Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • How to quickly and securely verify consumer identities - APAC
    How to quickly and securely verify consumer identities - APAC
    Jenn Markey, Product Marketing, Entrust Datacard Recorded: Jun 5 2020 24 mins
    2020 has brought about a new normal. One of the biggest changes has been the rapid rise in businesses and consumers interacting and transacting online. While ecommerce, online banking, and other digital services are hardly new, many people and businesses that were slow to adopt such models now find themselves wanting, and in many cases, needing to go online. And that introduces the challenge of securely verifying customer identities, especially when an in-person identity check is not feasible.
    Modern identity proofing keeps your customers safe and protects your organization.

    Learn best practices to:

    - Securely verify consumer identities
    - Limit user friction in the verification process
    - Protect consumer identities
    - Minimize fraud exposure
  • Roadmap to building a successful Information Security Program.
    Roadmap to building a successful Information Security Program.
    Alex Leon, CISO at Dime Community Bank Recorded: Jun 4 2020 62 mins
    Building an information security program that meets the business needs of your organization and its continuance, while protecting the institution’s assets, is a venture all CISO’s have to endure. During this webinar, a bank CISO with over 25 years of experience in the Financial Services industry will share his knowledge on how to build a successful program for various size organizations. This session will cover the GRC framework (Governance, Risk and Compliance) will blend with the Cybersecurity framework (Identify, Protect, Detect, Respond and Recover) creating a unique formula for success.

    Alex Leon is the CISO at Dime Community Bank, a $6 Billion institution located in Brooklyn, New York. Alex has over 25 years of experience working in the Financial Services industry, including 18 years at Citibank and 4 years at Mitsubishi UFJ Trust and Banking. He has experience working in all 3 Lines of Defense (IT/IS, Risk, Audit). He has some of the most recognized Information Security certifications such as: C|CISO, CISSP, CISM, CISA, CRISC, CGEIT, CBCP, CTPRP and CSX-f. Alex has a Master of Science in IT Management from Colorado Technical University; and also earned a CISO Executive Program Certification from Carnegie Mellon University’s Heinz College of Information Systems and Policy. He is a Cybersecurity Advisory Board Member at Rutgers University, New Jersey. Alex is the first CISO at Dime Community Bank and reports directly to the Chief Risk Officer. He briefs the Bank’s Board of Directors at least quarterly. In his free time he shares his knowledge and industry experience with those entering the cybersecurity field. He is a Learning Tree Cybersecurity Instructor and enjoys skydiving during the summer months.
  • Fight and Prevent Ransomware | Live Virtual Panel
    Fight and Prevent Ransomware | Live Virtual Panel
    Matt Robertson, Andrew Miller, Sohil Merchant, Charles Johnson Recorded: Jun 4 2020 59 mins
    Ransomware alone impacted the 2019 economy by $11.5 billion. With no signs of slowing down, ransomware continues to be a growing fear in today’s environment. Accudata has assembled a panel of cybersecurity experts to discuss the threats facing organizations today.

    Tune in to our panel June 4 at 11 a.m. to learn about tangible best practices that you can implement in your environment to fight and prevent ransomware. Our expert panel includes:

    -Matt Robertson, principal SE, Pure Storage
    -Andrew Miller, principal SE, Pure Storage
    -Sohil Merchant, senior practice manager, data center & cloud applications, Accudata Systems
    -Charles Johnson, cybersecurity practice manager, Accudata Systems
  • Ep. 5: Never Alone On Call
    Ep. 5: Never Alone On Call
    Emily Nakashima, Director of Engineering; Ben Hartshorne, Engineer; Alyson van Hardenberg, Engineer Recorded: Jun 4 2020 44 mins
    Switch from deep query to a trace waterfall view and spot outliers with Honeycomb BubbleUp heat-maps - these make debugging effortless and dare we say fun? The Observability that Honeycomb brings literally shifts a Dev team from guessing what the problem may be to knowing exactly how their complex prod is behaving and where in the code the issue lies. Through the experience of all users, dev teams learn faster when they work together and have the same visibility, down to the raw event. We affectionately call it See Prod in Hi-Res.

    In Honeycomb, achieve Team Collaboration through shared charts and boards, and follow the breadcrumbs from your teammates' experiences. With Query History, everyone sees results and can tag according to what’s interesting. It’s organized, intuitive, and easy to follow. Incident response and on-call run much more smoothly when everyone is virtually on-call with you.

    In this webinar, we’ll discuss and show how:

    * Honeycomb's Query History gives rich meaningful context
    * Honeycomb’ers dogfood and learn from each others' compound wisdom
    * Benefits span engineering cycles and use-cases when debugging and maintaining
    * To build a culture of observability and why you should do it now
  • Threat Landscape – A lot has changed in 60 Days
    Threat Landscape – A lot has changed in 60 Days
    Srikrupa Srivatsan Recorded: Jun 4 2020 32 mins
    From increased cyberthreat exposure of work-from-home users to coronavirus related malware campaigns, the threat landscape in 2020 has significantly changed from even just 2 months ago. Many organizations continue to require their non-essential workers to work from home, which means these remote users are exposed to the ever-increasing barrage of new malware campaigns on the Internet. We also see escalating APT attacks on healthcare and essential services, designed to steal research from these institutions as the world races to find a vaccine to the pandemic.

    Join this webinar to learn about:
    * Latest cyberthreats that thrive in today’s chaotic world
    * Malware trends that may continue well into 2020 and beyond
    * Best practice tips to extending enterprise level security to users and devices, wherever they may be
  • Security in a 5G World
    Security in a 5G World
    Alex Schlager, Verizon, Executive Director Product Recorded: Jun 4 2020 59 mins
    This webinar will:

    - Discuss the promise of 5G and explain how network evolution - from 2G to 3G to 4G and LTE - has provided Verizon with invaluable insights into network security
    - Review the security implications of 5G and 5G-enabled applications
    - Demonstrate how Verizon is working to ensure that the future will be more secure
  • In 5 Schritten zum personenorientierten Insider-Threat-Programm
    In 5 Schritten zum personenorientierten Insider-Threat-Programm
    Michael Silvestri, Director DACH bei ObserveIT & Ilan Sharoni, Security Insider Threat Expert Recorded: Jun 4 2020 57 mins
    Der Großteil der Sicherheitsteams ist mit den Herausforderungen, die Cyberbedrohungen von außen für das Unternehmen bedeuten bestens vertraut. Doch der Ausgangspunkt viele Cybersecurity-Probleme sind im Unternehmen selbst zu finden. Eine kürzlich vom Ponemon Institute durchgeführte Studie kam zum Ergebnis, dass Insider-Bedrohungen innerhalb von nur zwei Jahren um 45 Prozent zugenommen haben und auch die durchschnittlichen Kosten eines Insider-Zwischenfalls in diesem Zeitraum um 31 Prozent gestiegen sind.

