Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • How Hackers Sneak Past Defenses, and Ways to Evade Them
    How Hackers Sneak Past Defenses, and Ways to Evade Them Brook Chelmo, Product Manager, SonicWall and Andy Norton, Director, Threat Research, Lastline Recorded: Feb 20 2018 61 mins
    The rise of ransomware forced companies to improve their defenses against malware and intrusions. As a result, malware developers seek new ways to evade network security defenses.

    In this webinar, experts from SonicWall and Lastline will show you 6 core evasion tactics, why they work, and how to stop them by using advanced malware analysis tools.

    - Learn about modern hacking, and how it affects companies today
    - Discover how and why hackers break into networks
    - Learn how to apply advanced network sandboxing to discover and stop new threats
  • Behind Every Ticket is a Patient
    Behind Every Ticket is a Patient Rick Bradley - APCON, Ryan Davis - ExtraHop Recorded: Feb 20 2018 35 mins
    Many network operation teams struggle to address data friction issues by failing to leverage their network. Using a network as a real-time data source allows you to confidently maximize the value of IT data. Sign up to learn about an analytical approach to healthcare and how to leverage a network as a data source.
  • Transformation from Legacy to Software Defined Networking
    Transformation from Legacy to Software Defined Networking Henrik Johansson, VP SDN & Data Center, PacketFront Software Recorded: Feb 20 2018 48 mins
    "Every service provider today has investment heavily in physical networking equipment. All their customers are all connected over the legacy network in one way or another. In order to maximize the ROI, there must be a simple and quick way to orchestrate new services using new network functions virtualizations (NFV) technology on top of the old network.

    This live demonstration will showcase how this can be done, using the service orchestration, automation and activation capabilities of PacketFront Software’s BECS platform integrated towards an open source platform consisting of OPNFV, OpenDaylight and OpenStack."
  • 5G Networks: How to Prepare & What it Means for the Mobile Network Industry
    5G Networks: How to Prepare & What it Means for the Mobile Network Industry Ahmed Banafa, Lindsay Notwell, Upkar Dhaliwal & Mansoor Hanif Recorded: Feb 20 2018 58 mins
    The advent of 5G mobile network technology is upon us, and implementation is quickly approaching.

    For mobile network providers, vendors and enterprises, achieving a 5G version will require new technology innovations for scalability, efficiency and security. For consumers, it means a whole new wave of digital customer experience.

    These next-generation networks will no doubt be in high demand for improving latency and bandwidth, but with more people connected than ever before, what are the potential security implications or concerns for both the enterprise and the consumer?

    Join this expert panel moderated by Ahmed Banafa, Faculty member at SJSU & IoT Expert. He will be joined by expert panelists Lindsay Notwell, VP of 5G Strategy, Cradlepoint, Upkar Dhaliwal, System Architect, Future Wireless Technologies, and Mansoor Hanif, Director of Converged Networks and Innovation, BT.
  • Remind me WHAT This GDPR Thing is all About Again?
    Remind me WHAT This GDPR Thing is all About Again? Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Feb 20 2018 49 mins
    Are you Prepared, Blissfully Unaware or in Full Panic Mode?

    It’s 2018 and May 25th, aka G-Day (GDPR day), is rapidly approaching. Hopefully your organization is well on its way to completing the necessary steps to bring itself into line with the new regulations. However we all know that the best laid plans always have a way of falling behind.

    This session will focus on the data breach prevention aspect of GDPR and will identify the key areas where you should have the right technology in place. Remember, no network can be made 100% hacker proof but with the right preparations, processes and technology in place, you can be well equipped to deal with any intrusion and minimize or even eliminate the possibility of data breach related fine from your local Data Protection authorities.
  • 3 New Use Cases for vRealize Operations
    3 New Use Cases for vRealize Operations Kyle Wassink & Rachel Foresta, Solutions Architects with Blue Medora Recorded: Feb 16 2018 54 mins
    If you own vRealize, but have yet to use it for full-stack dashboarding, rapid root cause analysis or hybrid cloud performance tuning, you're missing out. Watch experts from Blue Medora walk you through: How to unify on-and off-premises operations data within vRealize; Ways to create custom dashboards that give you a 360 view of your entire environment; and tips for using dashboards to pinpoint root causes up to 60% faster
  • Future-Proof your Architecture: Remove Hybrid Data Center Networking Complexity
    Future-Proof your Architecture: Remove Hybrid Data Center Networking Complexity Rob Anderson, Director of Product Marketing, NetFoundry Recorded: Feb 15 2018 16 mins
    Join Rob Anderson, Director of Product Marketing at NetFoundry, as he reviews how hybrid device, site, and cloud networking will evolve to meet digital transformation needs.

    Learn how to make your networks as agile as the applications they need to support in your data center.

    About the presenter:
    Rob is Director of Marketing at NetFoundry. NetFoundry believes in enabling edge innovation. NetFoundry frees individuals, apps, groups, and businesses from traditional network, telco, and hardware constraints, enabling applications and business policies to control underlying networks, with security, compliance, reliability, & performance.

    Prior to NetFoundry, Rob's roles included Director of Global Marketing & Product Management at Modern Systems, along with various management and product development roles in the telecommunications industry. Rob graduated from Clemson University in 2003, holds a Project Management Professional (PMP) certification from the Project Management Institute, and a New Product Development Professional (NPDP) certification from the Product Development and Management Association.
  • The public cloud is here - use it wisely w/hybrid cloud strategy lessons learned
    The public cloud is here - use it wisely w/hybrid cloud strategy lessons learned Gordon Haff, Red Hat and Lauren Nelson, principal analyst serving infrastructure & operations professionals, Forrester Recorded: Feb 15 2018 56 mins
    For many firms, the migration to public cloud is well underway. Understanding what motivates these migrators and the challenges they face along the way can help you in your own journey.
    Join this webinar for a rare look into an emerging group and a glimpse into the future of public cloud. You'll hear about the results of a Forrester Consulting study, commissioned by Red Hat, that looks at these aspects of firms migrating to the cloud:
    > Their motivations and challenges.
    > The strategies they're adopting for migration.
    > What cloud migration in practice looks like.
  • Inflection Point: Where IoT & Software-Defined are Pushing Today's Data Center
    Inflection Point: Where IoT & Software-Defined are Pushing Today's Data Center David Powell, GM of Service Provider Business, LogicMonitor Recorded: Feb 15 2018 37 mins
    Today's enterprises are going through a period of consolidation and moving workloads to the public cloud. Data center providers are acquiring smaller regional data center assets, creating less choice and more dominant players. New technology is compounding the shift, changing everything inside the data center. And a zero tolerance for downtime among the user community means that delays and maintenance windows are no longer an option. Things are changing quickly. And the prevailing industry trends are increasing the pace of that change:

    - The Internet of Things (IoT) is pushing compute to the edge with smart devices, creating challenges for latency and scalability.
    - Software-defined Environments require a complete rethinking of the way data centers are built. If executed correctly, they have the potential to eliminate the bottleneck typically associated with hardware.
    - Machine Learning presents new forms of data and pattern recognition, which has direct implications for data center security and resource allocation.
    - Serverless computing, while closely tied to IoT and other application development trends, puts more pressure on the core infrastructure to be scalable and automated.

    How will this affect today's data center? This session explores the bleeding edge and how data center practitioners can capitalize on its momentum rather than become subsumed by it. Attendees will gain a nuanced understanding of the new technology trends that are taking shape. And they'll leave with strategies to adapt to new pressures and demands.
  • Preparing Your Data Center for a Digital Makeover
    Preparing Your Data Center for a Digital Makeover Cindy Borovick, Business Intelligence Director, F5 and Lori Mac Vittie, Principal Technical Evangelist, F5 Recorded: Feb 15 2018 38 mins
    Our discussion will explore the forcing functions of digital transformation on today’s traditional data center as it expands into cloud environments and the security challenges that result. A key to digital transformation success is having IT at the digital table. We’ll discuss technologies such as automation, API and IoT gateways, and the security services you’ll need to be successful.
  • Discover the SIEMple Life with a Managed SOC
    Discover the SIEMple Life with a Managed SOC Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks Recorded: Feb 15 2018 59 mins
    Most security information and event management (SIEM) customers are struggling to achieve meaningful success a year or more after initial deployment. This is especially true with mid-market companies, where shrinking IT security budgets and shortage of skilled cyber security resources have forced them to reconsider investing in a SIEM, and seriously look at managed security services options.

    Before CIOs/CISOs take a leap of faith into any kind of managed security service, they want to be able to measure ROI with an outsourced managed solution, as opposed to managing their own SIEM. In this webinar, hear from security experts on:
    - What does it take to build and manage your own SIEM in-house?
    - What security SIEM blind spots can you avoid with a managed security service?
    - How do you determine ROI of a managed service as compared to a SIEM?
  • Will Artificial Intelligence Strengthen Your Security Stance?
    Will Artificial Intelligence Strengthen Your Security Stance? Chris Roberts, Acalvio | Chris Morales, Vectra | Vikram Kapoor, Lacework | Willy Leichter, Virsec Recorded: Feb 15 2018 59 mins
    The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.

    Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.

    Join this Q&A panel on how AI can help improve your organization's overall security.

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Chris Morales, Head of Security Analytics, Vectra
    - Vikram Kapoor, Co-Founder and CTO, Lacework
    - Willy Leichter, Vice President of Marketing, Virsec
  • How to Implement Trusted Platforms and EcoSystems
    How to Implement Trusted Platforms and EcoSystems Phil Tricca, Intel, and Lee Wilson, OnBoard Security Recorded: Feb 15 2018 56 mins
    Daily reports of attacks and breaches, from servers, PCs and data centers to IoT systems, mean that developers and OEMs must embed security at the foundation of their systems and ecosystem. This new webcast with long-time TPM and Trusted Software Stack expert Lee Wilson, OnBoard Security, and Philip Tricca, Intel Corporation, will review the key attributes of the TPM and how the new TCG TSS can be used for bottoms-up defense using a trust chain and improving overall platform security.

    Attendees will learn about the changes to TSS to make use much easier and more efficient, how to start developing applications and resources. Use cases including key storage and software measurement will be addressed along with strong device identity and authentication. Using the TPM and TSS for health monitoring also will be discussed.

    Wilson is business development engineer at OnBoard Security, where he is responsible for technical support and business development of OnBoard Security's TCG Software Stack 2.0 (TrustSentry 2.0) and OnBoard Security's post-quantum cryptography (NTRU and pqNTRUsign).

    Prior to joining OnBoard Security, Lee had a 35 year career with IBM. He currently chairs the Trusted Software Stack and Virtualized Platform Work Groups for Trusted Computing Group. Lee earned his BSEE work at Northwestern University and his MSEE work at Syracuse University and has been awarded TCG’s Key Contributor Award.

