Hi [[ session.user.profile.firstName ]]
Sort by:
    • [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority
      [EXECUTIVE PANEL] How To Make the Cyber Risk Message a Board's Priority FireEye EMEA Live: Apr 24 2018 2:00 pm UTC 75 mins
    • Cyber threats are growing faster than any other category of business risk, breaches are inevitable, and the areas put at risk when they happen are broad and deep: from a compromised system or supply chain to the financial implications of non-compliance and breach notification. You not only face compromised or lost data, but your brand will take a huge hit that it may not recover from. Add to that the legal risks resulting from regulatory fines and failure to keep customer commitments, and it adds up to a game-changing argument.

      Business leaders need to understand the potential losses they face on multiple levels, acknowledge the changing risk and have a breach response plan in place, but most importantly they must escalate cyber risk at the highest organisational levels and bridge the gap between the fight on the frontlines and priorities in the boardroom.

      Join us for an executive panel with our EMEA VP & regional leaders as they discuss insights on how the CISOs take the risk message to the board and how they bridge the gap by translating technical jargon into business language.

      "Cyber security is a constant battle for every business, and one of the challenges is getting the Board of Directors to understand that enterprise-wide risk management is more than an IT problem. FireEye helps security teams and company executives bridge the gap between the fight on the frontlines and priorities in the boardroom."


      "Cybersecurity is now a persistent business risk. The impact has extended to the C-suite and boardroom.
      - PWC Global State of Info Security Survey, 2015

      Read more >
    • Security is NOT an Abstract Concept – Building Consensus in the Boardroom
      Security is NOT an Abstract Concept – Building Consensus in the Boardroom Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Apr 24 2018 9:00 am UTC 35 mins
    • Making the connection between “Cause and Effect” is difficult enough but when technology executives need to explain their strategy to a non-technical audience, all too often the key message is lost in technical jargon.

      When technology is embraced by business leaders, it’s because of the perceived business benefit the technology could bring to the organization. What is frequently not discussed, or even thought about at this level, are the security implications associated with technology. The challenge for the senior technology executives is to be able to associate technology with risk, and risk with business disruption, without resorting to a Fear, Uncertainty and Doubt strategy.

      This session will focus on how senior technology executives can better relate to a non-technical audience, using tangible and quantifiable examples, to both inform and persuade of the need of making security an essential component of any business plan.

      Read more >
    • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
      Analyst Insights: Trends Driving the Need for a SOC-as-a-Service Mark Bouchard, Co-Founder and COO - CyberEdge Group & Narayan Makaram, Sr. Director, Product Marketing - Arctic Wolf Networks Upcoming: May 22 2018 6:00 pm UTC 60 mins
    • Companies of all sizes, in every industry need advanced security capabilities in the form of a security operations center (SOC). However, until recently these resources were only accessible to large enterprises with sizable budgets. Learn how small to midsize enterprises (SMes) can get access to a SOC in the form of a SOC-as-a-service.

      Mark Bouchard, Co-founder and COO of CyberEdge Group, will share insights on the cybersecurity challenges SMEs face, drawing on data from the recently published 2018 Cyberthreat Defense Report.

      Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the SOC options available to SMEs and identify the top 10 capabilities to look for in a SOC-as-a-service.

      By attending this webinar you will learn about.
      •Cybersecurity challenges facing IT organization in small to midsize enterprises (SMEs)
      •Insights into what is driving the need for managed threat detection and response
      •The top 10 essential elements of a SOC-as-a-Service

      About our key speaker:

      Mark Bouchard, CISSP, is the Chief Operating Officer at CyberEdge Group, an award-winning research, marketing and publishing firm serving the needs of high-tech organizations worldwide. Before CyberEdge, Mark founded AimPoint Group, an independent IT research and consulting company specializing in information security. Prior to AimPoint Group, Mark was a Vice President at META Group (acquired by Gartner) where he helped hundreds of organizations worldwide address their IT challenges. A veteran of the U.S. Navy, Mark is passionate about ensuring the success of his clients.

