Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Minimizing Cyber Exposure – An analysis of Meltdown and Spectre
    Minimizing Cyber Exposure – An analysis of Meltdown and Spectre Robert Healey, Senior Director Marketing, APAC, Tenable Network Security Recorded: Jan 24 2018 61 mins
    As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.

    Attend this webinar to discover:
    •Where vulnerability management for today’s assets needs to start
    •What the new faces of attacks and remediation look like
    •Why prioritization should not be based on scan results
    •Why reports using Excel are no longer the answer
    •How DevOps can be part of the solution to incorporate security

    Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
  • 3M & Staples Present: Improving comfort and performance in the workplace
    3M & Staples Present: Improving comfort and performance in the workplace Tom Albin PhD & Cristina Ainslie, LEED AP BD+C Field Sales Director, Furniture, Staples Business Advantage Recorded: Jan 23 2018 34 mins
    Gain valuable insight from our expert speakers.

    Webinar topics include:
    • Ergonomics 101
    How it impacts workplace productivity
    • Sitting vs. Standing
    The benefits and costs
    • Employee Retention
    Why comfort makes employees happy

    Tom Albin PhD is a licensed professional engineer (PE) and a certified professional ergonomist (CPE). He holds a PhD from the Technical University of Delft in the Netherlands. He is a Fellow of the Human Factors and Ergonomics Society. Tom divides his professional life between the Office Ergonomics Research Committee (www.oerc.org), where he is the Executive Director, and his consulting practice, High Plains Engineering Services. He has extensive experience as a researcher, corporate ergonomist, and product developer. In addition, he has been active in the US and International Standards community. He is accredited as a US expert to several International Standards Organization working groups and is Vice-Convenor of the ISO committee revising the standards for input devices and workstation layout/postures.

    Cristina Ainslie brings a wealth of knowledge to her role as Field Sales Director, Furniture as she has been in the industry for over 30 years. Her tenure in the industry ranges from working as Regional Manager for Teknion and as a Principle for a LEED consulting firm. She is passionate about bringing value to your project by putting together a team that is best in class and will ensure your project is planned, design and executed to your specific needs. She was instrumental in helping her teams create furniture programs for Yahoo, Netflix, Cisco Systems, Polo/Ralph Lauren and YouTube. Her experience in sustainability helped her act as an owner’s rep to assist her clients in obtaining LEED Certification for their projects. She assembled project teams that included architects, contractors, MEP and furniture vendors.
  • Breaking Down Cloud Security: Discover What it Means to You
    Breaking Down Cloud Security: Discover What it Means to You Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Recorded: Jan 23 2018 37 mins
    Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.

    Join us as we discuss:

    - How cloud security differs from a public cloud, a private cloud or a hybrid cloud
    - How cloud technologies impact a company's security options
    - How do you defend against attacks of third-party providers of IT services
    - How to develop policies and procedures to test and evaluate servers over which you have no physical control

    To better understand what cloud security means to you, register now.
  • Hong Kong & Singapore: Standing Out in the APAC MTDC Market (US Audience)
    Hong Kong & Singapore: Standing Out in the APAC MTDC Market (US Audience) Kelly Morgan, VP, Services & Dan Thompson, Senior Analyst, MTDC Recorded: Jan 23 2018 48 mins
    The multi-tenant datacenter market in Asia is expected to grow at a 15% CAGR from 2015-2020, and is the fastest-growing region after Latin America. Hong Kong and Singapore continue to be key markets in that region for growth, despite Singapore having a slower year in 2017, when considering new datacenter builds. In this webinar, we will discuss our most recent findings on the major players and trends in these top markets. We will also preview our research plans for 2018, including the new Asian markets we expect to cover.
  • Docker Monitoring: Best Practices for Optimal Efficiency
    Docker Monitoring: Best Practices for Optimal Efficiency Eric Carter, Product Marketing Manager, Sysdig Recorded: Jan 23 2018 64 mins
    Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.

    Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.

    During this webinar you’ll learn:

    - How should you monitor services built on top of containers?
    - What metrics become more relevant in Docker-based environments?
    - How do you construct alerts most effectively?
    - How do you troubleshoot containers that are rapidly coming and going?

    The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
  • Hunting the Hunters or Can you cover your cyber tracks to avoid being caught?
    Hunting the Hunters or Can you cover your cyber tracks to avoid being caught? Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Jan 23 2018 35 mins
    While some hackers crave the attention of a high profile attack or data breach, others prefer to work in shadows either trying to hide their tracks or are indifferent all together.

    Regardless, accurately understanding where an attack comes from is very helpful in defending against future attacks. More importantly, when companies and key organizations work together it is possible to tie together a multitude of individual footprints into a single, conclusive trail back to the originator.

    This session will focus on the importance of attribution and includes a case study of how a major cyber criminal was taken down, from the lowest foot soldier to the kingpin himself.
  • Data Protector zum Wochenstart: Neuigkeiten zu DP und Backup Navigator
    Data Protector zum Wochenstart: Neuigkeiten zu DP und Backup Navigator Marc Fisseler, Presales Consultant Data Protection, Micro Focus Recorded: Jan 22 2018 80 mins
    In den Webinaren "Data Protector zum Wochenstart" wird Ihnen unser Team regelmäßig Neuerungen zu Data Protector in Theorie und Praxis vorstellen. Bleiben Sie auf dem Laufenden und freuen Sie sich auf hilfreiche Informationen, Demos und Empfehlungen zu Data Protector aus erster Hand. Backup Navigator steht dem Ganzen als Analysewerkzeug zur Seite und sorgt für den langfristig einwandfreien Betrieb. Neuerungen, aktuelle Trends und Entwicklungen rund um die Themen Data Protection, Data Backup und Recovery werden ebenfalls in die Webinare mit einfließen. Ein Blick in die Zukunft rundet die jeweilige Session ab.

