As part of our research work focused on identifying automated network traffic that we can relate with malicious behavior and botnet communications, we often come across with traffic not necessarily related to malicious intent, but that represents a high risk for the companies allowing it to occur on their networks.
Often associated with abandoned ware, policy control failures, or miss configurations, these traffic patterns end up exposing company information and assets to multiple risk levels.
On this webinar, we are going to explore this byproduct of our botnet research, how widespread this problem is, how we can use this to relay risk information to companies, and the several degrees of exposure and impact that this type of traffic can represent.
Jens Monrad, Global Threat Intelligence Liaison, FireEye
The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?
"The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."
Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:
•How to ensure you are responding to the alert that matters
•Benefits of Alerts with threat Intelligence
•Using threat intelligence to think like your attacker
•How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage
•How security teams can prioritize and optimize their response efforts.
Evolving tactics, techniques and procedures (TTPs) of online criminal actors have left a number of notable victim organizations in their wake and raised the bar for the security teams and law enforcement agencies that have sworn to protect them. From the migration of online criminal markets to an even deeper underground, to online extortion making a big comeback in novel ways, to increasingly effective malware crafted to steal more money and private information, if you are a potential target for online criminals, you are up against a greater cyber criminal threat than in years past.
Ayaz Hussain Abro, Information Security & GRC Consultant
The main areas covered in this webinar will be the latest smartphone threats and malicious back doors. How Hackers are gaining access into user's mobile phone and reach into financial information just by deceiving user just with one application.
We all make transactions through smartphone apps, and these need to be safe and alert. The audience will learn about how to defeat hackers by using smartphone smartly.
Ina Yulo (BrightTALK), John Erik Setsaas (Signicat), John Egan (Anthemis Group), Jason Peto (360global net)
When it comes to analysing and managing insurance claims, the market still runs in a very old school manner — human intervention, lots of paperwork and phone calls. This unfortunately also poses a real threat when it comes to fraudulent claims and applications. With digital advances and the rise of InsurTech, these risks can be minimised and fraudulent applications detected way before they can do any harm.
Join this panel where we’ll discuss:
-How predictive analytics can help spot fraudulent applications before they can do proper damage
-How new technologies can help investigate and monitor specific claims
-The need for more transparency throughout the claiming process and the importance of identity validation
-Improving the customer journey by empowering the individual to report and settle claims online or through mobile devices
JP Vergne (Scotiabank Lab, Ivey B-School), Alexander Hinchliffe (Palo Alto), Samee Zafar (Edgar Dunn) Mark Lavender (BT)
Bitcoin has been making remarkable breakthroughs in the currency world. Its ability to allow users to be fully in control of their transactions along with its no-borders transfer policy have made it attractive to both investors and consumers alike.
However, recent reports have revealed a darker side to Bitcoin. The cryptocurrency is being hoarded by financial institutions as ransom money to pay off potential cyber attackers. Has Bitcoin officially crossed the line and now become a black market currency? Has its untraceable nature inspired the new generation of cyber criminals to initiate unprecedented levels of targeted Ransomware attacks?
Join this panel of industry-leading speakers, who'll be discussing the following:
-Why has Bitcoin-related ransomware become more popular in recent years?
-How can you prevent a Ransomware outbreak in your organisation?
-Is it possible to catch and subsequently prosecute blockchain criminals?
-How can authorities and financial institutions adopt and adapt in the face of rising levels of Ransomware threats?
Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
For many businesses, security, compliance and data protection in the cloud have been a major challenge due to the shared responsibility model and automation of public cloud infrastructure. Trying to force fit traditional security tools into an agile infrastructure like AWS can be time consuming and clumsy, and ensuring consistent security controls requires new practices for security and auditing teams.
Register for this impactful webinar presented by Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic, as he walks through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.
