Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Strategy and Tactics for Securing Mobile Devices in Financial Organizations
    Strategy and Tactics for Securing Mobile Devices in Financial Organizations Brian Heemsoth, Director of Software & Mobile Security, Aetna Recorded: Dec 18 2017 56 mins
    Protecting financial data has gotten drastically more difficult in the age of mobility, with always-on, always-connected computers in our pockets. A whole new approach is required to effectively defend against mobile malware attacks, network attacks and attacks against OS vulnerabilities.

    View this webinar with Brian Heemsoth, Director of Software & Mobile Security at Aetna, to learn how Aetna protects its corporate data from mobile threats while providing a better user experience and complying with strict industry regulations.

    Key Learning Objectives:

    - How Aetna addressed 23.97 high risk vulnerabilities per device, mitigated 701 malware infections and 460 instances of high risk networks

    - How to manage risk on thousands of mobile devices stemming from malware, networks, and security vulnerabilities

    - How to make your workforce more agile and productive with mobile devices, while protecting corporate data from theft

    View Today
  • [Webinar] Shifting Left Without Sacrificing Security and Compliance
    [Webinar] Shifting Left Without Sacrificing Security and Compliance Maya Ber Lerner, VP of Product, Quali Recorded: Dec 15 2017 25 mins
    Deliver Production-like Environments Early in the Dev/Test Lifecycle
    As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
  • The 2018 Cyber Threat Predictions from FortiGuard Labs
    The 2018 Cyber Threat Predictions from FortiGuard Labs Derek Manky, Global Security Strategist, Fortinet Recorded: Dec 15 2017 6 mins
    Join Derek Manky, Global Security Strategist at Fortinet, to learn about the top Threat Predictions for 2018, as identified by FortiGuard Labs' 200 expert threat researchers, and gain the latest intelligence on the threat landscape and our predictions for every critical area including malware, botnets, mobile threats and more.

    You can also access our 2018 Threat Prediction Report attached to understand what cybercriminals have in store for us and what you, as an IT security professional, should be most prepared to address.
  • How to Maintain Visibility in Hybrid Multi-Cloud Environments
    How to Maintain Visibility in Hybrid Multi-Cloud Environments Brad Casemore - Research Director for Datacenter Networks, IDC and Eric Thomas - Director of Cloud Solutions, ExtraHop Recorded: Dec 14 2017 50 mins
    In the early days of aviation, flight instrumentation made it safer to fly in bad weather. Today, cloud computing is taking off and revolutionizing how applications are built and delivered. But while these technologies offer new possibilities, they also can obscure visibility and make it much more difficult for IT Operations teams to detect security threats and diagnose the root cause of performance issues.

    There is hope: the network remains the common denominator for all applications and provides a source of real-time insight across hybrid, multi-cloud environments.

    In this webinar, IDC Research Director Brad Casemore and ExtraHop’s Director of Solutions Architecture, Eric Thomas, discuss how organizations can tap into network communications and maintain visibility for security and performance.
  • UIM Demo Series:Ensure Your Citrix® Environment Delivers A Phenomenal Experience
    UIM Demo Series:Ensure Your Citrix® Environment Delivers A Phenomenal Experience CA Technologies Recorded: Dec 14 2017 29 mins
    When you employ Citrix® application and desktop virtualization solutions, end users rely on these solutions constantly to get their work done.* However, while ensuring these Citrix deployments deliver optimal service levels is critical, it’s also challenging as many components and complex interrelationships have to be tracked and managed. Join us for this demo to see how you can leverage CA Unified Infrastructure Management to get comprehensive visibility into Citrix solutions and underlying environments.

    The CA Technologies Level Up Your Infrastructure Experience Demo Series Giveaway is a random drawing contest is open from November 28, 2017 to February 16, 2018 at 11:59pm EST. Please read the Official Rules in entirety at http://transform.ca.com/rs/117-QWV-692/images/CA%20UIM%20--%20Level%20Up%20Demo%20Rules%20.pdf.

    *Copyright © 2017 CA. All rights reserved. Citrix is a trademark of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies.
  • UIM Demo Series: Monitoring Public Cloud Performance & Utilization
    UIM Demo Series: Monitoring Public Cloud Performance & Utilization CA Technologies Recorded: Dec 14 2017 26 mins
    Public cloud services are being adopted by organizations of all sizes. To maximize the value of cloud computing, you need to go beyond the simple metrics provided by public cloud service providers and monitor it in the context of its on-premises infrastructure. Join us for this demo to see how you can improve performance, utilization and adoption of public cloud services such as Amazon Web Services and Microsoft Azure with CA Unified Infrastructure Management (CA UIM).