    In diesem Webinar wird sich alles um die Neuerungen des Data Protector Version 10.0 drehen. Die neue Konfigurationsoberfläche des Data Protector und ein komplett überholter Scheduler
    gestalten die tägliche Arbeit neu. Darüberhinaus werden wir auf weitere neue Features eingehen. Neben einem theoretischen Überblick schließt sich ein praktischer Teil anhand von Demos an.
  • Elastic Load Balancing as a Service (LBaaS) for OpenStack (German)
    Elastic Load Balancing as a Service (LBaaS) for OpenStack (German) Frey Khademim Recorded: Jan 19 2018 46 mins
    Die Avi Vantage Plattform bietet Enterprise-class Load Balancing, Web Application Firewall (WAF) und Application Analytics. Dank der Software-definierten Architektur von Avi Vantage ist nicht nur die nahtlose Integration in OpenStack möglich, sondern es können alle Komponenten der Avi Vantage Plattform auch innerhalb von OpenStack, z.B. als virtuelle Maschine oder Container, betrieben werden. Avi Vantage bietet Enterprise-class Load Balancing as a Service (LBaaS) und ermöglicht die automatisierte Bereitstellung innerhalb von OpenStack Umgebungen.

    In diesem Webinar zeigt die Firma Avi Networks unter anderem:
    - Native Integration mit OpenStack Neutron, Nova, Keystone und Horizon
    - Verschiedene Deployment Methoden, z.B. Provider Mode oder Tenant Mode
    - Application Analytics und automatische Skalierung auf Basis von Real-Time Performance Daten
    - Zentrale Verwaltung von verteilten Load Balancing Services
    - Automatische Bereitstellung weiterer Load Balancer mittels Heat, Ansible und Co.
  • Elasticity, Portability, and Intelligence from the Smart Load Balancer
    Elasticity, Portability, and Intelligence from the Smart Load Balancer Ashish Shah Recorded: Jan 18 2018 42 mins
    A load balancer lives in a critical position between your applications and your end-users. This placement can deliver incredible value in terms of analytics, performance, and cost savings—but only if your load balancer is architected realize this potential. This live workshop will explore the technology and value behind the Smart Load Balancer. As an attendee, you will:

    • Learn differences between Smart Load Balancers and Legacy Load Balancers.
    • Understand the value of Smart Load Balancers in traditional and modern use cases.
    • See a live demonstration of Avi Networks’ Smart Load Balancer in action.
  • DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems
    DDoS Attack: How Attackers Circumvent CDNs to Attack Origin Systems Andy Shoemaker, Founder, NimbusDDOS & Kim Lambert, Sr. Product Marketing Manager, Imperva Incapsula Recorded: Jan 18 2018 47 mins
    Do you feel safe from DDoS attacks because you use a content delivery network (CDN)? Join Andy Shoemaker, founder of DDoS testing company NimbusDDOS, to uncover the limitations of this strategy. In this webinar he’ll perform a live DDoS attack to show how attackers bypass CDN defenses to directly target an organization’s critical resources.

    In this webinar you will:
    · Learn about the benefits and pitfalls of using CDNs as a DDoS protection strategy
    · Watch a live DDoS attack from the attacker's perspective
    · Participate in a live Q&A with DDoS experts
  • Machine Learning and Microsegmentation
    Machine Learning and Microsegmentation John O'Neil, Edgewise Chief Data Scientist Recorded: Jan 18 2018 37 mins
    “Make the trust zones smaller” is the rallying cry behind microsegmentation projects. Break up the network into smaller pieces and put firewalls in between those pieces to ensure attackers can’t get from one part of the network to the next. But making microsegmentation projects work relies on a great deal of knowledge of the network and attack pathways. And it’s an incredibly heavy lift–configuring and deploying a microsegmentation solution takes an immense amount of time and resources. Machine learning can significantly reduce the hurdles by learning the network’s intended state and defining the attack pathways that need to be secured, automating the microsegmentation process.

    Edgewise’s Chief Data Scientist John O’Neil will deep-dive into the role of machine learning in microsegmentation and demonstrate how a machine learning driven solution could reduce the time and energy needed to deploy microsegmentation from months to hours.
  • Secrets Revealed: Effective Protection Against Ransomware
    Secrets Revealed: Effective Protection Against Ransomware Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec Recorded: Jan 18 2018 62 mins
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • Playing Through the Pain: Strategies for Working in the Real World
    Playing Through the Pain: Strategies for Working in the Real World Richard Thieme, Author and Professional Speaker Recorded: Jan 18 2018 64 mins
    After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.

    This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.

    Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
  • The Future of Authentication in a Hyper Connected World
    The Future of Authentication in a Hyper Connected World Angel Grant, Dir, Identity, Fraud & Risk Mgmt., RSA; Clare Nelson; John Carnes, Anthem; Brandon Dunlap (moderator) Recorded: Jan 18 2018 59 mins
    With the ever increasing number of devices and applications that individuals use and access on a daily basis, the authentication of individuals has become paramount for organizations. It needs to be done faster, seamlessly and have less impact on the user. What can organizations do to meet this challenge? Are behavioral analytics an answer? What role does identity assurance play? What about multi-factor authentication? Biometrics? Join RSA and (ISC)2 on January 18, 2018 at 1:00PM Eastern for a discussion on where ID/Access management and authentication is going and how these future advancements can impact your organization.
  • Security and the Changing Value of our Data
    Security and the Changing Value of our Data Laurence Pitt, Global Security Strategy Director at Juniper Networks Recorded: Jan 18 2018 43 mins
    We’ve spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed.

