Hi [[ session.user.profile.firstName ]]
Sort by:
    • “Cloud-First” Ransomware: A Technical Analysis
      “Cloud-First” Ransomware: A Technical Analysis Netskope chief scientist Krishna Narayanaswamy and Director of Netskope Threat Research Labs Ravi Balupari Recorded: Apr 3 2017 5:55 pm UTC 44 mins
    • Get a technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs and learn how to defend against them.

      Cloud services have emerged as the preferred attack vector of some of the most dangerous and innovative cloud malware exploits of the past six months. Why? Because many organizations don't inspect their cloud SSL traffic for a malware and the same functionalities of the cloud dramatically increase productivity (sync, share, collaborate, etc) also provide ransomware developers with a perfect medium for faster delivery of malware payloads to more targets.

      Join Netskope chief scientist Krishna Narayanaswamy and Director of Netskope Threat Research Labs Ravi Balupari for a fascinating look at how malicious actors now design ransomware to make best use of popular cloud services to hide in plain sight, and do more damage in less time.

      Krishna and Ravi will provide technical analyses of recent malware campaigns discovered or documented by Netskope Threat Research Labs.

      These include:

      - Virlock, which encrypts files and also infects them, making it a polymorphic file infector
      - CloudFanta, which uses the SugarSync cloud storage app to deliver malware capable of stealing user credentials and monitoring online banking activities
      - CloudSquirrel, which takes advantage of multiple cloud apps throughout the ransomware kill chain with the intent to steal and exfiltrate user data
      - The Zepto variant of Locky ransomware, now distributed both by popular cloud storage apps and via DLL

      Read more >
    • Building & Scaling a 100% Cloud & Mobile IT Organization
      Building & