Hi [[ session.user.profile.firstName ]]

Mobile Computing

  • 2018 Ponemon Institute Study on Application Security: Arxan AppSec Series 1/3
    2018 Ponemon Institute Study on Application Security: Arxan AppSec Series 1/3 Dr. Larry Ponemon, Ponemon Institute Chairman & Founder | Deborah Clark McGinn, Arxan VP of Marketing Recorded: May 22 2018 59 mins
    Data breaches caused by unprotected applications affected nearly 75% of companies in a recent global survey, yet a majority of these companies admit they don’t adequately invest in app security until after they’ve suffered significant losses. Join Arxan and the Ponemon Institute for part one of our application security insights series, where we’ll share the results of the 2018 Study on Application Security. This survey of nearly 1,400 IT and IT security practitioners from around the world examines the risk unprotected applications pose to businesses, and how companies are addressing those risks.

    During part 1 of this webinar series, we’ll cover:
    •The impact of cyberattacks and data breaches on unsecured mobile applications
    •Global trends on application security investments and spending
    •Insights to improve application security posture, including the use of threat intelligence data
  • Beyond the stack trace: A new approach to debugging
    Beyond the stack trace: A new approach to debugging AJ Jindal, Product Manager of Mobile & IoT, AppDynamics Recorded: May 17 2018 27 mins
    Mobile app crashes lose you revenue, loyalty, and potential customers due to poor user ratings at the App Store or Play Store.

    But stack traces, the traditional debugging method, can leave you with more questions than answers. Learn how to keep your apps healthy and customers happy by fixing crashing apps more quickly, and for good.

    This invaluable lesson on debugging apps will teach you how to:
    - Access a full context of user behavior, application flow, and code execution
    - Reduce your Mean Time to Identification of a crash issue
    - Eliminate costly trial and error, replicating, or not finding the issue at all

    ​The health of your apps is too important to your business to pass up these valuable tips. Register now.
  • Outsourcing Core IT When You Are Core IT
    Outsourcing Core IT When You Are Core IT Hyoun Park Recorded: May 17 2018 28 mins
    How do you know if you are outsourceable? And how can you guide the outsourcing without simply being replaced?

    This webinar takes the analyst's experiences in IT, examples from current IT organizations and managed mobility service providers, and key trends in the IT world to show when and how to identify IT jobs ripe for outsourcing and how to position yourself to take advantage of the outsourcing rather than simply be replaced.
  • Accudata's White-Hat Files | May 2018 Edition
    Accudata's White-Hat Files | May 2018 Edition Josh Berry, CISSP & OSCP, Principal Consultant for Risk & Compliance Recorded: May 17 2018 16 mins
    Welcome to the White Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.

    Our first White Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.
    In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.

    Join us for our next edition in June! Register here: https://www.brighttalk.com/webcast/16347/322209?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=322209
  • Verizon Risk Report - Streamline Security with Actionable Insights
    Verizon Risk Report - Streamline Security with Actionable Insights Katie Crammer, Director, Verizon Global Security Solutions Recorded: May 17 2018 39 mins
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • 2018 Global Encryption Trends:  The Effects of Multi-Cloud Use and Compliance
    2018 Global Encryption Trends: The Effects of Multi-Cloud Use and Compliance Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Sr. Director of Security Strategy, Thales eSecurity Recorded: May 17 2018 61 mins
    In today’s environment data protection is more critical than ever and businesses are responding. This 13th edition of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales eSecurity, reveals how increased cloud use and accelerated compliance initiatives are driving adoption of new encryption strategies. Join Dr. Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Growth in encryption and Hardware Security Module (HSM) usage
    • The importance of performance, scalability and consistent policy enforcement across enterprise and cloud use cases for encryption solutions
    • Trends in encryption deployment across multiple vertical markets and geographies that are useful for benchmarking
  • New Design Principles for Measuring Customer Satisfaction
    New Design Principles for Measuring Customer Satisfaction Dr. René Degen, Co-Founder at Comparable and Former Director of Services - Miele and Jeroen Peters, Co-Founder at Comparable Recorded: May 16 2018 46 mins
    In this webinar, Jeroen Peters and René Degen, of Comparable B.V. will propose the following:Customer satisfaction surveys is a dead end street, why you may not want to use the NPS score anymore, Customer Satisfaction Score is probably not the most meaningful measurement, new design principles for future customer satisfaction measurements, Using your service engineer as an information source.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: May 16 2018 73 mins
    Fellow Cybersecurity Practitioner:

    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    This month's theme: Mobile Security Index 2018 Highlights

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •John Pernini, Security Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Threat Intelligence

    This month we'll be covering mobile device security threats by featuring the Verizon Mobile Security Index (MSI) 2018. Mobile devices are an appealing target—there are more of them, they have access to more data, and they are critical to business operations. The MSI includes recommendations that can help strengthen your organization's mobile device security, to include security measures for your network, devices, applications, and people.