    Um diese Insider-Bedrohungen zu adressieren müssen Unternehmen ein Insider-Threat-Programm entwickeln. Nur so erhalten Sie die notwendige Transparenz über von Insidern verursachte Datenlecks. Und nur so kann die Reaktion und Untersuchung von Zwischenfällen optimiert werden und zugleich ein Gleichgewicht zwischen dem Schutz der Unternehmens-Assets und der Privatsphäre der Mitarbeiter gefunden wird.

    Wir haben fünf Schritte entwickelt, um ein personenorientiertes Insider-Threat-Programm aufzubauen, inklusive Beispielen aus der Praxis sowie bewährter Vorgehensweisen, die Sie direkt in Ihrem Unternehmen umsetzen können. In unserem Webinar erfahren Sie:
    • Welche Arten von Insider-Bedrohungen sind für Unternehmen am teuersten?
    • Wie können Sie feststellen, ob in Ihrem Unternehmen ausreichend dafür getan wird, Insider-Bedrohungen entgegenzuwirken.
    • Wir informieren Sie über die fünf Schritte zum Aufbau eines effektiven Insider-Threat-Programms.
    • Und erläutern, warum die richtige Strategie eine Kombination von Menschen, Prozessen und Technologie (in dieser Reihenfolge) beinhalten muss.
  • 2020 Cost of Insider Threats Report - Over view with LIVE Q&As - APAC APJ Region
    2020 Cost of Insider Threats Report - Over view with LIVE Q&As - APAC APJ Region
    Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT Recorded: Jun 4 2020 42 mins
    Ponemon 2020 Cost Report for Insider Threats: Key Takeaways and Trends

    How much could Insider Threats cost your company annually? $11.45M, according to a new report from the Ponemon Institute, up from $8.76M in 2018. Ponemon’s 2020 Cost of Insider Threats Report surveyed hundreds of IT security professionals across North America, EMEA, and APAC, covering multi-year trends that prove the significance of this rapidly growing threat type.

    Join Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Josh Epstein, CMO at ObserveIT a Proofpoint company, in a webinar to break down the key findings of the 2020 report. We will cover:

    What kinds of Insider Threats cost organisations the most
    How investigations are driving up the cost-per-incident for companies
    Which organisations, industries, and regions are being targeted the most
    How companies can potentially save millions by using a dedicated Insider Threat management approach
  • Securing Healthcare Transformation: Cybersecurity Trends and Insights
    Securing Healthcare Transformation: Cybersecurity Trends and Insights
    Dave Grady, Verizon Chief Security Evangelist and Ann MacKay, HIMSS Insights Practice Lead Recorded: Jun 3 2020 14 mins
    Cybersecurity is a key challenge for healthcare organizations, especially as they embrace Digital Transformation. A recent HIMSS survey of IT and security influencers at provider organizations clearly shows that cybersecurity – for better or worse – plays a critical role in advancing the delivery of care and revolutionizing the patient experience. Done right, cybersecurity programs can enable innovation. Done wrong, security programs can slow progress and introduce more risk.

    Join Ann Mackay, Insights Practice Lead at HIMSS Media and David Grady, Chief Cybersecurity Evangelist share insights from new research on information security in healthcare.
    You’ll learn about:
    - How concerns about cybersecurity impede innovation in healthcare
    - Which security threats are most relevant and damaging to healthcare organizations
    - How IT leaders and healthcare executives prioritize IT and security investments
    - How healthcare consumerism influence IT innovation and how it illustrates the importance of cybersecurity
    - Why internet stakeholder engagement is so important to healthcare organizations as they embrace Digital Transformation
  • The PCI Secure Software Life Cycle Standard  (SLC)
    The PCI Secure Software Life Cycle Standard (SLC)
    Kevin Poniatowski, Principal Security Instructor Recorded: Jun 3 2020 60 mins
    Securing payment software, transactions and data

    The PCI SLC outlines security requirements and assessment procedures to help ensure payment software adequately protects the integrity and confidentiality of payment transactions and data. It provides payment software vendors with nine control objectives that set the stage for secure and repeatable development. These controls are very likely to become requirements for all in the future.

    Join this webcast to understand how to:

    • Identify and mitigate common threats and vulnerabilities defined in the PCI Secure SLC standard
    • Build an environment for secure software development, change control, and management
    • Improve communications for secure deployment, configuration and software updates
    • Document and demonstrate evidence of compliance to validate your practices
  • HP Education: Cybersecurity in the Age of Teach and Learn from Home
    HP Education: Cybersecurity in the Age of Teach and Learn from Home
    Mike Belcher, HP Director EdTech Innovation Recorded: Jun 3 2020 59 mins
    Colleges, universities and K12 institutions have had to transition to a remote learning and working model, therefore it has become crucial to protect students’, faculty’s, and research department’s PCs and printers.

    To help you tackle the special challenge of cyber safety while researching, teaching and learning from home, please join us for a webinar to learn about the best practices for securing your institutional interests and devices while operating in the new norm.

