Hi [[ session.user.profile.firstName ]]
Sort by:
    • Under Attack: Managing Small Business Cybersecurity Risk in 2017
      Under Attack: Managing Small Business Cybersecurity Risk in 2017 Emory Simmons, President of CMIT Solutions of South Charlotte Recorded: Feb 23 2017 4:00 pm UTC 61 mins
    • Over the last few months, cyberattacks have dominated the news, creating uncertainty about how best to protect the value small business owners have worked to create. In this webinar, Emory Simmons, President of CMIT Solutions of South Charlotte, outlines today’s online threats and lays out a plan small businesses can use to manage risk.

      Invest an hour to attend, Under Attack: Managing Small Business Cybersecurity Risk in 2017, on February 23rd at 11:00 am EST for answers to the questions below:

      - What’s the likelihood my company will be targeted by a hacker?
      - If my data is in the cloud, they are responsible for data breaches, right?
      - Are ransomware attacks really that widespread?
      - Does business insurance cover breaches?
      - What can I do today to protect myself and my company?

      Read more >
    • Securing Critical Infrastructure with Advanced Cybersecurity Controls
      Securing Critical Infrastructure with Advanced Cybersecurity Controls Keao Caindec, VP of Marketing and Dean Weber, CTO, Mocana Recorded: Aug 1 2017 6:00 pm UTC 46 mins
    • The US Department of Homeland Security has defined 16 critical infrastructure sectors, including: chemical, communications, critical manufacturing, dams, defense, energy, financial, food and agriculture, healthcare, IT, nuclear, transportation and water and waste management.

      Securing the industrial control systems (ICS) and SCADA networks requires a different approach that goes beyond threat detection, perimeter-based security, firewalls and physical security protections.

      In this webinar, you’ll learn about how to architect and embed strong cybersecurity controls such as: secure boot, multi-factor authentication, secure software updates, secure communications between industrial devices (PLCs, sensors, IEDs, RTUs and controllers), gateways and industrial clouds. You’ll also learn about how to enable applications to call cryptographic functions that leverage hardware secure elements such as TPM, SGX, TrustZone as well as HSMs and SIMs.

      Read more >
    • Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility
      Sight for Sore Eyes: How Security & Risk Pros Can Restore Their Visibility Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Joseph Blackenship, Forrester Analyst Recorded: Dec 14 2016 6:00 pm UTC 62 mins
    • The threat landscape in 2016 shifted more quickly than it ever has. But one element stayed the same: the most harmful attacks targeted people, not infrastructure. Record volumes of ransomware and business email compromise (BEC) spoofing, for example, have joined old standbys like credential phishing. That’s why getting visibility into how cyber attacks are targeting your people has never been more critical.

      Join guest speaker, Forrester’s Joseph Blackenship, senior analyst serving security and risk professionals, and Ryan Kalember, SVP of cybersecurity strategy at Proofpoint, for an interactive discussion. They’ll explore how security and risk professionals can get greater visibility into modern threats.

      Topics include:
      - How to grapple with “malware-free” threats, like BEC spoofing
      - Staying ahead of digital risks, such as evolving social media and mobile app-based risks to data and user credentials
      - Managing a move to the cloud without losing visibility into attacks

      Read more >
    • To the Cloud: Ready or Not! …The Catalyst for Better Cybersecurity?
      To the Cloud: Ready or Not! …The Catalyst for Better Cybersecurity? Mark Weatherford, Chief Cybersecurity Strategist, vArmour Recorded: Jul 12 2016 5:00 pm UTC 34 mins
    • As the global cyber threat environment continues to evolve, organizations need to begin thinking differently about information security and the protection of their infrastructure. The evolution from perimeter-centric, hardware-based environments to virtualized data centers and the cloud is underway and many organizations are late to the game. As CIO’s and CISO’s are driven to transition their CapEx investments to OpEx spending, the economic efficiencies of the cloud provide a rational path to those goals. From a security perspective however, security models that don’t sufficiently address workload and application-aware segmentation, lateral traffic visibility, and network-based threat detection of on-premises data center and public cloud-based environments leave a huge gap in the overall security posture.

      This talk will provide CIO's and CISO's struggling with decisions about migration to the cloud with some thoughts about how the cloud can be the catalyst that improves security while also reducing costs and technology footprint.

      Read more >
    • Why cybersecurity is everyone’s responsibility in today’s FS organization
      Why cybersecurity is everyone’s responsibility in today’s FS organization Steve Holt, EY EMEIA Financial Services Cyber Security Leader Recorded: May 25 2017 3:00 pm UTC 56 mins
    • This webinar will discuss the global cybersecurity landscape, and the threats and opportunities cybersecurity is presenting for financial services organizations. Given the panel is being held exactly one year before the official General Data Protection Regulation (GDPR) implementation date, panelists will be reflecting specifically on the implications of this regulation for FS organizations.