    For this month's MIB, we'll highlight findings within the MSI and provide insight and recommendations from our investigations and threat intelligence to help you improve your mobile device security and response posture.

    Following the MSI highlights, we'll cover the following topics:

    •Current Intelligence
    •Latest Malware Trends
    •Attacks and Threat Indicators
    •Significant Vulnerabilities

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Harnessing Contactless Payments to Drive New Growth Opportunities in LATAM
    Harnessing Contactless Payments to Drive New Growth Opportunities in LATAM Adrian Drozd, Frost & Sullivan, Joe Santana, FIME, Marcelo de Oliveira,Visa Recorded: May 15 2018 61 mins
    Digital transformation has disrupted the payments ecosystem. Recent technology innovations around contactless payment have transformed the payment industry by providing concrete advantages and benefits to both merchants and consumers. Applying contactless functionality to traditional payment cards can enable a better customer experience based on convenience and ease of use. Furthermore, by promoting contactless payment, merchants can improve their operational efficiency through faster digital transactions that reduce payment times. The infrastructure deployed to process contactless payments must be certified and aligned with the latest security standards to ensure success.

    Key Takeaways:
    · Understand the recent specifications and requirements published for Latin America
    · Hear about the new Visa deadline regarding contactless implementation
    · Find out how your organization can derive competitive advantage by embracing contactless payments
    · Discuss expected industry transformation with key industry stakeholders
  • 451 Research and Gemalto present "MSPs - Maximizing ROI with Security"
    451 Research and Gemalto present "MSPs - Maximizing ROI with Security" Gary Marsden, Senior Director of Data Protection Solutions at Gemalto and William Fellows, Research VP 451 Research Recorded: May 15 2018 60 mins
    Digital transformation is a critical part of an enterprise business strategy. However, for many organizations, having more digital assets introduces major headaches due to the complexity of technologies, the lack of available and affordable skills and the ever-changing security threat landscape. The ability to use cloud based solutions to service digital strategies is helping reduce costs but is also increasing risks, isolating data and reducing controls.

    Many MSPs have recognized this as an opportunity and are building business plans and service strategies to help their customers. Being the one-stop shop for applications, cloud services and related security aspects is a path that is actively being trodden by MSP’s, MSSP’s and traditional resellers alike. According to 451 Research, it is about a “sell with” approach by addressing business requirements with security “built-in”. In this joint webinar, our guest William Fellows, 451 Research analyst will provide new research results this related data points and discuss how the cloud is creating opportunities as well as challenges. The interactive Q&A style webinar will cover:

    • A current view of the cloud’s impact on digital transformation
    • Opportunities for MSPs to expand service portfolios and generate new revenue streams
    • What a true “sell with” partnership looks like
    • Technology enabling this new sales and marketing strategy for MSPs

    William Fellows is a co-founder of The 451 Group. As VP of Research, he is responsible for the Cloud Transformation Channel at 451 Research.

    Gary Marsden: Senior Director of Partnerships at Gemalto
  • New Data Breach Findings: The Year of Internal Threats & Misplaced Data
    New Data Breach Findings: The Year of Internal Threats & Misplaced Data Jason Hart, CTO of Data Protection at Gemalto Recorded: May 14 2018 52 mins
    2018 has started off as an eventful year with data breaches at Saks Fifth Avenue, Lord & Taylor and Under Armour’s MyFitnessPal app. And it will continue to be a catalyst year for data security with the 25th of May deadline for the European Unions’ General Data Protection Regulation, which regards “privacy as a fundamental human right and to protect it as such.” Data exposed or breached is not only a headache for security teams, but also impacts brand reputation, customer confidence and stock prices.

    Gemalto’s 2017 Breach Level Index found 2.6 billion records where compromised in 2017, a 88% increase from 2016. In this webinar our expert, Jason Hart, will walk attendees through the most shocking 2017 stats, new data breach tactics and how companies can manage risk by mapping out where your data resides. Join us to learn more about:
    -Internal threats and misconfigured cloud databases
    -Growing security threats like data integrity attacks
    -Innovative technology that is solving some of these issues
    -What we have in store for 2018
  • 2018 Verizon DBIR and Federal Agencies: A Cyber Security Panel Discussion
    2018 Verizon DBIR and Federal Agencies: A Cyber Security Panel Discussion Craig Bowman, Vice President - Advanced Solutions, Verizon Recorded: May 10 2018 60 mins
    The 2018 Verizon Data Breach Investigations Report (DBIR), now in its eleventh year, is an industry benchmark for information on cybersecurity threats. This year we looked at over 53K security incidents and 2,216 confirmed breaches. But what does it really mean for federal agencies?

