Hi [[ session.user.profile.firstName ]]
Sort by:
    • Security Heretic: What got us here, won't get us there
      Security Heretic: What got us here, won't get us there Gary Marsden, Senior Director of Data Protection Solutions at Gemalto Recorded: Nov 16 2017 4:00 pm UTC 57 mins
    • Cybersecurity is at a crossroads and requires a dramatic shift to adequately support the needs of business owners and security administrators as digital transformation challenges their needs and investments. Managing multiple cloud providers and dramatic increases in the number of endpoints generating data and the subsequent volume of data means enterprise security teams no longer have the requisite skills and bandwidth to deal with complicated security products. Building in security from the beginning quickly and cost-effectively is an industry game changer, especially with new growth markets like Big Data, Blockchain, Cloud Computing, Internet of Things and Digital Payments.

      Multi-cloud environments and government regulations and industry compliance add to the complexity of maintaining a manageable and effective data protection strategy. Transforming encryption and key management (data protection in general) into a click and deploy model reduces internal business barriers between security teams, DevOps and product teams and alleviates disparate security policies, so you know where your data is and that it is secure. The way people consume security is changing by taking an on-demand approach similar to the Netflix philosophy. In this webinar, we will discuss how cloud-based security is simplifying workflow processes, changing cost/benefit models to drive us towards a pervasiveness of encryption and key management that will de-risk data and connectivity in similar ways to anti-virus and firewalls.

      Join this interactive presentation to learn about:
      • The role of security in today's connected world
      • The drivers for and impact of simplifying security on business and workflow
      • How security is providing valuable business intelligence through connected systems and meeting compliance mandates
      • Gemalto’s solution to solving on-demand data protection
      • Upcoming cybersecurity trends and how to prepare

      Read more >
    • Find out the do's and don'ts during an Oracle audit!
      Find out the do's and don'ts during an Oracle audit! Christian Den Boer & b.lay Director, Richard Spithoven Recorded: Nov 21 2017 3:00 pm UTC 60 mins
    • Together with our partner b.lay we tackle the fundamental aspects our customers face during an Oracle audit.

      It is no secret that most software publishers now have software audit practices and some are aggressively pushing license compliance audits as part of their revenue model. Gartner[1] states that 68% of organizations experience two or more audits annually so it’s best to be well prepared.

      This webinar will cover key aspects of the Oracle Audit process and understanding the real deal of the cloud resolution offered in case of a non-compliance situation.
      Topics covered during the webinar are:
      - Common misunderstandings and issues
      - Oracle audit process
      - The cloud deal
      - Best solution to tackle a software audit

      [1] Competitive Landscape: Software Asset Management Tools. Published: 26 August 2016. Analyst(s): April Adams, Hank Marquis, Gary Spivak

      Read more >
    • Top cyber threats in the financial sector
      Top cyber threats in the financial sector Candid Wueest, Principal Threat Researcher, Symantec Recorded: Nov 16 2017 3:00 pm UTC 49 mins
    • Financial institutions are increasingly facing attacks on multiple fronts.

      Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions. While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing new types of attacks in the form of large-scale financial heists.

      Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards. They are using living off the land and fileless attack tactics similar to APT groups. But also extortion with DDoS attacks or business email compromise (BEC) scams are increasingly bothering financial corporations.

      In this webcast on the current financial threat landscape, Symantec takes a look at the most prevalent and significant financial threats.

      In this webcast we will review:
      - The top threats facing financial institutions with statistics and examples
      - Explore the most common techniques employed in financial attacks
      - Provide case studies of the most high-profile financial attacks of the past 12 months

      Read more >
    • Understanding your Attack Surface - Research into FT30 organisations
      Understanding your Attack Surface - Research into FT30 organisations Terry Bishop, EMEA Technical Director, RiskIQ Recorded: Nov 21 2017 2:00 pm UTC 37 mins
    • Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions. Cyber adversaries are taking advantage of this sprawling digital attack surface, looking forweaknesses to exploit. The attack surface has become the battle line between malicious actorsand an organisation’s external threat defenders and its compromise is behind many of the breaches that get reported with alarming frequency.