      * Cheri McGuire, Group Chief Information Security Officer, Standard Chartered Bank
      * Simon Hales, Group Head of ISR, HSBC
      * Tony de Bos, EY EMEIA Financial Services, Data Protection and Privacy Leader

      Topics for discussion:

      * Talent and awareness - building a culture that makes cybersecurity part of everyone’s job and rethinking the role of the Chief Information Security Officer (CISO)
      * Strategy and innovation - putting cybersecurity at the heart of business strategy and ensuring that new digital innovation includes cybersecurity at the outset
      * Regulation - assessing the impact GDPR will have on your organization’s people, processes and technology ahead of the 2018 implementation date
      * Resilience and scalability - being prepared to recover rapidly from a cyber-breach while holding up your ecosystem to the same cybersecurity standards that you follow as an organization

      This publication contains information in summary form and is therefore intended for general guidance only. It is not intended to be a substitute for detailed research or the exercise of professional judgment. Member firms of the global EY organization cannot accept responsibility for loss to any person relying on this article.

      Read more >
    • Where Does CyberSecurity Preparedness Fall Short? Lessons from the DoJ
      Where Does CyberSecurity Preparedness Fall Short? Lessons from the DoJ John Carlin Recorded: May 9 2017 9:35 pm UTC 73 mins
    • From the hack of SONY Entertainment, to Russian interference in the 2016 election, John Carlin led investigations into these breaches and was responsible for protecting the nation against terrorism, espionage, and cyber and other national security threats.

      John's days of chasing cyber-terrorists for the DOJ as Assistant Attorney General for National Security might be over, but he’s joining us to share an insider’s perspective on cyber threats in the public and private sector.

      Where cybersecurity preparedness falls short (public and private sector)
      Practical takeaways to meet the cybersecurity needs of C-Suite executives
      How to manage the evolving threat landscape - and what you can do to stay secure

      Read more >
    • The State of Cybersecurity for CIOs and CSOs
      The State of Cybersecurity for CIOs and CSOs Rick Howard, CSO of Palo Alto Networks Recorded: May 15 2017 6:30 pm UTC 57 mins
    • Kick-Start a Radical Change in the Evolution of Cybersecurity. C-level Webinar for Government and Education Executives.

      Senior government and education officials are prime for the next evolution in cybersecurity. Although network defenders remain lockstep in outdated best practices, CIOs and CSOs are moving away from the coveted defense-in-depth strategies of the past and looking forward to more effective measures to implement the Cyber Kill Chain™ model.

      In this executive webinar, the CSO of Palo Alto Networks®, Rick Howard, will discuss how CIOs and CSOs can more effectively orchestrate their enterprise security posture. Rick will review the state of enterprise cyber defense and provide insight for executives on:

      • Why the defense-in-depth model failed.
      • Why its replacement, the Cyber Kill Chain, hasn’t realized its full potential.
      • How to shift focus to automatic enterprise security orchestration.
      • How to influence the board and radically change thinking from the top down.

      Join us to learn more about this new and necessary direction in the evolution of cybersecurity.

      Read more >
    • 2017 Cybersecurity Predictions Leadership Webinar
      2017 Cybersecurity Predictions Leadership Webinar Rick Howard, CSO, and Ryan Olson, Unit 42 Intelligence Director, Palo Alto Networks Recorded: Mar 30 2017 6:30 pm UTC 49 mins
    • Cybersecurity is in a state of constant change and evolution. Executive leaders have an opportunity to get ahead of cybercriminals by understanding existing and potential threats and how to mitigate against them.

      In this leadership webinar designed specifically for CSO’s and technical security executives, Palo Alto Networks CSO, Rick Howard, and Unit 42 Intelligence Director, Ryan Olson, will review the cybersecurity predictions and share best practices for achieving a more resilient posture in 2017. Join us to learn about “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity this year.

      Get the executive point of view on these top-of-mind CSO initiatives as we discuss:
      •Why automation and playbook models will take on key roles in threat intelligence sharing.
      •Why cybersecurity is extending beyond the IT department and what your can do about it.
      •Trends for ransomware and practical advice to protect your organization from attacks.

      Read more >
    • 2017 Cybersecurity Threat Insights for Leaders
      2017 Cybersecurity Threat Insights for Leaders Alex Tilley, Counter Threat e-crime lead and Daniel Eden, Senior Incident Responder, SecureWorks Recorded: Mar 8 2017 11:00 pm UTC 59 mins
    • Partnering to Fight Cybercrime

      In our “2017 Cybersecurity Threat Insights Report for Leaders ” report, we shared several key findings and observations from our client engagements and about the security industry. This webcast will cover our findings and observations but will also provide you with clear direction on where you need to focus your resources to evoke positive action in your security program.

      During this webcast our Counter Threat Unit™ e-crime lead, Alex Tilley, and Senior Incident Responder Daniel Eden, will give their perspective, observations and guidance through responses to a series of questions led by a moderator.