    Join our panel of federal cyber security experts for a look at some of the key findings of the 2018 report:
    • Cybercrime can come in any shape or size, and not always in the form you’d expect.
    • State affiliated actors are prevalent threat actors against the public sector.
    • The average time gap between the first click on a phishing campaign and the first report to security? Longer than you think.
    • Ransomware was the top variety of malicious software in 2017.
    • The overwhelming majority of incidents fell into one of nine attack patterns — knowing these can help you mitigate the risks of a breach.

    Our panel:
    • Chris Gagne- ASAIC, Criminal Investigative Division, Cyber Forensics and Technology Unit, United States Secret Service
    • Matthew Noyes - Cyber Policy and Strategy Director, United States Secret Service
    • Bernard Wilson - Program Manager - Network Intrusion Responder (NITRO), United States Secret Service
    • Jeff Wagner- Associate Chief information Officer, U.S. Office of Personnel Management (OPM).
    • Marc Spitler- DBIR Author/Analyst, Verizon
    • Craig Bowman (moderator)- Vice President, Advanced Solutions Division, Verizon
  • Cash in at scale on the esports explosion
    Cash in at scale on the esports explosion Dean Takahashi, Lead Writer, GamesBeat Recorded: May 9 2018 60 mins
    The esports market is on fire. Last year 43 million people watched the League of Legends world championships, a multiplayer fighting game. And it's not a niche market of teenage boys in basements. A recent report found that 31 million people watch esports tournaments in the U.S., and more than double that -- 68M -- in China.

    And the question is -- how do you monetize that at scale?

    Look to the wild success of the Asia-Pacific esports companies. The companies who stage events like China’s 2017 Riot Championships, which posted more than 32 million viewers, have been able to compel customers to actually pay to view content, and even tip players, with the right streaming and payment technologies.

    Don’t miss this VB Live event for keen insights from leaders in the space on how U.S. companies can effectively operate globally or begin to expand globally. You’ll learn how to confront the challenges that scaling your audience can pose and improve it, from west to east, as you look to capture more of the global audience opportunity.

    Register now for free.

    You’ll learn about:
    * The opportunities provided by the growth in the esports streaming content market
    * What's causing the streaming content surge and market growth
    * The technology making this explosive esports growth possible on a global scale
    * Confronting the problems around scale in markets like China and elsewhere

    * Dean Takahashi, Lead Writer, GamesBeat
    * Johannes Waldstein, CEO, FanAI Inc.
    * Roc Harry, Relationship Director, Worldpay
    * Carter Rogers, Senior Analyst, SuperData Research

    Sponsored by Worldpay
  • Threat Modeling – Locking the Door on Vulnerabilities
    Threat Modeling – Locking the Door on Vulnerabilities Ed Adams, CEO by day, engineer at heart Recorded: May 9 2018 63 mins
    Did you lock the door before leaving your house this morning? If you did, you threat modeled without even realizing it. Threat modeling is identifying potential threats (house robbery) and implementing measures to mitigate the risk (locking your door).

    Protecting valuable assets, no matter if personal assets or business-related assets such as the software you are developing, threat modeling should become an instinctual and necessary part of your process.

    Our talk highlights how nearly 50% of security flaws can be mitigated through threat modeling. We help you prevent and mitigate risks by utilizing a reliable and hard-hitting analysis technique that can be applied to individual applications or across an entire portfolio. We show you how to effectively apply these techniques at the start of the design phase and throughout every phase of the development lifecycle so you can maximize the ROI of your security efforts.

    Topics covered include:
    • Threat Modeling 101
    • The propagating effect of poor design
    • Tabletop exercise – a world with and without threat modeling
    • Best practices and metrics for every stakeholder
  • Stronger Security Posture through Zero Trust and API Management
    Stronger Security Posture through Zero Trust and API Management Fernando Serto, Head of Security Tech & Strategy, APJ; Dawson Sewo, Senior Enterprise Security Architect, Akamai Technologies Recorded: May 9 2018 64 mins
    Organizations today are facing multiple challenges on providing an enhanced digital experience to their customers, whilst ensuring confidential data remains secure in accordance to evolving regulatory and compliance regimes. While APIs are the core of digital experiences, including single-page apps and mobile applications, traditional perimeter security architecture is no longer enough to protect your business and you must concurrently evolve your security approach.

    In this webinar, Akamai will be sharing findings on how adopting a zero trust model will increase the security posture of organisation through a “Never Trust, Always Verify” paradigm. We will also look at how the API threat landscape have evolved and share best practises in API security.