    *Copyright © 2017 CA. All rights reserved. Microsoft and Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. (See http://www.microsoft.com/about/legal/trademarks/usage/general.mspx for list of trademarks and guidelines.) Amazon Web Services is a trademark of Amazon.com, Inc. or its affiliates in the United States and/or other countries. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies.
  • Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model
    Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model Ananda Rajagopal, VP, Products, Gigamon, Dan Watson, Managing Consultant CyberSecurity, IBM, Glenn Hernandez, Frm USCG CISO Recorded: Dec 14 2017 61 mins
    Public clouds provided by services like AWS and Azure continue to surge in popularity with organizations small and large. However, the security of these services and how the responsibility for it is shared can be murky. Organizations want to assure that the public cloud is being used properly by everyone in the enterprise and to run mission-critical applications while meeting compliance and security controls. Join Gigamon and (ISC)2 on Thursday, December 14, 2017 at 1:00PM Eastern for a roundtable discussion on public clouds and the shared responsibility model and how that can help to secure and protect your organization.
  • Cyber Threat Predictions & Security for 2018
    Cyber Threat Predictions & Security for 2018 Diana Kelley | Mark Weatherford | Jon Green | David McGuire | Ashton Mozano Recorded: Dec 14 2017 61 mins
    With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.

    This interactive Q&A panel with security industry experts will explore:
    - The biggest threats on the horizon
    - Key vulnerabilities and how to protect against them
    - Measures for breach prevention, detection and response
    - Which areas to focus on in 2018
    - Recommendations for CISOs

    Speakers:
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - David McGuire, CEO, SpecterOps
    - Ashton Mozano, CTO, Circadence
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Jon Green, VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company
  • Modern Approaches to Security for Practitioners
    Modern Approaches to Security for Practitioners Alex Rice, CTO at HackerOne; Zane Lackey, CSO at Signal Sciences Recorded: Dec 14 2017 44 mins
    In the DevOps-era, security looks different. Hear from security experts Alex Rice, Co-founder and CTO at HackerOne, and Zane Lackey, Co-founder and CSO at Signal Sciences as they explore how security has changed in today's environments of fast, continuous development and regularly shifting business requirements.
  • HAProxy's Dynamic Capabilities
    HAProxy's Dynamic Capabilities Nenad Merdanovic, Product Manager, HAProxy Recorded: Dec 14 2017 55 mins
    Responding to the need for an application delivery controller to be fully dynamic, HAProxy Technologies invested a lot of resources into developing HAProxy’s Runtime API and the LB-update module. In this webinar, we will demonstrate the abilities of the Runtime API which enables you to change the behavior of your application delivery controller on-the-fly.

    What you'll learn:
    How to dynamically scale your server farms
    How to perform maintenance on your servers
    How to change routing policies
    How the LB-update module can be used to dynamically update ACLs and maps by pulling a file from one central place
  • Build an Application-Aware, Cloud-centric Network with Citrix NetScaler SD-WAN
    Build an Application-Aware, Cloud-centric Network with Citrix NetScaler SD-WAN Shoaib Yusuf, Solutions Architect, Citrix Recorded: Dec 14 2017 35 mins
    With SD-WAN, you can focus on your applications and not your network. With integrated visibility and simple centralized policy definitions, NetScaler SD-WAN provides a secure and reliable network for a hybrid and multi-cloud world, enabling a simple and systematic transition of applications to the cloud.
     
    What you will learn:
     
    • How to use SD-WAN to connect securely to Azure and AWS directly from branches and retail locations
    • How to secure data in transmit across the virtualized WAN using IPsec data encryption
    • What management tools are available to provide visibility and control of the network and applications
    • How NetScaler SD-WAN is paired with XenApp and XenDesktop to provide optimal performance and visibility
    • Easily roll-out SD-WAN to all locations with zero touch deployment service
  • Cyber Security Predictions: What is in store for the EMEA region
    Cyber Security Predictions: What is in store for the EMEA region Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Recorded: Dec 14 2017 37 mins
    2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

    Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

    •Continued political tension in the region
    •Upcoming elections
    •Mixed security maturity
    •The effect of new compliance and data protection laws

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Creating a Network Automation Framework for Self-Service Data Centers
    Creating a Network Automation Framework for Self-Service Data Centers Luke Short, Cloud Consultant, Automation Practice, Red Hat Recorded: Dec 13 2017 47 mins
    As more organizations move to public cloud service providers, they expect the same level of automation and self-service from their data centers. Ranging from network configuration and provisioning virtual network resources to self-healing networks, network automation is fast becoming a top priority for efficiency and productivity for many organizations.

    In this webinar, we’ll offer a framework that shows how network automation can change the way you do business. Using TripleO to deploy an OpenStack® lab environment and Ansible to manage the cloud resources, you’ll learn how to:

    - Develop an automation strategy that includes network discovery and configuration auditing.
    - Adopt a holistic approach to configuration and workload management.
    - Automate new network device provisioning.
    - Integrate existing orchestration tools and systems with Red Hat® Ansible Tower.
    - Provide a better way for teams to deploy and manage their own workloads.
  • Is Your Business Moving to the Cloud and Modern App Development?
    Is Your Business Moving to the Cloud and Modern App Development? Garrick Sobeski, Senior System Engineer, Citrix & Nihal Mirashi, Senior Marketing Manager, Citrix Recorded: Dec 13 2017 50 mins
    Digital transformation is changing the business world. Your customers expect a seamless application experience and the cloud is a key component in your ability to meet their expectations.