    Learning Points:
    - How K12 and university institutions can protect students’, faculty’s, and research department’s PCs and printers remotely
    - Best practices for securing sensitive information and devices while operating in the new norm
    - Real examples of security initiatives taken from academic peers

    Join HP's speakers for this in-depth security discussion
    - Mike Belcher, HP Director EdTech Innovation
    - Rick Griencewic, HP Senior Security Advisor

    And Our Guest Speaker
    - Daniel Mincheff, Chief Information Officer at Northeast Wisconsin Technical College
  • Securing Endpoints in a Work-From-Home World
    Securing Endpoints in a Work-From-Home World
    Todd Gustafson - President of U.S. Public Sector, HP Inc. and Sherban Naum - SVP, Business and Strategy, HP Security Recorded: Jun 3 2020 32 mins
    In the blink of an eye, thousands of public sector workers have become work-from-home employees. Even as some states have begun lifting their coronavirus shelter-at-home regulations, large swaths of the public workforce will continue to operate remotely for the foreseeable future. With so many employees working from their kitchen tables, state and local endpoints can be more vulnerable. The good news is that the number of cyberattacks has remained predictably steady during the past several weeks. The bad news? There’s been a tremendous increase in the number of successful attacks, resulting in potentially more breaches. Securing enterprise endpoints has never been more difficult – or more important. As a participant, you’ll learn:
    - The biggest challenges of maintaining endpoint security with a remote workforce
    - How some jurisdictions are innovating to meet those needs
    - How to secure your enterprise endpoints while enhancing cyber visibility in the months ahead
  • The Current and Future State of Cybersecurity
    The Current and Future State of Cybersecurity
    Elizabeth Nann, Exec Dir. of Global Consumer Insights WSJ Intelligence & Carl Leonard, Principal Security Analyst, Forcepoint Recorded: Jun 3 2020 30 mins
    The stark reality is that attackers today have a +90% success rate. It’s not a matter of “if” but “when” they will breach your network. There has never been a greater opportunity or impetus to get cybersecurity right than this moment in time. Your business literally depends on it. But how do you navigate the path forward when there are growing disparities today between CEOs and CISOs on the most effective cybersecurity path forward?

    Join Elizabeth Nann, Executive Director of Consumer Insights for Wall Street Journal and Carl Leonard, Principal Security Analyst at Forcepoint for an insightful discussion on key findings from the report and implications for both the industry and your business today.

    Highlights of the discussion will include;

    - Overcoming a lack of common vocabulary between CEOs and CISOs in communicating cyber risks and business impacts
    - Navigating disparities in CEOs proactive approach and CISOs reactive approach to cybersecurity
    - And, why, despite claiming vendor fatigue, CISOs use more than 50 security vendors on average today and more than 62% report they want even more
  • How Deloitte uncovers hidden SAM opportunities on a single platform
    How Deloitte uncovers hidden SAM opportunities on a single platform
    Dave Dawson, Global Leader, Software Asset Management, Deloitte Recorded: Jun 3 2020 52 mins
    Your organization needs a complete picture of your IT infrastructure - what’s deployed, who’s using it, and whether it’s up to date. After all, your IT team can’t protect what it can’t manage.

    The right Software Asset Management (SAM) application is now an essential component to managing enterprise software spend, both for compliance and reducing licensing complexity.

    Sign up for our webinar, hosted by Dave Dawson, a principal in the Deloitte U.S. Risk and Financial Advisory practice. By attending, you’ll learn the potential risks your business may face without a formal SAM strategy - and uncover hidden SAM opportunities you may be missing.
    Hosted by:
    Dave Dawson, Global Leader, Software Asset Management, Deloitte

    -Find opportunities you’re currently missing to save on software costs
    -Help stay audit-ready and increase visibility of license and compliance positions
    -Unlock software savings faster with intuitive workflows on a single platform
  • Next Generation Technologies and Cybersecurity
    Next Generation Technologies and Cybersecurity
    Dave Grady, Verizon Chief Security Evangelist; Damon Hopley, Senior Manager Product Management Recorded: Jun 3 2020 53 mins
    From artificial intelligence (AI) and 5G to blockchain and machine learning, next-generation technologies help enable companies to run faster, smarter and better than ever before. However, there are potential risks that come with the rewards of deploying next-generation technologies.

    Business leaders—those who specialize in IT and those who don’t— should join this panel discussion to learn how to cut through the hype to better understand the link between innovative technologies and cybersecurity.

    In this webinar you will learn:
    - Latest trends in cybersecurity including the application of IoT, 5G, MEC (Mobile Access Edge Computing) and Blockchain to security challenges
    - Understand the risks association with implementing the new technologies
    - Review importance of a strong foundation before implementing new technologies
  • Securing Healthcare Transformation: Cybersecurity Trends and Insights
    Securing Healthcare Transformation: Cybersecurity Trends and Insights
    Dave Grady, Verizon Chief Security Evangelist Recorded: Jun 3 2020 56 mins
    Cybersecurity is a key challenge for healthcare organizations, especially as they embrace Digital Transformation. A recent HIMSS survey of IT and security influencers at provider organizations clearly shows that cybersecurity – for better or worse – plays a critical role in advancing the delivery of care and revolutionizing the patient experience. Done right, cybersecurity programs can enable innovation. Done wrong, security programs can slow progress and introduce more risk.

    Join Ann Mackay, Insights Practice Lead at HIMSS Media and David Grady, Chief Cybersecurity Evangelist share insights from new research on information security in healthcare.
    You’ll learn about:
    How concerns about cybersecurity impede innovation in healthcare
    Which security threats are most relevant and damaging to healthcare organizations
    How IT leaders and healthcare executives prioritize IT and security investments
    How healthcare consumerism influence IT innovation and how it illustrates the importance of cybersecurity
    Why internet stakeholder engagement is so important to healthcare organizations as they embrace Digital Transformation
  • これからのPKIマーケット~証明書ライフサイクル管理という考え方~
    これからのPKIマーケット~証明書ライフサイクル管理という考え方~
    佐藤 公理, CISSP, シニアテクニカルセールスコンサルタント, エントラストジャパン株式会社 Recorded: Jun 3 2020 62 mins
    PKI・デジタル証明書は従来よりサーバ証明書、メールセキュリティ(S/MIMEなど)、電子署名、デバイス認証、ネットワーク認証とITシステムのさまざまな分野で幅広く利用されています。クラウド・IoTによるITシステム活用の広がりにより、PKIの利用範囲やユースケースも広がることが予想されます。

    本セミナーでは、これからのPKIマーケットを概説すると共に、新たな課題や「証明書ライフサイクル管理」という考え方に関しても解説します。

    Presenter: 佐藤 公理, CISSP, シニアテクニカルセールスコンサルタント, エントラストジャパン株式会社
    Moderator: 小熊 慶一郎, CISSP, Director of Business Development, Japan, (ISC)²
  • Don’t Get Stung by #OWASP Top 10!
    Don’t Get Stung by #OWASP Top 10!
    Shain Singh, Security Solution Architect, APCJ, F5 Networks; Shahnawaz Backer, Principal Security Advisor, F5 Labs Recorded: Jun 3 2020 64 mins
    F5 Labs reports detail that web-based attacks have grown from 2,323 in 2017 to over 20,600 in 2019. The exponential growth of applications has led to a significant increase in the rate of public disclosure of breaches. Traditional methods for security controls are lagging behind the need to deploy production-ready apps for continuous deployment.

