Information Security

Channel profile:

The latest trends and best practice advice from the leading experts

This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Subscribers (51,646)
Don't get hooked: How to protect against SpearPhishing Michelle Couture, Product Marketing Manager, hosted Exchange Fully secure your network by learning how to protect against cybersecurity’s weakest link: humans. 95% of all attacks on networks were the result of “spear phishing”: attempts to steal data by masquerading as a trustworthy entity. They send an email from the “CEO” or “building manager" but once you click… it’s GAME OVER!
We will cover:
•How a phishing attack happens
•Stories from real life attacks and the lessons learned from them
•Steps you can take to protect your company
Read more >
Jul 28 2015 2:00 pm
UTC
45 mins
Attend
  • Live and recorded (1965)
  • Upcoming (44)
  • Date
  • Rating
  • Views
  • As corporate information technology infrastructure increases in size and complexity, corporations are recognizing the need for a better mechanism for assessing IT's role and alignment to the key corporate initiatives. What began as a series of best practices has evolved into the field known as IT governance.

    IT governance is no longer just a theoretical concept, it is a fundamental business necessity, and an iterative process which requires senior management commitment over the long term in order to see results. By implementing a business risk approach to IT governance corporations can deliver immediate benefits to the entire organization.

    Join Eric Kavanagh, the Bloor Group; Paul Quanrud, TCS; Keith Breidt, BAH; and Yo Delmar, MetricStream; for this educational session as they address some of the key concepts and challenges with IT governance. They will answer as many questions as we can fit in to the 45 minute Q&A, and will provide research materials for you to takeaway.

    If you would like to attend please confirm your position below.
  • The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.
  • Cloud computing and DevOps are letting enterprises deploy new software faster than ever. But with development organizations focused on speed, are you achieving time to market at the expense of cyber security?

    Run time application self-protection (RASP) is a new approach to application security that enables production applications to spot and block cyber attacks from within the application itself—without recompiling and without sacrificing performance. Join the webinar to learn:

    How to enable new and legacy applications to protect themselves in as little as 10 minutes
    The four situations where RASP is the best solution
    Why Gartner says RASP is a must-have technology for bi-modal IT
  • When a popular product is launched, a high-stakes race begins between the offense and defense markets to find software vulnerabilities. More and more organizations are seeing that incenting security research with programs like bug bounties are an effective way to find vulnerabilities. Katie Moussouris, Chief Policy Officer of HackerOne, will reveal what the latest research shows and what it means for companies today.

    About the presenter:

    Katie Moussouris is the Chief Policy Officer for HackerOne, a platform provider for coordinated vulnerability response & structured bounty programs. She is a noted authority on vuln disclosure & advises lawmakers, customers, & researchers to legitimize & promote security research & help make the internet safer for everyone. Katie's earlier Microsoft work encompassed industry leading initiatives such as Microsoft's bounty programs & Microsoft Vulnerability Research. She is also a subject matter expert for the US National Body of the International Standards Organization (ISO) in vuln disclosure (29147), vuln handling processes (30111), and secure development (27034). Katie is a visiting scholar with MIT Sloan School, doing research on the vulnerability economy and exploit market. She is a New America Foundation Fellow. Katie is an ex-hacker, ex-Linux developer, and persistent disruptor. Follow her and HackerOne on Twitter http://twitter.com/k8em0 and http://twitter.com/hacker0x01
  • If Anthem, Sony, Home Depot, Target and Neiman Marcus can fall victim to security breaches, so can you. The bad news is - no company is immune, no matter how big or small you are. Without a proper understanding of zero-day threats, companies have no way of exposing the gaps of overhyped security solutions. These threats are very sophisticated and often leveraging previously unknown attack techniques and vulnerabilities.

    Join us for a compelling webcast that will highlight critical insights combating zero-day threats - including the ability to:

    • Track employee traffic at all times, in real time, irrespective of whether they are inside or outside the corporate network
    • Derive intelligent insights and meaningful data for fast corrective action
    • Avoid a strategy based on "alerting" you about infections - without any guarantees you will notice them
    • Implement a comprehensive approach to stopping zero-day threats - based on protection, (inspecting every byte of traffic and automatically blocking threats), detection and remediation
  • Ensuring Business continuity and managing risks is becoming more and more crucial for companies heavily relying on technical infrastructure to run their business such as CRM, ERP, CMS, accounting, big data and more.

    Todays's economy cannot be conceived without the use of such systems, more and more connected and presumably accessible from everywhere.

    Data is now the key asset of any company, and needs to be protected the same way as everyone protects their assets.

    But the reality is far from this. So many companies are "saving" money by using non-redundant infrastructures, networks or servers, and often have to experience the worst scenario to start digging into Disaster Recovery, but it's already too late.

    So join Eric Sansonny as he looks at Disaster Recovery as a Service and Cloud Backups to see if the solution lies there.
  • In this insightful and data-rich webinar Jeremiah Grossman, founder of WhiteHat Security, presents findings from WhiteHat's 2015 Website Security Statistics Report.

    The report, generated by examining vulns in more than 30,000 websites under WhiteHat’s Sentinel management, provides unique perspectives on the state of website security. Data by industry will be presented and accompanied by expert analysis and recommendations.

    Why Attend:

    -Discover the most prevalent vulnerabilities

    -Learn how many vulnerabilities are typically remediated and the average time to resolve

    -Hear why the best approach is to identify specific security metrics to improve upon

    -Take away valuable recommendations for measurable improvement within your application security programs
  • Your company can learn valuable lessons about risk strategy and incident response from what happened to Hacking Team, a firm that supplies surveillance tools to government agencies. Widely accused of helping governments spy on dissidents and journalists, Hacking Team found itself hacked with embarrassing, possibly damaging results. ESET senior security researcher Stephen Cobb explains the missteps made and the lessons to be learned during this webinar.

    Key takeaways:
    •How Hacking Team’s mistakes mirrored those made by Sony
    •How employees’ weak passwords helped facilitate the breach
    •How transparency would have helped Hacking Team’s credibility
    •Why every company must review what might be exposed in a breach
  • The new Microsoft Windows 10 platform is an exciting step forward from both a functionality and a security perspective. Senior Product Marketing Manager, Stephen Rose covers the new features of this operating system and what they mean to you as a way of adding additional security to your organization.
  • Database servers are the primary targets of most data security breaches. Understanding how to effectively monitor databases can prevent data loss and significantly reduce the time to discover the risk.

    Attend this webinar and learn how to:
    - Detect and block active attacks
    - Discover sensitive data, risks, and vulnerabilities
    - Automate risk remediation
    - Demonstrate consistent and complete compliance

Embed in website or blog