the overlay network.

    Reachability and forwarding through the underlay and overlay networks is achieved using IP routing on gateways. The VPNCs and BGWs each implement their own routing tables to determine the next-hop for each IP packet on its way to the desired destination. The routing tables on the BGWs consist of default gateways and static routes while the routing tables on VPNCs consist of default gateways, static, IKEv2, and OSPF routes

    Agenda:

    1. Introduction to underlay and overlay routing.
    2. Configuration of Overlay routing.
    3. What is PBR.
    4. Traffic using with PBR/DPS
    5. Configuration and troubleshooting.
  • Live Demo: Ramping Up People-Centric Cybersecurity
    Live Demo: Ramping Up People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Oct 30 2019 5:00 pm UTC 45 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    1. Identify and remediate account compromise attacks
    2. Solve for data loss through email
    3. Make your users more resilient against attacks through awareness training
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Oct 31 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Today’s Threat Landscape: Reviewing Cybercriminals’ Latest Tactics (EMEA)
    Today’s Threat Landscape: Reviewing Cybercriminals’ Latest Tactics (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Nov 11 2019 11:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    This webinar will provide expert insights on the latest cybercriminal activity, highlighting the year's most innovative, dangerous, and pervasive instances of malware.

    Specifically, we will be covering the developments including information theft, Emotet, BEC scams, ransomware, targeted attacks, and more. Come learn about these developments and strategies to help secure your organisation from ransomware and next-generation cyberthreats.
  • Live Demo: Advanced People-Centric Cybersecurity
    Live Demo: Advanced People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Nov 12 2019 6:00 pm UTC 45 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Nov 14 2019 5:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • 2019 Cybersecurity Trends (EMEA)
    2019 Cybersecurity Trends (EMEA)
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Nov 19 2019 4:00 pm UTC 60 mins
    ** This is an EMEA focused webinar **

    As we near the end of 2019, we’ll take a look at some of the most pressing and prevalent threat trends from another busy year in cybercrime.

    This webinar promises to be a sneak peek at some of the developments sure to be covered in the 2020 Webroot Threat Report, so don’t miss it.

    We will update the key topics to be discussed closer to the date.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Adam Harrison, Cryptocurrency Nov 20 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Adam Harrison, Principal Consultant, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This month's theme: Cryptocurrency

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Prepare Your Business for the Workplace of 2025: Top Trends Impacting LATAM
    Prepare Your Business for the Workplace of 2025: Top Trends Impacting LATAM
    Sebastian Menutti Industry Principal, Connected Work, Frost & Sullivan Nov 20 2019 4:00 pm UTC 60 mins
    How will you leverage the emerging growth opportunities generated by the immense change that workplaces are experiencing in Latin America? How do you remain a relevant market participant once your current workplace has become obsolete?

    Key Takeaways:

    • Discover how new styles, workers, and technologies will completely reshape where, when, and how people work. And what can your company do to stay ahead of the curve?
    • Find out about the substantial growth opportunities for companies and technology vendors.
    • Explore how collaborative solutions can spur your employee productivity and business agility.
  • Airheads Tech Talks: SD-WAN-MicroBranch(IAP-VPN)
    Airheads Tech Talks: SD-WAN-MicroBranch(IAP-VPN)
    Ramkumar Radhakrishnan, Aruba TAC Nov 26 2019 10:00 am UTC 90 mins
    The Aruba SD-Branch solution provides a complete suite of solutions for all the needs in a distributed enterprise. This also includes the support for micro-branches (SOHO), where the branch network could be built just using IAPs and switches. This helps in VPN connectivity to access corporate resources to the larger branches, that may need redundant gateways as well as the complete cloud-managed LAN/WLAN.

    Agenda:

    1. Introduction
    2. Supported topologies
    3. Modes of operation
    4. Configuration
    5. Integration with Clearpass
    6. Troubleshooting"
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Dec 5 2019 5:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • MSP’s Top Cloud Security Concerns and How to Tackle Them (EMEA)
    MSP’s Top Cloud Security Concerns and How to Tackle Them (EMEA)
    Fiona Challis, Channel Enablement & Sales Expert, Next Gen Dec 9 2019 3:00 pm UTC 60 mins
    ** This is an EMEA focused webinar **

    The role of the cloud in IT security can be confusing and frightening for many customers and clients.

    Learn five tips for implementing cloud-based security for your clients. Discuss how to balance an approach with customers with those tips and understand the important questions to consider with customers considering cloud security as an option.
  • Data Protector zum Wochenstart: Data Protector Neuerungen
    Data Protector zum Wochenstart: Data Protector Neuerungen
    Sprecher ist ein Technical Consultant mit Spezialisierung auf Data Protection Dec 16 2019 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    Je nach Thema dauern die Webinare zwischen 60 und 90 Minuten.
  • 2019 Threat Landscape Roundup (EMEA)
    2019 Threat Landscape Roundup (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Dec 16 2019 11:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    SMBs are major targets for cybercriminals. To stay safe, today’s businesses must understand the types of cyberattacks they may encounter and how to implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses faced during 2019, see what's upcoming in 2020, and get tips to help you to keep your business and clients safe.

    A Webroot threat expert will be discussing information theft, information stealers, BEC scams, ransomware, targeted attacks, and all the cybercrime headlines of 2019.
  • Airheads Tech Talks: SD-WAN-Branch Security and Zscaler
    Airheads Tech Talks: SD-WAN-Branch Security and Zscaler
    Abdul Ali Irfaan, Aruba TAC Dec 17 2019 10:00 am UTC 90 mins
    Security is an integral part of the Aruba SD-Branch solution. The security of the Aruba SD-Branch solution is built in layers, from the hardening of the operating system to the integration with best-of-breed security partners like Zscaler.
    With these integrations, the Aruba SD-Branch architecture seeks to offer enterprise-grade advanced threat protection in a scalable manner. The integration with Zscaler’s Security as a Service offering provides an extremely simple and scalable solution for advanced threat protection in branch networks.

    Agenda:

    1. Feature Description
    2. Pre-requisites
    3. Configuring Aruba Branch Gateway
    4. Configuring Next-Hop List
    5. Add Next-Hop List to Routing Policy
    6. Add Routing Policy to User-Role
    7. Debugging
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Eric K. Gentry, Principal Consultant, PS Advisory Services Dec 18 2019 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Eric K. Gentry, Principal Consultant, PS Advisory Services
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Dec 19 2019 5:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Data Protector zum Wochenstart: Best Practices & Empfehlungen
    Data Protector zum Wochenstart: Best Practices & Empfehlungen
    Sprecher ist ein Technical Consultant mit Spezialisierung auf Data Protection Jan 20 2020 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb.

    Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    Je nach Thema dauern die Webinare zwischen 60 und 90 Minuten.