    Are you an F5 customer that has an upcoming refresh? Are you convinced that expensive proprietary hardware is your only choice? Are your developers employing load balancers in the cloud, decreasing the need for hardware? Are you struggling to balance how much hardware you should buy now to minimize obsolescence as you move workloads to the cloud?

    If you answered yes to any of these questions, then this webinar is for you! 

    Join this webinar and learn:

    • Why customers are not convinced that F5 is the right choice for them
    • Common enterprise application delivery use cases
    • Why Citrix NetScaler is gaining popularity amongst former F5 customers
  • Detecting Hidden Spambots...and Other Network Security Tales from Flow Data
    Detecting Hidden Spambots...and Other Network Security Tales from Flow Data Jim Meehan of Kentik Recorded: Dec 13 2017 53 mins
    A site reliability team investigates why they were blacklisted from a Google API. Misconfig? DDoS? Turns out it was an accident caused by the team's engineering interns, who wrote a bad script. Another team quickly located and eradicated spambots lurking in their infrastructure cloud -- after months of the bots evading basic detection methods. How did these teams make these discoveries? Flow data.

    Flow data is now often paired with many other data sets, including BGP, geolocation, and business metadata, for network and security intelligence. The availability of open source and commercial big data technology and scale-out computing clusters makes it possible to realize the value that flow data has always promised, but never delivered in the past -- with use cases across sophisticated, accurate, and useful anomaly detection and alerting, as well as ad-hoc, exploratory analyses. In this webinar, Kentik's Jim Meehan, head of product marketing, will discuss real-world examples of network performance, anomaly detection, and forensic mysteries that were quickly solved via flow data. He will also cover current best practices for leveraging flow data.
  • Managing compliance and risk with Data Center Automation
    Managing compliance and risk with Data Center Automation Megan Glick, Darren Blumenthal, Joe deBalquiere Recorded: Dec 13 2017 37 mins
    It’s no secret that IT compliance management requirements are on an upward spiral. From growing and ever-changing external regulatory policies to tightening internal requirements, getting a complete view across the infrastructure is a major challenge, let alone proving it’s in a compliant state. Micro Focus Data Center Automation addresses these obstacles, providing a single solution for internal and regulatory compliance across heterogeneous servers, database, and middleware.

    Join us to see:

    Product in action including the new simplified portal for compliance use cases
    New risk and security dashboards that give you ultimate visibility into the state of compliance across the entire data center
  • Implementing a Cyber Security Rx to Support the Latest Healthcare Advances
    Implementing a Cyber Security Rx to Support the Latest Healthcare Advances Tracy Hillstrom, Director of Product Marketing, and Ryan Orsi, Director of Product Management Recorded: Dec 13 2017 58 mins
    The healthcare industry is experiencing a surge in transformative new technologies, and introducing telemedicine, more networked devices (Internet of Medical Things), and increases in protected EMR transmissions over Wi-Fi to enable better treatment, productivity, and communication within healthcare facilities. While they contribute to better overall outcomes - they can also open the door to new cyber security risks that need to be addressed with comprehensive security measures.
    Join Director of Product Marketing, Tracy Hillstrom, and Director of Product Management, Ryan Orsi, as they review the risks and the strategies to protect privileged information and support your compliance activities in Healthcare. You'll learn how medical providers can defend against malware with a cyber security “Rx” that supports a healthy technology adoption plan for every healthcare organization.
  • A Customer Story - A WAN Strategy that Unifies the Enterprise and Enables Growth
    A Customer Story - A WAN Strategy that Unifies the Enterprise and Enables Growth Daan Muizer, Stolt-Nielsen & Ferran van den Berg, Videns Recorded: Dec 13 2017 61 mins
    With offices in 30+ countries, a de-centralized network infrastructure, and a company-wide migration to cloud applications, the existing mix of MPLS and internet across sites was hugely limiting to Stolt-Nielsen’s future growth strategies.

    Of major importance was moving to a platform that connected Stolt-Nielsen’s entire network to the same applications no matter where offices were located, guaranteeing that those applications were always accessible, and provided a high-quality experience for all users.
    Stolt-Nielsen was using Office365, Skype for Business, and file replication across the entire organization and wanted every user to have the same experience regardless of location. Stolt-Nielsen turned to VeloCloud Managed Service Provider, Videns, to re-think its network strategy and transform the WAN.