Securing AWS Tried and Tested Continuous Security Strategy:
• Tradition is out: where traditional security does and doesn’t fit
• Where to start: what to do within the first 5 minutes of setting up your AWS account
• Visibility into your AWS infrastructure where to go to get security value
• Top AWS Security Best Practices
Tom Meredith (SmartToken Chain), Ali Raza (CCG Catalyst)
Every person on the planet has a mobile phone, but 2 Billion people are “Un-banked”.
Banks and telecoms are in a Gold Rush to bank the unbanked, but many obstacles remain. Money transfers are some of the most popular transactions made by both the banked and the unbanked. However, building trust in this new service is definitely a challenge.
Join this panel where discussion points will include:
-Who has the upper hand: Banks or Carriers?
-How can Fintech companies ensure trust and security when it comes to mobile money transfers?
-Global ISO Standards Authenticate ID and Asset Verification
-ISO Reduces Fraud and Speeds up Asset Transfers
-What are some of the security challenges new payment services are able to overcome?
-Are “Standards” emerging to reduce implementation and compliance costs?
-How do you create cross-border and Inter-bank/carrier transactions?
-How can banks and telecoms successfully bank the unbanked?
Kristian Sørensen, Mario Maawad (CaixaBank), Giles Sutherland (Carta), Douglas Kinloch (Inside Secure), Jose Caldera
With more and more people using their phones to conduct business and make transactions, concerns around security have also increased.
During the session, we will discuss:
Is hardware security a thing of the past?
Will tokenisation solve security issues or introduce new problems?
How do you secure your app?
How do you balance security with convenience?
Will biometrics make secure solutions easier to use?
The end user perspective - are consumers driven by security or by trust?
Future outlook - are we heading in the right direction security wise?
Maya Malevich - Director, Product Marketing Tufin and John Parmley- Area Vice President - US West, Tufin
For many financial services organizations, security and risk management is a necessary evil that slows down IT's ability to keep up with business needs. The conflict between security and agility becomes even greater with adoption of hybrid cloud platforms. While agility should be maintained, security and compliance become even more challenging.
By automating and orchestrating network security policies across physical and hybrid cloud platforms, it is possible to maximize both agility and security simultaneously.
Join us for this session to understand how network security change automation with inherent policy controls can help you stop the balancing act between agility and security and maximize both for your business.
Conventional security solutions have been failing in preventing advanced threats. Join to learn how web isolation is revolutionizing cyber-security by indisputably eliminating critical attack vectors including browsers, emails and documents
Brandon Cook and Srini Gurrapu of Skyhigh Networks
Office 365 usage has tripled in the last 9 months as more and more companies enable anytime, anywhere access to Microsoft’s suite of cloud services. But security and compliance require a new level of granularity when users access cloud-based systems of record from a variety of networks, locations, and devices.
In today’s cloud-first, mobile-first world, IT Security teams are creating variable trust models based on user, device, activity, and data sensitivity. In this session, we’ll share the proven 4-layer trust model for security and compliance in O365.
Changed business practices, such as employees working on the move and the adoption of the cloud and cloud resources, should be mirrored by a change in security strategies. Organizations are commonly reluctant to adopt cloud technologies over concerns with security and control over enterprise data. However at the same time, many of these same organizations opened up access to applications for employees on the move, users on personal devices, external contractors, and other third parties that created a significantly larger attack surface than cloud services would have. To combat these threats, a number of cloud-friendly segmentation and application isolation techniques can be deployed to allow organizations to safely use the cloud whilst reducing their attack surface. Specifically, application segmentation via software-defined security represents a technique to accommodate borderless applications, adoption of the cloud, and modern user behaviours.
Paul German, VP in EMEA, will discuss how the challenges presented by the next generation of information security can be overcome with practical examples and best practice tips.
Abhinav Sharma and Dave Roche, Product Managers for Symantec Secure App Service
With the explosion of connected objects and mobile devices, publishing or sharing software - even internally - has become a real challenge for companies with a coding activity. In this webinar, we will explore the code signing threat landscape and share our best practice and solutions to all your code signing needs. You will learn about:
- the value of code signing today and the new code signing use cases in the world of IoT
- the risks associated with traditional code signing: key management, auditing and reporting, multitude of signing platforms and files, compliance, embedding in the development process, etc.