    Tricca is a software architect and engineer working in Intel’s platform security division. His career began with a 7-year stint in a U.S. Air Force research lab working with open source Linux security technology including mandatory access control systems like SELinux and measured boot using the TPM 1.2 devices. Most recently Philip has found his way to Intel where his current responsibilities include transforming Intel’s open source implementation of the TPM2 Software Stack (TSS2) from proof of concept to a vibrant and sustainable OSS project.
  • Plan the Work & Work the Plan – Continuing the Move to the Cloud
    Plan the Work & Work the Plan – Continuing the Move to the Cloud Tom Thomas, Director of Enterprise Architecture, F5; Ryan Goode, Sr Mgr, Tech Ops, (ISC)2; Brandon Dunlap, Moderator Recorded: Feb 15 2018 58 mins
    Chances are, your organization has made a move to the cloud. In fact, most enterprises run approx. 45% of their applications and infrastructure in the cloud with that number sure to increase in the next 12 months. But as you relocate more into the cloud, what’s your strategy? What are you moving? What benefit are you seeking? Different businesses have different goals and objectives. Join F5 and (ISC)2 on February 15, 2018 at 1:00PM Eastern for a discussion on the continuing evolution of cloud migration and how organizations should prepare, strategize and execute their cloud journey while addressing operational needs, security concerns and the options that cloud-based services can bring.
  • Shadow Data Report: Top 5 Risks of Employee Cloud App Use and Abuse
    Shadow Data Report: Top 5 Risks of Employee Cloud App Use and Abuse Martin Johnson, Sr. Director of Outbound Product Management, Cloud from Symantec Recorded: Feb 15 2018 54 mins
    It’s not an illusion. The increase in cloud app adoption has increased the exposure to your most sensitive data. Our Shadow Data Report covers the key trends and challenges to consider so you can deal with the risks head-on and still maintain the benefits of moving to the cloud.

    Register for this webcast for insights on the top 5 threats from the report to consider as well as:

    •The hidden signs of looming data breaches and where to look for them

    •What kind of risky employee activity could expose your most sensitive data

    •Whether file sharing, email and social or a combination change your exploitation risks

    Register Today
  • Embrace the Datacenter of the Future with Network Virtualization
    Embrace the Datacenter of the Future with Network Virtualization Mark Hollman, Sr. Mgr Product Marketing at Verizon Recorded: Feb 15 2018 27 mins
    The terms SDN (Software-Defined Network) and NFV (Network Function Virtualization) are on many agendas right now, but what does network virtualization really mean in practical terms for the data center environment?

    In this session we will discuss your move to the cloud, including how to:

    •Speed time to market: Embracing new technologies to quickly deploy new services or turn on new sites.
    •Become more agile: Leveraging application enablement to facilitate agile business processes and help customers connect to multiple clouds/CSPs.
    •Manage costs: Consolidating your rack to free up space and control costs.
    •Enhance the customer experience: Improving application performance and limiting downtime from outages.
  • Cloud Automation in Telecommunications: Evolution or Revolution?
    Cloud Automation in Telecommunications: Evolution or Revolution? Omar Alassil, Kalyanjeet Gogoi, Sachin Venkatrao, Umair Zahid & Dimitris Vasilaras Recorded: Feb 15 2018 60 mins
    With the recent advances in the telco domain such as virtualization, cloudification, software-defined everything, network slicing and IoT, telcos moving into the cloud face a fundamental challenge on how to take benefit of things that these technologies provide such as automation and machine learning. This poses a question on whether automating the network is something that can be achieved from day one or whether it should be taken as a step-by-step approach.

    In this webinar, we will be exploring various tranches that can be and should be automated to support this journey. We will also explore the challenges around them and the industry readiness for a fully automated telco cloud.

    Join us on this expert panel to hear the views from both sides: operators and vendors.

    Moderator: Omar Alassil, Cloud & Data Center Solutions Lead, Nokia Global Services
    Panelists: Kalyanjeet Gogoi, Cloud Portfolio Innovation Lead, Nokia Global Services, Sahin Chickballapur Venkatrao, CTO GS Cloud/Data Center Services, Nokia, Umair Zahid, Cloud Automation & Infrastructure Lead, Three UK, and Dimitris Vasilaras, E2E Cloud Solutions Lead, Three UK
  • IT Transformation: Beyond the Traditional Data Centre
    IT Transformation: Beyond the Traditional Data Centre Simon Ratcliffe, Consulting & Advisory, Ensono Recorded: Feb 15 2018 49 mins
    IT Transformation projects are usually driven by the need to reduce complexity, improve agility, simplify systems, contain costs, manage ever growing data and provide more efficient operational management. Arguably, for seasoned IT professionals there is nothing new about the drivers for transformational change; it’s the velocity and scale of transformation today that’s the big challenge.

    Today, to effectively accelerate business innovation, successful IT leaders are building infrastructure that focuses on automation and flexibility, supporting agile application development and helping deliver world-class customer experience. Of course, IT teams are still under pressure to deliver legacy, mission-critical applications but they also need to support a seemingly constant flow of emerging business opportunities. They’re also tasked to lower costs, reduce Capex, while helping to drive revenue growth. That’s a lot of drivers and this complex juggling act often requires modernising infrastructure. An almost inevitable result of this is that the mix of platforms they adopt will include public cloud.

    So, does that signal the end of the corporate data centre as we know it? Well, as is so often the answer – yes and no. ‘Yes’ because there is no doubt that the complexity and cost of building and managing on-premise infrastructures is becoming increasingly unsustainable for many businesses. And ‘no’ because business continuity and stability of legacy applications are still, quite rightly, primary drivers today. But the corporate data centre may well now be a service provider’s data centre...
  • Container troubleshooting with Sysdig
    Container troubleshooting with Sysdig Jorge Salamero Sanz, Technical Marketing Manager, Sysdig Recorded: Feb 15 2018 45 mins
    SSHing into a container for troubleshooting or burdening it with additional monitoring tools is kind of an anti-pattern. But… you still want to have full control, traceability and visibility right? Containers are highly volatile, how can you do this if your container doesn’t exist anymore?

    Sysdig uses Linux tracepoints to collect and then process and filter kernel system calls and events. Still this requires a deep knowledge on a tcpdump like filtering syntax and understanding on the syscalls involved. Sysdig Inspect makes our deep dive into system calls much more intuitive and visual though a graphical user interface that allows to correlate high level activities like containers, processes, containers, network or file I/O and commands, events or logs.

    In this webinar series you will get to know how Sysdig and Sysdig inspect works through a series of practical examples:

    -Exploration and performance analysis of container, processes, network and file activity on a typical Wordpress setup
    -Debug a 502 HTTP error on a load-balanced Python app with HAproxy
    -Troubleshoot a Kubernetes CrashLoopBackOff error

    Who should attend?