    Join Akamai and (ISC)² on May 9, 2018 (Wed) at 13:00 (Singapore time) to learn stronger security posture through zero trust and API management.
  • 5 things you need to know to prepare for (& successfully deploy) digital advice
    5 things you need to know to prepare for (& successfully deploy) digital advice Panel Webinar - Please see description for the panellist names. Recorded: May 8 2018 34 mins
    • Identifying your target market and accompanying strategy, customer proposition and distribution models
    • Getting your business model right
    • Choosing the right technology strategy
    • Ensuring you have the right workforce on-board
    • The role of compliance when deploying digital advice

    Panel speakers:

    Rickard Lindell, Head of Digital Advice, Nordea
    Dean Butler, Head of Innovation, Prudential
    Maria Lagutina, Head of Product Innovation & Propositions, CYBG
    Simon Crowe, Sales Director, EMEA, Glassbox
  • The Smart Digital Workplace
    The Smart Digital Workplace Aruba, a Hewlett Packard Enterprise company Recorded: May 8 2018 3 mins
    The Aruba Smart Digital Workplace combines the right technology foundation with the best workspace design to enable creativity, collaboration, speed and freedom.
  • How businesses win with Aruba Mobile Engagement
    How businesses win with Aruba Mobile Engagement Aruba, a Hewlett Packard Enterprise company Recorded: May 8 2018 2 mins
    The Aruba Mobile Engagement Solution transforms the way large, public-facing enterprises engage with guests at their venues.
  • Seal, Lock & Protect: How not to leave your networks and cloud vulnerable
    Seal, Lock & Protect: How not to leave your networks and cloud vulnerable John Ray, Product Management and Danna Bethlehem, Product Marketing Gemalto and Josh Chambers, Product Management at F5 Recorded: May 7 2018 54 mins
    Securing and monitoring your network and cloud environments has changed over the past few years and compliance and government regulations will add to it. Network traffic monitoring tools have been presented as a solution to meeting compliance and performance on a network. But monitoring alone is not enough. In terms of security, companies need to holistically secure their network, cloud and data, no matter where their users are accessing from.
    This joint webinar between F5 and Gemalto will help attendees prepare for the next-generation of secure network access as more data resides in more places with more people accessing it. It will also walk them through the integration between F5 and Gemalto and what options this partnership offers.

    In this webinar, you will earn how to:
    •Reduce the risk of breaches by ensuring that only authorized users are accessing network, using the F5 environment as an example
    •Protect & encrypt your customer data
    •Manage secure cloud access
    •Comply with regulations
  • Navigating the Hidden Challenges of IoT:  How to make your IoT Project a Success
    Navigating the Hidden Challenges of IoT: How to make your IoT Project a Success Brian Partridge of 451 Research & Bryan Lubel of Integron Recorded: May 4 2018 61 mins
    Deploying and managing thousands of connected assets across an enterprise and around the world can be a daunting task, to say the least. From hardware selection and multiple carrier contracts, to device management, security, coverage, and global rollout, the complexities are numerous. These complexities can result in delayed time-to-market, cost overages, and inability to scale.

    Enterprise companies are turning to outsourced managed IoT servicers to address these challenges – achieving a faster time to market and reduced total cost of ownership for their solutions, with edge-to-cloud managed services becoming increasingly important piece of their outsourcing strategy.

    In this webinar, join 451 Research vice president Brian Partridge and Integron president Bryan Lubel as they:

    •Discuss today’s IoT market drivers, challenges, and new opportunities
    •Review 451 IoT research results on connectivity trends, IoT skills gap, and IoT adoption strategies
    •Share many of the hidden challenges and roadblocks that enterprise companies face as they roll out their IoT projects
    •Discuss models and approaches for addressing and overcoming these hidden challenges to optimize cost and reduce risk
    •Discuss real-world case studies in healthcare, energy, transportation, and retail
  • 451 Research Webinar: How the GDPR Impacts Enterprise Mobility Management
    451 Research Webinar: How the GDPR Impacts Enterprise Mobility Management Chris Marsh, 451 Research and Magnus Mjøsund, Apperian Product Manager, Arxan Recorded: May 3 2018 57 mins
    The European Union’s General Data Protection Regulation (GDPR) that goes into effect on 25 May 2018 expands the meaning of personal data, mandates when such data can be collected, and enforces full transparency and consent from the user. Organizations of all types processing data from EU residents must evaluate and likely make changes to their enterprise mobility management practices in order to adhere to the new law or face severe penalties.

    Watch this webinar to understand what GDPR means for infrastructure and operations professionals that are responsible for mobile and endpoint strategy to make sure your organization is compliant from day one.

    We review the most important sections of the law related to enterprise mobility from an administration and end user perspective as well as the implications for BYOD programs. Learn how EMM can be leveraged to meet GDPR requirements and how a mobile application management solution like Apperian supports privacy and mitigates risk by managing corporate data while leaving personal data untouched.
  • Encryption Lunch and Learn
    Encryption Lunch and Learn Rain Networks and DataMotion Recorded: May 3 2018 45 mins
    Join us on Thursday, May 3rd for a webinar with DataMotion! For nearly 20 years DataMotion has provided users with an easy to use secure email delivery system. With SecureMail Desktop, you can send emails that are encrypted and secure, helping to meet any compliance regulation requirements. The best part is that this can all be done via an easy to install plug-in. During the webinar, we will be discussing the following topics:
    •DataMotion's balance between security and ease of use
    •How DataMotion helps customers stay in compliance with regulations like HIPAA, GLBA, FISMA, and more.
    •How recipients open and view encrypted emails
    •DataMotion's Partner Program
  • Security at the Speed of App Development: DevOps Meets CA Single Sign-On
    Security at the Speed of App Development: DevOps Meets CA Single Sign-On CA Hosts: Herbert Mehlhorn, Product Management & Venky Karukuri, Sr Principal Architect Recorded: May 3 2018 61 mins
    For businesses and government organizations to succeed, development and security teams must quickly build, test, and deploy secure apps and features. The challenge presented by this DevOps process? Typically, there are only a few security teams to support many development teams.

