As part of our research work focused on identifying automated network traffic that we can relate with malicious behavior and botnet communications, we often come across with traffic not necessarily related to malicious intent, but that represents a high risk for the companies allowing it to occur on their networks.
Often associated with abandoned ware, policy control failures, or miss configurations, these traffic patterns end up exposing company information and assets to multiple risk levels.
On this webinar, we are going to explore this byproduct of our botnet research, how widespread this problem is, how we can use this to relay risk information to companies, and the several degrees of exposure and impact that this type of traffic can represent.
Jens Monrad, Global Threat Intelligence Liaison, FireEye
The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?
"The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."
Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:
•How to ensure you are responding to the alert that matters
•Benefits of Alerts with threat Intelligence
•Using threat intelligence to think like your attacker
•How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage
•How security teams can prioritize and optimize their response efforts.
Evolving tactics, techniques and procedures (TTPs) of online criminal actors have left a number of notable victim organizations in their wake and raised the bar for the security teams and law enforcement agencies that have sworn to protect them. From the migration of online criminal markets to an even deeper underground, to online extortion making a big comeback in novel ways, to increasingly effective malware crafted to steal more money and private information, if you are a potential target for online criminals, you are up against a greater cyber criminal threat than in years past.
Ayaz Hussain Abro, Information Security & GRC Consultant
The main areas covered in this webinar will be the latest smartphone threats and malicious back doors. How Hackers are gaining access into user's mobile phone and reach into financial information just by deceiving user just with one application.
We all make transactions through smartphone apps, and these need to be safe and alert. The audience will learn about how to defeat hackers by using smartphone smartly.
Ina Yulo (BrightTALK), John Erik Setsaas (Signicat), John Egan (Anthemis Group), Jason Peto (360global net)
When it comes to analysing and managing insurance claims, the market still runs in a very old school manner — human intervention, lots of paperwork and phone calls. This unfortunately also poses a real threat when it comes to fraudulent claims and applications. With digital advances and the rise of InsurTech, these risks can be minimised and fraudulent applications detected way before they can do any harm.
Join this panel where we’ll discuss:
-How predictive analytics can help spot fraudulent applications before they can do proper damage
-How new technologies can help investigate and monitor specific claims
-The need for more transparency throughout the claiming process and the importance of identity validation
-Improving the customer journey by empowering the individual to report and settle claims online or through mobile devices
JP Vergne (Scotiabank Lab, Ivey B-School), Alexander Hinchliffe (Palo Alto), Samee Zafar (Edgar Dunn) Mark Lavender (BT)
Bitcoin has been making remarkable breakthroughs in the currency world. Its ability to allow users to be fully in control of their transactions along with its no-borders transfer policy have made it attractive to both investors and consumers alike.
However, recent reports have revealed a darker side to Bitcoin. The cryptocurrency is being hoarded by financial institutions as ransom money to pay off potential cyber attackers. Has Bitcoin officially crossed the line and now become a black market currency? Has its untraceable nature inspired the new generation of cyber criminals to initiate unprecedented levels of targeted Ransomware attacks?
Join this panel of industry-leading speakers, who'll be discussing the following:
-Why has Bitcoin-related ransomware become more popular in recent years?
-How can you prevent a Ransomware outbreak in your organisation?
-Is it possible to catch and subsequently prosecute blockchain criminals?
-How can authorities and financial institutions adopt and adapt in the face of rising levels of Ransomware threats?
Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
For many businesses, security, compliance and data protection in the cloud have been a major challenge due to the shared responsibility model and automation of public cloud infrastructure. Trying to force fit traditional security tools into an agile infrastructure like AWS can be time consuming and clumsy, and ensuring consistent security controls requires new practices for security and auditing teams.
Register for this impactful webinar presented by Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic, as he walks through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.
Securing AWS Tried and Tested Continuous Security Strategy:
• Tradition is out: where traditional security does and doesn’t fit
• Where to start: what to do within the first 5 minutes of setting up your AWS account
• Visibility into your AWS infrastructure where to go to get security value
• Top AWS Security Best Practices
Tom Meredith (SmartToken Chain), Ali Raza (CCG Catalyst)
Every person on the planet has a mobile phone, but 2 Billion people are “Un-banked”.