    Because of this changing value, data must be secured and protected – kept away from people who might pose a threat to its integrity and value. In this world of instantly available information a news leak informed by real data is something that can quickly reduce the value of a product, or even damage the revenue and reputation of your business.

    Endpoint-based technologies can help to prevent an attack, but this is a defensive posture - we need to move and become more proactive. Understanding the data you have makes it easier to know what is ‘normal’, in turn this makes it easier to recognize unusual behavior of devices and data which might indicate a threat has breached the network. The faster you are able to see this, the faster you can react – ensuring maximum time possible to mitigate the potential damage.
  • Case Study Webinar: Moving Network Operations into the Future
    Case Study Webinar: Moving Network Operations into the Future Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE & Karen Crowley,Sr. Product Marketing Manager Recorded: Jan 18 2018 48 mins
    Join us on January 18th, 2018 for a lively discussion with Ralf Buchroth, Team Lead in IT Infrastructure and Provider Management at RWE, the second largest utility provider in Germany.

    We will discuss RWE’s challenges and success in moving their network operations into the future without compromising security and compliance, including:
    • consolidating security and orchestrating connectivity across a hybrid network, including legacy firewalls and routers, next generation firewalls, and the AWS cloud platform
    • incorporating a cloud-first strategy and a heavy investment in DevOps to identify and address security violations in AWS, and allow application developers to spin up new applications without knowing IPs, protocols and ports
    • reclaiming visibility of their firewall configurations and moving from error-prone manual changes to automating the process
    • vastly improving workflows to improve audit preparation from a previously non-auditable change process

    Register now to gain amazing insight into how they have found success. We will wrap up with a live Q&A, so have your questions ready!
  • The Goldilocks Problem of AI in Security: How to Find the “Just Right” Use Cases
    The Goldilocks Problem of AI in Security: How to Find the “Just Right” Use Cases Gary Golomb, Co-founder and Chief Research Officer, Awake Security Recorded: Jan 17 2018 49 mins
    Like many technologies, artificial intelligence (AI) and machine learning (ML) are "just right" for some types of problems, but are often over-sold for others they are just not well-suited for. This webinar will dive into the characteristics of problems that AI/ML can greatly help enterprise security teams solve, but also contrast those against use cases where AI/ML is a much higher risk for those same resource-strapped teams. In those situations, the technology can actually worsen the skills deficit in the organization, rather than making it better.

    Attending this webinar will give you a framework for evaluating AI/ML technologies, including:

    - When can AI/ML indeed replace people, and when is it better suited to assist people?
    - What types of threats is it best suited for?
    - How does AI/ML fit in with other methodologies like security analytics, for threat detection?
    - How can AI/ML help with security investigations and incident response?
    - How can organizations evaluate vendor claims and ask them the right questions?
  • Through the LookingGlass – What We Learned from Major 2017 Cybersecurity Events
    Through the LookingGlass – What We Learned from Major 2017 Cybersecurity Events Eric Olson, VP of Intelligence Operations, and James Carnall, VP of Customer Support Recorded: Jan 17 2018 61 mins
    2017 was filled with cybersecurity meltdowns. From WannaCry to BadRabbit, the cybersecurity landscape has only become more volatile. With cyber threats on the rise, is your organization’s security posture ready for 2018?

    Join LookingGlass’ Vice President of Customer Support, James Carnall and Vice President of Intelligence Operations, Eric Olson as they take a closer look at 2017’s major cyber-related incidents and provide tips and recommendations on how your organization can prepare for 2018. Webinar attendees will learn:

    · Major cybersecurity trends from the past year
    · Cybersecurity tactics that worked – and didn’t work – in 2017
    · How to take a proactive cybersecurity approach to fending off cyber threats
  • Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning
    Hybrid-AI: Boost Cybersecurity with Human Augmented Machine Learning Matthew Thurston, Chief Architect - Arctic Wolf Networks Recorded: Jan 17 2018 48 mins
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • How To Simplify Your Datacenter Environment in a Multi Cloud World
    How To Simplify Your Datacenter Environment in a Multi Cloud World Vinu Thomas, Raphael Meyerowitz, Mike Berthiaume Recorded: Jan 17 2018 55 mins
    Presidio is radically simplifying customers datacenter environments with Nutanix. Come hear from Vinu Thomas, Presidio CTO, Raphael Meyerowitz, AVP of Datacenter Solutions, and Mike Berthiaume with Nutanix on how we are making it easier to manage, upgrade and deploy multi-cloud solutions.
  • Verizon Threat Research Advisory Center - Monthly Intel Briefing
    Verizon Threat Research Advisory Center - Monthly Intel Briefing John Grim and David Kennedy, Verizon Enterprise Solutions Recorded: Jan 17 2018 71 mins
    Join us—the Verizon Threat Research Advisory Center —for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape. Threats like MeltDown, Spectre and other hot topics will be shared by experts across Verizon and our partners.

    Each month, we will have a specific theme to help promote awareness and best practices.
  • Security Management in the Cloud
    Security Management in the Cloud Presenter: Greg Singh, Technical Director-APAC, Skybox Security | Moderator: Clayton Jones, Managing Director, APAC, (ISC)2 Recorded: Jan 17 2018 60 mins
    As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.

    Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.

    This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.

    Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.
  • The [SMART] & Modern Highly-Efficient Data Center
    The [SMART] & Modern Highly-Efficient Data Center Stewart Dale, Sr. Application Engineer, Intel Data Center Management Solutions, and Dr. Rene Meyer, AMAX Recorded: Jan 16 2018 53 mins
    AMAX's [SMART]DC Data Center Manager is the premier out-of-band DCIM solution for the modern heterogeneous data centers, to optimize efficiency and manageability while reducing operational costs and resource underutilization.

    This webinar will cover:

    •The Next Generation of Data Centers: High Efficiency Meets Scalability
    •Streamline Heterogeneous Data Center Management with [SMART]DC
    •Incorporate GPU platforms Seamlessly as Your Data Center Upgrades
    •Achieve up to 30% in Power Savings for Your Infrastructure
    •Minimize Operational Disruptions and Protect Hardware Investment
    •How You Can Start Today
  • Forecasting 2018: An insider’s look to the future of IoT — a webinar
    Forecasting 2018: An insider’s look to the future of IoT — a webinar Aeris Communications Recorded: Jan 16 2018 64 mins
    With IoT still experiencing growing pains, predicting its future can be guesswork at best. Join us for this January 16 webinar where IoT subject matter experts peer into the crystal ball and expand on some of their IoT visions for the near future.

    Moderated by Christina Richards, VP, Global Marketing, Aeris, this webinar will present viewpoints, discuss upcoming IoT directions, innovations, and challenges, and enable audience participation via a Q&A session. All is possible at this future-leaning webinar. Here are a few tidbits.

    “SIM providers are going away. It’s just a matter of when.”
    —Drew Johnson, VP Engineering & Operations, Aeris

    “Automotive transformation via the IoT will become mainstream.”
    —Michelle Avary, VP, Automotive Strategy, Aeris

    “With more than a billion people in India alone, many below the poverty line, IoT will lead the charge for securing basic needs, such as clean water, healthcare, and education.”
    —Dr. Rishi Mohan Bhatnagar, President, Aeris India

    “Security will have to up its game as IoT delivers huge volumes of data.”
    —Syed “Z” Hosain, Chief Technology Officer, Aeris

    My prediction: This will be the only IoT futuristic view you will need to attend this year!

    Sign up now for this futuristic view into the future of IoT.
  • From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st
    From 10% to 100% Cloud in 3 Years: How (ISC)² is Doing it & Putting Security 1st Wesley Simpson, MSM, COO, (ISC)² Recorded: Jan 16 2018 49 mins
    (ISC)² COO Wesley Simpson, shares the association’s experience as (ISC)² transitions to a 100% cloud-based services model. This interactive discussion explores how (ISC)² decided to go all in with cloud, why the cloud was the best option, how the team ensured its cloud strategy mapped to operational needs, and how security is front and center throughout the entire process. Learn how we are doing it and share your cloud migration experiences. This discussion is for anyone thinking about moving to the cloud, already making the transition or even those who completed a cloud migration but still looking for best practices to apply.
  • Advancing Our Leadership in Automation with Tufin R17-3
    Advancing Our Leadership in Automation with Tufin R17-3 Amnon Even-Zohar,Senior Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Jan 24 2018 4:00 pm UTC 45 mins
    Please join Tufin as we brief our customers on the release of Tufin Orchestration Suite™ R17-3, Advancing Our Leadership in Automation: Pioneering the Automation Journey to the SDN and More. We’ll cover the different facets of automation features in the release including automation and provisioning for VMware NSX, support for Check Point Identity Awareness Blade, and end-to-end group modification automation.

    Other items covered include:

    Policy optimization for Cisco Firepower
    Enhancements to topology to further support “what-if” analysis
    Policy Browser search enhancements
    Changes to cloud license enforcement
  • MEF 3.0 - What You Need to Know
    MEF 3.0 - What You Need to Know Stan Hubbard - Dir. Communications & Research, MEF; Dan Pitt - SVP, MEF; Bob Mandeville - President, Iometrix Jan 24 2018 5:00 pm UTC 75 mins
    In Nov. 2017, MEF released our MEF 3.0 transformational global services framework for defining, delivering, and certifying agile, assured, and orchestrated services across a global ecosystem of automated networks. Dozens of service and technology firms have publicly embraced MEF 3.0 and currently are involved in MEF 3.0 development work.

    MEF 3.0 services provide an on-demand, cloud-centric experience with unprecedented user- and application-directed control over network resources and service capabilities.

    Over the next several months, MEF will host a series of webinars covering the key pillars of MEF 3.0:

    • Standardized, Orchestrated Services
    • Open LSO APIs
    • Agile Service & Technology Certification
    • Community Collaboration

    Our first webinar will provide an overview of MEF 3.0, including:

    • Explanation of the MEF 3.0 framework
    • Comparing MEF 3.0 to CE 2.0
    • Latest developments on inter-provider and intra-provider LSO APIs
    • An exciting new approach to MEF certifications
    • Expanded community collaboration
  • Container Runtime Security with Sysdig Falco
    Container Runtime Security with Sysdig Falco Michael Ducy, Director of Community and Evangelism, Sysdig Jan 24 2018 6:00 pm UTC 60 mins
    While there have been many improvements around securing containers, there is still a large gap in monitoring the behavior of containers in production and taking action on any abnormal behavior. That’s why we created Sysdig Falco, the open source behavioral activity monitor for containerized environments.

    Sysdig Falco can detect and alert on anomalous behavior at the application, file, system, and network level. In this webinar attendees get a deep dive into Falco and learn:

    -How does behavioral security differ from existing security solutions like image scanning?