- the security and development costs to take into account
- how to transition from a traditional to a next generation code signing activity thanks to Cloud based signing
Josh Golfarb, CTO of Emerging Technologies, FireEye
CISOs and senior IT executives have to make tough choices, deciding among competing budget requests for programs, staff, technology and services. They have to make critical choices about which strategic investments to make toward reducing risk. In order to make these choices, they have to prioritise threats relevant to their specific enterprise, which requires sifting through a continuous deluge of reports, analysis and hyperbole from media, analysts and vendors.
Join this live webinar where Josh Golfarb, CTO of Emerging Technologies, presents an overview of the threat landscape, and introduces a practical foundation for building an intelligence-led security program aimed toward reducing risk to the enterprise.
Sian John (Chief Strategist) & Zoltán Précsényi (Senior Manager Government Affairs) - Symantec
When a breach occurs the most damaged areas for the business are reputation, revenue and repeat business. Protecting these means having strong controls in place to prevent the breach, and clear communications if (when) it happens. The EU-GDPR requires a breach to be notified within 72 hours of discovery, strong protection process allows the business to control what/who needs to be notified, and limit potential damage.
Join this webcast to find out the latest on the General Data Protection Regulation.
Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere.
In this webinar, we'll discuss how IT can limit risk of data leakage amid changing user habits. Learn how organizations across all industries are enabling secure mobility and productivity with a zero-touch, agentless solution.
Today’s changing and sophisticated threat landscape and increasing use of the cloud and mobile devices have rewritten the rules of data security. However, many companies continue to rely on breach prevention as the foundation of their security strategies. If one thing has been learned in recent years it is that data breaches are inevitable, and that is why IT organizations must shift a from mindset that is entirely focused on Breach Prevention to Breach Acceptance and finally to a Secure the Breach approach to data security. This presentation will review why IT professionals need to adopt a new data security mindset if they are to effectively protect sensitive information and users accessing it using a three step process of securing user access, encrypting sensitive data, and secure management of encryption keys.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.
The industry was surprised when Dell announced its intent to acquire EMC for $67 billion, the largest tech deal ever. Merging two large stagnate companies with very different cultures and high-level of overlap in products can pose significant challenges.
Join this webinar to learn about:
- The acquisition implications and how it’ll affect your long-term storage investment
- The uncertainty on Dell and EMC’s roadmap and which products will continue to be invested in
-Alternate storage solutions that enable you to transform data into insights and value for your organization
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
With all the technology and process improvements over the past 20 years, and with almost every IT organization wanting to increase ITSM maturity, you would think that maturity levels would have increased; but that is not the case. This webcast will discuss how to increase ITSM maturity in eight different areas including user experience, process automation, and incident, problem, change, configuration, request and knowledge management, and more.
With the relentless speed of innovation in data center technologies, how do you decide on your next step? Virtualization is being applied to every aspect of the data center, and it’s critical to first understand what makes sense for your business and why.
Join us for an open panel of NSX top influencers as they engage in a no-slide webcast conversation. They’ll kick off the session with a discussion on network virtualization and how it completes the virtualization infrastructure; how they see the evolution of the data center progressing; and the role of fluid architectures.
Don’t miss this opportunity to learn from industry experts as they share their valuable insights with the IT community.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization on powerful industry standard infrastructure featuring Intel® Xeon® processors and Intel® Ethernet 10GB/40GB Converged Network Adapters.
SD-WAN can dramatically reduce cost and increases the ability to rapidly bring new services online, connecting users to all types of applications, and speeding up time to market. But the idea of re-architecting the WAN can be daunting and the decision to adopt an SD-WAN solution can be a difficult one.