    Join F5 Networks and (ISC)² on Jun 3, 2020 (Wed) at 14:00 (GMT +8), we will dive into real-live attacks where common vulnerabilities have been exploited and discuss how we can learn from these to provide countermeasures at the speed of DevOps.

    Presenter: Shain Singh, Security Solution Architect, APCJ, F5 Networks
    Presenter: Shahnawaz Backer, Principal Security Advisor, F5 Labs, F5 Networks
    Moderator: Tony Vizza, CISSP, CCSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Keep Connected Episode 3: Enabling and Securing the Remote Workplace
    Keep Connected Episode 3: Enabling and Securing the Remote Workplace
    Tony Judd, Verizon’s UK MD, and Stephen Keenan, Executive Director, Client Services – EMEA, Verizon Business Group. Recorded: Jun 3 2020 45 mins
    Welcome to ‘Keep connected: enabling and securing the remote workplace'.

    The ‘Keep Connected’ series was created to help businesses achieve continuity – and even discover better ways of working – in today’s increasingly uncertain landscape. In the third instalment, our panellists will be discussing the core network and security implications behind the recent shift to home working.

    As organisations of all shapes and sizes have adapted to enable fully remote workforces, new questions are being asked of the underlying network infrastructures we all depend on. Systems and processes built for an office-based world of work are now flexing and evolving to ensure critical apps and tools can be accessed seamlessly – and securely – from practically anywhere.

    This webinar features Tony Judd, Verizon’s UK MD, and Stephen Keenan, Executive Director, Client Services – EMEA, Verizon Business Group. They will look in detail at what some of the UK’s biggest commercial operations have learned while tackling the new technical challenges created by the dramatic change in working patterns.

    Join us as we discuss the latest best practice in terms of connectivity and business continuity – and explore what implications current events might have for the future of work itself.
  • Introducing Native Process Automation: AI-Infused Workflows for Contact Centers
    Introducing Native Process Automation: AI-Infused Workflows for Contact Centers
    Jim Radzicki, TELUS International; Lance Fried, Thrio, Inc.; Dan Miller, Opus Research Recorded: Jun 2 2020 47 mins
    Cloud-based contact center specialist, Thrio, has introduced "Native Process Automation" (NPA) to help both customers and contact center agents complete their tasks. In this webinar, learn:

    * Why the global pandemic has permanently altered commerce and customer care for voice and digital channels
    * Integrating NPA into both agent and customer workflows
    * What it takes for cloud-based services to support both agent-based and automated self-service
    * How NPA delivers the benefits for Conversational AI
  • Arm Mini Webinar Series: A Deployer's Route to IoT at Hyperscale
    Arm Mini Webinar Series: A Deployer's Route to IoT at Hyperscale
    Phil Skipper, Brian Russell, Avishay Shraga, Hima Mukkamala, Pete Swabey & Bob O'Donnell Recorded: Jun 2 2020 36 mins
    Webinar 2: From Complicated and Costly to Out-of-the-Box and Easy
    Join experts from Vodafone, Flex, Atos, Cypress (An Infineon Technologies Company), Altair Semiconductor, Arm and The Economist to learn more.

    The current crisis is showing us the importance of precise and reliable data. It has highlighted how thinking it's obvious what's in a box marked 'PPE' and being certain of its contents can be at odds. How vital it is to track production line operations in real-time when stoppages cannot be tolerated, and how data-driven processes across any system can be fine-tuned when every element of the system is connected and manageable. It's not a test anyone wanted to see but we are now seeing the true potential of a global IoT, and the data-driven insight and actions it can enable.

    But driving a pervasive IoT to take connected industries, businesses and people to the next level of value and control is not simply a case of deploying more devices. Considerations such as clearly defined objectives, security, component interoperability, speed to market and turnkey vs tailored solutions are all areas that must be tackled before embarking on a commercial IoT journey.

    Join two webinars with industry experts at the cutting edge of IoT evolution debating what they think happens next. How they imagine the vision of a Hyperscale IoT can become a reality.

    Hear how costs are being driven out of IoT deployments with new connectivity tools and ways to speed time to market while reducing materials bills. How IoT can become an affordable and easy option for all.

    Panelists:

    Mobile Network Operator Vodafone's Head of IoT Strategy, Phil Skipper

    IoT system integrators Atos's IoT Solution Architect Brian Russell

    Semiconductor company Altair's Head of Security Technology Avishay Shraga

    Arm's General Manager of its Pelion IoT Platform Hima Mukkamala

    The Economist Intelligence Unit's Editorial Director Pete Swabey

    With panel moderator Bob O'Donnell from analyst firm TECHnalysis
  • Five Apple Security Misconceptions
    Five Apple Security Misconceptions
    Kat Garbis Recorded: Jun 2 2020 32 mins
    Despite Apple’s growing market share in the enterprise, there are still misconceptions and concerns surrounding Apple hardware and device security compared to other platforms.

    In our webinar, 5 Apple Security Misconceptions, we examine areas where misinformation lingers and empower IT administrators and their organizations with the facts regarding Mac, iPad, iPhone and Apple TV device security.

    Five misconceptions we’ll cover:

    Deploying and securing devices is the same across all platforms
    Additional encryption tools are required for Apple
    Apple IDs are cumbersome and difficult to use
    Apple's native security features are not enough
    Binding Mac devices to a network is a must
  • Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (EMEA)
    Securing SaaS with Bitglass: Confluence, Jira, & Salesforce (EMEA)
    Samantha Nguyen Recorded: Jun 2 2020 33 mins
    Software-as-a-service applications like Confluence, Jira, and Salesforce have arisen as indispensable tools. Confluence and Jira work in unison to provide organizations a big-picture perspective on development, tracking, and documentation. Meanwhile, Salesforce delivers CRM services that allow organizations to bring these development projects to fruition at market. However, the use of such cloud tools means that new security solutions and strategies are needed in order to keep data safe.

    As the Next-Gen Cloud Access Security Broker, Bitglass is perfectly positioned to help organizations protect their data in these and other SaaS apps.