    -How does Falco work?

    -What can it detect?

    -How to build and customize rules.

    -How to extend with alerting options.

    Who should attend?

    If you're managing containers in production, or just beginning our container exploration, you'll want to attend to understand the security paradigms of containers and how to secure them.
  • IT Service Management mit DevOps-Turbo – Neue Maßstäbe in puncto Nutzererfahrung
    IT Service Management mit DevOps-Turbo – Neue Maßstäbe in puncto Nutzererfahrung Robert Kreher, Micro Focus, und Dr. Kai-Uwe Winter, Materna Jan 25 2018 10:00 am UTC 60 mins
    Digitalisierung, Cloud oder DevOps machen auch vor dem Service Management nicht Halt. Die Interaktion zwischen Endanwender und Help Desk soll modern, interaktiv, transparent und mobil sein. Die Anwender wünschen sich ein zentrales, interaktives Portal für alle Anfragen. Transformative Trends wiederum verlangen nach Service Management-Lösungen, die mit ihrer Geschwindigkeit mithalten können. Routinetätigkeiten sollen sukzessive automatisiert werden können und zugleich kosteneffizient sein.

    Eine innovative Lösung hierfür ist Service Management Automation-X (SMA-X) von Micro Focus. Sie bietet integrierte virtuelle Agenten mit Chatbots, Social-Collaboration-Funktionen, ein Smart-Ticketing-System und intelligente E-Mail-Programme. All dies sorgt beim Anwender für ein optimiertes Nutzererlebnis. Als erste vollständig containerbasierte und mandantenfähige Plattform für das Service Management bietet SMA-X die größte Bandbreite an Deployment-Optionen. Auch strengste Service Level Agreements können damit kosteneffizient erfüllt werden. Sie verfügen über die Datenhoheit und können so Sicherheit und Speicherort der Daten garantieren sowie Datenschutz- und Compliance-Richtlinien einhalten.

    Diese Vorteile von Service Management Automation-X lernen Sie im Webinar kennen:
    • Containerbasierte Bereitstellung vom Rechenzentrum bis zur Public Cloud
    • Läuft in der Public Cloud mit voller Performance- und Kostenflexibilität
    • Code- und versionslose Benutzerführung
    • Schlanke und moderne Benutzerführung durch den Einsatz von Big Data Analytics und Automatisierung
    • Mandantenfähigkeit durch Containertechnologie
    • Zusätzliche Enterprise-Anwendungen
    • Verbesserte Smart Ticketing Analytics durch optische Zeichenerkennung und maschinenbasierte Lernsysteme
    • Hosting in Deutschland im zertifizierten Rechenzentrum der Materna in Dortmund

    Nutzen Sie die Gelegenheit, Ihre Fragen an die Experten zu stellen. Die Teilnahme am Webinar ist für Sie kostenfrei. Wir freuen uns auf Ihre Anmeldung.
  • Remote Production: Game changer for sports broadcasting
    Remote Production: Game changer for sports broadcasting IBC365 | Tata Communications | VISTA Worldlink Jan 25 2018 1:00 pm UTC 60 mins
    Join IBC365 and Tata Communications on Thursday 25 January at 1pm GMT to explore how remote production is changing the way sports broadcasters operate.

    Remote production gives broadcasters the ability to produce live broadcasts at a distance from the actual event, by sending raw camera feeds, audio and equipment control over a telecom infrastructure to a central studio facility.

    It helps to generate high volume of sports content economically, thereby improving productivity and efficiency for sports broadcasters.

    Today, for any live event, about 30-40 people travel to each location with kit and other equipment to produce the broadcast feed at the venue. This is not only expensive but also logistically a nightmare.

    By producing feeds remotely at a central location only a handful of camera crew would have to travel while the technical director, commentator and other key crew members can finalise production at a central location.

    In this webinar we explore how broadcasters and production companies can overcome any technical and operational challenges to embrace the benefits of remote production.

    Jeremy Dujardin, CTO, Media Services, Tata Communications
    Dhaval Ponda, Global Sales Head, Media Services, Tata Communications
    Josh Liemer, VP Creative Services, VISTA Worldlink
  • 20 Docker Security Tools Compared
    20 Docker Security Tools Compared Jorge Salamero Sanz and Knox Anderson Jan 25 2018 6:00 pm UTC 60 mins
    There are quite a few Docker security tools in the ecosystem; how do they compare?

    Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/

    We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.

    Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:

    -How to secure Docker containers and what are the best practices
    -Why you need to both static and dynamic (run-time) scanning for your images
    -What other container security measures and policies are necessary in production

    Demo: Comparing and implementing docker security basics with the most popular container security tools
  • Putting the Power of Proxy to Work
    Putting the Power of Proxy to Work Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products, Symantec Jan 25 2018 6:00 pm UTC 45 mins
    Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.

    Join us for our webinar “Putting the Power of Proxy to Work” to learn how:

    - Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud

    - Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365

    - A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization

    Register Today
  • How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart
    How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart Panel of Secureworks Information Security Strategic and Technical Consultants Jan 25 2018 7:00 pm UTC 60 mins
    As the scope for security skill and expertise demanded of organizations extends, CISOs are increasingly turning to security consulting partners for strategic guidance and technical and advisory expertise.

    There are a broad range of organizations in today’s market offering security consultancy services based on best practices and standard frameworks. Partnering with one of these firms can provide your organization with the technical expertise to improve network visibility and gain a clearer understanding of your vulnerabilities, provide the strategic and practical guidance that helps you prioritize and build out programs that enable business objectives, as well as advise on how to effectively engage with the C-suite.