    If you're managing containers in production, using containers for development or just beginning our container exploration, you'll want to attend to understand the challenges of troubleshooting system or application errors when running inside containers.
  • Customer Success Story: STT Connect Builds Cloud Mgmt Co with SDN
    Customer Success Story: STT Connect Builds Cloud Mgmt Co with SDN David Robinson, CTO, STT Connect; Luke Turner, SE Director, Big Switch Networks; Salman Zahid, Recorded: Feb 15 2018 57 mins
    “When we set out to build our private cloud business, we outlined three customer-focused tenets to abide by one, the foundation must be secure,” said David Robinson, CTO, STT Connect. Two, it must be managed in an automated way. And three, of course, it needed to be high performing today and tomorrow."

    Guided by these principles, David and his team made a strategic decision to embrace open solutions, and to have everything software-defined. Sharing the business and technology vision that launched a new web-scale cloud offering for enterprise customers and reseller partners, he discusses the infrastructure requirements and benefits; the challenges of working with network engineers who hesitated in accepting a software-defined vision; and the best practices learned during the testing and implementation phases of their project. David explains why a web-scale cloud solution with software-defined networking enables STT Connect to offer a solution that is scalable and repeatable across their data centers.

    In the webinar, we discussed the following:
    ●Big Question #1: How do you build a new web-based solution quickly and effectively?
    ●Big Question #2: How do you establish a secure, automated, and high-performance environment that can be implemented globally?
    ●Big Question #3: How do you comply with strict standards for security availability and transparency defined by their markets?
  • Building a Zero Trust Network
    Building a Zero Trust Network Evan Gilman and Doug Barth Recorded: Feb 14 2018 59 mins
    Even as the world continues to change, our network security models have struggled to keep pace. Cloud mobility is a paramount security project, but the perimeter security model is showing its age and having difficulty in the new cloud world order.

    We spend millions on complex perimeter and address-focused technologies, but ever-worsening breaches continue to make the headlines year after year. The zero trust model aims to resolve that conflict.

    Zero trust networks are built with security at the forefront, creating policies using software and user identities, rather than spoofable IP addresses. By shifting the identifiers from addresses to software and user signatures, zero trust networks can protect public cloud workloads and on-premises applications with the same ease and flexibility.

    Doug and Evan will discuss the origins of and philosophy behind the zero trust networking model, why it's needed in today's network security landscape and how it can simplify workload protection.
  • Storage Performance Benchmarking: Workloads
    Storage Performance Benchmarking: Workloads Mark Rogov, Dell EMC, Chris Conniff, Dell EMC, Tim Lustig, Mellanox Recorded: Feb 14 2018 57 mins
    Benchmarking storage performance is both an art and a science. In this 5th installment of the SNIA Ethernet Storage Forum’s “Storage Performance Benchmarking” series, our experts take on optimizing performance for various workloads. Attendees will gain an understanding of workload profiles and their characteristics for common Independent Software Vendor (ISV) applications and learn how to identify application workloads based on I/O profiles to better understand the implications on storage architectures and design patterns. This webcast will cover:
    •An introduction to benchmarking storage performance of workloads
    •Workload characteristics
    •Common Workloads (OLTP, OLAP, VMware, etc.)
    •Graph fun!

    Spend Valentine’s Day with us. We think you’ll “love” this webcast!
  • Access Management and Security Controls with NGINX
    Access Management and Security Controls with NGINX Faisal Memon, Technical Product Marketing Recorded: Feb 14 2018 62 mins
    When your content is valuable, and you’re rightly concerned about the privacy and security of your users, you can use NGINX to control and secure access to your services and the data that they manage.

    We’ll cover different ways you can use authentication, authorization, and security controls in NGINX and NGINX Plus to protect your code and content.

    Join to learn:
    *About restricting access with NGINX
    *How to offload SSL/TLS and use Let’s Encrypt certificates
    *How to enable rate, connection, and bandwidth limiting
    *About JWT authentication and single sign-on (SSO)
  • IoT Devices for the Enterprise: The Key Roles of Design, Testing & Security
    IoT Devices for the Enterprise: The Key Roles of Design, Testing & Security Expert panel including Ken Hosac, VP of IoT Strategy, Cradlepoint Recorded: Feb 14 2018 62 mins
    IoT devices aimed at the enterprise space serve a wide variety of purposes and must designed, tested and deployed in ways that address the unique needs of businesses.

    Unlike large-scale, consumer-oriented IoT offerings, enterprise IoT devices must be differentiated to serve specific industry needs as well as provide enterprise-grade availability, security and reliability — but still maintain relatively low cost.

    As businesses seek to gain new insights and efficiencies by leveraging the internet of things, RCR Wireless News looks at what enterprises need to know to make the IoT work for them.

    Presenters:
    — Kelly Hill, Editor, RCR Wireless News
    — Derek Kerton, Principal Analyst, Kerton Group
    — Ken Hosac, VP, IoT Strategy & Business Development, Cradlepoint
    — Mike Eftimakis, IoT Product Manager, Arm
  • Sprint to the (Application) Finish with GDPR-Compliant Test Data
    Sprint to the (Application) Finish with GDPR-Compliant Test Data Bonnie Yeomans, Assistant General Counsel, CA Technologies Recorded: Feb 14 2018 45 mins
    If you’re going Agile, you’re no doubt moving to faster sprints! Test data takes center stage as companies grapple with faster testing processes and new compliance initiatives such as GDPR. Two-week sprints require teams to test faster and testing faster means having test data delivered at any stage of development.

    Join us for this webcast to learn how your teams can deliver the GDPR compliant data at the right time to every team that needs it. We will review traditional testing techniques and their strengths and weaknesses and then explore the world of synthetic data creation and virtual test data delivery to gain a better understanding of these trends. We will wrap things up by giving a game plan for GDPR compliance in the testing space.

