Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • Deliver a Better Digital Workspace Experience featuring Forrester
    Deliver a Better Digital Workspace Experience featuring Forrester
    Calvin Hsu, VP of Product Marketing at Citrix, Andrew Hewitt, Analyst Serving Infrastructure & Ops Professionals at Forrester Recorded: Aug 15 2019 65 mins
    As your enterprise looks for better ways to drive employee productivity through a better technology experience, the infusion of intelligence, automation, and personalization into the digital workspace offers exciting potential. In this webinar, digital workspace thought leaders Andrew Hewitt (Forrester Analyst/Guest speaker) and Calvin Hsu (Citrix VP of Product Marketing) will explore the impact of digital workspaces powered by intelligence and automation.

    Attendees of the webinar will learn:
    -The top challenges organizations face in creating a technology experience that enables productivity
    -The evolution of digital workspace technology, and particularly the impact of intelligence and automation within the workspace
    -A day-in-the-life scenario of a digital workspace end user that shows specific processes and advantages
  • From Skeptics to Champions: Selling the Value of Security Awareness Training
    From Skeptics to Champions: Selling the Value of Security Awareness Training
    Dale Zabriskie, Security Awareness Training Evangelist & Joe Krock, Cyber Training and Awareness Leader Recorded: Aug 15 2019 106 mins
    The value of security awareness training may be obvious to you and other cybersecurity professionals. But in order to launch a new or more comprehensive training program, you’ll need to convince management—and your end users. To make your case for security awareness training, speaking the language of your customer is key.

    Expect tough questions: What’s wrong with what we’re doing now? What measurable goals can the security awareness training program achieve? How does the program justify the cost? Users may have concerns the value of simulated phishing tests and whether training will interfere with their work.

    Taking the time to win over doubters and skeptics can reduce obstacles—and even turn them into future champions for your security awareness training program. In this webinar, you’ll learn about:

    - Best practices for selling the value of security awareness training internally
    - Preparing a business case for your training program
    - Engaging employees through creative programming, recognition, and incentives
  • Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Top 5 Podcasts: Digital Transformation From Cisco to GE and Beyond with Bill Ruh
    Ed Maguire, Principal Partner, Momenta Partners & Bill Ruh, CEO of Digital Business at LendLease Group Recorded: Aug 15 2019 58 mins
    Bill Ruh is CEO of Digital Business at Lendlease Group, a global developer and construction company for high rise and other real estate developments. Previously, he was the Chief Digital Officer for all of GE and CEO of GE Digital. Our conversation explored the nature of digital transformation, the considerations for creating goals and aligning the organization for success. One of the key insights is that transformation for industrial firms draws from best practices of technology companies, and the core principle is that technology companies’ missions are tied to asset optimization and better outcomes. He also shared how large companies need to think of transformation in two speeds – shorter term and longer term, where Speed 1 is the quarter to quarter focus and Speed 2 is the long term “moon shots”. He compares and contrasts the innovation mindset and approaches between startups and established companies, and shares best practices for larger companies to bridge the cultural gaps between their legacy and digital businesses. He also shares his views of the future of the construction and real estate industries enabled by the transformative impact of new technologies, which he is spearheading in his new role at Lendlease.
  • Why your Contact Center needs a Conversational AI Platform
    Why your Contact Center needs a Conversational AI Platform
    Pranav Deshpande, Product Marketing - AI/ML @ Twilio and Ricky Holtz, Sales Engineer Recorded: Aug 15 2019 53 mins
    Conversations powered by AI allow your contact center teams to deliver more of a personal and faster customer experience while improving operational efficiency. So why do 60% of customers try to skip IVRs to get to a human agent as soon as they can?
  • DevOps Transformation: The value of automation in deployment pipelines
    DevOps Transformation: The value of automation in deployment pipelines
    Julian Fish, Director of Product Management, Micro Focus Recorded: Aug 14 2019 55 mins
    Enterprises undertaking a DevOps transformation must look to implement tool-chains and pipelines to streamline application delivery. However, tool-chain integration and pipeline management provide little value if delivered in isolation.

    Join Julian Fish, Director of Product Management, in this live webinar to see how an orchestrated and automated pipeline can drive multiple tool-chains and be implemented in minutes. Please join us to learn:

    • How to quickly create a deployment pipeline that spans build, deployment, and test
    • Best practices for component reuse, artifact management, and process definition to simplify repeatability
    • How application, database, and test automation can be orchestrated from a single, easy to use dashboard
  • APIs & Microservices for a Modern and Integrated Enterprise
    APIs & Microservices for a Modern and Integrated Enterprise
    Renu Motwani Recorded: Aug 14 2019 23 mins
    Digital Transformation starts with the need for modernization of legacy systems and/or integration of the existing systems with the modern cloud. APIs form the first logical step in undertaking that journey. The underlying implementation: business logic, integration with the vast variety of data sources - both new and legacy, follows as the next important undertaking – and that defined the role of Microservices. In this session we'll dive deeper into how APIs and Microservices can help define a modern, digital enterprise.
  • 数据泄露事件及对中国企业的启示
    数据泄露事件及对中国企业的启示
    李岳霖, 技术顾问, Akamai Technologies; 郑伟, 大中华区产品市场部经理, Akamai Technologies Recorded: Aug 14 2019 63 mins
    2018年5月25日,《欧盟数据保护通用条例》(General Data Protection Regulation,简称“GDPR”)正式生效。但条例生效后的1年多,欧洲各国监管机构尚未对违规企业作出巨额罚款。终于,在2019年7月8日与9日,英国信息监管局(Information Commissioner’s Office,简称“ICO”)先后对英国某航空公司和某知名连锁酒店开出1.83亿英镑和9920万英镑的巨额罚单,拉开GDPR强硬执法的序幕。

    • 航空公司和酒店的数据泄露事件,公司网站被劫持,谁该负责?
    • 对中国企业,特别是有出海业务的国内企业有什么启示?