    What truly sets Secureworks’ information security consulting services apart is how we utilize our Counter Threat Unit™ and knowledge garnered from thousands of client engagements to ensure you are being consulted on the latest industry trends and threats. This way, the outcome is based on real-world scenarios that matter to your organization.

    Join consultants across our technical and strategic practices as they share lessons learned from their most challenging engagements and the value that real-time threat intelligence has brought to those engagements.

    Key topics discussed include:

    • Examples of real-world engagements where the CTU™ and Consulting Practice improved the outcomes for clients
    • Tools consultants use to ensure that your outcome is based on real-world scenarios and threats that matter to your organization
    • Lessons learned from our most strategic and complex engagements
  • SAP-Basis im Wandel: Wie kann man hybride SAP-Landschaften automatisiert managen
    SAP-Basis im Wandel: Wie kann man hybride SAP-Landschaften automatisiert managen Sandra Apflauer, Micro Focus, und Helge Sanden, IT-Onlinemagazin Jan 30 2018 9:00 am UTC 45 mins
    IT-Onlinemagazin Expert-Talk

    SAP-Basis im Wandel: Wie kann man hybride SAP-Landschaften automatisiert managen?
    30.01.2018 um 10:00 Uhr - Micro Focus & IT-Onlinemagazin

    IT-Abteilungen und SAP-Basisadministratoren sind aktuell nicht zu beneiden: Sie stehen im Spannungsfeld hohen Kostendrucks, steigender Heterogenität der IT-Landschaften, dem SAP-Generationswechsel und ganz neuer Anforderungen durch Innovationsthemen.

    Welche Antwortmöglichkeiten es für diese Herausforderungen gibt, werden wir in diesem Expert-Talk diskutieren. Wir werden beleuchten, wie man Routineaufgaben in der SAP Basis automatisieren, wie man Self-Services für die Anwender einrichten und wie man die zukünftigen, hybriden Multi-Cloud SAP-Landschaften sinnvoll Ende-zu-Ende orchestrieren und über den gesamten Lebenszyklus hinweg managen kann.

    Unser Anliegen ist es, Ihnen Ideen für Veränderungen im SAP Basis Betrieb aufzuzeigen, die Ihnen gleichzeitig Raum für Innovationen schaffen können. Wenn Sie im Vorfeld Fragen haben, senden Sie diese bitte gerne an: redaktion@it-onlinemagazin.de.

    Ihre Gesprächspartner:
    Sandra Apflauer, Pre-Sales Team Lead Innovation Strategies, Micro Focus
    Helge Sanden, Chefredakteur, IT-Onlinemagazin
  • Key Considerations for Choosing a Fiber Termination Method
    Key Considerations for Choosing a Fiber Termination Method Betsy Conroy & Brian Duval, Siemon Company Jan 30 2018 4:00 pm UTC 90 mins
    There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.

    This webinar is approved for one BICSI CEC.
  • Easy To Build: All Programmable Carrier Grade VNF Platform
    Easy To Build: All Programmable Carrier Grade VNF Platform David Levi, CEO at Ethernity Networks & Ken Dennen, Sr. Director of Business Development for the U.S Jan 30 2018 5:00 pm UTC 60 mins
    For communication server providers (CSPs), Carrier Ethernet (CE) underpins the vast majority of modern services delivered to enterprise and residential customers. As CSPs seek to expand their service offerings from their networking infrastructure base, they need to leverage their CE access networks to seamlessly connect users to Multi-Access Edge Computing (MEC) applications. The strength of CE service orchestration and service level agreements (SLAs) provides a dynamic, trusted foundation for new revenue generating services. Ethernity Networks’ ACE-NIC 40G Server Adapter integrates field-proven CE services and programmable NFVI acceleration, all optimized to work with Intel servers and DPDK.
  • Why Native Security Features in AWS and Office365 aren't Enough
    Why Native Security Features in AWS and Office365 aren't Enough Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager Jan 30 2018 5:00 pm UTC 60 mins
    Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.

    When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.

    In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:

    - The top cybersecurity risks and best practices for securing cloud deployments
    - How AWN security monitoring compliments the native security features in AWS and Office365
    - The role of AWN cloud security in integrating observations from cloud and on-premise systems

    To see how AWN CyberSOC™ can secure your cloud, register now.

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.

    Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
  • Best Practices for Data Privacy Day 2018
    Best Practices for Data Privacy Day 2018 Zoltán Précsényi, Director GDPR Strategy, EMEA Legal, Symantec Jan 30 2018 6:00 pm UTC 60 mins
    Creating a culture of privacy at work starts with teaching your organization what privacy means. Customers and stakeholders want to understand what personal data is being collected about them, how it will be used and whom it will be shared.

    Symantec is proud to support Data Privacy Day, please join Symantec’s Zoltán Précsényi for a webcast on 1/30 to learn how to:

    •Articulate what privacy means to your organization and share best practices to achieve and maintain security internally and with third parties.

    •Define security measures to protect individuals’ personal information from unauthorized access and use.

    •Explore the fundamentals of what personal data means under GDPR

    •Communicate your data use practices to your customers’ and explain how you manage their personal information.

    Register Today
  • Tech AMA: Circuit Breaker Patterns in Microservices Applications
    Tech AMA: Circuit Breaker Patterns in Microservices Applications Chris Stetson, Charles Pretzer, Floyd Smith Jan 30 2018 7:00 pm UTC 60 mins
    This webinar is a chance to learn how the circuit breaker pattern is used in microservices applications. Fundamentally, the circuit breaker pattern in a microservice application is all about managing traffic to the different instances of your services. We utilize active health checks to monitor these instances, to help avoid catastrophic failure.