Banks and telecoms are in a Gold Rush to bank the unbanked, but many obstacles remain. Money transfers are some of the most popular transactions made by both the banked and the unbanked. However, building trust in this new service is definitely a challenge.
Join this panel where discussion points will include:
-Who has the upper hand: Banks or Carriers?
-How can Fintech companies ensure trust and security when it comes to mobile money transfers?
-Global ISO Standards Authenticate ID and Asset Verification
-ISO Reduces Fraud and Speeds up Asset Transfers
-What are some of the security challenges new payment services are able to overcome?
-Are “Standards” emerging to reduce implementation and compliance costs?
-How do you create cross-border and Inter-bank/carrier transactions?
-How can banks and telecoms successfully bank the unbanked?
Kristian Sørensen, Mario Maawad (CaixaBank), Giles Sutherland (Carta), Douglas Kinloch (Inside Secure), Jose Caldera
With more and more people using their phones to conduct business and make transactions, concerns around security have also increased.
During the session, we will discuss:
Is hardware security a thing of the past?
Will tokenisation solve security issues or introduce new problems?
How do you secure your app?
How do you balance security with convenience?
Will biometrics make secure solutions easier to use?
The end user perspective - are consumers driven by security or by trust?
Future outlook - are we heading in the right direction security wise?
Maya Malevich - Director, Product Marketing Tufin and John Parmley- Area Vice President - US West, Tufin
For many financial services organizations, security and risk management is a necessary evil that slows down IT's ability to keep up with business needs. The conflict between security and agility becomes even greater with adoption of hybrid cloud platforms. While agility should be maintained, security and compliance become even more challenging.
By automating and orchestrating network security policies across physical and hybrid cloud platforms, it is possible to maximize both agility and security simultaneously.
Join us for this session to understand how network security change automation with inherent policy controls can help you stop the balancing act between agility and security and maximize both for your business.
Conventional security solutions have been failing in preventing advanced threats. Join to learn how web isolation is revolutionizing cyber-security by indisputably eliminating critical attack vectors including browsers, emails and documents
Brandon Cook and Srini Gurrapu of Skyhigh Networks
Office 365 usage has tripled in the last 9 months as more and more companies enable anytime, anywhere access to Microsoft’s suite of cloud services. But security and compliance require a new level of granularity when users access cloud-based systems of record from a variety of networks, locations, and devices.
In today’s cloud-first, mobile-first world, IT Security teams are creating variable trust models based on user, device, activity, and data sensitivity. In this session, we’ll share the proven 4-layer trust model for security and compliance in O365.
Changed business practices, such as employees working on the move and the adoption of the cloud and cloud resources, should be mirrored by a change in security strategies. Organizations are commonly reluctant to adopt cloud technologies over concerns with security and control over enterprise data. However at the same time, many of these same organizations opened up access to applications for employees on the move, users on personal devices, external contractors, and other third parties that created a significantly larger attack surface than cloud services would have. To combat these threats, a number of cloud-friendly segmentation and application isolation techniques can be deployed to allow organizations to safely use the cloud whilst reducing their attack surface. Specifically, application segmentation via software-defined security represents a technique to accommodate borderless applications, adoption of the cloud, and modern user behaviours.
Paul German, VP in EMEA, will discuss how the challenges presented by the next generation of information security can be overcome with practical examples and best practice tips.
Abhinav Sharma and Dave Roche, Product Managers for Symantec Secure App Service
With the explosion of connected objects and mobile devices, publishing or sharing software - even internally - has become a real challenge for companies with a coding activity. In this webinar, we will explore the code signing threat landscape and share our best practice and solutions to all your code signing needs. You will learn about:
- the value of code signing today and the new code signing use cases in the world of IoT
- the risks associated with traditional code signing: key management, auditing and reporting, multitude of signing platforms and files, compliance, embedding in the development process, etc.
- the security and development costs to take into account
- how to transition from a traditional to a next generation code signing activity thanks to Cloud based signing
Josh Golfarb, CTO of Emerging Technologies, FireEye
CISOs and senior IT executives have to make tough choices, deciding among competing budget requests for programs, staff, technology and services. They have to make critical choices about which strategic investments to make toward reducing risk. In order to make these choices, they have to prioritise threats relevant to their specific enterprise, which requires sifting through a continuous deluge of reports, analysis and hyperbole from media, analysts and vendors.