    The good news? DevOps is not just for developers anymore. Join us as we discuss how CA Single Sign-On REST APIs can help security teams:
    • Confidently create, read, update, and delete policies
    • Easily move policies from dev to staging to production
    • Efficiently keep pace with development team practices

    We’ll also cover how to apply DevOps techniques to your infrastructure, allowing security teams to better prepare for releases, minimize downtime, and avoid costly upgrades.
  • Strategies for Monetising Open Banking
    Strategies for Monetising Open Banking Roger Vincent, Head of Partner Innovation, Equifax; Nick Cabrera, Director, Finance Edge Recorded: May 2 2018 38 mins
    Roger Vincent, Head of Innovation with Equifax will share his insights on making the most of Open Banking and his lessons learned along the way.

    In this webinar Roger will talk about:

    * How increased use of open APIs is likely to shape the financial services market, why challenger banks are making headway, the big banks are building partnerships and the impact of APIs among payment service providers.
    * Activities banks need prioritise in the wake of Open Banking; starting with compliance & legal issue and why they need to assess time/resources carefully before trying to deploy solutions.
    * Which strategies are likely to thrive in the new environment and how regulatory compliance can quickly be turned into competitive advantage to commercialise Open Banking.
    * Overcoming security and privacy concerns associated with data sharing and the implementation of GDPR.
    * Strategies to encourage customer engagement by using Open Banking applications to enrich user experience to create long term value over short term revenue.
  • Apperian App Management Platform Demo
    Apperian App Management Platform Demo Arxan Recorded: May 1 2018 6 mins
    Watch the 5-minute Apperian App Management demo video today and tour the platform that enables IT and line of business professionals to deliver critical apps to 100% of users across their organization.
  • Semantic AI: Bringing Machine Learning and Knowledge Graphs Together
    Semantic AI: Bringing Machine Learning and Knowledge Graphs Together Kirk Borne, Principal Data Scientist, Booz Allen Hamilton & Andreas Blumauer, CEO, Managing Partner Semantic Web Company May 23 2018 1:00 pm UTC 60 mins
    Implementing AI applications based on machine learning is a significant topic for organizations embracing digital transformation. By 2020, 30% of CIOs will include AI in their top five investment priorities according to Gartner’s Top 10 Strategic Technology Trends for 2018: Intelligent Apps and Analytics. But to deliver on the AI promise, organizations need to generate good quality data to train the algorithms. Failure to do so will result in the following scenario: "When you automate a mess, you get an automated mess."

    This webinar covers:

    - An introduction to machine learning use cases and challenges provided by Kirk Borne, Principal Data Scientist at Booz Allen Hamilton and top data science and big data influencer.
    - How to achieve good data quality based on harmonized semantic metadata presented by Andreas Blumauer, CEO and co-founder of Semantic Web Company and a pioneer in the application of semantic web standards for enterprise data integration.
    - How to apply a combined approach when semantic knowledge models and machine learning build the basis of your cognitive computing. (See Attachment: The Knowledge Graph as the Default Data Model for Machine Learning)
    - Why a combination of machine and human computation approaches is required, not only from an ethical but also from a technical perspective.
  • Accudata + Forcepoint Security Series | Risk-Adaptive Protection
    Accudata + Forcepoint Security Series | Risk-Adaptive Protection Bharath Vasudevan, Senior Director May 23 2018 4:00 pm UTC 30 mins
    What comes to mind when you hear “decision making based on calculated behavioral analytics”? It’s a pretty exciting concept–one that’s new to cyber security and one that Forcepoint does very well. Join our webinar to learn how risk-adaptive protection is helping organizations:

    - Continually improve security effectiveness through machine learning and AI
    - Better understand risky behavior
    - Automate policies
    - Dramatically reduce the quantity of alerts
    - Streamline and accelerate investigation of those alerts