    In this webinar, you will learn:
    - The ins and outs of securing Confluence, Jira, and Salesforce with Bitglass
    - What steps can be taken to allow only proper access to these applications
    - How to ensure that data at rest in the cloud is secure
  • Phishing Threats in a Mobile-Enabled World
    Phishing Threats in a Mobile-Enabled World
    Chris Hazelton, Director Security Solutions, Lookout Recorded: Jun 2 2020 37 mins
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • AIOps for your business services
    AIOps for your business services
    Chanda Dani, Sr. Director, Product Marketing, ITOM, and Usman Sindhu, Sr. Technical Product, ServiceNow Recorded: Jun 2 2020 61 mins
    Gartner states that in four years, 40% of large enterprises will combine big data and machine learning functionality in IT Operations. ServiceNow IT Operations Management (ITOM) and IT Service Management (ITSM) form a complete solution to eliminate service outages which includes key artificial intelligence for IT Operations (AIOps) capabilities.

    With digital transformation, the ops management role expands to aid both the bottom line and top line. Extend service management technologies to make your operations service aware. Learn about 3 ways AIOps from ServiceNow simplifies operations for business services which include:

    - Gain visibility into your entire operations footprint across on-premises and cloud
    - Maximise service uptime
    - Optimise service delivery and spend.
  • Understand mobile risk: Lookout Mobile Threat Defense
    Understand mobile risk: Lookout Mobile Threat Defense
    Marius Rohart, Security Sales Engineer EMEA, Lookout Jun 9 2020 12:00 am UTC 46 mins
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Transform IT to deliver more growth-oriented innovation
    Transform IT to deliver more growth-oriented innovation
    Darren Hamway, Portfolio Manager, Tiffany & Co. and Bruce Randall, Director, Product Marketing-ITSM, ServiceNow Jun 9 2020 3:00 am UTC 56 mins
    Digital transformation means transforming IT. Whether increasing productivity, driving insights, delivering innovation, or simply providing a consumer-like experience for employees; IT has proven to be an indispensable element in business success.

    Join Darren Hamway, Portfolio Manager/ IT Project Management Officer, Tiffany & Co. along with Bruce Randall, Product Marketing – IT Service Management Director, ServiceNow as they discuss how Tiffany & Co. has successfully increased IT throughput and productivity with ServiceNow.

    In this webinar you will also learn:

    - How modernised IT can help drive digital transformation for you and your business
    - How to deliver innovation without negative employee impact, or breaking the bank on infrastructure and resources
    - How combining IT Service Management and IT Business Management helps to deliver new innovations
    - How to transition from successful IT Service Management to successful IT Business Management
  • 2020 Data Breach Investigations Report (DBIR) Key Findings
    2020 Data Breach Investigations Report (DBIR) Key Findings
    Alex Pinto and Gabriel Bassett Jun 9 2020 3:00 am UTC 75 mins
    This is the 13th edition of the Data Breach Investigations Report (DBIR). Join the discussion with Alex Pinto and Gabriel Bassett, as they reveal key findings on global cyber security breaches and threat patterns faced by businesses and organizations. A Q&A session will be hosted by Ashish Thapar after the presentation.

    Speakers:

    Alex Pinto
    Distinguished Engineer and Team Manager
    Data Breach Investigations Report (DBIR)
    Verizon Business Group

    Gabriel Bassett
    Data Breach Investigations Report (DBIR) Co-author
    Verizon Business Group
  • Understand mobile risk: Lookout Mobile Threat Defense
    Understand mobile risk: Lookout Mobile Threat Defense
    Marius Rohart, Security Sales Engineer EMEA, Lookout Jun 9 2020 9:00 am UTC 46 mins
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Aruba  leads Internet of Things (IoT) with Smart Edge Computing and Security
    Aruba leads Internet of Things (IoT) with Smart Edge Computing and Security
    Karthikeyan Gunasekar Jun 9 2020 2:00 pm UTC 66 mins
    Join us to know how Aruba opens new value added services, great user experience and use case driven approach with our IoT as Gateway solution. As more data is being generated at the edge, Aruba’s Wi-Fi 6 products, AI Driven operation system and enhanced security helps bridge connectivity with compute and analytics at the edge and bring value to today’s business needs for LoB’s and ITOps in different verticals.
  • The Use of Causal Discovery in Understanding the Root Causes of Business Trends
    The Use of Causal Discovery in Understanding the Root Causes of Business Trends
    Vijay Nadkarni, Vice President Artificial Intelligence, Tech Mahindra Jun 9 2020 3:00 pm UTC 60 mins
    A fundamental need in various industries is to find underlying causal relations and use them to improve the business outlook of companies. All companies bar none would like to understand why their sales are declining, what leads customers to buy, how to improve employee motivation, where to allocate resources and what is the best competitive strategy.

    The knowledge of causal relations is essential in achieving these goals. However, in most analyses, scientists draw inferences from correlation. However, correlation is not causation, and such correlative inferences can often be disastrously incorrect.

    This talk covers the following:

    - An insight into the data science of Causal Discovery
    - How to generate causal hypotheses to determine root causes of operational situations
    - How to conduct “natural experiments” to validate these hypotheses from a historical dataset
    - Real-world case studies of the successful application of causal discovery in industry

    About the speaker:
    Vijay Nadkarni is Vice President Artificial Intelligence at Tech Mahindra, responsible for AI technology
    and customer engagements across multiple verticals including automotive, manufacturing, aerospace,
    healthcare, retail, semiconductor and others. Previously, Vijay was VP and global head of AI at Visteon,
    responsible for AI across its product lines, notably autonomous driving and infotainment. A veteran of
    Silicon Valley, Vijay has co-founded multiple startups in AI and cloud computing of which Veraz
    Networks, a VoIP company, had a NASDAQ IPO, and another, Wellcore, was acquired.
  • Shift Performance Testing Left to Overcome Obstacles to DevOps & Agile Practices
    Shift Performance Testing Left to Overcome Obstacles to DevOps & Agile Practices
    Gil Kedem, Product Manager, Performance Engineering, Micro Focus Jun 9 2020 3:00 pm UTC 60 mins
    With the change in software development practices from waterfall to Agile to DevOps, the definition of “shift-left” testing needs to expand and evolve just as the entire development lifecycle has evolved. Performance testing is becoming a team sport/effort. Everyone, including RnD, is responsible for end-to-end quality. To avoid having performance testing be a bottleneck, teams must shift-left performance testing and get the developers and devtesters invested in quality earlier.

