Hi [[ session.user.profile.firstName ]]

Tripwire

  • Date
  • Rating
  • Views
  • Retail Security – Closing The Threat Gap Retail Security – Closing The Threat Gap Charles Kolodgy & Dwayne Melancon Recorded: Jun 12 2014 58 mins
    Attendees will learn:
    •How they can detect key indicators of a threat earlier in the threat kill chain to avoid or limit the financial damage as well as the damage to their reputation.
    •The importance of end point security across your business critical systems, including your POS systems.
    •How implementing critical security controls can make you an unattractive target.
  • How the 20 Controls Address Real Threats How the 20 Controls Address Real Threats Tony Sager and Dwayne Melancon Recorded: Jun 11 2014 60 mins
    In this webcast, we will:

    •Discuss how to translate security information into specific and scalable action
    •Describe the remediation plan for the controls, starting with the Top 5
    •Discuss how the Council on CyberSecurity uses a community approach to this translation problem to create and sustain the Critical Security Controls.
    •Discuss how the community will help advise and support your risk management efforts with a formalized framework
  • Heartbleed Outpatient Care: Steps for Secure Recovery Heartbleed Outpatient Care: Steps for Secure Recovery Joel Barnes Recorded: May 15 2014 48 mins
    In this webcast we will show:

    The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    How you can identify your business exposure and what systems are vulnerable
    How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
  • Insider Threat Kill Chain: Detecting Human Indicators of Compromise Insider Threat Kill Chain: Detecting Human Indicators of Compromise Ken Westin Recorded: May 8 2014 34 mins
    In this webinar we will:

    • Discuss how human resources, legal and IT can work together to help prevent insider threats before they become a problem.
    • Identify risk indicators with employee attitudes and behavior and how it correlates to their patterns of activity on your network.
    • Show how you can use log intelligence and security analytics to automate actions and alerts and rapid reporting and forensics.
  • Heartbleed Outpatient Care: Steps for Secure Business Recovery Heartbleed Outpatient Care: Steps for Secure Business Recovery Ken Westin Recorded: Apr 17 2014 57 mins
    In this webcast we will show:
    1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    2. How you can identify your business exposure and what systems are vulnerable
    3. How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
  • AAA: Getting Roadside Assistance from Tripwire AAA: Getting Roadside Assistance from Tripwire Tim Masey Recorded: Apr 2 2014 56 mins
    Tim Masey, Director of Enterprise Information Security at AAA, will share his company’s PCI journey.
    In this Q&A-style webcast you will learn:
    •How to move your PCI efforts from a small tactical implementation to a key critical component of your security posture.
    •How to align your compliance efforts with the needs of the business, which will allow you to gain more resources—financial, human and technical.
    •How to utilize security and policy driven dashboards to get your management’s support.
  • How to Restore Trust After a Breach – Middle East How to Restore Trust After a Breach – Middle East Jason Clark Recorded: Mar 13 2014 39 mins
    Jason Clark, CISSP, Tripwire Technical Manager (Middle East), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:
    •Which systems can be trusted?
    •What is the extent of the compromise?
    •How quickly can you attain situational awareness?
    Jason will also provide participants with a practical, five-step approach to restore trust in your critical systems after a data breach. Register today to join us for this informative webcast.
  • How to Restore Trust After a Breach – DACH How to Restore Trust After a Breach – DACH Michael Rohse Recorded: Mar 5 2014 52 mins
    Tripwire’s Senior Pre-Sales Consultant, Michael Rohse (DACH), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:
    •Which systems can be trusted?
    •What is the extent of the compromise?
    •How quickly can you attain situational awareness?
    Michael will also provide participants with a practical, five-step approach to restore trust in your critical systems after a data breach. Register today to join us for this informative webcast.
  • How to Restore Trust After a Breach - UK How to Restore Trust After a Breach - UK Joel Barnes Recorded: Mar 4 2014 57 mins
    In this webcast, Joel Barnes, UK Senior Systems Engineer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How quickly can you attain situational awareness? He will also provide participants with an approach to restore trust in your critical systems after a data breach, following five steps:
    1.Know what you have and prioritize by risk levels
    2.Define what “good” looks like
    3.Harvest system state information from your production systems
    4.Perform a reference node variance analysis to identify compromised systems
    5.Remove suspect systems from the environment and return to a trustworthy state
    Join us for this informative webcast!
  • How to Restore Trust After a Breach How to Restore Trust After a Breach Dwayne Melancon Recorded: Feb 12 2014 56 mins
    In this webcast, Dwayne Melancon, Tripwire’s Chief Technology Officer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How quickly can you attain situational awareness? He will also provide participants with an approach to restore trust in your critical systems after a data breach, following five steps:
    1.Know what you have and prioritize by risk levels
    2.Define what “good” looks like
    3.Harvest system state information from your production systems
    4.Perform a reference node variance analysis to identify compromised systems
    5.Remove suspect systems from the environment and return to a trustworthy state
    Join us for this informative webcast!

Embed in website or blog