    参加Akamai Technologies和 (ISC)² 在8月14日下午2:00至3:00的在线研讨会,此次演讲将为您带来对这些问题的解答,敬请期待!

    演讲人: 李岳霖, 技术顾问, Akamai Technologies
    演讲人: 郑伟, 大中华区产品市场部经理, Akamai Technologies
    主持人: 丁斐, CISSP, (ISC)² 南京准分会会长

    *本次在线研讨会将以普通话进行
  • Intro to Messaging at Scale
    Intro to Messaging at Scale
    Dave Esber, Product Marketing @ Twilio and David Lowes, Solutions Engineering @ Twilio Recorded: Aug 13 2019 39 mins
    Nine in 10 customers want to message with a business. Yet, messaging at scale is hard. In this three-part webinar series, we outline some of the key concepts you should consider as you scale your customer messaging and considerations for the future.

    Anyone can send their first message with just a few lines of code and a credit card, but with Twilio just a few tweaks to your code can help you send millions of messages to customers around the world. In this webinar, we touch on a few key messaging concepts like queueing, status callbacks, segments, concatenation, transcription, and phone number types. These SMS practices will help you set up your infrastructure to scale as your business grows.
  • Securing the Multi-Cloud in the Age of Threats
    Securing the Multi-Cloud in the Age of Threats
    Raj Mallempati (CloudKnox Security) | Chris Schueler (Trustwave) | Tim Choi (Proofpoint) | Nathan Wenzler (Moss Adams) Recorded: Aug 8 2019 55 mins
    How are organizations handling security for their multiple clouds and applications? Join cloud and security leaders in an interactive discussion to learn about:
    - Multi-cloud reality
    - Addressing your cyber risk
    - Managing vulnerabilities, detecting breaches and responding to incidents
    - Automating security tasks across multiple clouds and applications
    - Recommendations for improving enterprise cloud security

    Speakers:
    - Raj Mallempati, COO, CloudKnox Security
    - Chris Schueler, Senior Vice President of Managed Security Services, Trustwave
    - Tim Choi, VP, Product Marketing, Proofpoint
    - Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams
  • Webisode 4: Proofpoint Demo - Enterprise Information Archiving
    Webisode 4: Proofpoint Demo - Enterprise Information Archiving
    Tom Mahoney, Senior Archiving Sales Specialist; Jason Colvin, Senior Systems Engineer Recorded: Aug 8 2019 29 mins
    Developing a modern data archiving strategy isn’t easy. IT departments are plagued by data growth and legal and compliance teams struggle with how to best retain, discover, and supervise content.

    Join us for the last of four webisodes to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving:

    In this demo, we'll share how you can:

    - Mitigate reputational risk
    - Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance
  • Progressive Web Apps Simplified - All You Need to Know
    Progressive Web Apps Simplified - All You Need to Know
    Faizan Khalidi, Sr. Director of Product Management at Kony Inc. Recorded: Aug 8 2019 38 mins
    Progressive Web Apps (PWAs) are becoming more popular and gaining adoption in companies of all sizes. Many of us are still curious and learning on when and how to implement a PWA. Listen to this webcast to learn how to simplify the development of PWAs for mission-critical apps while avoiding some of the most common pitfalls. Source: Application Architecture Summit. Integration Development News.
  • IoT Security in 2019: Risks and Cyber Resilience
    IoT Security in 2019: Risks and Cyber Resilience
    Chris Morales (Vectra) | Jason Soroko (Sectigo) | Todd Weber (Optiv) | Rudolph Araujo (Awake Security) Recorded: Aug 7 2019 48 mins
    As the Internet of Things continues to grow, so do the security and privacy risks and vulnerabilities associated with IoT devices on enterprise networks. Organizations worldwide are looking to assess and manage their risk, implement basic cyber hygiene, and improve their security posture. Discover the best strategies for achieving security at every level, including IoT.
    Join this interactive panel with industry experts to learn more about:
    - Impact of IoT on enterprise security
    - How to assess the IoT risk
    - Most common IoT vulnerabilities and how to address them
    - Recommendations for improving IoT security

    Speakers:
    - Chris Morales, Head of Security Analytics, Vectra (Moderator)
    - Jason Soroko, CTO of IoT, Sectigo
    - Todd Weber, Chief Technology Officer, Optiv
    - Rudolph Araujo, VP Marketing, Awake Security
  • Webisode 5: Proofpoint Demo - Ramping Up People-Centric Cybersecurity
    Webisode 5: Proofpoint Demo - Ramping Up People-Centric Cybersecurity
    Craig Morell, Security Sales Engineer, Proofpoint Recorded: Aug 7 2019 36 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    - Identify and remediate account compromise attacks
    - Solve for data loss through email
    - Make your users more resilient against attacks through awareness training
  • Let's Fix the Internet Routing Security Problem
    Let's Fix the Internet Routing Security Problem
    Aftab Siddiqui, Internet Technology Manager in Asia Pacific Regional Bureau, Internet Society Recorded: Aug 7 2019 64 mins
    Internet routing failures happen every day. The most recent high-profile incident involved Verizon, causing outages at Cloudflare, Facebook, Amazon, among others, for nearly three hours in June. A few weeks prior, another routing failure, this time by China Telecom, lasted two hours and caused massive disruption in Europe. There is a clear need for network operators and the wider security community to improve routing security - the backbone of the Internet.