      Read more >
    • Addressing The Cyber Skills Gap
      Addressing The Cyber Skills Gap Greg Reber, CEO, AsTech | Bret Fund, CEO, SecureSet | Dan Lohrmann, CSO, Security Mentor Recorded: Feb 7 2018 6:00 pm UTC 61 mins
    • A maturing information security field and more sophisticated cyber-attack capabilities demands skilled information security professionals who are increasingly scarce. Cybercriminals are increasing in numbers and deepening their skillsets. The ‘good guys’ are struggling to keep pace. Where will these resources and skillsets come from? Organizations need to build sustainable recruiting practices as well as develop and retain the talent they already have to boost the organization’s cyber resilience.

      Businesses must prepare to build information security capabilities across the organization and position the executive team to recognize and retain talent, both those who have come up through the ranks and newer employees who have worked in a digital environment and business roles. Moving forward, there will be a need to be more aggressive about getting the skill sets that the organization needs. While the industry continues to attract the right level of interest, as a whole, the industry must realize that there is a skills gap problem that needs to be resolved.

      - Greg Reber, CEO, AsTech
      - Bret Fund, CEO, SecureSet
      - Dan Lohrmann, CSO, Security Mentor

      Read more >
    • Application Security at the Speed of DevOps
      Application Security at the Speed of DevOps James Rabon - Product Manager, Fortify Software Security Center and Tools Recorded: Oct 24 2017 6:00 pm UTC 60 mins
    • Faster time-to-market and business value driven application functionality are the biggest drivers for DevOps. With DevOps, more frequent releases require shorter development and test cycles creating a higher risk of breaches exploiting the application layer. The last couple of years have shown business value can take a significant hit with security breaches. Building security features at the speed of DevOps, and reducing risk with the right security architecture, processes, and collaboration is key to staying in business. This is the genesis of DevSecOps.

      In this Webinar, Derek Brink from Aberdeen Research describes how the shift towards rapid application delivery methods creates new opportunities for improving application security and reducing risk. MicroFocus’ James Rabon (Product Manager, Fortify Software Security Center and Tools) and Paladion's Vinod Vasudevan (Co-founder and CTO) discuss how MicroFocus and Paladion are helping customers integrate security and compliance into DevOps processes.

      Key Takeaways from the Webinar:

      - Trends in application delivery: from waterfall, to Agile and DevOps
      - How characteristics of Agile, DevOps provide a high-level blueprint for what application security in that environment should look like
      - Capabilities you should be looking for to improve application security at the speed of DevOps
      - How to adopt non-disruptive and continuous application security processes
      - Bringing in around-the-clock security monitoring for cloud assets

      Read more >
    • Making Security Strategy Reality: Winning Strategy through Tactics
      Making Security Strategy Reality: Winning Strategy through Tactics Griff James, Director, Damrod Analysis Recorded: Jan 16 2018 9:00 am UTC 32 mins
    • In cyber security the strategic goals are often clear, while the methods to achieve those goals is anything but. This webinar introduces Damrod’s Cyber Strategic Framework that applies military analysis to cyber security challenges. Aimed at security teams trying to implement high level goals in the real world, this talk focuses on effects based planning that integrates disparate elements of IT and security into a cohesive package. Defending the network is about more than technology. Analysis and leadership are critical elements of an effective cyber defense. You will leave this webinar better equipped to develop the tactics that make strategy a reality.

      About the Presenter:
      Griff is trained as a Canadian Infantry Officer and is a holds a Master’s Degree from the LSE. Unable to find “real” work, he got into software development as a Scrum Master, leading the development of a web based application. This experience fostered an interest in cybersecurity, and Griff went on to a boutique start-up providing application security to Fortune 500 companies. Frustrated by the disconnect between technologies and poor analysis within cyber security, Griff founded cyber defense firm Damrod Analysis in 2017.

