Hi [[ session.user.profile.firstName ]]
Sort by:
    • How to Build your People-Centric Cybersecurity Strategy
      How to Build your People-Centric Cybersecurity Strategy Ryan Kalember, SVP Cybersecurity Strategies at Proofpoint Recorded: Sep 12 2018 6:00 pm UTC 60 mins
    • Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.

      But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO.

      The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that:

      • Reveals who is targeted and how
      • Combats attacks before they reach your users, and
      • Mitigates damage from the attacks that inevitably will

      About the presenter:

      With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

      Read more >
    • To Outsource, or Not To Outsource: Best Practices for IT Security
      To Outsource, or Not To Outsource: Best Practices for IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Sep 13 2018 6:00 pm UTC 63 mins
    • With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

      By attending, you’ll:

      - Understand best practices for working most effectively with third party providers
      - Discover what security functions can be handled by third parties and what should be kept in-house
      - Recognize how to avoid common pitfalls of working with third parties
      - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

      Save your seat now to learn more!

      Read more >
    • AppSec in Financial Services through the BSIMM Lens
      AppSec in Financial Services through the BSIMM Lens Nabil Hannan, Managing Principal, Synopsys Software Integrity Group (SIG) Recorded: Aug 14 2018 8:00 pm UTC 39 mins
    • Do you ever wonder whether your software security program is the correct one for your organization? You spend time and money on processes, technology, and people. But how do you know whether the security efforts you’ve put in place even make sense? The Building Security In Maturity Model, or BSIMM, is a metrics-driven study of existing security initiatives at other organizations. BSIMM results help you assess the current state of your software security initiative and determine which areas need improvement.

      During the webinar, we’ll use a BSIMM broken down by the financial services industry to see what other companies are doing. We’ll also:

      · Use real data to help drive your software security initiative
      · Learn how organizations use the BSIMM to measure the maturity of their software security initiatives
      · Look at the aggregate data of the FSI vertical in the BSIMM
      · Discuss some of the most common activities that we observe with FSI companies and the drivers of those activities

      Read more >
    • Building a Cybersecurity Architecture to Combat Today’s Risks
      Building a Cybersecurity Architecture to Combat Today’s Risks Erik Bartholomy (LogRhythm) and Eric Parent (Sonepar) Live: Sep 18 2018 5:00 pm UTC 75 mins
    • Building a Cybersecurity Architecture to Combat Today’s Risks:
      Foundations, Visions, Testing and the Role of SIEM

      The rapid development and adoption of cloud infrastructure, mobile workforces, IoT and other susceptible environments has mandated a reappraisal of security architecture. Modern organizations are recognizing their security posture may not be keeping up with the threat landscape, and this leads to frightening discoveries around the safety of their data and networks.

      In this webinar, Erik Bartholomy – a Security Architect at LogRhythm – will be joined by Eric Parent – CISO at Sonepar – to discuss how security architecture is developing to face the current threat landscape. Failures in past layered approaches are frequent, and serve as valuable learning lessons on the importance of proactive monitoring and response.

      During the webinar our speakers will discuss:

      •How LogRhythm’s POC enabled Sonepar’s team to efficiently expedite threat detection, and improve their SOC and analyst efficiency

      •The guiding principles and technology behind modern security frameworks and architecture, including the rise in popularity and value of the Zero Trust Framework

      •How security architecture helps align IT security with business strategy and current threats

      •Adapting architecture to accommodate different environments, including on-premises, cloud, and hybrid cloud

      Read more >
    • Forrester Total Economic Impact Study on Security Operating Platform
      Forrester Total Economic Impact Study on Security Operating Platform Scott Simkin, director of threat intelligence from Palo Alto Networks and Henry Huang, principal consultant from Forrester Recorded: Aug 2 2018 4:00 pm UTC 57 mins
    • Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.

      Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.

      The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:

      •Realize security operation efficiencies of $4.75M
      •Avoid alternative security purchases of $3.5M
      •Generate an ROI of 65%


      Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.

      ***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks

      Read more >
    • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
      Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Dinah Davis, VP Research & Development - Arctic Wolf Networks Upcoming: Sep 20 2018 7:00 pm UTC 45 mins
    • Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

      However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

      In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

      - What happens when a ransomware is exploded in a computer, with a demo
      - How do you detect and respond to a ransomware attack?
      - What is coming next in the world of ransomware?