    Tune in May 23!
  • Mobile App Reverse Engineering is easier than you think: Arxan AppSec Series 2/3
    Mobile App Reverse Engineering is easier than you think: Arxan AppSec Series 2/3 Chris Stahly, Arxan Senior Security Architect | Deborah Clark McGinn, Arxan VP of Marketing May 23 2018 5:00 pm UTC 60 mins
    Everyone knows that high-value mobile applications like banking or payment apps can be the gateway to a treasure trove of sensitive information. What most organizations may not understand, however, is just how easy it is to reverse engineer applications after they’ve been deployed to an app store, using freely available tools. In part two of our application security series, Arxan Director of Research Chris Stahly will demonstrate how easily an attacker can gain access to IP, customer data, and even encryption keys if a high-value app is not properly protected. We’ll discuss ways to improve mobile app security, reduce threat response times and minimize the impact of an attack using real-time threat intelligence.
  • Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks
    Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst May 24 2018 9:00 am UTC 45 mins
    ‘The human factor’—the instincts of curiosity and trust that lead well-meaning people to click, download, install, move funds, and more—is simply more reliable and lucrative than exploits with increasingly short shelf lives.

    Join our speakers, Adenike Cosgrove and Davide Canali, as they discuss the findings from our Human Factor 2018 report. We’ll talk through the many ways in which threat actors continue to refine their approaches to social engineering with well-crafted lures and schemes that regularly trick even savvy users.

    During the webinar, we’ll cover:
    -- Trends in volume and type of attack providing useful insights for both defenders and organizations.
    -- Ransomware and Email Fraud - how effective have they become and who is being targeted the
    -- How bad actors are using cloud services to their benefit
    -- Live Q&A with the speakers
  • Does it matter if an algorithm can't explain how it knows what it knows?
    Does it matter if an algorithm can't explain how it knows what it knows? Beau Walker, Founder, Method Data Science May 24 2018 3:30 pm UTC 60 mins
    With the General Data Protection Regulation (GDPR) becoming enforceable in the EU on May 25, 2018, many data scientists are worried about the impact that this regulation and similar initiatives in other countries that give consumers a "right to explanation" of decisions made by algorithms will have on the field of predictive and prescriptive analytics.

    In this session, Beau will discuss the role of interpretable algorithms in data science as well as explore tools and methods for explaining high-performing algorithms.

    Beau Walker has a Juris Doctorate (law degree) and BS and MS Degrees in Biology and Ecology and Evolution. Beau has worked in many domains including academia, pharma, healthcare, life sciences, insurance, legal, financial services, marketing, and IoT.
  • Trust But Verify: Mobile App Protection Best Practices - Arxan AppSec Series 3/3
    Trust But Verify: Mobile App Protection Best Practices - Arxan AppSec Series 3/3 Chris Stahly, Arxan Senior Security Architect | Deborah Clark McGinn, Arxan VP of Marketing May 24 2018 5:00 pm UTC 60 mins
    Traditional network and app security approaches are no longer sufficient to protect high-value apps running in untrusted environments. Knowing the status of apps running in the wild and whether they are under attack is key to responding to the ever changing threat landscape. Visibility into when, how and from where an attack is happening, and the ability to optimize your response in real time can mean the difference between stopping a threat before it spreads or picking up the pieces after the fact.

    In part three of our application security series, we’ll share best practices for app protection and mitigation, plus how Arxan’s comprehensive app protection and alerting capabilities can help prevent reverse engineering, code tampering, IP theft, and help level the playing field with attackers.
  • Locking in HIPAA Compliance with Privileged Access Management
    Locking in HIPAA Compliance with Privileged Access Management CA Hosts: Cullen Lemley, Cybersecurity Consultant & Alexandra Beswerchij, Product Marketing Manager May 24 2018 5:00 pm UTC 60 mins
    The healthcare industry is facing increased pressure to comply with strict regulatory requirements that focus on managing, controlling, and monitoring privileged access to sensitive data. Yet, data breaches remain at an all-time high, while compliance and security measures seem to be on hold. In fact, 2018 has already imposed over $3.6 million dollars* in fines, due to HIPAA compliance violations.

    Take control of your environment, your privileged users, and get compliant. Join CA hosts – Cullen Lemley, Cybersecurity Consultant and Alexandra Beswerchij, Product Marketing Manager – as they reveal necessary steps to HIPAA compliance and Privileged Access Management best practices to defend against cybersecurity risks.

    *Compliancy Group, 2018 HIPAA Fines
  • GDPR compliance on mobile devices, how secure is your organization?
    GDPR compliance on mobile devices, how secure is your organization? Aaron Cockerill, Chief Strategy Officer, Lookout May 29 2018 11:00 am UTC 60 mins
    Since 25 May, the General Data Protection Regulation (GDPR) is now officially enforceable. By now, most of the companies dealing with data should have taken the necessary steps to comply with the regulation and stay out of trouble. And this is all good but, have you thought about how your employees are using their mobile phones or devices to access your company data? How do you protect your organization from an employee's phone being hacked? The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

    By popular demand, we're replaying this webinar hosted by Aaron Cockerill, Chief Strategy Officer at Lookout and his guest, Kabir Barday, CEO at OneTrust.