    In this webinar, we will explain why network operators should consider the Mutually Agreed Norms for Routing Security (MANRS), a community-driven global initiative that prevents such glitches by taking on security as a shared responsibility among networks. This webinar will give a technical overview of the related challenges and risks, and show the impact of recent incidents, followed by the four actions operators can adopt.

    Join Internet Society and (ISC)² on Aug 7, 2019 (Wed) at 14:00 (GMT +8) to learn about internet routing security.

    Presenter: Aftab Siddiqui, Internet Technology Manager in Asia Pacific Regional Bureau, Internet Society
    Moderator: S.C. Leung, Member, (ISC)² Board of Directors
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Aug 6 2019 33 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Top 5 Podcasts: Managing Expectations - A Conversation with Guido Jouret
    Top 5 Podcasts: Managing Expectations - A Conversation with Guido Jouret
    Ed Maguire, Principal Partner, Momenta Partners Recorded: Aug 6 2019 49 mins
    Our conversation explored Guido Jouret’s core principles around digital transformation, best practices for implementation as well as key lessons as they have applied in his career. Notably, we explore the implications of how the coming transition in transportation from internal combustion engines to self-driving electric powered transportation has implications all across the value chain.

    We explored a range of topics including:

    - What does digital transformation mean?
    - How to asses where change is occurring external to the organization, and how best to map impact on the business, the organization and the market;
    - How to asses with which customer journeys matter most to the company;
    - How to effectively organize sponsorship and leadership;
    - Best practices in implementing an iterative approach to improvement;
    - How to evaluate and challenge ideas;
    - How to ensure effective collaboration between IT and the rest of the organization;
    - How to manage resistance and/or risks related to the existing business;
    - Common mistakes organizations make early in the process of launching digital initiatives.
  • CISSPチャレンジセミナー③
    CISSPチャレンジセミナー③
    講師:日本マイクロソフト株式会社 技術統括室Chief Security Officer 河野省二, CISSP Recorded: Aug 2 2019 86 mins
    CISOに必要な情報セキュリティの知識と考え方

    CISOにはどのような知識が必要なのか、CSIRTのメンバーの教育はどうしようか、情報セキュリティに関する製品やサービス開発はどのように行えばよいのかなど、ユーザ企業もベンダー企業も人材育成の悩みは尽きません。セキュリティ事故をベースにした教育はわかりやすい一方で、応用が効かないためにその他の脅威や攻撃に対応する力が付きにくいのが現状です。

    CISSPの8ドメインは情報セキュリティ活動のあり方について基盤づくりから学び、実践的な対策を行うための考えかたを構築するために必要な情報が集約されています。セミナーでは「CISSPならこう考える」ということで、経営陣やCISO、CSIRTのメンバーが知っておくべき情報セキュリティの知識をわかりやすくお教えします。通常は5日間で行っているオフィシャルセミナーの中から、CISOに大きく関係するセキュリティとリスクマネジメント、アイデンティティとアクセスの管理、資産のセキュリティを中心に8ドメインのトピックをご理解いただくためのショートセミナーです。

    CISSPを受験させてみたいけど、どのような内容になっているのかわからないという経営層の皆さんにも理解しやすい内容で提供させていただきます。情報セキュリティベンダーで製品・サービス企画を行っている皆さんにも効果的な内容となっています。

    本セミナーは2019年4月4日に収録されました。
  • CISSPチャレンジセミナー②
    CISSPチャレンジセミナー②
    講師:日本マイクロソフト株式会社 技術統括室Chief Security Officer 河野省二, CISSP Recorded: Aug 2 2019 60 mins
    CISOに必要な情報セキュリティの知識と考え方

    CISOにはどのような知識が必要なのか、CSIRTのメンバーの教育はどうしようか、情報セキュリティに関する製品やサービス開発はどのように行えばよいのかなど、ユーザ企業もベンダー企業も人材育成の悩みは尽きません。セキュリティ事故をベースにした教育はわかりやすい一方で、応用が効かないためにその他の脅威や攻撃に対応する力が付きにくいのが現状です。

    CISSPの8ドメインは情報セキュリティ活動のあり方について基盤づくりから学び、実践的な対策を行うための考えかたを構築するために必要な情報が集約されています。セミナーでは「CISSPならこう考える」ということで、経営陣やCISO、CSIRTのメンバーが知っておくべき情報セキュリティの知識をわかりやすくお教えします。通常は5日間で行っているオフィシャルセミナーの中から、CISOに大きく関係するセキュリティとリスクマネジメント、アイデンティティとアクセスの管理、資産のセキュリティを中心に8ドメインのトピックをご理解いただくためのショートセミナーです。

    CISSPを受験させてみたいけど、どのような内容になっているのかわからないという経営層の皆さんにも理解しやすい内容で提供させていただきます。情報セキュリティベンダーで製品・サービス企画を行っている皆さんにも効果的な内容となっています。

    本セミナーは2019年4月4日に収録されました。
  • (ISC)²と提供資格のご紹介
    (ISC)²と提供資格のご紹介
    (ISC)² Director of Business Development, Japan 小熊慶一郎, CISSP Recorded: Aug 2 2019 21 mins
    (ISC)²が提供する主な資格、CISSPの考え方や特徴、米国国防総省のスキル対応定義を含む、各国における(ISC)²の資格の採用状況、また、日本政府へのアプローチなどをご紹介します。