    Join this webinar to learn:
    - How the circuit breaker pattern works
    - Why the circuit breaker pattern has become popular, especially for microservices apps
    - How the circuit breaker pattern is implemented in Microservices Reference Architecture
    - Why NGINX is particularly well-suited for supporting microservices apps

    Chris Stetson, Chief Architect & Sr. Director, Microservices Engineering
    Charles Pretzer, Technical Architect
    Floyd Smith, Director, Content Marketing
  • Sizing up the Enterprise Container Market
    Sizing up the Enterprise Container Market Jay Lyman, Principal Analyst, Development, DevOps & IT Ops Jan 30 2018 7:00 pm UTC 60 mins
    In this 451 Research webinar, we will discuss our market sizing research on container software revenue and growth, as well as enterprise drivers, challenges and the vendor landscape centered on Docker, Kubernetes and other container software.
  • How Modern Enterprises Are Tackling the Migration from On-Premises to Cloud
    How Modern Enterprises Are Tackling the Migration from On-Premises to Cloud Dan Taylor, Senior Program Manager, Microsoft Jan 31 2018 4:00 pm UTC 60 mins
    The modern Cloud delivers faster time to market, lower IT costs, and greater overall value to the enterprise by allowing companies to focus more on the core business problems rather than the infrastructure used to solve them. But the path to the cloud can be challenging for anyone with an established presence on-premises, or in a private data center.

    Dan Taylor from Microsoft’s Cloud & Enterprise division shares with you how large enterprises are tackling this problem and gaining immediate value by leveraging the cloud. You’ll hear how enterprises are managing their migration to the cloud by embracing hybrid patterns, containerizing and migrating applications, using single-pane-of-glass monitoring solutions, and leveraging Azure to tackle data privacy.
  • SD-WAN Meets a New Wireless Infrastructure
    SD-WAN Meets a New Wireless Infrastructure Todd Krautkremer, CMO, Cradlepoint Jan 31 2018 4:30 pm UTC 60 mins
    Cradlepoint announced a new solution pricing model, the next step in its Elastic Edge strategy for software-driven and cloud-delivered wireless Wide Area Networks (WANs).

    The new model is based around a series of NetCloud Solution Packages, which simplify the way customers buy, deploy, manage, and evolve their Cradlepoint network, facilitating rapid deployment, time-to-value, and customer success. Each solution package is tailored to specific market needs and combines NetCloud software and services, fit-for-purpose endpoint hardware, and comprehensive 24x7 support.

    The first NetCloud Solution Package to be launched is aimed at branch networks and provides 4G LTE-optimized SD-WAN functionality with extended wireless LAN coverage.

    With NetCloud Solution Packages, Cradlepoint becomes a first-mover in transitioning enterprise WANs from a hardware-first approach, which is inflexible and resource-intensive, to a software-first, cloud-delivered solution, reflecting the shift that is underway within IT infrastructure overall. Now customers can buy a complete Cradlepoint network solution and gain the benefits of simplicity, cost-effectiveness, and a shared interest in customer success.

    “IT infrastructure is evolving from the buy-it-and-build-it approach, to consume-as-a-service”, said George Mulhern, Cradlepoint CEO. “Cradlepoint NetCloud Solution Packages acknowledge this trend and represent the next step in our Elastic Edge strategy for bringing the simplicity, elasticity, and economic advantages of software and cloud services to wireless wide-area networking — creating customer value across the entire lifecycle.”

    Join us for a live webinar to learn more about these solutions. This webinar will focus on the new NetCloud Solution Packages, including the new AER2200 and AP22 Access Points. Learn to implement next-gen branch solutions and the benefits of Cradlepoint.
  • Sysdig Container Intelligence Platform Overview
    Sysdig Container Intelligence Platform Overview Knox Anderson, Product Marketing Manager, Sysdig Jan 31 2018 6:00 pm UTC 60 mins
    Containers and microservices are designed to prove a reliable and low-cost way for teams to build and ship distributed applications. However, they also add extra layers of abstraction and orchestration to your environment that hinder your ability to do performance monitoring and security enforcement. Sysdig can help you overcome this challenge by providing full visibility including the ability to monitor and enforce policies at any level of the application stack.

    Register for the webinar to learn:

    - How to instrument your AWS environment with Sysdig
    - Best practices for leveraging orchestration and container metadata to optimize and secure your containers
    - How troubleshooting and forensics has changed in containerized environments
    - Best practices for alerting and securing ephemeral infrastructure
  • FC vs. iSCSI
    FC vs. iSCSI Fred Knight, NetApp, John Kim, SNIA ESF Chair, Mellanox, Alex McDonald, SNIA ESF Vice Chair, NetApp Jan 31 2018 7:00 pm UTC 75 mins
    In the enterprise, block storage typically handles the most critical applications such as database, ERP, product development, and tier-1 virtualization. The dominant connectivity option for this has long been Fibre Channel SAN (FC-SAN), but recently many customers and block storage vendors have turned to iSCSI instead. FC-SAN is known for its reliability, lossless nature, 2x FC speed bumps, and carefully tested interoperability between vendors. iSCSI is known for running on ubiquitous Ethernet networks, 10x Ethernet speed bumps, and supporting commodity networking hardware from many vendors.

