Hi [[ session.user.profile.firstName ]]
Sort by:
    • AppSec in Financial Services through the BSIMM Lens
      AppSec in Financial Services through the BSIMM Lens Nabil Hannan, Managing Principal, Synopsys Software Integrity Group (SIG) Recorded: Aug 14 2018 8:00 pm UTC 39 mins
    • Do you ever wonder whether your software security program is the correct one for your organization? You spend time and money on processes, technology, and people. But how do you know whether the security efforts you’ve put in place even make sense? The Building Security In Maturity Model, or BSIMM, is a metrics-driven study of existing security initiatives at other organizations. BSIMM results help you assess the current state of your software security initiative and determine which areas need improvement.

      During the webinar, we’ll use a BSIMM broken down by the financial services industry to see what other companies are doing. We’ll also:

      · Use real data to help drive your software security initiative
      · Learn how organizations use the BSIMM to measure the maturity of their software security initiatives
      · Look at the aggregate data of the FSI vertical in the BSIMM
      · Discuss some of the most common activities that we observe with FSI companies and the drivers of those activities

      Read more >
    • Building a Cybersecurity Architecture to Combat Today’s Risks
      Building a Cybersecurity Architecture to Combat Today’s Risks Erik Bartholomy (LogRhythm) and Eric Parent (Sonepar) Recorded: Sep 18 2018 5:00 pm UTC 48 mins
    • Building a Cybersecurity Architecture to Combat Today’s Risks:
      Foundations, Visions, Testing and the Role of SIEM

      The rapid development and adoption of cloud infrastructure, mobile workforces, IoT and other susceptible environments has mandated a reappraisal of security architecture. Modern organizations are recognizing their security posture may not be keeping up with the threat landscape, and this leads to frightening discoveries around the safety of their data and networks.

      In this webinar, Erik Bartholomy – a Security Architect at LogRhythm – will be joined by Eric Parent – CISO at Sonepar – to discuss how security architecture is developing to face the current threat landscape. Failures in past layered approaches are frequent, and serve as valuable learning lessons on the importance of proactive monitoring and response.

      During the webinar our speakers will discuss:

      •How LogRhythm’s POC enabled Sonepar’s team to efficiently expedite threat detection, and improve their SOC and analyst efficiency

      •The guiding principles and technology behind modern security frameworks and architecture, including the rise in popularity and value of the Zero Trust Framework

      •How security architecture helps align IT security with business strategy and current threats

      •Adapting architecture to accommodate different environments, including on-premises, cloud, and hybrid cloud

      Read more >
    • Forrester Total Economic Impact Study on Security Operating Platform
      Forrester Total Economic Impact Study on Security Operating Platform Scott Simkin, director of threat intelligence from Palo Alto Networks and Henry Huang, principal consultant from Forrester Recorded: Aug 2 2018 4:00 pm UTC 57 mins
    • Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.

      Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.

      The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:

      •Realize security operation efficiencies of $4.75M
      •Avoid alternative security purchases of $3.5M
      •Generate an ROI of 65%

      Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.

      ***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks

      Read more >
    • Cutting through the Cloud Security Noise: 5 Must-have Architectural Requirements
      Cutting through the Cloud Security Noise: 5 Must-have Architectural Requirements Steve House of Zscaler Recorded: Jan 11 2018 5:00 pm UTC 47 mins
    • The cloud and mobility have fundamentally changed the IT landscape. Both apps and users have left the network, however traditional security has struggled to keep pace. Developing a strong cloud security strategy is important to help restore visibility and reduce risk, but what is the best approach? While there are many opinions and perspectives, the best security strategy starts in the beginning with the proper architecture. Join this webcast to hear:

      - 5 key architectural requirements your cloud security strategy can’t live without.
      - What core building blocks you need to enable and secure your users and apps
      - Learn how leading enterprises are transforming their security to cloud

      Speaker Bio:
      Steve House is a seasoned Product Management leader with over 20 years of experience in the networking and security industries. During that time, he has worked for multiple market-leading organizations including Zscaler, Blue Coat Systems, Packeteer and CacheFlow where he has a consistent track record of helping them innovate and grow their market share.