      You Will Learn About:

      - Our observations from our engagements and findings
      - How you need to rethink core security processes and operations
      - Whether the current nature and behaviors of the threat are evolving or staying constant
      - What the common attack vectors are and how to protect your organization against the fundamentals of cyber-attacks
      - How to focus your resources from a tactical and strategic perspective

      Read more >
    • Cybersecurity Threats for Education - A New Global Frontier
      Cybersecurity Threats for Education - A New Global Frontier Center for Digital Education, University of Wisconsin-Madison, Palo Alto Networks Recorded: Feb 23 2017 4:00 pm UTC 60 mins
    • On a daily basis, organizations are targeted by cybersecurity threats. While these threats occur throughout the world, half of ransomware detections occur in the U.S. Today, the internet of everything, mobile devices, underfunded/staffed IT organizations and a critical lack of trained cybersecurity professionals are combining to make things more difficult. As ransomware attacks become more prevalent and the effectiveness of phishing attempts become more sophisticated, all but the largest IT organizations are fortunate if they can keep pace.

      We know cyber attackers are becoming more refined and are searching for new ways to make a profit. Thanks to advances in attack distribution, anonymous payments, reliably encrypting and decrypting data, ransomware attacks are rising dramatically. Understanding the dangers of ransomware, and how to prevent them, has never has been more important.

      Bob Turner, Chief Information Security Officer, Office of the CIO & Vice Provost for Information Technology, University of Wisconsin-Madison

      Brad Duncan, Unit 42 Threat Expert, Palo Alto Networks

      Jim Jorstad, Senior Fellow, Center for Digital Education

      Please join the Center for Digital Education, the University of Wisconsin-Madison, and Palo Alto Networks for this informative on demand webinar to learn more about these challenges and to gain focused advice to help you combat one of the biggest obstacles every IT organization is facing.

      Topics will include:
      •The three key steps to protect against ransomware: preparation, prevention, and response
      •New attack strategies and what to do about them
      •Combatting new forms of cryptolocker and other ransomware
      •Myths of ransomware

      Read more >
    • Mitigating New Threats Faster with Rapid Intel and Automation
      Mitigating New Threats Faster with Rapid Intel and Automation Paul Morris, Acting CISO/Acting Director, Cybersecurity Division, TSA and Pamela Warren, Director, Palo Alto Networks Recorded: Feb 23 2017 6:00 pm UTC 62 mins
    • Cyber security is front and center like never before, and cyber leaders are working to speed cyber response times for threat prevention, detection, and mitigation for known, and more importantly, unknown threats.

      A recent study shows Feds are losing the race against hackers– with 85% of security operations professionals taking hours, even days, to create protections against newly discovered cyber threats.

      View the on-demand “Pedal to the Metal” webinar and hear from Federal and industry cyber experts as they discuss MeriTalk’s newest cyber study findings, including:
      •How much time and manpower is expended analyzing threat intelligence?
      •What advanced automatic capabilities can Feds utilize to act rapidly and decisively against advanced threats?
      •Is threat intelligence is helping Feds prevent attacks – from never-before-seen threat actors and tactics – faster?

      Featured Speakers Include:
      •Paul Morris, Acting CISO/Acting Director, Information Assurance and Cybersecurity Division, TSA
      •Pamela Warren, Director, Government and Industry Initiatives, Palo Alto Networks

      Read more >
    • Impact of The Modernizing Government Technology Act on Cybersecurity Programs
      Impact of The Modernizing Government Technology Act on Cybersecurity Programs Cameron Chehreh (VP and CTO at Dell EMC Federal) Chris Brazdziunas (VP of Products LogRhythm) Recorded: Sep 14 2017 5:00 pm UTC 34 mins
    • Federal security operations teams face the daunting task of limiting our nation’s cyber risk and securing critical data while using outdated hardware and software. Fortunately, the Modernizing Government Technology (MGT) Act is primed to help agencies transform the way the federal government administers information technology services and cybersecurity.

      In this webcast, Cameron Chehreh, VP and CTO at Dell EMC Federal, and Chris Brazdziunas, VP of products at LogRhythm, examine the impacts the MGT Act will have on modernizing federal IT and cybersecurity programs.

      You’ll learn:
      -How the MGT Act will drive federal IT modernization
      -Advantages of moving data centers to private cloud models through evolution or revolution
      -Benefits of a detect-and-respond oriented security strategy
      -The role automation plays in increasing threat management efficiency

      Register to learn more about how Dell and LogRhythm are transforming IT and security technology in federal agencies.

      Read more >
    • Putting the NIST Cybersecurity Framework to Use in Your Healthcare Organization
      Putting the NIST Cybersecurity Framework to Use in Your Healthcare Organization Symantec Upcoming: Dec 5 2017 6:00 pm UTC 60 mins
    • Part 7 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

      The NIST CSF provides an excellent guide for healthcare organizations looking to improve their overall cybersecurity posture. Throughout our webinar series we’ve explored the intricacies of the framework to highlight what healthcare organizations really need to know, with a specific focus on the five core functional areas of the framework – IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER.

      Join us for this final webinar as we wrap-up the main takeaways from the series, and also hear from experts who have incorporated the NIST CSF into healthcare environment, and the impact it has provided.

      Register Today

      To view on demand NIST Cybersecurity Framework for Healthcare Series Part 1-6 visit https://resource.elq.symantec.com/LP=4235

      Read more >