      In an effort to highlight and quantify the risks which organisations have in their attack surface, we conducted research on the top 30 UK organisations (FT30) to highlight the issues we believe all companies face. We will present the various types of risk we uncovered and offer practical advice on ways to mitigate them and harden your attack surface.

      Read more >
    • 通过能见度改变网络安全
      通过能见度改变网络安全 主讲人:王睿 Forescout 系统工程师 Recorded: Nov 16 2017 2:00 am UTC 60 mins
    • 通过可视性 改变网络安全
      大家是否都觉得黑客们拥有攻无不克的能力呢?尽管我们在网络安全的投入不断增加,然而
      我们还是看到网络攻击和数据泄露事件越来越多。 因此我们必须增强网络安全,如何才能做到呢?欲要加强我们的网络安全,先从可视性开始。在我们的讲座里,您会更加了解我们Forescout如果通过加强公司内网,园区,数据中心,还有云端网络的可视性去实现:

      •100% 可视。在极短的时间内,不依靠终端软件发现所有的网络设备。这些包括: managed devices, BYOD, IoT, OT, 甚至是VM。 当以上设备一接入网络即可发现,并且实时监控。
      •可控。按照公司的网络安全策略及其设备的属性和状态进行自动化准入管控。自动修复高安全风险设备。
      •联动。与您现在已有的安全设备共享实时数据有效监控所有网络设备。

      Read more >
    • In-Depth Analysis of a Fast Flux Botnet
      In-Depth Analysis of a Fast Flux Botnet Or Katz, Principal Lead Security Researcher, Akamai Upcoming: Nov 22 2017 5:00 am UTC 60 mins
    • In recent years, we have seen large-scale botnets used to execute attacks rarely seen in the past -- botnets that incorporate new features and bigger capabilities than ever before. How and why some of these botnets remain resilient is a question that needs to be answered, and one of the reasons is Fast Flux. Fast Flux is a DNS technique used by botnets to hide various types of malicious activities (such as phishing, web proxying, malware delivery, and malware communication) behind an ever-changing network of compromised hosts acting as proxies. In general, a Fast Flux network is mostly used to make communication between malware and its command and control server (C&C) more resistant to discovery. Akamai’s high visibility to both Web and Enterprise traffic enables new and unique insights on the behavior of such Fast Flux networks.

      In this webinar, you will get an in-depth analysis on:

      - How network fluxing is using domains, IP addresses and even nameservers to become resistant to discovery
      - How Fast Flux networks offer services such as malware communication and hosting of malicious content
      - How botnets are used both for Fast Flux communications and a variety of Web attacks such as Web scraping and credential abuse
      - Best practices for detecting and defending against such botnets

      Join Akamai and (ISC)² on Nov 22 (Wed) at 13:00 (Singapore time) / 16:00 (Sydney time) to learn more about the Fast Flux Botnet.

      Presenter: Or Katz, Principal Lead Security Researcher, Akamai
      Moderator: Ir. Tejinder Singh, Senior Development Expert, T-Systems Malaysia SGA Security Engineering

      Read more >
    • UK Enterprise Security Maturity: How Does Your Organisation Stack Up?
      UK Enterprise Security Maturity: How Does Your Organisation Stack Up? Jarad Carleton, Principle Consultant at Frost & Sullivan & Hadi Hosn, Global Consulting Solutions Lead at Secureworks Upcoming: Nov 27 2017 2:00 pm UTC 60 mins
    • During March/April 2017, Secureworks and Frost & Sullivan partnered to conduct security readiness research amongst 201 IT leaders within large UK enterprises to determine how realistic their perceived level of security maturity is. The end result is the white paper, Measuring Cybersecurity Preparedness: Illuminating Perception vs Reality in UK Enterprise.