      At Zscaler, Steve leads the Product Management team responsible for driving product strategy and execution. Steve’s goal is to help the company through its next phase of growth becoming the standard Internet security platform delivered as a service to any user on any device in any location. Steve holds a Bachelor of Science in Electrical Engineering from Duke University.

      For more questions about Zscaler, go to www.zscaler.com

      Read more >
    • A Day in The Life of a Breach
      A Day in The Life of a Breach Matthias Maier, Technical Evangelist, Splunk Recorded: Sep 18 2018 1:00 pm UTC 47 mins
    • You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?

      Join this session with Splunk to walk through a typical ‘day in the life of a breach’. From detection to investigation and response, experience the true impact that a breach can have on a business, and the best practices being carried out by organizations today. We will cover:

      - What today’s breach response should look like
      - What tools and processes should be put in place upfront
      - What departments and entities need to be involved beyond IT
      - Examples of activities that are happening within organizations to prepare for a breach today
      - What the consequences of the breach could be

      Read more >
    • Reducing the Risk of Phishing Attacks
      Reducing the Risk of Phishing Attacks Derek Brink, Aberdeen Recorded: Sep 18 2018 4:50 pm UTC 43 mins
    • Within the first 24 hours of a phishing attack, attackers hook virtually 100% of their victims. And these attacks are only growing more sophisticated and dangerous. To truly protect your business, you have to get in front of phishing attacks and stop them in as little time as possible.

      In this invaluable webinar, Aberdeen’s Derek Brink reveals what the risks from phishing attacks to your business truly are, and the strategies the Best-in-Class use to reduce those risks as much as possible.

      What You Will Learn
      - What happens in the first 60 minutes of a phishing attack
      - Why relying on browser-based protection is not enough
      - Why an investment in advanced email and web security pays off
      - How the Best-in-Class invest in technology that operates faster than both users and attackers

      Read more >
    • Cloud–delivered Security: Why It’s Your Best Bet
      Cloud–delivered Security: Why It’s Your Best Bet Greg Mayfield of Tenable Recorded: Sep 20 2018 4:00 pm UTC 48 mins
    • On-prem vs Cloud-based security? It’s an ongoing debate that SecOps teams face daily.

      With cloud adoption continuing to be a top business initiative, SecOps teams must adapt or risk falling behind. As most on-prem security tools don’t work in the cloud and suffer limitations, SecOps teams are faced with a myriad of new technologies and tools to implement to protect their critical assets. This can be overwhelming as numerous options abound.

      As the attack surface evolves and expands in the cloud, understanding the current state of assets and assessing their risk is an essential first step. Achieving continuous visibility and protection is then the following challenge. This webinar will discuss the opportunities and benefits that SecOps teams face by utilizing cloud-delivered security solutions vs. traditional on-prem solutions.

      Read more >
    • Taking back control of cloud security with CASB
      Taking back control of cloud security with CASB Scott Reeves, Senior Systems Engineer Cloud Security Upcoming: Oct 4 2018 9:00 am UTC 75 mins
    • Cloud apps can significantly improve an organisation’s productivity. But many of them can be set up without IT involvement, thanks to pay-as-you-go subscriptions and no on-premises infrastructure.

      The result? IT teams no longer complete visibility of all the systems being used across their organisation. This so-called Shadow IT can significantly increase an organisation’s security risks.

      In this webinar, Symantec Cloud Security expert Scott Reeves talks about how to secure cloud apps and master Shadow IT. Register now to:
      •Understand the threats posed by cloud apps and shadow IT
      •Get to know the cloud security landscape
      •Discover how to govern cloud apps and enforce security

      Plus, you’ll learn how a Cloud Access Security Broker (CASB) gives you the visibility and control to beat the cloud chaos – even with limited resources.

      Read more >