Join renowned network expert Ethan Banks, Co-Founder of Packet Pushers, and Rolf Muralt, VP Products Management SD-WAN at Silver Peak, in a webinar that discusses the SD-WAN market, lessons learned, and what features to be on the lookout for as you make your decision. They will discuss issues around technology selection and deployment, including:
· How a zero-touch, hybrid or SD-WAN can leverage multiple connectivity forms
· Ways to prioritize and route traffic across different connections
· Quality of Service (QoS), and how to maintain 100% uptime
· Best practices for transitioning with minimal impact on budget and resources
· Real customer examples that demonstrate different deployment stage and benefits
Traditional performance testing typically requires that all components of the application are “completed,” integrated and deployed into an appropriate environment. This results in testing not being done until late in the delivery cycle or sometimes skipped entirely. Which can then lead to a less then optimal user experience, expensive rework and potential loss of business.
Many organizations are adopting service virtualization to overcome the key challenges associated with performance testing. During this session see why and specifically how service virtualization:
•Enables you to do testing early in the dev cycle by simulating unavailable production systems and missing components
•Helps you control the inputs (like response times and 3rd party system responses) so you can do more negative and exploratory testing
•Provisions performance test environments “in a box” for on-demand testing
•Works with CA APM so that you can monitor an app during a load and performance test and see how the app reacts
Applications - the lifeblood of modern business - can be in a sorry state of affairs given today's forced alignment with server, OS, and storage boundaries. This can not only cause deployment delays and complexity, but it also results in underutilized hardware and inflated operational costs. There is a drive to embrace new technologies and methodologies in the enterprise, but this presents significant challenges. Limited application-awareness at the infrastructure level makes it nearly impossible to deliver on the promised SLAs and the tight coupling of applications and underlying operating software (OS or hypervisors) compromises application portability as well as developer productivity.
A growing number of enterprises are turning to application containers to support more efficient and effective development and deployment in an application-centric IT paradigm. By abstracting applications from the underlying infrastructure, containers can simplify application deployment, and enable seamless portability across machines and clouds. Containers can also enable significant cost savings by consolidating multiple applications per machine without compromising performance or predictability. Join us to learn more about container adoption in the enterprise and how a container-based server and storage virtualization environment can help take your software-defined datacenter transformation to the next level of an application-defined datacenter.
Join us for this informative webinar to learn how to upgrade your Tera1 PCoIP zero clients to new LG devices, receive 5 free zero clients with money back and feel good about recycling not only your zero clients but laptops, desktops, printers and hard drives.
• Earlier this year, LG Electronics USA, was recognized by the EPA on their dedication to increasing consumer awareness about the importance of third-party certified recycling through nationwide education and outreach efforts.
• According to the EPA, the positive environmental impact of LG’s responsible recycling is equal to taking 12,300 passenger cars off the road for a year or saving enough energy to power more than 8,000 U.S. homes for a year.
Guest speaker David Bernstein with Anything IT will explain the process to receive rebates on Tera1 zero clients and dispose of them in accordance with industry’s highest e-waste standards
Anything IT and LG will explain a simple, fast and easy approach to upgrade:
• Assess the value of your current obsolete devices (any brand and any quantity)
• Claim your rebate
• Get 5 free zero clients
• Logistics and Process to upgrade and replace
Most organizations making an investment in NetApp Filers count on the system to store user data and host virtual machine datastores from an environment like VMware. In addition these organizations want their NetApp systems to do more and be the repository for the next wave of unstructured data; data generated by machines. NetApp systems are busting at the seams, so these organizations are trying to decide what to do next.
To help you find out what to do next, join Storage Switzerland and Caringo for our live webinar and learn:
1. What are the modern unstructured data use cases
2. The challenges NetApp faces in addressing its customers’ issues
3. Other solutions; can all-flash or object storage solve these challenges
4. Making the move - how to migrate from NetApp to other systems
5. How to re-purpose, instead of replacing your NetApp