      To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.

      Read more >
    • Next Generation Phishing Protection
      Next Generation Phishing Protection Peter Mullens, Product Marketing, Barracuda Networks Recorded: Jul 19 2018 8:45 am UTC 49 mins
    • Did you know email is still the biggest threat vector for phishing, with 74% of threats entered as an email attachment or link? Does your email protection do enough to help prevent your users from being phished?

      On this webinar you’ll learn how a multi-layered next generation email protection solution not only addresses the latest email threats but helps you stay ahead of the curve.

      What we’ll discuss:

      How advanced threats are evolving to use sophisticated techniques such as spear phishing and social engineering.

      The different layers needed in a next generation email protection solution.

      How you can get started today.

      Read more >
    • Understanding the Attack Landscape – Your Best Cyber Security Defense
      Understanding the Attack Landscape – Your Best Cyber Security Defense Matt Downing and Carlos Castillo, Threat Intelligence Researchers, Alert Logic Upcoming: Sep 27 2018 3:00 pm UTC 45 mins
    • With smart attackers seeking the weakest spots in network defenses and retooling to understand the changing attack surface – you need to get, and stay, ahead of the game.

      As we reflect on the state of security this past year, it’s evident that cybercriminals continue to be successful with a trusted set of techniques proven effective against common vulnerabilities and misconfigurations. Attackers looking to make a buck prey on businesses of all sizes.

      Fortunately, by understanding what the attack landscape looks like, where the next attacks will be coming from, and what your attackers might be after, you can achieve top-strength security. Join this session to hear how attackers are infiltrating enterprise environments and how you can learn from them. We’ll dive into real case studies and provide actual code samples.

      We’ll discuss recent breaches and share:

      • An overview of the timeline announcement to public proof-of-concept release
      • Alert Logic’s immediate coverage with generalized web coverage on our threat manager appliances
      • The number of attacks over time
      • Categorizing attacker payloads to define their initial compromise goals and intentions
      • A look at understanding victim targeting
      • Common outcomes in incidents where the attacks were successful

      What you’ll take away:

      • An understanding of the critical timing to patch vulnerable systems
      • How Alert Logic’s SOC with Active Intelligence can carry the load for detection and response
      • Ways to detect common attacker goals and intentions

      Join us for these key take-aways and more, as we share critical insights for understanding today’s attack landscape.

      Read more >
    • Solving the Financial Services Security Talent Shortage with Managed Detection
      Solving the Financial Services Security Talent Shortage with Managed Detection Todd Thiemann, Director Product Marketing - Arctic Wolf Networks Recorded: Aug 14 2018 7:00 pm UTC 39 mins
    • Financial institutions face a daunting combination of cybersecurity threats and compliance requirements. IT teams at regional banks and credit unions have a relatively small staff but facing similar security and compliance burden to what larger, well-resourced financial institutions carry. How can small and mid-sized financial institutions counter sophisticated cyberthreats, provide monitoring and incident response needed for compliance, and do so with tight budgets that do not allow for staffing an elaborate security operations center? Managed detection and response provides a “force multiplier” to address all three issues.

      Attend this webinar and learn about:

      • Top cyberthreats facing financial institutions
      • Financial services compliance evolution, security monitoring and incident response
      • Differences between SIEM, SOC, and SOC-as-a-service
      • Monitoring on premises and cloud resources without adding headcount

      To gain insights on these challenges and how to solve them, save your seat now!

      Read more >
    • The Evolution of Mobile Threat Actors
      The Evolution of Mobile Threat Actors Michael Flossman, Head of Threat Intelligence, Lookout Recorded: Jul 19 2018 3:00 pm UTC 37 mins
    • Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.

      Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."

      Read more >
    • [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority
      [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority FireEye EMEA Recorded: Apr 24 2018 2:00 pm UTC 63 mins
    • Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.

      Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.

      Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.

      ----------------------------
      "Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."

      - KEVIN MANDIA, CHIEF EXECUTIVE OFFICER, FIREEYE

      "Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
      - PWC Global State of Info Security Survey, 2015

      Read more >