Hi [[ session.user.profile.firstName ]]
Sort by:
    • Best Practices for Outsourcing Your IT Security
      Best Practices for Outsourcing Your IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Jun 19 2018 6:00 pm UTC 62 mins
    • With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

      By attending, you’ll:

      - Understand best practices for working most effectively with third party providers
      - Discover what security functions can be handled by third parties and what should be kept in-house
      - Recognize how to avoid common pitfalls of working with third parties
      - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

      Save your seat now to learn more!

      Read more >
    • Next Generation Phishing Protection
      Next Generation Phishing Protection Peter Mullens, Product Marketing, Barracuda Networks Recorded: Jul 19 2018 8:45 am UTC 49 mins
    • Did you know email is still the biggest threat vector for phishing, with 74% of threats entered as an email attachment or link? Does your email protection do enough to help prevent your users from being phished?

      On this webinar you’ll learn how a multi-layered next generation email protection solution not only addresses the latest email threats but helps you stay ahead of the curve.

      What we’ll discuss:

      How advanced threats are evolving to use sophisticated techniques such as spear phishing and social engineering.

      The different layers needed in a next generation email protection solution.

      How you can get started today.

      Read more >
    • The Evolution of Mobile Threat Actors
      The Evolution of Mobile Threat Actors Michael Flossman, Head of Threat Intelligence, Lookout Recorded: Jul 19 2018 3:00 pm UTC 37 mins
    • Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.

      Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."

      Read more >
    • Solving Security Talent Shortage: Managed Detection & Response for Financial
      Solving Security Talent Shortage: Managed Detection & Response for Financial Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Upcoming: Aug 14 2018 7:00 pm UTC 60 mins
    • Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

      Attend this webinar and learn about:

      • Top cyberthreats facing financial institutions
      • Financial services compliance evolution, security monitoring and incident response
      • Differences between SIEM, SOC, and SOC-as-a-service
      • Monitoring on premises and cloud resources without adding headcount

      To gain insights on these challenges and how to solve them, save your seat now!

      Read more >
    • Economic Impact of Deploying Palo Alto Networks Security Operating Platform
      Economic Impact of Deploying Palo Alto Networks Security Operating Platform Scott Simkin, director of threat intelligence from Palo Alto Networks and Henry Huang, principal consultant from Forrester Upcoming: Aug 2 2018 4:00 pm UTC 60 mins
    • Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.

      Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.

      The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:

      •Realize security operation efficiencies of $4.75M
      •Avoid alternative security purchases of $3.5M
      •Generate an ROI of 65%


      Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.

      ***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks

      Read more >
    • [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority
      [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority FireEye EMEA Recorded: Apr 24 2018 2:00 pm UTC 63 mins
    • Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.

      Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.

      Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.

      ----------------------------
      "Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."

      - KEVIN MANDIA, CHIEF EXECUTIVE OFFICER, FIREEYE

      "Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
      - PWC Global State of Info Security Survey, 2015

      Read more >
    • Finding Out Your Cybersecurity Posture Doesn’t Take a Genius
      Finding Out Your Cybersecurity Posture Doesn’t Take a Genius Mukul Kumar, CISO & VP of Cyber Practice Recorded: May 23 2018 5:00 pm UTC 48 mins
    • 3.5 million unfilled security jobs in the coming years coupled with increasingly sophisticated attacks doesn’t paint a pretty picture. As Cisco’s SVP security said at RSA this year, ‘we are completely screwed.’ But we don’t have to be, and you don’t have to be a genius either!

      Join us, as we share results of recent surveys from ESG, Cybersecurity Insiders, and Cavirin that look at key concerns when migrating to the hybrid cloud, things like DevSecOps, container monitoring, and continuous compliance.

      We will then provide you a sneak peek into Cavirin’s CyberPosture Intelligence and its simplicity which provides you with a real-time view across your hybrid cloud, both account security posture as well as workload continuous compliance. One button assessments and immediate comparisons to your desired ‘golden posture’ help you maintain control without hiring more security experts.

      Read more >
    • Best Practices for Threat Hunting
      Best Practices for Threat Hunting Jonny Milliken, Threat Intelligence Manager, Alert Logic Recorded: Jul 18 2018 2:00 pm UTC 39 mins
    • Cyber threats are increasing in both sophistication and frequency, often overwhelming Security Operation Center (SOC) staff. As a result, more organizations are moving away from traditional reactive security while incorporating threat hunting techniques in their cybersecurity strategy.

      Go threat hunting with Jonny Milliken, Threat Research Manager at Alert Logic and join this webinar – here you’ll learn why more organizations are adding threat hunting capabilities, and why it should be a top priority for you as well.


      Highlights include:
      - Should we fight automation with automation?
      - How to construct your security operations to build to scale and react quickly to new threats
      - Known and unknown threats
      - Threat detection vs. threat hunting

      Read more >
    • Lessons Learned from the Cyber Security Front Line
      Lessons Learned from the Cyber Security Front Line Dan Pitman, Senior Solutions Architect, Alert Logic Recorded: Jul 18 2018 12:00 pm UTC 16 mins
    • Cybersecurity is currently dominating the headlines – data breaches happen on a regular basis. Cybersecurity is a space that is undergoing significant transformation in trying to gain the upper hand on hackers, and is under a constant bombardment of scrutiny.

      Join this eye-opening webinar with Dan Pitman, Alert Logic’s Senior Solutions Architect, as he discusses the perils of the cyber security industry.

      During this webinar you will gain insight on:
      - What tactics are cyber criminals using to identify a vulnerable target
      - Attack methodologies and how vulnerable web apps can be leveraged by attackers to gain privileged access
      - How to effectively utilize your security tactics to better protect your web apps
      - Remediation strategies to help defend against cyber attacks

      Read more >
    • Gaining Board alignment on cyber-security
      Gaining Board alignment on cyber-security BRC, CGI and DCMS speakers Recorded: Jun 14 2018 1:00 pm UTC 56 mins
    • We know the Board has a key role to play in supporting better cyber-security but with so many pressing and competing issues, how can we raise cyber security up the Board’s agenda?
      Richard Holmes, VP Secure Systems Engineering, and Gianni Rino, Global Industry Lead for Retail and Consumer Services at CGI UK, will share their insights, expertise and learning on cyber-security and Board engagement:
      •What is the role of the Board in supporting better cyber-security?
      •How to cost and communicate cyber risks to Board members
      •CGI’s eight boardroom recommendations
      •Q&As

      Read more >
    • Decoding the Matrix: Deception-Borne Threat Intelligence
      Decoding the Matrix: Deception-Borne Threat Intelligence John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies Recorded: Jul 18 2018 8:00 pm UTC 44 mins
    • Deception-based solutions can provide a wealth of information about how adversaries behave as they attempt to complete their mission. Depending on the level of engagement organizations desire to setup in their deception solution, information gleaned can include basic network connection information or every keystroke, command and action taken when a system is accessed. Understanding where in the attack life-cycle your deception information is coming from is critical to knowing how to utilize that information to strengthen your SOC / IR Operational Workflows. This webinar will discuss the types of information that can be gathered by Deception Solutions based on different levels of engagement and how that information can be used in the most effective manner with your Threat Intelligence and Security Analytics platforms.

      About the Speaker:

      John Bradshaw, Sr. Director, Solutions Engineering at Acalvio Technologies, has more than 25 years of experience in the Cyber Security industry focusing on advanced, targeted threats. He held senior leadership roles at Mandiant, ArcSight, Internet Security Systems, Lastline, and UUNET.

      Read more >