    On the agenda:
    - Why mobile is a problem for GDPR compliance
    - Understanding the threats & risks to GDPR compliance from mobile
    - Finding & stopping mobile threats to GDPR compliance

    Did you know?

    84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

    31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

    63% of enterprise employees say they access their organization's customer, partner, data and employee data while on their mobile device.
  • How to Reduce Excessive Access for Highly Privileged Users
    How to Reduce Excessive Access for Highly Privileged Users Naresh Persaud, Senior Director of Security at CA Technologies May 31 2018 5:00 pm UTC 60 mins
    Adopting privileged access management typically means forcing users to use named accounts instead of root and administrator accounts. As a result, the volume of privileged "named user" accounts in the enterprise is increasing. Fortunately, with effective role management and certification review, organizations can streamline and reduce excessive access.

    Join Naresh Persaud, Senior Director of Security at CA Technologies as he explains the challenge of privileged user governance, explores solutions, and presents a demo on how to manage privileged "named users."
  • Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse
    Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse Markus Grüneberg, Senior Cyber Security Strategist, Proofpoint Jun 5 2018 8:00 am UTC 60 mins
    Proofpoint hat seinen neuen Faktor Mensch Bericht für das Jahr 2018 veröffentlicht, der untersucht, wie Bedrohungsakteure ihre Herangehensweisen mit Social Engineering und ausgeklügelten Angriffen verfeinern, die selbst versierte Benutzer regelmäßig täuschen.

    Melden Sie sich jetzt zu unserem Live-Webcast Der Faktor Mensch 2018 am 5. Juni 2018 um 10:00Uhr an und informieren Sie sich über die wichtigsten Erkenntnisse des diesjährigen Berichts.
    Der jährliche Proofpoint Bericht basiert auf der Analyse von Angriffsversuchen bei mehr als 6.000 weltweiten Unternehmenskunden während des gesamten Jahres 2017 und bietet Einblicke in Angriffstrends über E-Mail, Cloud-Anwendungen und soziale Medien hinweg, um Unternehmen und Benutzern die Sicherheit zu gewährleisten.

    Themen des Berichtes:
    -Soziale Engineering: Wie Social Engineering auf den Faktor Mensch abzielt
    -Bedrohungs-Trends: Malware, Phishing und E-Mail-Betrug: Dropbox, Docusign & Co
    -Trends zu gezielte Angriffen: Spam-Kampagnen bis zielgerichteter E-Mail-Betrugs
    -Neue digitale Risiken: Collaboration-Tools als neue Angriffsziele
    -Angriffe über Cloud Dienste: Cyberangriffe über Cloud-Dienste und -Apps
  • AI-powered location: A step closer to the future?
    AI-powered location: A step closer to the future? Peter Frans Pauwels, Co-founder, TomTom Jun 5 2018 5:00 pm UTC 60 mins
    By leveraging the power of the cloud, artificial intelligence and machine learning, mapping devices are getting smarter over time, recognizing patterns and farming insight from contextualized data. And that means smart cities and data-based Location of Things navigation is becoming a reality.

    Cities can analyze and improve congested traffic. Freight companies with connected trucks can better manage logistics, optimize fleets, and track customer engagement. And cars will learn to make split-second decisions on our behalf, making the call on turning left or hitting the breaks when it recognizes a pedestrian is in the crosswalk.

    To find out more about how cloud-based, AI-powered location technology is creating the highly accurate and always up-to-date maps that can revolutionize everything from autonomous cars to connected cities, don’t miss this VB Live event!

    In this webinar you'll learn:

    * How to leverage the power of the cloud, AI, and machine learning across devices by contextualizing location data in real time
    * Understand the role of location-based data mapping in the "Location of Things"
    * The application of data-enriched mapping to industries like retail and automotive
    * How "Location of Things" powered by geographical data can be used to connect autonomous driving, smart mobility, and smarter cities

    * Chris Pendleton, Principal PM, Azure Maps
    * Peter Frans Pauwels, Co-founder, TomTom
    * Jennifer Belissent, Analyst, Forrester
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by TomTom
  • LIVE DEMO - Securing your Open Banking API implementation
    LIVE DEMO - Securing your Open Banking API implementation Isabelle Mauny, CTO & Co-Founder, 42Crunch Jun 7 2018 3:00 pm UTC 60 mins
    .During this practical webinar, you will learn:
    1. Why TLS and OAuth2 are not enough to secure your APIs
    API Security has a much wider spectrum and even if you are using OAuth today, you may not use it in a way that is adapted to the risk taken when exposing Open banking APIs. What about API attacks protection ? PKCE ? Message confidentiality and integrity ? 
    2. Why API security must be declared and not coded
    Developers should not have to master security standards such as OAuth and OpenID Connect and try to implement them properly into their APIs. Instead, they should rely on proven, reliable policies approved by the bank’s security team and simply apply those policies on top of their APIs.
    3. How declarative security helps with consistency and automation
    42Crunch's innovative tagging mechanisms can be used by developers to express security constraints on top of their Open API definitions (aka Swagger). Those tags are translated automatically, either via the UI or in the CI/CD pipeline into policies which are applied on APIs requests/responses, making it possible to apply security as early as possible in the API lifecycle and find security vulnerabilities early.