    One hour with us could save you days or weeks of frustration as you get ready for 2018.
  • Verizon Threat Research Advisory Center - Cyrptocurrency Attacks
    Verizon Threat Research Advisory Center - Cyrptocurrency Attacks John Grim and David Kennedy, Verizon Enterprise Solutions Feb 21 2018 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.

    This month's theme: Cryptocurrency Related Attacks

    Our Verizon Threat Research Advisory Center presenters will be:

    •David Kennedy, Managing Principal, Open Source Intelligence
    •John Grim, Senior Manager, Investigative Response – Americas
    •Adam Harrison, Senior Consultant, Investigative Response – EMEA
    •Josh Costa, Senior Consultant, Investigative Response – Americas
    •Roy Porter, Senior Analyst, Cyber Intelligence

    We'll cover 'Cryptocurrency Related Attacks' for this month's theme. In doing so, we'll provide insight as seen by our investigators and analysts. For the 'Insight' portion, Adam Harrison will provide a 2018 Data Breach Digest pre-release 'sneak peek' on a Cryptocurrency-Mining Malware scenario. For the 'Today's Risk' portion, we'll feature Roy Porter who'll provide an in-depth look into cryptocurrency-related attacks as seen in our caseload and on the DarkNet and internet.

    This will be followed by our regularly scheduled programming:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to cryptocurrency related data breaches that you'd like us to cover on the call, please send them to the following email address prior to Feb 14 2018:

    Intel.Briefing@verizon.com

    And then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • The Growing Risk of DDoS Attacks
    The Growing Risk of DDoS Attacks Robert Ayoub Research Director- Security IDC and Tom Bienkowski Director of DDoS Product Marketing Arbor Networks Feb 21 2018 4:00 pm UTC 60 mins
    If asked, “What’s our risk of a DDoS attack?”… Would you be able to answer with confidence? With all the attention given to ransomware, it’s easy to forget about availability protection. But the data is clear. DDoS attacks are increasing in frequency and complexity. And if not adequately prepared, the impact of a DDoS attack can be quite significant. To help you more accurately assess your risk of DDoS attacks, join Rob Ayoub, IDC Research Director and Tom Bienkowski, Arbor Networks Director of Product Marketing to learn about the latest trends in DDoS attacks and more importantly best practices in protection.
  • Are you ready for the new MFA requirements for PCI Compliance?
    Are you ready for the new MFA requirements for PCI Compliance? Alex Wong, Senior Manager, Product Management, Symantec and Maren Peasley, System Engineer, Symantec Feb 21 2018 6:00 pm UTC 60 mins
    PCI just made changes to the MFA requirements.

    With rapid cloud adoption, how do companies protect data, secure access & keep employees productive all while meeting compliance requirements?

    Key Takeaways:

    - Learn the scope of the new and future Payment Card Industry MFA & SSL (PCI) requirements

    - Understand common ways to comply & why companies fall out of compliance

    - Review best practices to secure access to your data

    Register Today
  • Is Your Security Team Equipped to Make the Best Tactical Decisions?
    Is Your Security Team Equipped to Make the Best Tactical Decisions? Olga Polishchuk, Senior Director of Investigation and Jonathan Tomek, Senior Director of Research Feb 21 2018 7:00 pm UTC 60 mins
    Our webinar with LookingGlass’ Senior Directors of Intelligence, Olga Polishchuk and Jonathan Tomek will explore how you and your security team can benefit from finished intelligence, including insights into key topics like policy, high-profile events, and threat trends. Whether you need to know more about international business law or want to a specific threat actor’s profile, having strategic intelligence at your fingertips can help keep your organization safe from cyber and physical threats.

    “I have to prepare a report for our senior management, but don’t have the necessary intel.”
    “We have an international event happening in our city. Having strategic intelligence will help our security team be prepared.”
    “If my team had access to finished intelligence, they would be better able to predict lateral movements by adversaries.”

    Join us on February 21 @ 2PM ET to learn how you can enable your security team to make better tactical and business decisions.
  • SD-WAN en comercio: Habilitando Seguridad y Segmentacion para la Transformacion
    SD-WAN en comercio: Habilitando Seguridad y Segmentacion para la Transformacion Tony Banuelos, Product Manager Feb 22 2018 3:00 pm UTC 60 mins
    En los ultimos diez años el perfil de trafico en redes cambio por completo comparado con los diez años anterior. El “internet of things” (IoT), variaciones y numero de dispositivos conectados a la red, video, imagenes, voz, transacciones de tarjeta de credito, wifi y mucho mas han cambiado las funciones requeridas que redes deben ofrecer. En comercio, especificamente, se deben ofrecer funciones para separar el tipo de trafico que se maneja sobre la misma red. La habilidad de separar trafico de PCI, guest wifi y voz es critico para ofrecer los servicios necesarios dentro de una tienda al por menor. Es aqui donde segmentacion de trafico juega un rol importante dentro de la red.

    Este webinar cubrira los siguientes topicos:

    - Que es segmentacion en relacion a SD-WAN
    - Importancia de segmentacion en tiendas al por menor, ilustrado con usos de caso
    - Demostracion de segmentacion en SD-WAN
  • Sysdig Monitor Overview
    Sysdig Monitor Overview Eric Carter, Director, Product Marketing, Sysdig Feb 22 2018 6:00 pm UTC 60 mins
    Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?

    Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:

    - How to monitor services and apps built on top of containers
    - The benefits of transparent instrumentation for metric collection
    - Using dashboards to quickly see and share performance data
    - How to quickly determine the what and the why of what’s happening in your environment
  • Data Protector zum Wochenstart: DP 10 New GUI and Consolidated Scheduler
    Data Protector zum Wochenstart: DP 10 New GUI and Consolidated Scheduler Claus Nöske, Presales Consultant Data Protection, Micro Focus Feb 26 2018 8:00 am UTC 90 mins
    In den Webinaren „Data Protector zum Wochenstart“ wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen.

    Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb. Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    In diesem Webinar möchten wir noch detaillierter auf die neue Benutzeroberfläche eingehen. Dabei zeigen wir die verschiedenen Ansichten und Funktionen von Dashboard und Consolidated Scheduler. Hier ist es nun in Zukunft möglich, die Backup Jobs neben der Weboberfläche auch über ein Command Line Interface oder die REST API zu verwalten.
  • Transitions From CA eHealth® to CA Performance Management for Modern Network Ops
    Transitions From CA eHealth® to CA Performance Management for Modern Network Ops Drew Gardner, CA Technologies, Solution Sales & Gary Williams, Telefonica UK, Product Manager - OSS Tools & Gateway SDN Feb 27 2018 10:00 am UTC 60 mins
    O2/Telefonica is launching their SD-WAN offering to the market this year built using the Network Operations and Analytics platform from CA. After a successful CA eHealth to CA Performance Management upgrade, they now have the capability to define their customer SD-WAN offering thanks to modern network performance monitoring from CA. In this session, learn how one of the largest UK telecommunications providers transitioned to a modern network monitoring platform that delivers fast and intuitive network operations insights, capacity planning and high scale and future proofs their next-gen SDN initiatives to competitively win the digital marketplace.
  • Ponemon Research: Reducing Cybersecurity Costs & Risk Through Automation
    Ponemon Research: Reducing Cybersecurity Costs & Risk Through Automation Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute; Laurence Pitt, Global Security Strategy, Juniper Networks Feb 27 2018 4:00 pm UTC 60 mins
    Recent research, conducted by the Ponemon Institute, into cyber automation technologies revealed that cyber automation reduces the hours spent dealing with security exploits and as a result can save organizations an average of more than $2.3 million annually.

    Over 1,500 IT security practitioners, globally, were surveyed. The research looked at how organizations are deploying cyber automation technologies such as artificial intelligence and machine learning; their cost-effectiveness and other benefits of automation.

    Attend this webinar to find out more about:

    - How your peers are deploying cyber automation technologies
    - The benefits of adopting security tools with Automation
    - Why automation is the answer
    - Attendees to the webinar will get a copy of the full research report.
  • All-in-One Enterprise-Class Mobile Networking
    All-in-One Enterprise-Class Mobile Networking Cradlepoint's Todd Krautkremer, CMO, and Jake Smith, Product Manager for Network Security Services Feb 27 2018 5:00 pm UTC 60 mins
    Bringing the benefits of Software-Defined WAN To LTE mobile networks for first responders, transit operators and other fleet-based organizations, Cradlepoint announced this week its all-inclusive solution services for mobile networking. This is the third major product announcement from Cradlepoint under its new NetCloud Solution Packages services model.

    First responders, transit operators, utility crews, and insurance disaster teams - as well as many other organizations that depend on distributed field forces and fleets to deliver products, provide services, and get work done - need reliable and secure mobile networks with always-on 4G LTE connectivity including seamless communication through the new FirstNet emergency service. They need their people and passengers to access mission-critical applications and the Internet from anywhere, and to keep data flowing from onboard telemetry, sensors, surveillance cameras, and other devices. However, managing and securing these roving communications hubs has become a challenge for IT teams, since traditional mobile solutions fall short in providing the enterprise-class visibility, security, and control capabilities of fixed branch networks.

    Join Cradlepoint's Todd Krautkremer, CMO, and Jake Smith, product manager for network security services, for a live webinar on Tuesday, Feb. 27, at 9am PT. They will discuss mobile networking challenges and opportunities and introduce a new NetCloud Solution Package for mobility that includes the COR IBR1700, NetCloud services - including NetCloud Manager and NetCloud Perimeter- and comprehensive 24x7 support.

    Replacing multiple standalone "boxes" with an all-in-one mobile networking solution, the IBR1700 is designed for installations within a wide range of vehicles, including police, fire, ambulance, and other first responder vehicles; tractor-trailers; school and metro transit buses; light-rail and commuter trains; river and coastal ships; and mobile command trailers.
  • ESG Tests vArmour for Securing Multi-Cloud Workloads
    ESG Tests vArmour for Securing Multi-Cloud Workloads Tony Palmer, Sr. Lab Analyst at ESG; Faraz Aladin, Sr. Director of Marketing at vArmour Feb 27 2018 6:00 pm UTC 60 mins
    The Analysts at Enterprise Strategy Group just wrapped up testing of the vArmour DSS Distributed Security System across physical, virtual, cloud, and container platforms and the results are in.

    Join ESG Senior Lab Analyst, Tony Palmer, along with vArmour Senior Director of Marketing, Faraz Aladin, for a detailed review of the vArmour solution and to see how it performs in the areas of:

    --Application identification, inspection, and protection across a combination of infrastructure platforms

    --Scalability to match compute resources and throughput requirements

    --Automatic security provisioning for new assets

    --Deception capability, ease of use, and efficiency
  • CEO Insights: 2018's Top Cyber Security Predictions
    CEO Insights: 2018's Top Cyber Security Predictions Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Feb 27 2018 6:00 pm UTC 60 mins
    As you explore new opportunities to drive business growth in 2018, so are cyber criminals retooling their war chest to exploit your business. As we have seen in 2017, no one is safe.

    In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf Networks, will share his insights on the top 7 predictions to look out for in 2018.

    Here is a preview of the top 3 predictions that is bound to surprise you.
    - AI will not improve security. You will need Hybrid-AI.
    - The US voting system will undergo major changes
    - A major corporation will get caught with its sticky hands in the cookie jar

    With these challenges, investing in prevention tools alone is not enough to counteract new cyber-attacks. Focusing on threat detection and response becomes necessary to address these sophisticated attacks that will continue to bypass their perimeter defenses.

    To learn more about these 2018 predictions and to see how you can protect your on-premise IT infrastructure and cloud-based resources, with an industry leading SOC-as-a-service, register now.

