For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.
This panel of security experts will discuss the internet of things and what's keeping them up at night when they think about security in 2015. After an in-depth discussion, there will be live Q&A from the audience.
This week's panelists include:
Darin Andersen, Chairman and Founder, CyberTECH
Ron Gula, CEO and Founder, Tenable Network Security
Grant Jordan, President, Somerset Recon
Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an organization recognize these threats more quickly as they emerge? How does the organization ensure that information about the latest threats is available to drive fast response at the points of vulnerability? In this program, Gartner Research Director Craig Lawson and Webroot Chief Technology Officer Hal Lonas discuss how integrating machine-readable threat intelligence into your security infrastructure can help your organization block active attacks, and even predict where future attacks are likely to come from.
Part 2 of 2: Join Dave Simpson, 451 Research Sr. Storage Analyst, and Sean Derrington, Exablox Sr. Director of Product Management in a follow-up session about:
1) Data protection trends and pain points
2) How virtualization changes the game
3) Array-based snapshots and replication for data protection
4) Backup targets shift
5) Cloud-based backup and recovery
6) Why object-based storage?
Did you miss Part 1: The Future of Enterprise Storage with Simon Robinson, VP of Storage at 451 Research? https://www.brighttalk.com/r/R5t
Your organization is constantly under cyber attack that could - if unchecked - damage your business, customers, employees and reputation. To date, the ad-hoc sharing of cyber-threat information across industries is not well defined nor well structured and in many instances, sharing threat information relevant to your organization is not allowed due to privacy, workload constraints, outdated policies or legal concerns.
Join Jon Oltsik, Sr. Principal Analyst with Enterprise Strategy Group, and Rich Reybok, CTO Vorstack Corporation, to understand the challenges that organizations face today with sharing threat intelligence and how to navigate them both internally and externally. Come to understand what’s changed in the last few years and the historical negative stigma of information sharing. This webinar can help answer the question “What does sharing threat intelligence really mean?” Following the overview and strategy, a brief discussion on the different approaches to sharing threat information and how secure sharing within your “trusted circle” can create a simple Cyber neighborhood-watch environment. This event is designed to help you overcome the hurdles that organizations have today – that of being able to receive the available collective knowledge, validate impending cyber-threats and access remediation solutions – all within the framework of stringent data access and privacy controls.
What you will learn:
-Issues organizations face when sharing threat information.
-What’s changed that has created this “need” to share threat intelligence.
-Definition of what sharing Threat Intelligence means in today’s world of cyber crime and attacks.
-The new approaches available for successful and secure collaboration.
-How to participate in a Cyber Neighborhood watch with trusted industry peers.
-The benefits organizations can recognize from collaboration.
Tech blogs are overflowing with examples of password hacks, data destruction, and data leakage. It’s time for a new approach. Imation’s recently-announced Secure Data Movement Architecture (SDMA) will safeguard your organization’s most valuable data against tampering, leakage, or loss - throughout its entire lifecycle including when it’s in the cloud or mobile devices, or anywhere in between. Join us as we give you a sneak peek into our new concept for painless data protection, and the rapidly evolving types of threats its meant to address.
Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
This webinar will demonstrate how Sequence Package Analysis (SPA), a new natural language method that utilizes a corpus of annotated training data comprised of a unique set of feature extractions, may detect early signs of terrorism and sedition. Using an SPA-designed BNF table consisting of sequentially-implicative (as opposed to syntactic) parsing structures, this natural language tool searches social media content and recordings of conversations of suspected terrorists to identify (and measure) collusion, collaboration, affinity with other terror or sedition suspects. Whereas conventional text mining methods are hindered by the speech system’s failure to identify keywords (most suspects intentionally refrain from the use of keywords that pinpoint location, names, dates and time), SPA is designed to work around these obstacles in which users refrain from referring to named entities that are likely to flag their communications as suspicious.
Wi-Fi security attacks, hacking, stolen mobile devices – are these keeping you awake at nights? Are you surprised that Wi-Fi networks can be more secure than your wired networks? Wireless LAN has come a long way from the days of its inception with inadequate security.
Contrary to common belief, security is not a single protocol or an appliance or an encryption. It is a system of different components working together to ensure your Wi-Fi network is secure and your confidential information is protected.
Join this webinar to learn about
- Advances in Wi-Fi security
- Multi-layers approach to holistic protection
- Controlling user and device access
- Controlling applications
-Xirrus security solutions
The maturity of Hadoop as a technology framework suitable for organizations, large and small, to economically store and process vast amounts of data is no longer a prediction, but rather a reality every IT leader understands. But that doesn’t mean Hadoop is done disrupting the data and analytics landscape.
Self-service analytics solutions capable of leveraging the massive processing and data discovery potential of distributed Hadoop clusters are ushering in a new era of data freedom for business users who are hungry to put data at the heart of their decision making process. With programming and query languages no longer a prerequisite skill for exploring Hadoop environments, organizations everywhere are waking up to the reality that even non-technical users can quickly and easily find insights in even the biggest of Hadoop data sets.
Attend this webinar to hear how IT groups are adjusting to this new breed of bold and curious data user and learn:
- How IT is shifting from data protector to data mentor
- Why business users are so data hungry and so un-afraid of Big Data
- What true self-service analytics can look like when paired with Hadoop