Join this live webinar where Josh Golfarb, CTO of Emerging Technologies, presents an overview of the threat landscape, and introduces a practical foundation for building an intelligence-led security program aimed toward reducing risk to the enterprise.
Sian John (Chief Strategist) & Zoltán Précsényi (Senior Manager Government Affairs) - Symantec
When a breach occurs the most damaged areas for the business are reputation, revenue and repeat business. Protecting these means having strong controls in place to prevent the breach, and clear communications if (when) it happens. The EU-GDPR requires a breach to be notified within 72 hours of discovery, strong protection process allows the business to control what/who needs to be notified, and limit potential damage.
Join this webcast to find out the latest on the General Data Protection Regulation.
Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere.
In this webinar, we'll discuss how IT can limit risk of data leakage amid changing user habits. Learn how organizations across all industries are enabling secure mobility and productivity with a zero-touch, agentless solution.
Today’s changing and sophisticated threat landscape and increasing use of the cloud and mobile devices have rewritten the rules of data security. However, many companies continue to rely on breach prevention as the foundation of their security strategies. If one thing has been learned in recent years it is that data breaches are inevitable, and that is why IT organizations must shift a from mindset that is entirely focused on Breach Prevention to Breach Acceptance and finally to a Secure the Breach approach to data security. This presentation will review why IT professionals need to adopt a new data security mindset if they are to effectively protect sensitive information and users accessing it using a three step process of securing user access, encrypting sensitive data, and secure management of encryption keys.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.
Die zunehmende Digitalisierung, der Einsatz moderner bildgebender Analyseverfahren sowie die
gesetzlichen Verpflichtungen zur Speicherung von Gesundheitsdaten lassen den Speicherbedarf
im Gesundheitswesen explodieren und stellen eine große Herausforderung an die effiziente Abläufe und Datenabfragen dar.
•Softwarebasierte Speicherlösungen – wie SUSE Enterprise Storage – bieten eine sichere und kostengünstige Alternative, ohne Kompromisse bei Funktionalitäten und Sicherheit.
•Die Einführung von SAP Anwendungen ermöglicht schnellen Zugriff und intelligente Abfragen in Echtzeit. SUSE Enterprise Linux für SAP Applications ist die führende Plattform für SAP und SAP HANA Anwendungen.
In diesem Webinar geben unsere Experten einen Überblick zu diesen Themen speziell im Gesundheitssektor und stehen für Ihre Fragen zur Verfügung. In weiteren Webinaren werden die Themen vertieft.
A few years ago, kik might have seemed like just another messaging app. Today it boasts 275 million users and its very own Bot Shop a platform for companies like Sephora and Weather.com to display their bot prowess. More and more smart companies are sitting up and paying attention, as Yahoo, Facebook, and others get into the messaging bot game.
Today most bots center around the conversational interface offered by Facebook Messenger and the likes of kik, but who knows what tomorrow might mean?
Join our VB Live event as our panel of experts talks about what smart companies know about bots. From messaging to shopping, bots are increasingly part of the business landscape.
In this webinar, you’ll learn to:
* Understand the importance of bots to brands
* Know bot landscape and what it means for your business
* Recognize the potential synergies and pitfalls between bots and brands
* Paul Gray, Director of Platform Services, Kik
* Jon Cifuentest, Analyst, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
Register for this free executive leadership live event today!
Join this webinar to see how the CloudPhysics Public Cloud Planning Rightsizer identifies opportunities to lower your costs of running applications on the public cloud.
The Public Cloud Planning Rightsizer automatically identifies on-premises virtual machines (VMs) that are over-provisioned with more resources (such as CPU and memory) than they use. This lets you optimize instance matching to the ideal cloud instances. Rightsizing reveals the verifiable cost of running workloads in the cloud. Now you can answer the question, “will we save money by migrating applications to the cloud?”
This webinar shows how Public Cloud Planning Rightsizer collects resource utilization data from each VM on a fine-grained basis, and then analyzes those data across time to discover the VM’s actual resource needs. Imagine an on-premises VM configured with 8 vCPUs: if the Rightsizer shows that it has never used more than 2 vCPUs, you can Rightsize that VM to a smaller instance in the cloud, saving substantial funds.