    In this webinar, Stolt-Nielsen and Videns discuss the benefits they were looking to achieve, what the alternative solution evaluation process looked like, and the results attained with a new infrastructure.
  • Endpoint Security for Cloud Generation & New Integrations Extend Data Protection
    Endpoint Security for Cloud Generation & New Integrations Extend Data Protection Sam Tong, Senior Principal Systems Engineer, Symantec; Moderator: S.C. Leung, Member, Asia-Pacific Advisory Council, (ISC)² Recorded: Dec 13 2017 64 mins
    First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:

    •Defend against ransomware with multi-layered protection
    •Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
    •Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    •Extend advanced security to mobile devices
    •Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
    •Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    New Integrations Extend Data Protection Beyond Traditional DLP

    Powered by the industry’s leading data loss prevention technology, to give you greater visibility and control over your confidential data.

    •Expanded Information Centric (ICE) Encryption integration
    •Enhanced data classification integration
    •Sensitive Image Recognition
    •Stronger endpoint controls
    •Enhanced data at rest discovery
    •Improved cloud app policy and incident management
    •Flexibility on cloud deployment
    •And More …

    Join Symantec and (ISC)² on Dec 13 at 14:00 (Hong Kong time) and learn about the latest Evolution of Endpoint Security & Data Protection.

    This webinar will be conducted in Cantonese.
  • Cybersecurity choices: SIEM, MSSP, or SOC-as-a-Service?
    Cybersecurity choices: SIEM, MSSP, or SOC-as-a-Service? Sridhar Karnam, Director of Product Strategy at Arctic Wolf; Terry R., Exec Editor at SC Media Recorded: Dec 12 2017 58 mins
    Gain insight into three cybersecurity solutions: SIEM, MSSP, and SOC-as-a-Service. Discover which solution is the best fit for your organization based on some of the following criteria:

    - company size offerings
    - detection and response capabilities
    - deployment times
    - support and expertise

    Think you're too small for a SIEM or SOC-as-a-Service? This webinar will explain why you're not. Think you're too big for an MSSP? Find out if that's truly the case.
  • Enterprise IT Operations Management  - the rest of the story
    Enterprise IT Operations Management  - the rest of the story Greenlight Group Recorded: Dec 12 2017 64 mins
    In this last of a 3 part webinar series presented by Greenlight, Micro Focus Product Management and Greenlight group will provide an overview of the current state of IT Operations Management technologies running on enterprise grade cloud native technology stacks.  Join us, and come up to speed as the experts provide a high level overview of Network Operations, Hybrid Cloud, and Datacenter Automation suites from the Micro Focus ITOM portfolio running in a Docker & Kubernetes orchestrated environment.
  • Predictive Network Analytics: Active Monitoring of SDx & Cloud Environments
    Predictive Network Analytics: Active Monitoring of SDx & Cloud Environments Shamus McGillicuddy, EMA, Senior Analyst; Tim Diep, Product Manager, CA; Marcus Friman, Co-Founder, Netrounds Recorded: Dec 12 2017 53 mins
    Network Operations and Analytics from CA Technologies and Netrounds Active Testing and Monitoring wins EMA 2017 Networking Innovator Award

    Join EMA Senior Analyst, Shamus McGillicuddy and a panel of Predictive Network Analytics experts from CA and Netrounds as we discuss:
    • Why predictive network monitoring is needed now more than ever when considering network transformations to compete in the digital age.
    • Gained insights from active testing and monitoring with the operational insights provided by CA to predict network performance in SDx environments.
    • Solve the enterprise network operations blind spots caused by hybrid cloud environments for proactive problem resolution and enhanced issue isolation.
    • Leverage automated service validation and active ongoing monitoring to maximize the customer experience and end-to-end service quality.
  • Cybersecurity & Healthcare: How prepared are you?
    Cybersecurity & Healthcare: How prepared are you? Ernie Hood, Senior Research Director with the Advisory Board and former Vice President and CIO at Group Health Recorded: Dec 12 2017 53 mins
    Securing your healthcare organization goes beyond investing in technology to secure your devices, data, and applications. In today's complex digital healthcare environment, your healthcare workflows broaden your risk exposure by interacting with multiple apps, devices, and users spread across multiple geographies. Securing these interactions and all of the components within these workflows requires investing in a comprehensive cybersecurity ecosystem that is more focused on business objectives and less focused on securing individual applications and devices.

    This webinar will discuss the pieces of a cybersecurity ecosystem model, and how this type of model requires policies, processes, and technologies that allow your healthcare organization to take a more proactive approach to risk management and security.
  • Celebrating 10 Years of Service Virtualization – A Look at What Lies Ahead
    Celebrating 10 Years of Service Virtualization – A Look at What Lies Ahead Theresa Lanowitz, Founder of industry analyst firm voke, Nate Lee Director of Product Management for Service Virtualization Recorded: Dec 12 2017 64 mins
    Transformational. Impactful. Defining. All of these words have been used to describe service virtualization – a technology so powerful that software engineering teams across the globe rely upon it to help protect their brand and their business.

    At 10 years old, service virtualization is now an established technology that has proven its value by:

    •Giving software engineering teams unrestricted access to incomplete or unavailable services to complete their tasks in the software lifecycle
    •Reducing defect reproduction time
    •Reducing the number of defects and increasing test coverage.