    ※都合により5:46のところで一部動画が切れています。悪しからずご了承ください。

    本セミナーは2019年4月4日に収録されました。
  • CISSPチャレンジセミナー①
    CISSPチャレンジセミナー①
    講師:日本マイクロソフト株式会社 技術統括室Chief Security Officer 河野省二, CISSP Recorded: Aug 2 2019 52 mins
    CISOに必要な情報セキュリティの知識と考え方

    CISOにはどのような知識が必要なのか、CSIRTのメンバーの教育はどうしようか、情報セキュリティに関する製品やサービス開発はどのように行えばよいのかなど、ユーザ企業もベンダー企業も人材育成の悩みは尽きません。セキュリティ事故をベースにした教育はわかりやすい一方で、応用が効かないためにその他の脅威や攻撃に対応する力が付きにくいのが現状です。

    CISSPの8ドメインは情報セキュリティ活動のあり方について基盤づくりから学び、実践的な対策を行うための考えかたを構築するために必要な情報が集約されています。セミナーでは「CISSPならこう考える」ということで、経営陣やCISO、CSIRTのメンバーが知っておくべき情報セキュリティの知識をわかりやすくお教えします。通常は5日間で行っているオフィシャルセミナーの中から、CISOに大きく関係するセキュリティとリスクマネジメント、アイデンティティとアクセスの管理、資産のセキュリティを中心に8ドメインのトピックをご理解いただくためのショートセミナーです。

    CISSPを受験させてみたいけど、どのような内容になっているのかわからないという経営層の皆さんにも理解しやすい内容で提供させていただきます。情報セキュリティベンダーで製品・サービス企画を行っている皆さんにも効果的な内容となっています。

    本セミナーは2019年4月4日に収録されました。
  • Enabling Next Generation Patient Care with a Mobile First Network
    Enabling Next Generation Patient Care with a Mobile First Network
    Tim Vanevenhoven (Aruba), Jake Dorst (CIO, Tahoe Forest Health System) Recorded: Aug 1 2019 44 mins
    Join us August 1st, 10am PDT to hear Tahoe Forest Health System CIO, Jake Dorst, share how they have worked with Aruba to strengthen their IT network infrastructure and save money with the goal of improving patient care. Attend and you could qualify for a FREE Access Point and a 90-day trial of Aruba's network cloud-management solution, Aruba Central.
  • Blockchain & Connected Industry: Applications and Implications
    Blockchain & Connected Industry: Applications and Implications
    Ed Maguire, Principal Partner, Momenta Partners Recorded: Aug 1 2019 62 mins
    Over the last few years, the blockchain has emerged as a new technology that has been met with equal parts acclaim and skepticism. The revolutionary aspect of blockchain center is decentralization, which means that secure peer-to-peer transactions can be conducted over networks without an intermediary. 

    In this webinar, a series of experts at the forefront of this cutting-edge technology, take a critical look at the current industry landscape and the use of blockchain technology in IoT applications. It further provides an overview of IOTA technology, which was developed to provide speed and scalability necessary to support industrial IoT use cases.
  • Making 60-minute Remediation a Reality
    Making 60-minute Remediation a Reality
    Austin Murphy: Vice President of Managed Services - CrowdStrike, Con Mallon: Senior Product Director - CrowdStrike Recorded: Aug 1 2019 54 mins
    How to leverage technology + expertise to respond within the "breakout time" window.

    Speed is an imperative in cybersecurity and it is one of the themes in the CrowdStrike® 2019 Global Threat Report, which highlights the critical importance of speed in staying ahead of today’s rapidly evolving threats. One of the focuses of this year’s report is “breakout time” — the window of time from when an adversary first compromises an endpoint machine to when they begin moving laterally throughout your network to reach their objective. For some adversaries, it only takes an average of 18 minutes. This begs an important question — are you and your organization able to respond at the same pace as the attacker?

    To help organizations be better prepared for today’s sophisticated adversaries, CrowdStrike has established the "1-10-60 rule” as a benchmark for the average speed needed to defeat the adversary and stop the breach: 1 minute to detect, 10 to investigate and 60 minutes to remediate.

    In this webcast, CrowdStrike VP of Managed Services Austin Murphy will discuss the 1-10-60 rule and explain why these key outcome-driven metrics are critical to your organization’s security readiness. He will also show you how CrowdStrike Falcon® Complete™ can instantly transform your security and ensure you can meet the 1-10-60 rule.

    Join this webcast to learn:

    - Why speed of detection, investigation and remediation are key factors for successful day-to-day security management
    - The important steps needed to improve your organization’s ability to rapidly detect, investigate and remediate threats
    - How Falcon Complete can fast-track your organization to a 1-10-60 rule posture and elevate your cybersecurity maturity to the highest possible level, regardless of your internal resources
  • Accelerating Customer Performance via Strategic Customer Assessments
    Accelerating Customer Performance via Strategic Customer Assessments
    Thomas B. Cross Recorded: Jul 31 2019 31 mins
    In this 30-minute webinar, we will explore the means for accelerating company performance by increasing performance of their customers using strategic assessments. Here are the Top-10 Topics presented.
    1 - Customer – now and forever will always be about the customer.
    2 - Content - the words, images, ideas, AI abstractions or messages you use to communicate to the customer.
    3 – Channels Media – what mainstream and other media channels are customers using now and will use?
    4 - Channels of Distribution – build “agile” sales channel models adapting to known and emerging markets designed to reduce enterprise sales cycles.
    5 – Connections - the means for networking with other businesses, industry, government and others.
    6 - Communications - the unique organization processes that occur between companies and customers.
    7 - Collaboration - organizational thought leadership for content development and delivery processes.
    8 - Call to Actions – driving behavior without which nothing happens.
    9 - Crisis - chaos, buzz, glitz, hate, squawk, gossip, glam and anything you can imagine being said for or against you.
    10 - Coming Sooner - the race to zero and competition is not just coming soon but sooner.
  • Beyond the Phish: A Snapshot of End-User Behavior
    Beyond the Phish: A Snapshot of End-User Behavior
    Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist Recorded: Jul 31 2019 59 mins
    Phishing is one of InfoSec's longstanding threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering?