    About our speaker:
    Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
  • Sysdig Secure Overview
    Sysdig Secure Overview Knox Anderson, Product Marketing Manager, Sysdig Feb 27 2018 6:00 pm UTC 60 mins
    Learn how you can simplify and strengthen your container security posture by combining deep kernel-level container visibility with metadata from your container orchestration tools to define your policies.

    We'll cover how the security landscape is changing, the architecture of Sysdig Secure, we will show you live how to instrument your containerized environment and then do something you'll never see from any other security tool!

    During the live demo will walk you through what Sysdig Secure can do:

    -Implement application and service aware policies
    -Block incoming attacks and container break-ins
    -Audit executed commands
    -Intrusion forensics: pre and post attack investigation
    -Unify monitoring & security workflows
  • Create a Green Patch in Your Brownfield: Getting Started w/ IoT in Manufacturing
    Create a Green Patch in Your Brownfield: Getting Started w/ IoT in Manufacturing John Kowal, Director of Business Development, B&R Industrial Automation Feb 27 2018 6:00 pm UTC 60 mins
    A practical way to get started with IIoT in a brownfield factory is by creating a “Green Patch in your Brownfield.”

    Everyone is talking about deploying IIoT in brownfields to achieve incremental gains in productivity. But in the greenfield, IIoT can deliver a game changer: to change your business model to mass customization through adaptive machines. Batch size of one. Deliver direct from the production line to consumers. Flatten your supply chain, your sales chain. No greenfield in your near future? To get started, get focused. For your next capex, put a 'focused factory' in your existing plant -- a 'green patch' in your brownfield. Learn from a pilot project the full potential of IIoT with today's state of the art automation technologies, not the legacy assets of the brownfield.
  • Securing Today’s Enterprise The Proof is in the Proxy
    Securing Today’s Enterprise The Proof is in the Proxy Timothy Chiu - Senior Director of Product Marketing, Symantec Feb 27 2018 6:00 pm UTC 30 mins
    While many network security technologies by themselves promise complete security, the only real protection against advanced threats in today's risk-laden environment is a multi-layered defense comprised of
    different network, end-point and gateway technologies.

    Learn how each of these different technologies offers different layers of protection against threats, and why it’s not a prudent risk to go without any of them, especially the Secure Web Gateway.

    The Secure Web Gateway adds the proxy-based layer of defense needed for web-borne threats, generally considered one of the two most likely mechanisms for threat transmission into organizations today
    (the other being e-mail).

    Please Join Us, Register Today
  • Ускорение разработки для СУБД при помощи XtremIO
    Ускорение разработки для СУБД при помощи XtremIO Denis Serov Feb 28 2018 8:00 am UTC 60 mins
    Вы узнаете, какие уникальные преимущества дает XtremIO для сред разработки на примере СУБД Oracle.
    Мы также рассмотрим отличительные особенности XtremIO X2, особенно ценные для данной среды.
  • Container Forensics & Troubleshooting with Sysdig Inspect
    Container Forensics & Troubleshooting with Sysdig Inspect Jorge Salamero Sanz, Technical Marketing Manager, Sysdig Feb 28 2018 10:00 am UTC 60 mins
    Join us for a 1 hour use-case driven training session on container forensics, postmortem analysis and error troubleshooting with the Sysdig open source tool, Sysdig Inspect.

    In this session, we'll demo:

    -How to troubleshoot a 502 Bad Gateway error on HAproxy

    - A postmortem analysis to understand how a hacker broke into your containerized app

    - How to do deep forensic analysis and understand how your system was breached and what data was taken
  • Shift Happens! The power of Performance Testing
    Shift Happens! The power of Performance Testing Jeff Bradley, Pre-Sales Advisor, CA Technologies Feb 28 2018 4:00 pm UTC 45 mins
    Performance testing is more relevant than ever. It’s even more prominent in the software development life cycle than in the past. What’s changed is that development and testing teams now can test component level performance earlier than ever with tools such as Service Virtualization.

    It’s now easier to identify and fix performance-related issues as they are being worked much earlier than before, when performance testing was done during a formal performance testing cycle in the stage environment after multiple code builds have hidden those issues deeper across several application layers.

    This session will cover the basics of how to shift performance testing left so that development and testing teams can test component level performance using CA Service Virtualization and CA BlazeMeter.
  • Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors
    Building efficient 5G NR base stations with Intel® Xeon® Scalable Processors Daniel Towner, System Architect for Wireless Access, Intel Corporation Feb 28 2018 4:00 pm UTC 45 mins
    5G brings many new capabilities over 4G including higher bandwidths, lower latencies, and more efficient use of radio spectrum. However, these improvements require a large increase in computing power in the base station. Fortunately the Xeon Scalable Processor series (Skylake-SP) recently introduced by Intel has a new high-performance instruction set called Intel® Advanced Vector Extensions 512 (Intel® AVX-512) which is capable of delivering the compute needed to support the exciting new world of 5G.

    In his talk Daniel will give an overview of the new capabilities of the Intel AVX-512 instruction set and show why they are so beneficial to supporting 5G efficiently. The most obvious difference is that Intel AVX-512 has double the compute performance of previous generations of instruction sets. Perhaps surprisingly though it is the addition of brand new instructions that can make the biggest improvements. The new instructions mean that software algorithms can become more efficient, thereby enabling even more effective use of the improvements in computing performance and leading to very high performance 5G NR software implementations.
  • MEF Network Foundations – Advancing Professional Skills for Today’s Evolving Net
    MEF Network Foundations – Advancing Professional Skills for Today’s Evolving Net Rick Bauer - Director of Certification, MEF; Kevin Marz - Director, Tech 2000 Feb 28 2018 5:00 pm UTC 75 mins
    Building on the success of its MEF-Carrier Ethernet Certified Professional (MEF-CECP) program, MEF introduced its MEF Network Foundations (MEF-NF) certification in December 2017. MEF-NF helps individuals pursue advance skills to keep pace with rapidly evolving network environments. This new certification validates individuals’ concept-level understanding of key modern networking terms, processes, and elements covering knowledge and practice domains of SDN, NFV, Connectivity Services/Carrier Ethernet, and Lifecycle Service Orchestration.