Many enterprise organizations are moving beyond antivirus software, adding new types of controls and monitoring tools to improve incident prevention, detection, and response on their endpoints. Unfortunately, some of these firms are doing so by adding tactical technologies that offering incremental benefits only.
So what’s needed?
A strategic approach that covers the entire ESG endpoint security continuum from threat prevention to incident response. A truly comprehensive solution will also include advanced endpoint security controls that reduce the attack surface and tight integration with network security, SIEM, and threat intelligence to improve threat detection and response processes.
Join ESG senior principal analyst Jon Oltsik, Intel Security, and Bufferzone on a webinar on July 21 at 10am PT/1pm ET to learn more about next-generation endpoint security requirements and strategies.
It may be summer, but IT never takes a vacation. As business projects slow, IT takes advantage of the downtime to shore up the infrastructure and overhaul systems. With all eyes on technology these days, everything from security breaches to system outages get outsized attention. It’s a lot to contend with.
While any old cloud can provide a bit of shade, the iland cloud can do more. Our purpose built – and consistently enhanced – iland cloud console provides a welcome reprieve from the pain of managing cloud workloads, ensuring their security – and even answer questions from the executive suite.
Join a webinar from our product experts, showing how the iland cloud console integrates:
- A full complement of proactive security technologies
- Tools to provision and manage VMs, vApps, network and more
- 12 months of performance and capacity data
- On-demand reporting for your executives and auditors
- A host of “bonus features” to make your life easier
Join this webinar to see how the iland cloud, with it’s innovative console, does more than outsource infrastructure. We’ll pour you a tall glass of virtual ice water, turn on the A/C, and make sure that your cloud operation is cool as a cucumber.
The ever changing Cloud Service Provider marketplace is filled with growing opportunities and increasing competition. Mike Slisinger, Cloud Solutions Architect at Nutanix, and Chris Feltham, Cloud Solution Sales Manager at Intel, will discuss how Nutanix and Intel collaborate on cloud technologies and solutions to help Cloud Service Providers solve infrastructure challenges and simplify operations. We will also discuss how current Nutanix and Intel powered Service Providers are building differentiated services that provide true business value to their customers.
Attending this webcast should provide Cloud Service Providers with a good understanding of how Intel and Nutanix can help reduce costs of offering cloud services while enabling and growing new revenue streams for business.
Discover the complexities of licensing database technologies such as Oracle, SQL Server and PostgreSQL on VMware, with particular emphasis on modern converged and hyper-converged platforms. It's vital to ensure your virtual machines stay compliant with your database vendor’s license requirements. Join us to learn about the business and financial risks involved if you don't have a solid plan in place for compliance, as well as explore strategies for controlling and/or reducing costs and limiting organizational risk.
The days of ensuring each designer has their workstation under their desk is becoming less the norm. Many organizations, particularly media and entertainment as well as architecture and engineering are considering leveraging the cloud to provide workstations to solve common IT problems resulting from big data sets, a dispersed and flexible workforce as well as increasing concern for data security.
Alex Herrera, a senior analyst with Jon Peddie Research, author, and consultant to the world’s leading computer graphics and semiconductor companies will provide guidance on how organizations can develop an IT strategy to deploy and support a secure cloud model, where pay-as-you-go is the norm.
This session will provide valuable insights including:
• Pros and cons of hosting workstations in the cloud
• How to effectively manage workflows
• Differences between private and public clouds
• Key considerations for cloud deployments
Teradici’s CTO will discuss how customers can effectively leverage Teradici PCoIP Workstation Access Software to securely deliver a seamless end user experience from the cloud.
Those who attend the webinar will receive a copy of the slide deck.
Q&A will follow at the end of the session.
The virtualization wave is beginning to stall as companies confront application performance problems that can no longer be addressed effectively.
DataCore’s Parallel I/O breakthrough not only solves the immediate performance problem facing multi-core virtualized environments, but it significantly increases the VM density possible per physical server. In effect, it achieves remarkable cost reductions through maximum utilization of CPUs, memory and storage while fulfilling the promise of virtualization.
Join us for this webinar where we will take an inside look into DataCore’s Parallel I/O technology and show you what it can do for businesses running Microsoft SQL Server to improve the performance of database-driven applications.