    During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

    We’ll share:

    - The importance of assessing and training end users about cybersecurity threats beyond email-based social engineering
    - The strengths and weaknesses among end users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization
    - A more wholistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks
    - How you can use this information to reduce the risk of successful cyberattacks within your organization

    Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture.

    *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
  • HTTPS: SSL Certificates and Phishing (EMEA)
    HTTPS: SSL Certificates and Phishing (EMEA)
    Kelvin Murray, Sr. Threat Research Analyst, Webroot Aug 20 2019 10:00 am UTC 60 mins
    ** This is an EMEA focused webinar **

    When we see HTTPS at the beginning of a URL, or the accompanying lock icon in our browser’s address bar, we tend to think it means we’re safe from harm. But HTTPS isn’t really about security. It’s about privacy. That lock icon simply means any information we transmit on that site is encrypted. It makes no guarantees the destination itself is safe.

    Cybercriminals know users are trained to look for the lock icon in the address bar, and have been working hard to take advantage of that trust.

    Join our 30-minute webinar to learn more about the tradeoffs between privacy and security, and discover why HTTPS may not really be as secure as we think.
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Aug 20 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • 제로트러스트 세상에서 보안 태세 정의하기
    제로트러스트 세상에서 보안 태세 정의하기
    김 현 도, Senior Solution Engineer, Akamai Technologies; 한 준 형, Technical Account Manager, Akamai Technologies Aug 21 2019 6:00 am UTC 60 mins
    일반적으로 제로트러스트 접근방식에는 접근시도과 신원 확인, 그리고 기기확인이라는 3가지 핵심 축으로 살펴볼 수 있습니다.

    이전 웨비나에서는 아이덴티티 기반 접근 방식을 클라우드 프록시와 함께 사용하여 내부 어플리케이션에 보다 안전하게 액세스 하는 방법을 살펴보았습니다.

    이번 웨비나는 두가지 파트로 나뉘어 집니다. 첫번째 부분에서는 앞서 언급한 3가지 제로트러스트 접근 핵심축에 대해 좀 더 자세히 알아보고 사용자와 접근 장비에 대한 의미에 대해 더 살펴보는 과정을 통해 제로 트러스트 아키텍처를 구현하는 방안에 대해 알아보겠습니다.

    두번째 부분에서는 Web에서 API로 전환되는 보안의 트렌드에 대해 살펴보겠습니다.
    여기서 우리는 모바일 어플리케이션의 폭발적인 증가와 함께 웹에서 API로 공격이 이동하는 API의 공격 트랜드와 Credential Fraud의 라이프 사이클을 살펴볼예정입니다.

    발표자: 김 현 도, Senior Solution Engineer, Akamai Technologies
    발표자: 한 준 형, Technical Account Manager, Akamai Technologies
    진행자: 박 선 영, Senior Business Development Manager, APAC, (ISC)²
  • Why financial and professional services firms must get flexible working right
    Why financial and professional services firms must get flexible working right
    Kirsty Leighton Aug 21 2019 9:00 am UTC 51 mins
    Financial service companies will need to lead the charge in flexible and remote working if they are to attract the best possible talent. Something that has never been more important against a backdrop of Brexit and a growing millennial and Gen Z workforce.

    Today, only one in six (15%) employees work in businesses that don’t offer flexible working. What used to be a perk is now a mandatory offering.
    Alongside the importance of employee satisfaction, the UK is also facing a productivity challenge, on average the UK is 31% less productive than France.

    Join Mark Elwood, Director at TeleWare, Dr Lucy Green, CEO & Business Development Expert at Larato and David Mellard, Director and Founder at Bedrock HR, as they discuss:
    •The flexible working challenges financial services companies face – including security and data protection
    •Can financial services companies safely implement a bring your own device (BYOD) policy?
    •How to use tech to increase productivity
    •Scalable IT solutions for growing companies
  • Creating the Future of Work - Empowering a cloud-enabled workforce
    Creating the Future of Work - Empowering a cloud-enabled workforce
    Tony Muraki-Hart, Enterprise Architect, CANCOM & Toby Brown, Lead EMEA Domain Specialist, Citrix Aug 21 2019 9:00 am UTC 42 mins
    In collaboration with Microsoft & Citrix, CANCOM have developed this Webinar to help you pursue your cloud with confidence.

    Business is transforming, and IT is leading the charge into the digital age. Cloud computing is a critical enabler of this digital transformation. Now, the hub of worker productivity — the desktop — is transitioning to the cloud, thanks to innovations from Citrix and Microsoft.