    Join this session to learn how the LoadRunner family enables shift-left performance testing with tools specifically designed for developers and performance engineers to work together seamlessly, while reusing assets, sharing comprehensive, real-time analytics, and without leaving their usual developer ecosystem. See how easy it is to plan, run, and scale performance testing leveraging existing investments in testing infrastructure.
  • Best Practices for Managing Apple Devices: Secure and Empower a Remote Workforce
    Best Practices for Managing Apple Devices: Secure and Empower a Remote Workforce
    James Herbert, Solutions Engineer, Enterprise, OneLogin and Ross Drummond, Systems Engineer, Jamf Jun 9 2020 3:00 pm UTC 39 mins
    Covid-19 has had a huge impact on the global workforce - with more employees working remotely now than ever before. This new “virtual reality” is putting a strain on normal business operations at the same time as attackers are trying to exploit various vulnerabilities. How do you enable your employees to work securely?
  • Removing the friction between Security, Developers and DevOps
    Removing the friction between Security, Developers and DevOps
    Nathan Leach, Solution Architect Jun 9 2020 4:00 pm UTC 45 mins
    Developers, security professionals and DevOps teams often find themselves struggling between timely code delivery, secure code delivery and automation:
    - Developers are most commonly measured on the delivery speed and quality of their code, not on the security of their code.
    - Security professionals want to ensure that every piece of code is tested upon commit for security threats, without incremental cost and friction with developers and DevOps.
    - DevOps on the other hand care about the effectiveness of the release process and want to make sure nothing slows that down.

    In this webinar, Nathan Leach, Solution Architect at Checkmarx will walk you through how CxSAST allows companies to embed security into the software development lifecycle in a way that doesn’t disrupt developer’s work, doesn’t add any additional code reviews, and doesn't use any new tools.
  • TEM Expo Webinar 10 - Managing Service Orders for Timely Enablement
    TEM Expo Webinar 10 - Managing Service Orders for Timely Enablement
    Hyoun Park Jun 9 2020 5:00 pm UTC 30 mins
    This 30 minute webinar will provide a framework for managing service orders and providing timely enablement. This webinar serves as a preview for Amalgam Insights' Technology Expense Management Virtual Expo on June 11 to help IT to solve its 3 key problems in the Time of Corona:

    1) conserving cash
    2) supporting remote workers, &
    3) protecting the company

    For organizations focused on finding million dollar savings in IT environments, Amalgam Insights is providing this free series of webinars and a virtual event:

    April 21 - 6 Stages CIOs Must Consider to Manage COVID IT
    April 23 - Telecom and Network Expenses
    April 28 - Managing Wireless Expenses
    April 30 - Managing SaaS Expenses
    May 5 - Managing IaaS: The Mixed Blessings of Overwhelming Detail
    May 7 - Benchmarking TEM Metrics
    May 14 - Payment and Invoice Processing
    May 21 - Managing IT Finance
    May 26 - Benchmarking TEM Metrics
    June 2 - Building IT Inventory
    June 9 - Managing Service Orders

    Leading to our July 14 Virtual Event on Technology Expense Management: TEM Expo. Free for all BrightTALK webinar attendees: www.amalgaminsights.com/temexpo
  • Prevention: The Strategic Element in Your Security Stack
    Prevention: The Strategic Element in Your Security Stack
    Eyal Rozen, Sales Director - APAC & EMEA, Morphisec Jun 10 2020 4:00 am UTC 60 mins
    Despite continued infosec investments, data breaches continue while companies contend with complicated security architectures composed of disconnected technologies that produce mountains of non-actionable data. A renewed focus on prevention may hold the answer.

    Security architecture can be broken down into three main elements: Prevention, Detection and Remediation. Prevention should be considered the most strategically important defense element, as by default good true time zero prevention dramatically reduces latency, risks and operational costs of the security structure as a whole. As advanced threats evolve and data center transformation forces enterprise teams to consolidate security, the need for faster, easier and more deterministic threat prevention is essential, thus corporations need to consider a purpose-built stack of true prevention capabilities, that isn't available in a singular off-the-shelf solution, and add Detection based tools, which by definition have a huge latency, false alerts and are cost prohibitive, where and when appropriate, but not as a prevention tool.

    Join Morphisec and (ISC)² on Jun 10, 2020 (Wed) at 12pm (GMT +8) to learn about the strategic element in your security stack.

    Presenter: Eyal Rozen, Sales Director - APAC & EMEA, Morphisec
    Moderator: Tony Vizza, CISSP, CCSP, Director of Cybersecurity Advocacy, APAC, (ISC)²
  • 解码数字化进程中的Magecart/web盗用攻击
    解码数字化进程中的Magecart/web盗用攻击
    刘炅, 大中华区产品市场经理, Akamai Technologies Jun 10 2020 6:00 am UTC 60 mins
    在新冠疫情下越来越多的国家采用了限制措施,这使得我们对于互联网的依赖比以往任何时候都高。然而不幸的是,网络攻击者也是盯上了高速发展的在线交易业务。在三月的报告中,更多利用web盗用的攻击手段对电子商务网站的攻击也被曝光了出来。这次在线研讨会我们会讨论一下问题:

    • 新冠疫情背景下的互联网数字化生态
    • 网络威胁在新冠时期的转变
    • 增长的web盗用/Magecart攻击威胁和目标行业
    • Magecart攻击方法
    • 防护措施及方案

    参加Akamai Technologies和 (ISC)² 在6月10日下午2:00至3:00的在线研讨会,聆听专家分析Magecart/web盗用攻击,还等什么?赶紧加入我们吧。

    *本次在线研讨会将以普通话进行

    演讲人: 刘炅, 大中华区产品市场经理, Akamai Technologies
    主持人: 吴潇, CISSP, (ISC)²官方授权讲师
  • Mobile App & API Access Attacks: A New Security Frontier for Financial Services
    Mobile App & API Access Attacks: A New Security Frontier for Financial Services
    Joe Krull, Senior Analyst, Aite Group | Paul Dant, Senior Security Engineer, Arxan Technologies Jun 10 2020 9:00 am UTC 30 mins
    When it comes to finance, mobile banking or payments apps, maintaining customer trust is crucial to protecting brand equity and revenue. But according to recent analyst research, a majority of mobile finance apps lack the security controls and code hardening necessary to prevent applications from being compromised. And relying on legacy methods – like network or perimeter protection that is incapable of detecting these kinds of attacks – can have dire consequences.