    Join Theresa Lanowitz, founder of industry analyst firm voke and author of the leading research on service virtualization and its impact in the enterprise, and Nate Lee Director of Product Management for Service Virtualization at CA Technologies to learn about why service virtualization is an absolute must for any organization that wants to compete in the digital landscape and about what service virtualization can do for software engineering teams in the future.
  • APT34 - New Targeted Attack in the Middle East
    APT34 - New Targeted Attack in the Middle East STUART DAVIS | DIRECTOR EUROPE, MIDDLE EAST & AFRICA; DAN CABAN | PRINCIPAL CONSULTANT, MIDDLE EAST & AFRICA Dec 19 2017 1:30 pm UTC 60 mins
    Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.

    APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.

    Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.

    Register today to gain deeper insights into this threat group!
  • How to Approach a Cyber Security Review with Your Eyes Wide Open
    How to Approach a Cyber Security Review with Your Eyes Wide Open Matthew Rogers, Security Director at Freudenberg IT Dec 19 2017 4:00 pm UTC 15 mins
    Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.

    Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:

    • Security KPIs with risky validation processes (far more common than you think)

    • A checklist of security points that need tight inspection (and where to drill down)

    • New security services that streamline the process
  • Where Do We Go From Here?  A Fork in the Road for Multimode Fiber
    Where Do We Go From Here? A Fork in the Road for Multimode Fiber Robert Reid, Panduit Dec 19 2017 4:00 pm UTC 90 mins
    This talk will explore the evolution of multimode fiber from inception to current time against the historical transceiver roadmap. We will explore various transceiver form-factors with respect to capability, technology risk, density and cost vs. fiber types that have been deployed (and those yet to be widely deployed). Both transceivers and supported fibers will also be discussed with respect to the evolution of standards that support them.
    Attendees will earn 1 BICSI CEC.
  • The Hot Potato – Who’s Responsible for Vulnerability Management in the Cloud?
    The Hot Potato – Who’s Responsible for Vulnerability Management in the Cloud? Michelle Cobb, CMO, Skybox; Joel Scambray, NCC Group; Derrick Butts, CIO, The Truth Initiative;Brandon Dunlap (Moderator) Dec 19 2017 6:00 pm UTC 75 mins
    Organizations continue to rapidly move their workloads to the cloud as they benefit from the flexibility and agility this can provide. However, many security processes become increasingly difficult to manage in a Shared Responsibility model. Top among these is vulnerability management which is the key to visibility into virtual and multi-cloud networks. Join Skybox and (ISC)2 on December 19, 2017 at 1:00PM Eastern for our final ThinkTank of the year where we will discuss how to better prioritize and manage vulnerabilities and the best way to provide visibility (and thus, context) into the physical, virtual and multi-cloud environments all organizations find themselves dealing with now.
  • Rapidly Build and Operate Physical and Overlay Networks with Apstra AOS™
    Rapidly Build and Operate Physical and Overlay Networks with Apstra AOS™ Josh Saul Dec 19 2017 7:00 pm UTC 45 mins
    Imagine you have been asked to design and operationalize a new data center network in two weeks. Previously, such a project would have taken six months. With AOS, you can comfortably complete all phases of this project on time without human errors:

    • Design in minutes, using industry best-practice reference architecture
    • Build configs in minutes
    • Deploy configs in minutes
    • Validate network state continuously
    • Operate with closed-loop telemetry

    Come learn how AOS can assist you.
  • 万能なエンドポイントセキュリティを目指して
    万能なエンドポイントセキュリティを目指して Presenter: 株式会社シマンテック エバンジェリスト 髙岡 隆佳 / Moderator: (ISC)2 Director of Business Development, Japan小熊慶一郎 Dec 20 2017 7:00 am UTC 60 mins
    ~多様なモバイル環境と多角的な脅威に対応するために~

    昨今では高度な脅威は境界線をすり抜け、または公衆にさらされたモバイル環境から直接ユーザのエンドポイントを脅かし続けています。クラウドシフトや働き方改革により今まで以上にエンドポイントの保護が求められる中、多角的で高度な脅威からエンドポイントを包括的に保護するための最新の技術動向(機械分析・EDR・要塞化・詐称など)について解説いたします。
  • Connecting, Securing & Scaling IoT: 2018 Trends of the Digital Transformation
    Connecting, Securing & Scaling IoT: 2018 Trends of the Digital Transformation Ken Hosac, VP of IoT Strategy, Cradlepoint Dec 20 2017 4:00 pm UTC 60 mins
    The rapid, ongoing growth of IoT is opening exciting new opportunities for seeing, measuring, controlling, and profiting from actions that take place within enterprises. In fact, 69 percent of organizations have adopted, or plan to adopt, IoT solutions within the next year, according to Cradlepoint’s new State of IoT 2018 report.