      In this webcast, Jarad Carleton, Principle Consultant at Frost & Sullivan, will present key findings from the research, which benchmarks UK enterprises against the Security Maturity Model (SMM), co-developed by Secureworks and Frost & Sullivan.

      Hadi Hosn, Global Consulting Solutions Lead at Secureworks, will then explain the Secureworks point of view on some of the challenges UK enterprises are currently facing on their quest for greater security maturity, and how organisations can take positive steps to tackle them.

      During this live webcast we will cover:

      - How you rate against the UK’s Security Leaders
      - The top aspects of security Underprepared organisations should focus on
      - The key security weakness where even Security Leaders are vulnerable
      - Steps you can take to improve the security posture of your organisation

      Read more >
    • Security Anthropology: How Do Organizations Differ?
      Security Anthropology: How Do Organizations Differ? Wendy Nather with Duo Security Recorded: Nov 16 2017 5:00 pm UTC 53 mins
    • When planning a go-to-market strategy, it’s common practice to build detailed marketing and sales personas for key security individuals such as the CISO, the IT administrator, the developer, and the end user. Each of these roles has different needs and priorities when considering a security tool, and sales strategy recognizes the need to address each of them. Organizations have different types of business drivers, priorities, constraints, and capabilities as well: for example, an 80-year-old manufacturing company may not care what cute new IoT ideas you might have.

      These organizational personas must be considered when searching out peers for benchmarking. Security decisions made only by looking at other companies in the same industry doesn’t provide enough data, because there are many other variables that come into play. Building a security anthropology model for comparing organizations provides more context to better design products and services to align with their needs, while helping the security community speak the language of the users it’s serving. Join us for a discussion on how we can excavate a better approach with Wendy Nather, Principal Security Strategist at Duo Security.

      SPEAKER INFO:
      Wendy Nather is a former CISO in the public and private sectors, and past Research Director at the Retail ISAC (R-CISC) as well as at the analyst firm 451 Research. She enjoys extreme weather changes while shuttling between Austin and Ann Arbor.

      Read more >
    • Choosing The Right Data Architecture For Your Business
      Choosing The Right Data Architecture For Your Business Pavel Najvar - Chief Technology Evangelist, CloverETL Upcoming: Nov 22 2017 10:00 am UTC 45 mins
    • When it comes to choosing data storage solutions outside of your primary application, a maze of options exists out there, but how do you choose which type is right for your needs? Should you go for a data lake, or a data warehouse? And which methodology should you apply?

      Register for our upcoming webinar, “Choosing the right Enterprise Data Architectures for your business”, where we will discuss:

      The motivation for replicating operational data into various “stores”, as well as the implications;
      A high-level overview of the various options available, including data warehouses, data vaults, data hubs, data marts and data lakes;
      Commonly used practices for building these architectures;
      Advantages and disadvantages of different practices and methodologies.

      Finally, the webinar will end end with the way in which CloverETL can help you along the way.

      Read more >
    • Three Steps to Eliminating Storage Silos
      Three Steps to Eliminating Storage Silos Storage Switzerland, Nexsan Recorded: Nov 16 2017 6:00 pm UTC 51 mins
    • As an organization grows the number of use cases the data center needs to support increases with it. What starts out as a NAS for file sharing, moves to a SAN for database applications, and then storage for data protection. As the organization hits full stride it might look at arching to limit growth and a mobility solution to support a distributed workforce. The problem is each one of these storage types are silo’ed and have to be implemented, operated and maintained separately. As a result, storage ends up consuming a large chunk of the IT budget.

      Read more >
    • Deploying & Hosting Healthcare Information Systems in the Cloud
      Deploying & Hosting Healthcare Information Systems in the Cloud Ed Ricks, VP,Orchestrate Healthcare, Carl Kunkleman, Co-founder,ClearData, Eric Gray, Chief Solutions Architect,NETSCOUT Recorded: Nov 16 2017 6:30 pm UTC 82 mins
    • In a continued effort to present value and clarity through compelling topics, welcome to an important discussion relevant to Cloud initiatives and Healthcare.