    In this webinar, Aite Senior Analyst Joseph Krull and Arxan senior security engineer Paul Dant will discuss how the growing demand by mobile apps for API access is changing the security landscape, and what you can do to protect your organisation from a costly breach (hint: it starts with protecting your applications).

    You’ll learn:
    -How easily mobile apps can be reverse engineered - the first step in circumventing traditional security approaches
    -How common app vulnerabilities and development mistakes can lead to data exposure
    -What’s necessary to implement a comprehensive mobile app security strategy
  • Take your workforce passwordless and touchless
    Take your workforce passwordless and touchless
    Jenn Markey - leads product marketing for Entrust Datacard’s authentication business segment Jun 10 2020 3:00 pm UTC 30 mins
    Long before this year brought about a new normal, passwords were no one’s favorite – insecure from an IT perspective and annoying to users. Now there’s even more issues with passwords with remote workforces being particularly susceptible to phishing attacks and concerns over surface transmission for essential workers. Now, more than ever before, it’s time to go passwordless and touchless. Participants in this webinar will gain:

    - An overview of the current threat landscape with respect to passwords
    - Insight into passwordless specific use cases like healthcare and remote workforces
    - An understanding of the difference between passwordless experience and passwordless authentication
    - Best practices for implementing passwordless authentication
  • Extend Data Protection to the Cloud with CASB & Office365
    Extend Data Protection to the Cloud with CASB & Office365
    Eran Amir, Consulting Sales Engineer, EMEA Jun 10 2020 4:00 pm UTC 22 mins
    Nearly half of all corporate data is stored in the cloud. As employees utilize cloud apps for convenience or to improve productivity, more data flows to the cloud via unsanctioned apps and personal devices.

    Your cybersecurity strategy should address the sprawl of Shadow IT and its risk to users & data. In this webinar, we’ll outline the importance of data protection in the cloud, specifically for Office 365 apps. Here are some things you’ll learn:


    •The three pillars of data protection
    •How to protect data accessed from endpoints and personal devices
    •How Forcepoint can help secure O365
    •The 5 main cloud risk problems
    •Common use cases for Forcepoint CASB
  • Live Demo: Advanced People-Centric Cybersecurity for Cloud Applications
    Live Demo: Advanced People-Centric Cybersecurity for Cloud Applications
    Joel Sierra, Sales Engineer at Proofpoint Jun 10 2020 5:00 pm UTC 45 mins
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint provides holistic solutions that address today’s threat environment. Our solutions grow with organizations as they continue to elevate their security strategies from advanced email security, to stopping BEC and EAC, to protecting cloud applications, and more.

    Join us for a live demo to learn about how to begin your people-centric cybersecurity journey and see the tools in action. We’ll demonstrate how to:

    - Protect your people and defend your data as your organization works with O365, G Suite, and other cloud applications
    - Leverage Proofpoint’s CASB solution to gain a centralized view of your cloud environment
    - Block threats associated with compromised accounts, risky third-party apps, and the misuse of valuable data
  • Understanding the CARES Act for Education
    Understanding the CARES Act for Education
    Joe Morris: Vice President of Research, eRepublic & Dustin Haisler: Chief Innovation Officer, eRepublic Jun 10 2020 6:00 pm UTC 60 mins
    Digital Transformation Comes to Education: A Webinar Series - Understanding the CARES Act for Education

    The Coronavirus Aid, Relief and Economic Security (CARES) Act includes a $30B Education Stabilization Fund to address the needs of students/administrators. States have mandated school closures and remote learning and this has taken center stage across America.
  • 2020 Data Breach Investigations Report CISO Panel Discussion
    2020 Data Breach Investigations Report CISO Panel Discussion
    Mike Johnson, Christopher Porter, Alex Pinto, David Grady Jun 11 2020 3:00 am UTC 64 mins
    The 2020 Verizon Data Breach Investigations Report, now in its 13th year, is an annual industry benchmark for information on global cyber security breaches and threat patterns—information used by organizations to make critical security program decisions. Join our panel of CISO experts and Alex Pinto for a discussion about 2020 DBIR key findings and what those mean for the cyber security industry. The answers you want, straight from the experts.

    Moderator:

    David Grady
    Security Evangelist
    Verizon Business Group

    Speakers:

    Alex Pinto
    Distinguished Engineer and Team Manager
    Data Breach Investigations Report (DBIR)
    Verizon Business Group


    Christopher Porter
    Chief Information Security Officer (CISO) at Fannie Mae

    Michael Johnson
    Chief Information Security Officer (CISO) at Fastly
  • Autonomous Enterprise and the Rise of AIOps in Remote Working Environments
    Autonomous Enterprise and the Rise of AIOps in Remote Working Environments
    MuckAI Girish, Chief Revenue Officer, Appnomic Systems & Muddu Sudhakar, CEO, Aisera Jun 11 2020 12:00 pm UTC 54 mins
    Today’s enterprises are embracing a deep and drastic transformation and modernization to deliver their customers 100% business uptime while being nimble, simple and agile from an operational standpoint. While micro-service architectures, hyper-automation, and cloud are the de-facto agreed technologies driving this massive transformation, their impact to IT and Cloud operations cannot be neglected.

    A software glitch in a micro-service functional component propagates fast and impacts many business services at the same time. Datacenter-Cloud borderless infrastructure increases the surface of failures, and prolongs the time to detect, triage and remediate the problem.

    IT and Cloud operations need to refresh their decade-old tools, systems and processes to overcome todays challenges. Alert fatigue, difficulty in identifying the root cause of the problem, little to no time to analyze, inefficient communication, poor collaboration & poor remediation processes are their daily pain-points.

    In this talk, we will introduce AIOps and Self-healing Enterprise, a new technology paradigm designed to address todays remote working environments to improve business uptime and reduce operational pain points. The benefits of AI predictive intelligence, collaboration and automation in a turnkey, SaaS ready solution that automates the end-to-end IT/Cloud/Devops lifecycle – from early detection, root cause analysis to effective remediation. In doing so, AIOps drives higher business uptime, reduces resources required to manage, shorter the mean-time-to-resolution (MTTR) and drastic reduce the cost of ownership.