    That said, there’s a vast divide in the world of enterprise IoT between what businesses say they believe and how they plan to act.

    Join Ken Hosac, VP of IoT Strategy at Cradlepoint, for a live webinar on Dec. 20, 2017, at 8am PT, to explore brand-new data from the State of IoT 2018 report.

    Webinar attendees will gain knowledge about:
    — IoT perceptions & infrastructure preferences
    — IoT adoption & implementation trends
    — Solutions & best practices
  • Detecting Human Cyber Attackers Already Within Your Networks
    Detecting Human Cyber Attackers Already Within Your Networks John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies and Rick Moy, CMO, Acalvio Technologies Dec 20 2017 6:00 pm UTC 60 mins
    This session will discuss the ongoing problem of identifying attackers who have successfully evaded prevention technologies such as firewalls, IPS and antivirus, otherwise known as prevention failure detection. It will focus on deception technology and its practical approaches to quickly detecting attackers already inside your network. Special attention will be given to working with SIEMs to validate alerts, as well as incident response and forensic procedures.
  • Key Considerations for Choosing a Fiber Termination Method
    Key Considerations for Choosing a Fiber Termination Method Betsy Conroy & Brian Duval, Siemon Company Jan 9 2018 4:00 pm UTC 90 mins
    There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.

    This webinar is approved for one BICSI CEC.
  • 국내외 보안관제솔루션 시장과 Best Practice
    국내외 보안관제솔루션 시장과 Best Practice 황원섭, 차장 Security Presales, Micro Focus Korea Jan 10 2018 6:00 am UTC 60 mins
    빠르게 진화하는 사이버 위협에 대해 보다 신속·효율적인 보호와 대응을 위해서는 IT 인프라 전반에서 가시성을 확보하고, 보안 사고를 탐지·조사·대응할 수 있어야 합니다. 현재 국내외 다양한 통합로그 분석 및 보안관제 솔루션이 존재하며, 이를 보통 가트너에서 정의한 SIEM(Security Information and Event Management)이라는 명칭으로 불리우고 있습니다. 본 웨비나를 통해서 국내/외 대형 보안관제센터에서 사용 중인 솔루션의 특징 및 고려사항 등을 파악한 후, 향후 관련 솔루션 도입을 검토하신다면 많은 시행착오를 줄일 수 있을 것으로 생각됩니다.
  • Effective Micro-Segmentation for the Multi-Cloud
    Effective Micro-Segmentation for the Multi-Cloud John Parker, VP Products, ShieldX Networks Jan 10 2018 5:00 pm UTC 30 mins
    According to MarketsandMarkets, “more than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” And with the rise of multi-cloud architectures, plans and budgets to employ micro-segmentation are on the rise too, to help protect against the lateral movement of an attack, its access to high-value assets, and its subsequent exfiltration of sensitive data.

    But while ESG' research reports that already “68% of enterprise organizations use some type of software-based micro-segmentation technology” today, its implementation still presents challenges and fails to protect against today’s most pervasive assaults.

    Specifically, today’s micro-segmentation solutions offer only simple, ACL-based control, failing to secure all layers of the protocol stack in a way that is also cost-effective and practical to operationalize, especially in newer and elastic, multi-cloud environments.

    ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will present a brief and instructional overview on the new criteria for effective micro-segmentation, including why micro-segmentation and security controls must work through Layer 7 to protect against advanced attacks, and how to evaluate a solution behind the hype to determine if the micro-segmentation product you plan to deploy will deliver the security you’ve been promised.

    Overview

    •Micro-segmentation state-of-the-union: What is it and how most IT organizations deploy it today

    •Security challenges: What basic micro-segmentation does, and the compromises it misses

    •Blueprint for effective micro-segmentation: Preventing the ‘confused deputy’ and its use in the spread of lateral attacks

    •Best practice takeaways

    •Q&A
  • Testautomatisierung in der Cloud: Simpel – Smart – Skalierbar
    Testautomatisierung in der Cloud: Simpel – Smart – Skalierbar Udo Blank, Presales Consultant Jan 11 2018 10:00 am UTC 60 mins
    Die Verlagerung von Testumgebungen in die Cloud bedeutet neue Chancen für Softwarequalitätssicherung und Entwicklungsabteilungen. Durch die deutlich verkürzten Bereitstellungszeiten können Softwaretests in kürzerer Zeit und damit termintreuer, aber dennoch mit höherer Testabdeckung durchgeführt werden. Die Nutzung der Cloud-Technologie für die Testautomatisierung stellt nicht nur eine Alternative zu Hosting und Virtualisierung dar, vielmehr bringt sie einen Quantensprung in Sachen Qualität und Zuverlässigkeit der ausgelieferten Anwendungen mit sich. Tests, die bisher selten durchgeführt wurden, weil sie zu aufwändig oder zu teuer in der Umsetzung waren, können in der Cloud nun mit deutlich weniger Aufwand und Kosten realisiert werden.