    MEF-NF certification is ideally suited for:

    • Telecom and Network Operators
    • System Administrators
    • Technical Support Professionals
    • Technical Marketing and Sales Professionals
    • IT Pros who need a vendor-neutral certification to complement their vendor-specific network certifications

    This webinar will cover:

    • The value of both vendor-neutral and vendor-specific training/certification in building careers in networking
    • MEF-NF certification benefits to corporations and individuals
    • How MEF-NF fits in MEF’s Professional Certification Framework
    • Expanded options to prepare for the certification exam

    A leading service provider will provide a testimonial on the value of MEF-TN certification and share the business benefits that can be reaped by having a highly skilled workforce.
  • Balancing Risk, Compliance, and Performance in Data Analytics
    Balancing Risk, Compliance, and Performance in Data Analytics Scott Jeschonek, Director of Cloud Products (Avere) and Leonord Law, Product Manager (Google Cloud) Feb 28 2018 7:00 pm UTC 60 mins
    In this webinar, Avere Systems and Google Cloud explore the ways in which alternative asset managers are leveraging technology to drive improved profitability data without large capital investments in infrastructure.

    Today’s hedge fund managers are consistently analyzing greater volumes of data, with more speed, from a plethora of sources, with the end ambition of generating more alpha. Balancing the growing risks associated with proprietary data, compliance and regulatory restrictions, while supplying top-level performance is a dilemma facing IT managers everywhere.

    In this webinar we will discuss:

    – The trends driving increased demand for analytics in the alternative asset management sphere
    – Considerations for leveraging the cloud for short-term backtesting workloads
    – Practical tips for overcoming potential obstacles of latency, data movement, and lock-in
  • Assure the Network. Assure the Patient.
    Assure the Network. Assure the Patient. John Moyer, Cerner - Network Solutions Leader and Ryan Davis, ExtraHop - Product Marketing Feb 28 2018 7:00 pm UTC 60 mins
    Every hospital room is a datacenter. By the year 2020, Internet-connected medical devices will outnumber people 2:1. There will be 13 devices per staffed bed, not just per room. And, an average of 89 vendors will access a hospitals network every week. These increasing trends will create unique challenges for healthcare institutions, such as:

    -Increased complexity due to siloed departments
    -Lack of visibility into east-west traffic
    -Security around the increasing amount of medical devices

    There’s a better way for hospitals to build a sustainable business model focused on lower costs and better outcomes. Cerner and ExtraHop can help IT health organizations prepare for this shift, by keeping their systems online and providing the quality care patients expect. ExtraHop and Cerner provide the ability to see, in real time and down to the transactional level, exactly what’s happening across your healthcare IT and clinical systems. This visibility isn’t just a nice to have, it is a must-have to keep your IT healthy.
  • Technical Deep Dive: Plan & Design Your Wireless Network
    Technical Deep Dive: Plan & Design Your Wireless Network Srudi Dineshan - SonicWall Product Marketing Manager Feb 28 2018 7:00 pm UTC 60 mins
    The SonicWall SonicWave access point series features the latest Wave 2 technology. Built with security and user experience in mind, the SonicWave series provides a secure end-to-end solution.
    Learn best practices for planning and deploying your wireless network, including:
    • RF Fundamentals and the significance of 802.11ac Wave 2 technology
    • An overview of the SonicWave product portfolio
    • Site survey to understand AP placement and coverage analysis
    • How to setup, monitor and configure your access points
  • Monitoring Kubernetes with kube-state-metrics
    Monitoring Kubernetes with kube-state-metrics Eric Carter, Product Marketing & Jorge Salamero Sanz, Technical Marketing Mar 1 2018 6:00 pm UTC 60 mins
    Kubernetes simplifies deployment, scaling and maintenance of container-based services within and across clouds. At the same time, its dynamic nature adds complexity to app and infrastructure monitoring and troubleshooting. How can you ensure visibility into the health of application services in addition to the Kubernetes cluster itself?

    Using Kubernetes metadata and metrics - including kube-state-metrics - you can get critical insight into how your cluster is performing to ensure your users get the best experience.

    Join us for this webinar to discover how to effectively monitor Kubernetes. In this session we will discuss and demo:

    - How to correlate infrastructure, container, and orchestrator metrics for a complete picture of service performance
    - How to use kube-state-metrics to answer important questions about the condition of your Kubernetes cluster
    - How to detect, troubleshoot and resolve common scenarios you will face in your Kubernetes-based cloud
  • Briefings Part 2: The Hunt for IoT and it’s Threat to Modern Life
    Briefings Part 2: The Hunt for IoT and it’s Threat to Modern Life Sara Boddy, Director of F5 Labs Threat Research, F5; Brandon Dunlap, Brightfly (Moderator) Mar 1 2018 6:00 pm UTC 75 mins
    Our modern world depends on healthy, functioning, IoT devices. Unfortunately many of them are terribly insecure. Cyber attackers know this and have been aggressively compromising IoT devices for years. For the past two years, F5 Labs has been tracking cyber attackers as they hunt, infect, and build “Thingbots” - botnets made from IoT devices. This hunt has developed sizable thingbots like the infamous Mirai, and many others that have the capability to launch globally destructive attacks. These attacks can significantly impact modern life because of IoT’s presence within power systems, transportation systems, airport monitors, emergency warning systems, and security cameras. Join F5 and (ISC)2 on March 1, 2018 at 1:00PM Eastern for the 2nd Part of our three part Security Briefings series where we’ll explore the threat actors behind these attacks, the geographical targets of their attacks, how they are evolving their attack methods, and the types of devices impacted. We’ll include tips on how to start protecting yourself personally, and what you should be doing to protect your businesses.