      Read more >
    • Cutting through the Cloud Security Noise: 5 Must-have Architectural Requirements
      Cutting through the Cloud Security Noise: 5 Must-have Architectural Requirements Steve House of Zscaler Recorded: Jan 11 2018 5:00 pm UTC 47 mins
    • The cloud and mobility have fundamentally changed the IT landscape. Both apps and users have left the network, however traditional security has struggled to keep pace. Developing a strong cloud security strategy is important to help restore visibility and reduce risk, but what is the best approach? While there are many opinions and perspectives, the best security strategy starts in the beginning with the proper architecture. Join this webcast to hear:

      - 5 key architectural requirements your cloud security strategy can’t live without.
      - What core building blocks you need to enable and secure your users and apps
      - Learn how leading enterprises are transforming their security to cloud

      Speaker Bio:
      Steve House is a seasoned Product Management leader with over 20 years of experience in the networking and security industries. During that time, he has worked for multiple market-leading organizations including Zscaler, Blue Coat Systems, Packeteer and CacheFlow where he has a consistent track record of helping them innovate and grow their market share.

      At Zscaler, Steve leads the Product Management team responsible for driving product strategy and execution. Steve’s goal is to help the company through its next phase of growth becoming the standard Internet security platform delivered as a service to any user on any device in any location. Steve holds a Bachelor of Science in Electrical Engineering from Duke University.

      For more questions about Zscaler, go to www.zscaler.com

      Read more >
    • How a Security Company Secures its Own Cloud
      How a Security Company Secures its Own Cloud Meerah Rajavel & Dr. Richard Ford Upcoming: May 23 2018 6:00 pm UTC 45 mins
    • Driving Office 365 adoption is an important goal—87% of IT professionals say it’s a top priority*—yet, few have fully migrated their users and apps, with security, regulatory and resource challenges often the cause. Security companies too, face these same fundamental challenges. As a recent Office 365 adopter, Forcepoint has first-hand experience securely migrating users to the cloud.

      Join Forcepoint’s CIO and Chief Scientist as they share learnings, surprises and insights from our own migration.

      Presented by;

      Meerah Rajavel, CIO, Forcepoint
      Dr. Richard Ford, Chief Scientist, Forcepoint

      Read more >
    • Why Native Security Features in AWS and Office365 aren't Enough
      Why Native Security Features in AWS and Office365 aren't Enough Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager at Arctic Wolf Networks Upcoming: May 8 2018 6:00 pm UTC 60 mins
    • Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.

      When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.

      In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:

      - The top cybersecurity risks and best practices for securing cloud deployments
      - How AWN security monitoring compliments the native security features in AWS and Office365
      - The role of AWN cloud security in integrating observations from cloud and on-premise systems

      To see how AWN CyberSOC™ can secure your cloud, register now.

      About our speakers:

      Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.

      Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.

      Read more >
    • Creating a Cybersecurity Culture
      Creating a Cybersecurity Culture Heather Stratford, CEO of Stronger.tech Upcoming: Apr 24 2018 9:00 pm UTC 60 mins
    • For the last 2 decades, technology security was delegated to the IT team. It was role specific and designated for one small subsection of the IT team. That mentality and way of thinking must change.

      A paradigm shift is required for the whole organization. Every part of the organization contributes to the success or failure of the organization. Creating a security culture is not a one-time event, it is a new way of talking and acting.

      Join this webinar with Heather Stratford, CEO of Stronger.tech to:
      - Understand the steps that need to happen to create this culture
      - See where your organization is on the scale of creating a Strong Security Culture
      - Learn why creating a security-minded culture is an essential part of the "new" requirements for a CIO.

      Read more >
    • Stop Phishing Attacks: What You Need To Know
      Stop Phishing Attacks: What You Need To Know Jordan Wright, Senior R&D Engineer - Duo Security Upcoming: May 1 2018 10:00 am UTC 60 mins
    • We’ve all seen the emails: someone shared a Google doc with us, our bank wants to verify our password, we’ve received an “important” attachment, you name it.

      Phishing is common. It’s common because it’s easy. Not only is phishing common, but it’s getting worse. There’s no “magic bullet” to eliminate phishing as a threat, so what can you do to mitigate your risk?

      Join Jordan Wright for a hands-on, method-focused deep dive into how you can reduce the threat posed by phishing. This will cover mitigation tactics at each stage of a phishing attempt, from before an email reaches the inbox to what you can do after a user clicks the phishing link.

      Read more >