      HiMSS Chapter of Arizona is excited to announce the first topic of a 3-part webinar series: Deploying & Hosting Healthcare Information Systems in the Cloud. NETSCOUT is co-hosting and has provided the webinar services here on Brighttalk.

      Your webinar host: Perry Horner, CIO – Adelante Healthcare, this webinar is applicable for 1.5 CE hours.

      While there is a worldwide trend in moving mission critical Healthcare Information Systems to the Cloud, this concept is not always well received or understood by Providers nor Administration. The intent of this Webinar is to bring clarity and understanding with the means, methods, practice, outcomes, and benefits moving towards, implementing, and using a Healthcare Information System in a cloud-based/hybrid environment. Join us as we learn and interact with industry leading experts breaking down barriers and misconceptions to help you put your systems on the Cloud roadmap.

      Presenters and Topics:

      1. Ed Ricks, Vice President, Southeast – Orchestrate Healthcare, will be covering the difference between the various types of hosted offerings (SAAS vs. Remote Hosting vs. Hybrid)

      2. Carl Kunkleman, Co-founder of ClearData, will address whether Public, Hybrid or Private Cloud – HIPAA-compliance is the key to safeguarding Protected Health Information (PHI)

      3. Eric Gray, Chief Solutions Architect – NETSCOUT, will address the critical importance of service assurance and implementing measures and controls to reassure optimal patient experience when considering the Cloud

      Read more >
    • Open Banking: Designing & delivering services that work in an Open Future
      Open Banking: Designing & delivering services that work in an Open Future Louise Beaumont, Katharina Lueth, Arthur Leung, Andrew Steadman Recorded: Nov 16 2017 11:00 am UTC 60 mins
    • Open Banking will affect every layer of the bank:
      -It will stretch and stress banks’ brands – resulting in both the potential for significantly increased reach, and reputational enhancement and risk
      -It will change and complicate how banks talk to consumers and SMEs – whether direct, intermediated, invisible, or all three simultaneously
      -The ecosystem environment will radically change how services are designed - with a flood of ideas and data available for those banks which successfully attract, seed and enrich the ecosystem within which they are a player
      -And the ecosystem environment will fundamentally change how these services are delivered – whether by companies with whom the bank has a partnership, or companies with whom the bank has absolutely no relationship
      -And finally, it also demands a rich, growing - and secure - API layer to enable the Open Future

      This discussion focuses on how services are designed and delivered.

      Panelists:
      Louise Beaumont (Publicis.Sapient & techUK), Katharina Lueth (Raisin), Arthur Leung (Curve), Andrew Steadman (Fiserv)

      Read more >
    • Delivering a Secure API layer with Open Banking
      Delivering a Secure API layer with Open Banking Louise Beaumont (Publicis.Sapient & techUK), Bernard Harguindeguy (Elastic Beam), Chris Ward (Mapa Research) Recorded: Nov 16 2017 4:00 pm UTC 61 mins
    • This discussion focuses on delivering a secure API layer and how Open Banking will deliver a secure Open Future..

      Open Banking will affect every layer of the bank:
      -It will stretch and stress banks’ brands – resulting in both the potential for significantly increased reach, and reputational enhancement and risk
      -It will change and complicate how banks talk to consumers and SMEs – whether direct, intermediated, invisible, or all three simultaneously
      -The ecosystem environment will radically change how services are designed - with a flood of ideas and data available for those banks which successfully attract, seed and enrich the ecosystem within which they are a player
      -And the ecosystem environment will fundamentally change how these services are delivered – whether by companies with whom the bank has a partnership, or companies with whom the bank has absolutely no relationship
      -And finally, it also demands a rich, growing - and secure - API layer to enable the Open Future

      Read more >