    What's driving cloud investments today?
    Improving the speed of IT service delivery
    Greater flexibility to react to changing market conditions
    Enabling business continuity
    Improving customer support or services

    Watch this webinar to find out how you can:
    Deliver easy, secure access across devices
    Connect people and places, securely
    Reduce time to market for new products

    Start your transformation today. https://info.cancom.co.uk/move_to_cloud_with_citrix_microsoft
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    John Grim, Senior Manager, PS Advisory Services Aug 21 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •David Kennedy, Managing Principal, VTRAC | Open Source Intelligence

    Preparing for and responding to data breaches and cybersecurity incidents is never easy. It takes knowledge of your environment and its unique threats, effective teamwork, and just as importantly, a rigorous Incident Response (IR) Plan. We'll introduce our monthly listeners to the VIPR Report – the Verizon Incident Preparedness and Response Report. We'll provide a high-level overview of our findings across three years of IR Plan assessments and data breach simulations. Insight will include:

    •Observations and recommendations across the six phases of incident response
    •Top takeaways for building a solid IR Plan and capability
    •Breach Simulations Kits and using these resources to run data breach tabletop exercises

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Digital Transformation Discussion with Forcepoint Connectivity and Security
    Digital Transformation Discussion with Forcepoint Connectivity and Security
    Jim Fulton, Forcepoint Solution Director & David LePage, Forcepoint Solution Engineering Manager Aug 21 2019 3:00 pm UTC 64 mins
    Digital transformation is driving change across the world, creating new opportunities to boost business productivity, while cutting the costs of infrastructure and operations. Increasingly distributed organizations are re-architecting their networks and security to move their most valuable data and applications to the cloud, in order to give their users much richer, faster, less expensive access than ever before. Enabling remote sites and off-network users to securely connect direct-to-cloud is the new challenge facing enterprises and government agencies. 

    How can distributed organizations achieve the reliable, secure connectivity to the cloud they need? Many are now using internet technologies for connect all of their users to cloud-based applications more productively and cost-effectively than ever before.

    Included in this session:

    • How to accelerate the adoption of productivity-enhancing SaaS/cloud apps
    • How to overcome MPLS limitations including costs and issues with speed
    • How to quickly add security to direct-to-cloud SD-WAN deployment to keep intruders out and protect use of web content and cloud apps
    • How to streamline operations by integrating connectivity and security across thousands of sites in the cloud and on-premises from one console
    • Demonstrations of Forcepoint SD-WAN Connectivity, Securing Internet Access and Use, Operating at Scale to Drive Better Business Outcomes
  • Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Webisode 6: Proofpoint Demo - Advanced People-Centric Cybersecurity
    Joel Sierra, Security Sales Engineer, Proofpoint Aug 21 2019 5:00 pm UTC 38 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a demo to learn about the third phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1. Gain deeper visibility into attacks and respond when things go wrong
    2. Solve for unified data protection
    3. Defend against email fraud and social media fraud
  • Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Top 5 Podcasts: Helping Industrial IoT Become a Reality with Dr. Richard Soley
    Ed Maguire, Principal Partner, Momenta Partners & Dr. Richard Soley, Chairman and CEO of the Object Management Group Aug 22 2019 4:00 pm UTC 46 mins
    Richard Soley is Chairman and CEO of the Object Management Group, Executive Director of the Industrial Internet Consortium (IIC) and founding partner of the IoT Solutions World Congress. In this special edition of the Edge Podcast recorded on site in Barcelona, he shares some of the notable developments coming out of the conference.

    The IoT Solutions World Congress is differentiated from other events through the focus on end users and case studies, showcasing test bed work shepherded by the IIC. In our conversation, Richard Soley shares stories and examples of notable work underway, the potential for productivity gains across industries, and the view that manufacturing represents the industry with the most to gain from connecting assets and advanced analytics. Additionally he discusses the launch of the IIC’s new Resource Hub. Finally he shares a fascinating story about standards that connected the design of Space Shuttle booster with the Ancient Romans.
  • How to Design an Adaptable, Flexible and Compliant Social Selling Program
    How to Design an Adaptable, Flexible and Compliant Social Selling Program
    Roman Tobe, Product Marketing Manager Proofpoint & Jeremy Goldstein, Sr. Solutions Consultant Hootsuite Aug 22 2019 5:00 pm UTC 60 mins
    Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.

    If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?

    Join Hootsuite and Proofpoint as our experts share:

    - How top firms balance compliance with their adviser experience
    - What experts believe is in store for social selling and compliance in the future
    - How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms
  • Airheads Tech Talks: SD-WAN-Health Check and Dynamic Path Selection
    Airheads Tech Talks: SD-WAN-Health Check and Dynamic Path Selection
    Rajesh P, Aruba TAC Aug 27 2019 9:00 am UTC 90 mins
    Health checks must be enabled to determine the path availability of each WAN uplink. When enabled, the gateway will send UDP or ICMP probes to an IP or FQDN of a host to determine if the path is available to accommodate traffic. The primary use case for health checks is to verify that each ISP’s network is operational and prevent branch traffic from being forwarded into a black hole.

    Aruba gateways can implement DPS policies to determine the WAN uplinks that are selected for specific users, applications, and destinations. The selected forwarding path could be a single WAN uplink or traffic could be load balanced between a group of WAN uplinks. The destination IP address of the traffic will determine if the traffic is steered towards a VPN tunnel or forwarded directly to the Internet. The DPS policy effectively selects an uplink and the gateway’s routing table or policy-based routing (PBR) rules will determine the next hop.

    Agenda:

    1. Introduction to Health Check and DPS
    2. Features and basic setup requirements
    3. Uplink health check configurations
    4. DPS Policies Configurations
    5. DPS policies verification
    6. DPS Traffic Verification
    7. Flow with routing plus DPS
  • Optimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
    Optimizing DevOps Initiatives: The View from Both Sides of the DevOps Divide
    Dennis Drogseth, VP of Research, EMA and Mark Levy, Product Marketing Director, Micro Focus Aug 27 2019 5:00 pm UTC 60 mins
    What separates successful DevOps initiatives from unsuccessful ones? The answer to this and many other questions will be examined in this new research webinar presented by leading IT analyst firm Enterprise Management Associates (EMA).