    Mit StormRunner Functional (SRF) hat Micro Focus genau hierfür eine innovative Lösung auf den Markt gebracht, mit der funktionale Tests für Web-, mobile sowie SAP-Anwendungen einfach aus der Cloud heraus durchgeführt werden können. Die Vorteile auf einen Blick:

    - EINE cloudbasierte Plattform für das manuelle, explorative und automatisierte Testen.
    - Unterstützt agile Verfahren und Continuous Integration-/Testing-Initiativen.
    - Sehr einfache und übersichtliche Bedienung – auch für Business- und Fachabteilungen.
    - Keine Installation notwendig, SRF wird rein über den Browser aufgerufen.
    - "Out-of-the-Box"-Bereitstellung von Testumgebungen unter Berücksichtigung der verschiedensten Kombinationen hinsichtlich Betriebssysteme, Browsertypen sowie deren Versionen.
    - Nuzung von vorhandenen Skripten (UFT, UFT Pro (LeanFT), Selenium).
    - Möglichkeit zur Erstellung und Verwaltung von automatisierten Testfällen direkt in der Cloud.
    - Integration in agile Projekte über gängige CI/CD-Engines.

    Erfahren Sie im Live Webinar am 11. Januar 2018 anhand von ausgewählten Use Cases und einer spannenden Live Demo alles über StormRunner Functional.
    Seien Sie dabei und nutzen Sie die Gelegenheit, Ihre Fragen an unseren Experten zu stellen.
  • Human vs Machine: Is Hybrid AI SOC in Your Security's Future?
    Human vs Machine: Is Hybrid AI SOC in Your Security's Future? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Jan 11 2018 5:00 pm UTC 30 mins
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • GDPR Compliance: Maintaining Security in the Cloud
    GDPR Compliance: Maintaining Security in the Cloud Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service Jan 11 2018 6:00 pm UTC 60 mins
    Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?

    Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.

    Join us to learn how to enable safe cloud adoption while maintaining compliance.

    Key Takeaways:

    • How to address security and compliance challenges when migrating to the cloud

    • How to support GDPR compliance in the cloud

    • Leverage a single data protection solution for email, storage, network, endpoints, and cloud

    Register Today
  • Protecting your blind spots w/ Radware’s Alteon & Intel® QuickAssist Technology
    Protecting your blind spots w/ Radware’s Alteon & Intel® QuickAssist Technology Boaz Avigad, Director of Technical Marketing Jan 16 2018 4:00 pm UTC 45 mins
    With the ever growing cyber threats organizations are facing and the rising adoption of traffic encryption - providing efficient and cost-effective protection is becoming a daunting task. Join us to learn about how you can better protect your organization’s assets throughout trending datacenter evolution.

    In this webinar we will learn about:

    i. Why SSL visibility is important
    ii. What new challenges are we facing in SSL
    iii. The importance of performance
    iv. SSL in the age of virtualization
    v. The impact of the evolving datacenter landscape on SSL requirements
  • The [SMART] & Modern Highly-Efficient Data Center
    The [SMART] & Modern Highly-Efficient Data Center Stewart Dale, Sr. Application Engineer, Intel Data Center Management Solutions, and Dr. Rene Meyer, AMAX Jan 16 2018 7:00 pm UTC 60 mins
    AMAX's [SMART]DC Data Center Manager is the premier out-of-band DCIM solution for the modern heterogeneous data centers, to optimize efficiency and manageability while reducing operational costs and resource underutilization.

    This webinar will cover:

    •The Next Generation of Data Centers: High Efficiency Meets Scalability
    •Streamline Heterogeneous Data Center Management with [SMART]DC
    •Incorporate GPU platforms Seamlessly as Your Data Center Upgrades
    •Achieve up to 30% in Power Savings for Your Infrastructure
    •Minimize Operational Disruptions and Protect Hardware Investment
    •How You Can Start Today
  • Security Management in the Cloud
    Security Management in the Cloud Greg Singh, Technical Director-APAC, Skybox Security Jan 17 2018 6:00 am UTC 60 mins
    As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.

    Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.

    This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.

    Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
  • Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning
    Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning Matthew Thurston, Chief Architect - Arctic Wolf Networks Jan 17 2018 7:00 pm UTC 60 mins
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • Through the LookingGlass – What We Learned from Major 2017 Cybersecurity Events
    Through the LookingGlass – What We Learned from Major 2017 Cybersecurity Events Eric Olson, VP of Intelligence Operations, and James Carnall, VP of Customer Support Jan 17 2018 7:00 pm UTC 60 mins
    2017 was filled with cybersecurity meltdowns. From WannaCry to BadRabbit, the cybersecurity landscape has only become more volatile. With cyber threats on the rise, is your organization’s security posture ready for 2018?