    Presented by:

    Muddu Sudhakar
    CEO, Aisera
    Twitter: @smuddu
    Linkedin: https://www.linkedin.com/in/muddusudhakar/

    and

    MuckAI Girish
    Chief Revenue Officer, Appnomic Systems
    Twitter: @muckai
    Linkedin: https://www.linkedin.com/in/muckaigirish/
  • Software analysis of complex Cortex-M applications
    Software analysis of complex Cortex-M applications
    Reinhard Keil, Senior Director of Embedded Tools, Arm & Johan Kraft, Percepio Jun 11 2020 2:00 pm UTC 60 mins
    In the past, debugging was all about run/stop debuggers and instruction trace. However, in complex embedded applications, it can be difficult to find the root cause of reduced performance or incorrect program operation without knowing where to place breakpoints or triggers. Trace ports are often unavailable on today's increasingly fast and highly integrated devices, and run/stop debugging may interfere with real-time applications.

    On Arm Cortex-M systems, you can use event annotations to analyze the dynamic operation of your software with a standard debug probe. This is supported for all Cortex-M devices and doesn't require a trace port. It does not halt the target system and has minimal overhead.

    Several software stacks and RTOS kernels have already hooks for event annotations. Applications that use such software components are easier to develop as incorrect usage can be identified faster.

    Event Recorder (Arm Keil MDK) with Tracealyzer and DevAlert (Percepio) make it easy to detect any issues and analyze the dynamic operation of the software via the standard Cortex-M debug access port.

    Join our webinar to learn more about how to:
    - Identify sporadic anomalies to prevent reduced system performance or functional product defects using advanced data visualization and analytics
    - Verify systems after code modification and before final release
    - Run remote diagnosis during development
    - Analyze deployed IoT devices to continuously improve product life cycle

    Register for this joint webinar, presented by Reinhard Keil (Arm) and Johan Kraft (Percepio) to learn more about how the software development solutions of Arm Keil and Percepio facilitates debugging and monitoring of Arm Cortex-M microcontrollers.
  • How ServiceNow is changing IT self-service for its employees
    How ServiceNow is changing IT self-service for its employees
    Rajeev Sethi, Mirza Baig, Bruce Randall Jun 11 2020 4:00 pm UTC 55 mins
    The right IT service management can greatly shape and influence employee engagement and productivity. After all, employees want to grow with their organization and a self-service, frictionless interface that enables them to get work done provides an all-around win-win.

    Join our webinar and hear the Now on Now story. See how we’re changing IT self-service for our employees: transforming our organization’s culture and improving the overall mindset in the process. You’ll learn how ITSM Professional on the Now Platform® empowers us to:

    -Provide an employee-centric, role-based portal-improving efficiency and productivity
    -Focus on making the digital employee experience a journey, not an endpoint
    -Offer greater personalization, resulting in a more satisfying employee experience
  • TEM Expo Webinar 9 - Building Inventory: The Eternal Struggle For Truth
    TEM Expo Webinar 9 - Building Inventory: The Eternal Struggle For Truth
    Hyoun Park Jun 11 2020 5:00 pm UTC 30 mins
    Note: Postponed from June 2nd to June 11th. Spend this week thinking about your place in our world. We'll have a great webinar on IT inventory next week.

    This 30-minute webinar will provide a framework for managing IT Inventory. This webinar serves as a preview for Amalgam Insights' Technology Expense Management Virtual Expo on June 11 to help IT to solve its 3 key problems in the Time of Corona:

    1) conserving cash
    2) supporting remote workers, &
    3) protecting the company

    For organizations focused on finding million dollar savings in IT environments, Amalgam Insights is providing this free series of webinars and a virtual event:

    April 21 - 6 Stages CIOs Must Consider to Manage COVID IT
    April 23 - Telecom and Network Expenses
    April 28 - Managing Wireless Expenses
    April 30 - Managing SaaS Expenses
    May 5 - Managing IaaS: The Mixed Blessings of Overwhelming Detail
    May 7 - Benchmarking TEM Metrics
    May 14 - Payment and Invoice Processing
    May 21 - Managing IT Finance
    May 26 - Benchmarking TEM Metrics
    June 2 - Building IT Inventory - Postponed to June 11
    June 9 - Managing Service Orders

    Leading to our July 14 Virtual Event on Technology Expense Management: TEM Expo. Free for all BrightTALK webinar attendees: www.amalgaminsights.com/temexpo
  • Take your workforce passwordless and touchless - APAC
    Take your workforce passwordless and touchless - APAC
    Jenn Markey - Product Marketing, Entrust Datacard Jun 12 2020 5:00 am UTC 30 mins
    Long before this year brought about a new normal, passwords were no one’s favorite – insecure from an IT perspective and annoying to users. Now there’s even more issues with passwords with remote workforces being particularly susceptible to phishing attacks and concerns over surface transmission for essential workers. Now, more than ever before, it’s time to go passwordless and touchless. Participants in this webinar will gain:

    - An overview of the current threat landscape with respect to passwords
    - Insight into passwordless specific use cases like healthcare and remote workforces
    - An understanding of the difference between passwordless experience and passwordless authentication
    - Best practices for implementing passwordless authentication
  • Checkmarx DevSec Awareness and Training Solution
    Checkmarx DevSec Awareness and Training Solution
    Asaf Altagar Codebashing Product Manager Jun 15 2020 7:00 am UTC 60 mins
    Companies are looking to implement DevOps, bringing development and security teams together to code applications faster securely. With this structure, the need, and the benefit of putting security in the hands of developers is clear. However, the reality is that 60% of developers do not trust the security level of their applications, because developers are often not given enough security support. In general, companies train developers in security once a year, or even once a quarter in the best of cases, and thus hope that their teams will have the same level as security specialists. This approach consisting mainly of ticking the box "training in secure development," is not sufficient to establish and grow a real culture of application security within the organization.

    Join us to find out how to build an AppSec awareness program that genuinely supports and trains developers to think and code security daily.
  • Conectividad en Remoto Simple, Segura y Fiable
    Conectividad en Remoto Simple, Segura y Fiable
    Pedro Martinez Busto Jun 16 2020 2:15 am UTC 63 mins
    Aruba ofrece soluciones para Teletrabajo que le permiten extender la red corporativa de forma rápida, fácil y segura al domicilio del empleado o a cualquier localización remota. Descubre en este webinar las ventajas principales de cada una de las soluciones que te proponemos y los aspectos a tener en cuenta, para que tengas toda la información a la hora de elegir la solución que mejor se adapta a tus necesidades.