    Because, FCoE also delivers increasing performance as Ethernet speeds increase – and, Fibre Channel also delivers increasing performance as FC speeds increase. Historically, FC delivered speed bumps at a more rapid interval (2x bumps), while Ethernet delivered their speed bumps at a slower pace (10x bumps), but that has changed recently with Ethernet adding 2.5G, 5G, 25G, 40G, and 50G to the traditional 1G, 10G, 100G timeline.

    As the storage world moves to more flash and other non-volatile memory, more cloud, and more virtualization (or more containers), it’s time to revisit one of the great IT debates: Should you deploy Fibre Channel or iSCSI? Attend this SNIA Ethernet Storage Forum webcast to learn:
    •Will Fibre Channel or iSCSI deliver faster performance? Does it depend on the workload?
    •How is the wire speed race going between FC and iSCSI? Does anyone actually run iSCSI on 100GbE? When will 128Gb Fibre Channel arrive?
    •Can any server or storage array actually support more than 32Gb/s or 40Gb/s speeds?
    •Do Linux, Windows, or hypervisors have a preference?
    •Is one really easier [to install/manage] than the other, or are they just different?
    •How does the new NVMe over Fabrics protocol affect this debate?

    Join SNIA experts as they compare FC vs. iSCSI and argue in an energetic yet friendly way about their differences and merits of each.
  • Simplifying Network Functions Virtualization Infrastructure
    Simplifying Network Functions Virtualization Infrastructure Willie Nelson, Product Line Manager, Spreadcore products, Product Collaboration & Systems Division, Intel Corporation Feb 1 2018 4:00 pm UTC 60 mins
    With the global network functions virtualization (NFV) market projected to grow at a compound annual growth rate (CAGR) of 42%, reaching $15.5 billion by 2020, a massive market opportunity exists. To make it easier to design and deploy Network Functions Virtualization Infrastructure (NFVI) optimized systems, Intel has developed the new NFVI Server Block. Optimized to deliver exceptional performance for NFVI workloads, these pre-integrated, fully validated server systems reduce the complexity involved in designing and testing for the unique needs of NFVI.

    This webinar will cover the key features and benefits of the NFVI Server Block as well as several other NFVI enablement options from Intel. You’ll walk away with actionable guidance on how Intel can help you harness this growing market opportunity.
  • Protect Your Business Against Today’s Advanced Mobile Security Threats
    Protect Your Business Against Today’s Advanced Mobile Security Threats Brian Duckering, Sr. Mobile Security Specialist, Symantec Feb 1 2018 6:00 pm UTC 60 mins
    Mobile devices have become ubiquitous in business, permeating every aspect of user productivity and customer experience, yet many of these are also personal devices left unprotected against advanced malware and OS vulnerabilities.

    Considering the vast amounts of sensitive data that are stored on and communicated through these devices, how do we maintain the essential controls, security and privacy that are essential in the cloud generation?

    In this webcast, you will:

    - Learn about the various and advanced methods hackers use to attack and compromise mobile devices.

    - Understand the importance of being able to Predict, Detect, and Protect against all types of mobile threats.

    - Learn specific strategies and technologies that will support the need for visibility and full protection of your mobile infrastructure.

    Register Today
  • Don't Get Stung! Examining the OWASP Top 10 & Getting the Most from Advanced WAF
    Don't Get Stung! Examining the OWASP Top 10 & Getting the Most from Advanced WAF Nathan McKay, Solutions Marketing Manager, F5; Brandon Dunlap (Moderator) Feb 1 2018 6:00 pm UTC 75 mins
    Web application security is complex, difficult, and costly. These issues are well known, but remain prevalent out in the real world. Most development teams do not have the time or resources to sufficiently protect against the myriad of attacks that are relevant to each vector, while the level of expertise required to address these issues are difficult to come by even if your project has the time and budget for it. The good news is that advanced WAF technology is more accessible and affordable than ever before. With the right tools, comprehensive WAF coverage can not only reduce your exposures and give you better control over your applications but also help optimize your resources and reduce overall operating costs. Join F5 and (ISC)2 for Part 1 of a 3 part Security Briefings Series on February 1, 2018 at 1PM Eastern where we’ll discuss the OWASP Top 10, defenses for everything it addresses and how to use WAF to optimize and filter unwanted traffic to cut costs in the cloud.
  • Multi-Factor Authentication (MFA) and Beyond: Rethinking All the Auth
    Multi-Factor Authentication (MFA) and Beyond: Rethinking All the Auth Wendy Nather, Principal Security Strategist, Duo Security Feb 1 2018 8:00 pm UTC 60 mins
    We've known for a long time that the idea of a fixed perimeter and trusted internal network doesn't work too well, especially since a successful attacker looks exactly like an insider. The concepts variously known as de-perimeterization, zero-trust, software-defined perimeter and BeyondCorp all try to address this, and they represent a fundamental change in how you architect security for your enterprise.

    In this presentation, we will talk about what you can do to make your old perimeter less lonely, and most importantly, how to explain this new way of thinking to the rest of the business.
  • Deliver Better Software Faster with Continuous Testing
    Deliver Better Software Faster with Continuous Testing Steve Feloney, VP Product Management CA Technologies Feb 5 2018 4:00 pm UTC 45 mins
    To compete successfully in today’s economy, companies from all industries require the ability to deliver software faster, with higher quality, and reduced risk and costs. This is only possible with a modern software factory that can deliver quality software continuously. Yet for most enterprises, testing has not kept pace with modern development methodologies. A new approach to software testing is required: Continuous Testing.

    In the first session in a series, join product management leadership to gain in-depth insights on how by shifting testing left, and automating all aspects of test case generation and execution, continuous testing, it enables you to deliver quality software faster than ever.