    Join us as Dennis Drogseth, VP of Research at EMA provides observations and recommendations for successful DevOps implementations. Dennis will draw from a recent EMA survey of 400 global respondents spanning development, operations, IT service management (ITSM) teams and executive IT.

    This webinar will address DevOps initiatives from many perspectives. Topics covered will include pipeline activities, stakeholders, technological impacts including analytics and automation, roadblocks in terms of both tools and teams, organizational perspectives, best practices, and more.
  • Building a Culture of Security within Healthcare Organizations
    Building a Culture of Security within Healthcare Organizations
    Gretel Egan, Security Awareness Training Strategist, and Ryan Witt, Managing Director Healthcare Industry Practice Aug 27 2019 5:00 pm UTC 59 mins
    Are you taking a patient-centric approach to cybersecurity? As a patient yourself, you no doubt care about the quality of your care... but you also want your personal data and medical history to remain private. Patient care is about more than caring for the body and mind. It’s also about data security.

    In this webinar, we will discuss the importance of visibility and agility when it comes to identifying end-user vulnerabilities, and how healthcare organizations can efficiently implement security awareness training and build a culture that prioritizes data, device, and patient security.

    Join us to learn:

    - What we mean by a “patient-centric” cybersecurity mindset
    - How to overcome common training obstacles and deliver the most effective cybersecurity education program
    - How to understand the current state of healthcare cybersecurity and the challenges faced by the industry
  • DevSecOps: The Journey of Security in a DevOps Environment
    DevSecOps: The Journey of Security in a DevOps Environment
    Scott Van Kalken, Systems Engineer, F5 Networks Aug 28 2019 6:00 am UTC 60 mins
    IT automation and orchestration, the key enabler of digitization is the number one IT initiate globally according to our state of application services report 2019. In addition, Zero Trust and Security-By-Design are key imperatives of organizations pursuing digital transformation as these organizations accelerate adoption of cloud technologies to gain speed, scale and accessibility to innovative technologies like AI and blockchains.

    In this webinar, we will look at the changing landscape of DevOps and explore the practice of scaling application security, controlling vulnerabilities and controlling advanced threats with the web application firewall in CI/CD environments. We will also take a look at how the technologies enable close collaboration between security teams and development teams on securing APPs without requiring application teams having in-depth knowledge of security.

    Join F5 Networks and (ISC)² on Aug 28, 2019 (Wed) at 14:00 (GMT +8) to learn about web application firewall in a CI/CD workflow.

    Presenter: Scott Van Kalken, Systems Engineer, F5 Networks
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Improve SMB Productivity with Aruba Wi-Fi for UCC Applications
    Improve SMB Productivity with Aruba Wi-Fi for UCC Applications
    Kevin Crehan, Aruba - Lead Technologist, EMEA Aug 28 2019 10:00 am UTC 55 mins
    As workforces become increasingly mobile, the reliable delivery of Unified Communication and Collaboration (UCC) applications like Skype for Business is of utmost importance. Cloud-based business applications are cost efficient alternatives for small and medium business (SMB) – are your customers able to support this transition?

    Join this webinar to learn how Aruba’s Wi-Fi solutions enhance your customer’s network infrastructure, reduce costs, and improves productivity by providing reliable connectivity when using cloud-based business applications like Office 365, Skype for Business and other UCC applications.

    During this session we will cover:

    •Network trends and challenges impacting cloud-based business applications
    •Benefits of Skype for Business and other UCC applications paired with Aruba Wi-Fi solutions
    •Resources, promotions, and tools to leverage
    •Q & A
  • What the Symantec Acquisition Means for Your Email Security Future
    What the Symantec Acquisition Means for Your Email Security Future
    Ryan Kalember, EVP of Cybersecurity Strategy for Proofpoint Aug 28 2019 4:30 pm UTC 60 mins
    It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats.

    As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn:

    - How the email threat landscape has changed with attackers evading legacy approaches
    - How leaders like Proofpoint have innovated to keep up
    - How we have helped customers migrate from legacy products to Proofpoint
  • Analytics Driven Security
    Analytics Driven Security
    Richard Leadbetter, Technical Sales Specialist, EMEA Aug 29 2019 9:00 am UTC 29 mins
    What can CISOs do to stay secure while giving users the freedom they need? The answer is Analytics driven security. Automated Analytics Driven Security that takes a user-by-user, behaviour-based security approach to assessing risk, all without compromising personal user data or needing to rip-and-replace your existing network security measures.
    Included in webinar is demonstration where you will be able to see how to deal with onboarding and controlling any devices that are connecting to your networks.
  • Ad Tech: Competitive Advantage through a Better Database
    Ad Tech: Competitive Advantage through a Better Database
    Jim Nail, Principal Analyst, Forrester and Jonathan LeDuc, Lead Project Manager, Adition Aug 29 2019 9:00 am UTC 55 mins
    Whether you are a DSP, an SSP, or a DMP - you are looking to process massive amounts of data in just milliseconds. Doing so can optimize effective cost per click (or action), optimize open auctions, or improve your customers’ Ad targeting, user profiling, look-alike modeling, or audience analytics. All of these point to the bottom line.