    4. How to enforce security in a scalable way using micro-firewalls
    We will show how to deploy the 42Crunch API Firewall at run-time whether on premises, in the Cloud or in a hybrid environment and how to monitor the system through real-time security dashboards.
  • Why IAM Built on Open-Standards is the Key to Open Banking
    Why IAM Built on Open-Standards is the Key to Open Banking Rob Otto, EMEA Field CTO, Ping Identity; Ralph Bragg, Senior Partner, RaiDiAM Jun 13 2018 9:00 am UTC 60 mins
    Security, Compliance and User Experience - Why Identity Access Management Built on Open-Standards is the Key to Open Banking

    Learn how identity & access management (IAM) solutions, built on open standards, can help meet the technical requirements of PSD2 and Open Banking, including secure XS2A (access to accounts), Strong Customer Authentication (SCA), Dynamic Linking, and Consent Management, all while providing a seamless user experience and distinct competitive advantage.
  • How to Enable Trust, Interoperability, & Shared Credentials
    How to Enable Trust, Interoperability, & Shared Credentials Naresh Persaud, Senior Director Security at CA Technologies Jun 21 2018 5:00 pm UTC 60 mins
    The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
    The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:

    • Managing physical access
    • Protecting PII
    • Delivering cross-agency services
    • Revising digital consumer interaction

    In this session, Naresh Persaud, Senior Director Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.

    Implementing a digital identity strategy can be complicated. Let CA help.
  • Malware versus AI
    Malware versus AI Keith Rayle, Security Strategist, Fortinet Jun 26 2018 4:00 pm UTC 60 mins
    During this presentation, you'll learn about deep learning, the history of artificial intelligence, the history of malware management, and the current approach to eliminating malware threats to the enterprise using AI.
  • Customer Data Platforms: Sorting the Truth from the Hype
    Customer Data Platforms: Sorting the Truth from the Hype Jeff Cotrupe, Industry Director, BDA,Stratecast | Frost & Sullivan Mike Jude, Research Manager, Stratecast | Frost & Sullivan Jun 27 2018 4:00 pm UTC 75 mins
    To understand how a customer data platform (CDP) unifies customer data under one (conceptual) roof and can provide actionable analytic insights, we invite you to join Frost & Sullivan’s renowned Stratecast experts who will lead an interactive panel discussion on Customer Data Platforms: Sorting the Truth from the Hype. Hear expert insight on strategies to gather essential information about your customers in a new way that does not merely stockpile more intelligence, but enables you to analyze and act on it.

    Key Takeaways:

    • Gain insight on how to attain a higher state of business consciousness and make choice buzzword phrases such as “data-driven” and “customer-driven” a reality for your organization.
    • Understand big data and analytics (BDA) and the technology markets.
    • Learn new ways to invest wisely and know whether—and where—to place your bets on the right CDP solution.
  • How AI is changing the customer retention game
    How AI is changing the customer retention game Stewart Rogers, Analyst-at-Large, VentureBeat Jul 11 2018 5:00 pm UTC 60 mins
    Your users are like fine wine or good cheese: They get better over time. Which is why user retention is essential. With a steady retention rate your revenue just compounds over time. And increasing retention by just 10 percent will boost your business value by more than 30 percent.

    That’s where artificial intelligence comes in. AI marketing tools let you anticipate customer needs, create personalized campaigns that make them feel seen and heard, lock on to essential customer purchasing patterns, deliver highly relevant messaging, marketing, and offers when and where they want to see them, and more. And with the volume of customer data you have at your fingertips, you can identify what characteristics make up high-value customers, so you know exactly where to put your focus.

    Learn how tapping into your oil well of data, and harnessing it via marketing automation platforms powered by AI and machine learning, can strengthen your bottom line when you join this VB Live event!.

    Register here free.

    In this webinar you'll learn:

    * Key engagement strategies using AI
    * How to use AI to strengthen campaigns (including creative, messaging, segmentation and personalization)
    * The role of time-based triggering in automation and monetization
    * The trends in automation and IoT in ecommerce


    * Rachael Brownell, Moderator, VentureBeat
    * Stewart Rogers, Analyst-at-Large, VentureBeat

    More speakers coming soon!

    Sponsored by Clevertap
  • Architecting an Open Source Data Science Platform: 2018 Edition
    Architecting an Open Source Data Science Platform: 2018 Edition David Talby, CTO, Pacific AI Oct 23 2018 5:00 pm UTC 60 mins
    Join David Talby of Pacific AI as he updates the best practices and techniques for building an open source data science platform.