    Join LookingGlass’ Vice President of Customer Support, James Carnall and Vice President of Intelligence Operations, Eric Olson as they take a closer look at 2017’s major cyber-related incidents and provide tips and recommendations on how your organization can prepare for 2018. Webinar attendees will learn:

    · Major cybersecurity trends from the past year
    · Cybersecurity tactics that worked – and didn’t work – in 2017
    · How to take a proactive cybersecurity approach to fending off cyber threats
  • The Goldilocks Problem of AI in Security: How to Find the “Just Right” Use Cases
    The Goldilocks Problem of AI in Security: How to Find the “Just Right” Use Cases Gary Golomb, Co-founder and Chief Research Officer, Awake Security Jan 17 2018 9:00 pm UTC 45 mins
    Like many technologies, artificial intelligence (AI) and machine learning (ML) are "just right" for some types of problems, but are often over-sold for others they are just not well-suited for. This webinar will dive into the characteristics of problems that AI/ML can greatly help enterprise security teams solve, but also contrast those against use cases where AI/ML is a much higher risk for those same resource-strapped teams. In those situations, the technology can actually worsen the skills deficit in the organization, rather than making it better.

    Attending this webinar will give you a framework for evaluating AI/ML technologies, including:

    - When can AI/ML indeed replace people, and when is it better suited to assist people?
    - What types of threats is it best suited for?
    - How does AI/ML fit in with other methodologies like security analytics, for threat detection?
    - How can AI/ML help with security investigations and incident response?
    - How can organizations evaluate vendor claims and ask them the right questions?
  • The Future of Authentication in a Hyper Connected World
    The Future of Authentication in a Hyper Connected World Angel Grant, Dir, Identity, Fraud & Risk Mgmt., RSA; Clare Nelson; Brandon Dunlap (moderator) Jan 18 2018 5:00 pm UTC 75 mins
    With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
  • Secrets Revealed: Effective Protection Against Ransomware
    Secrets Revealed: Effective Protection Against Ransomware Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec Jan 18 2018 6:00 pm UTC 60 mins
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • Data Protector zum Wochenstart: Neuigkeiten zu DP und Backup Navigator
    Data Protector zum Wochenstart: Neuigkeiten zu DP und Backup Navigator Marc Fisseler, Presales Consultant Data Protection, Micro Focus Jan 22 2018 8:00 am UTC 90 mins
    In den Webinaren "Data Protector zum Wochenstart" wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen. Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb. Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    In diesem Webinar wird sich alles um die Neuerungen des Data Protector Version 10.0 drehen. Die neue Konfigurationsoberfläche des Data Protector und ein komplett überholter Scheduler
    gestalten die tägliche Arbeit neu. Darüberhinaus werden wir auf weitere neue Features eingehen. Neben einem theoretischen Überblick schließt sich ein praktischer Teil anhand von Demos an.
  • Breaking Down Cloud Security: Discover What it Means to You
    Breaking Down Cloud Security: Discover What it Means to You Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Jan 23 2018 5:00 pm UTC 45 mins
    Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.

    Join us as we discuss:

    - How cloud security differs from a public cloud, a private cloud or a hybrid cloud
    - How cloud technologies impact a company's security options
    - How do you defend against attacks of third-party providers of IT services
    - How to develop policies and procedures to test and evaluate servers over which you have no physical control

    To better understand what cloud security means to you, register now.
  • Create a Green Patch in Your Brownfield: Getting Started w/ IoT in Manufacturing
    Create a Green Patch in Your Brownfield: Getting Started w/ IoT in Manufacturing John Kowal, Director of Business Development, B&R Industrial Automation, Speaker #2 TBA Jan 23 2018 6:00 pm UTC 60 mins
    A practical way to get started with IIoT in a brownfield factory is by creating a “Green Patch in your Brownfield.”

    The Industrial Internet of Things (IIoT) takes advantage of the latest software and hardware capabilities to increase productivity. Sounds fantastic – right? But in the manufacturing space, organizations are often faced with brownfield environments including legacy computing systems and capital assets that are decades old. Integration can be a major challenge. The machine control systems typically are not networked and do not communicate with each other. Rewriting machine control code is an investment that carries a potential risk, and the machinery’s electrical and mechanical components may not be capable of executing on the new control capability.

    So how can manufacturers go from brownfields to greener pastures?
    By revisiting a 1970’s retro-concept – the focused factory, or factory within a factory. You essentially make a smaller – yet still greenfield – IIoT investment inside your existing facility. A greenfield means fresh equipment, tooling and state-of-the-art Operational Technologies (OT) and Information Technologies (IT) with the bandwidth, processing power and memory needed to apply advanced software and processes. This definition also applies to a green patch, only on a more limited scale.

    These capabilities support predictive maintenance, supply chain visibility, energy management, rapid changeovers, product lifecycle management and more. Join thought leaders from the Industrial Internet Consortium (IIC) membership to discuss:

    •Selecting a project or process for a “green patch” implementation
    •Constraints necessary to mitigate risk
    •Getting started with analytics
    •Success measurement using Overall Equipment Effectiveness Six Sigma KPIs