    Join this webinar, where guest speaker Jim Nail, Principal Analyst at Forrester, and Jonathan LeDuc, Lead Project Manager at Adition, will cover:

    - An overview of the latest complexities the Ad Tech industry faces, from both the analyst and vendor perspectives
    - How industry leaders are managing their omnichannel touches across search, display, mobile and the ability to move across these domains just as their customers do
    - Their firsthand experience working with ad tech data at scale, dealing with operational challenges, and what the benefits of an improved database infrastructure yield
  • Low-Code Without Limits- - Avoiding the Low-Code Brick Wall
    Low-Code Without Limits- - Avoiding the Low-Code Brick Wall
    Matt Terry, Sr Vice President Product Management + Carlos Carvajal, CMO Aug 29 2019 4:00 pm UTC 75 mins
    All low-code solutions enable companies to build applications faster. Starting fast is great but not if you have to compromise on flexibility, scalability, or user experience. Join this webinar to learn essential architecture requirements that your low-code solution should support to avoid hitting a brick wall in the future.
  • Introducing the Verizon Incident Preparedness and Response Report
    Introducing the Verizon Incident Preparedness and Response Report
    John Grim, Sr. Manager, VTRAC Aug 29 2019 5:00 pm UTC 75 mins
    For 12 years, we've written the book on data breaches. Literally. Now, we've written the book on data breach response. Introducing the VIPR Report, the Verizon Incident Preparedness and Response Report. The VIPR covers a three-year review of our IR Plan assessments and data breach simulation exercises across various industries. In this session, we'll discuss the top 20 key takeaways for incident preparedness and response as it relates to the six phases of incident response:

    Phase 1 – Planning and Preparation
    Phase 2 – Detection and Validation
    Phase 3 – Containment and Eradication
    Phase 4 – Collection and Analysis
    Phase 5 – Remediation and Recovery
    Phase 6 – Assessment and Adjustment

    Speakers will include:
    •John Grim, Managing Principal, VTRAC | Innovations and Development
    •Erika Gifford, Senior Manager, GSS | Security Operations Advisory
    •Hayden Williams, Senior Manager, VTRAC | Investigative Response
  • Are Your Network and Business at Risk of Attack?
    Are Your Network and Business at Risk of Attack?
    Cherie Martin, Aruba Product Marketing Manager and Brian Sieteski, Aruba Systems Engineer Aug 29 2019 5:00 pm UTC 46 mins
    Midsized companies like yours are using mobile applications and IoT to help their business grow. But just as these solutions attract customers, streamline operations, and increase business agility, they also create new attack surfaces and vulnerabilities. Join us for a webinar on August 29th,10am Pacific where we’ll review how to reduce the risk of these attacks to your network and business.

    Attend to learn:
    · Key business-class security features your network should possess
    · How the right network security innovations can keep your business safe
    · Why midsize companies trust Aruba to mitigate attacks and improve security standards for everyone

    Qualified attendees with receive a free Aruba Instant Access Point and a 90-day trial license of Aruba Central networking cloud management solution.
  • How to Put the ‘Sec’ in Mobile DevSecOps
    How to Put the ‘Sec’ in Mobile DevSecOps
    Brian Lawrence, Solutions Engineering Manager // Brian Reed, Chief Mobility Officer Aug 29 2019 6:00 pm UTC 60 mins
    There are more than 4.5 million apps and counting in the Apple® App Store® and Google Play™, many of which release weekly or even daily. Success in continuous delivery calls for removing friction from the pipeline. However, mobile app DevSecOps teams must contend with several security and privacy challenges.

    Join us for insight and best practices for achieving the DevSecOps goal of continuous security. You’ll learn:
    +The most common security and privacy issues found in mobile apps
    +How to partner with mobile app security, risk and compliance teams
    +Approaches for automating security in the CI/CD pipeline.
  • How to Prevent Breaches with Phishing Threat Intelligence
    How to Prevent Breaches with Phishing Threat Intelligence
    Ryan Jones, Principal Sales Engineer, APAC, Cofense Sep 4 2019 6:00 am UTC 60 mins
    Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognise phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.

    This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, organisations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.

    Join Cofense and (ISC)² on Sep 4, 2019 (Wed) at 14:00 (GMT +8) to learn about:
    - The constantly changing threat landscape
    - Turning active, real threats into learning moments for your users
    - Speeding up response with timely, actionable intelligence

    Presenter: Ryan Jones, Principal Sales Engineer, APAC, Cofense
    Moderator: Chuan-Wei Hoo, CISSP, Technical Advisor, Asia-Pacific, (ISC)²
  • The Digital Workspace, what’s holding you back?
    The Digital Workspace, what’s holding you back?
    Nico Zieck, Workspace Architect Sep 10 2019 8:00 am UTC 45 mins
    Gartner predicts that over the next several years, the greatest source of competitive advantage for 30% of the organizations will come from the workforce’s ability to creatively exploit emerging technologies. If you are considering introducing digital workspace into your organization you know it enables new, more effective ways of working; raises employee engagement and agility; and exploits consumer-oriented styles and technologies. But what is keeping you?

    Introducing a digital workspace does not necessarily mean a “rip and replace” of the existing technologies that you have invested in over the past year. Or you may be wondering how you can keep using legacy or custom applications in a unified workspace.

    Please join us for this live webinar and Q&A, hosted by Nico Zieck, Workspace Architect at Liquit, in which he will demonstrate how you move from a traditional, technology driven to a modern, unified workspace in three easy steps overcoming several of the most common obstacles.

    We look forward to welcoming you.
  • IT Security: from Complacent to Critical (EMEA)
    IT Security: from Complacent to Critical (EMEA)
    George Anderson, Director of Product Marketing, Webroot Sep 10 2019 3:00 pm UTC 60 mins
    ** This is an EMEA focused webinar **

    IT security for small to medium-sized businesses (SMBs) has turned from a situation where clients were complacent about IT Security to it now being a critical, high-demanded service offering.

    This presentation looks at what has driven this shift in client attitudes, and how IT security needs to rapidly evolve to give MSPs access to the expertise and security technology they need to thrive.

    Many MSPs are struggling with this new reality. This presentation will help you evaluate the IT security options open to you.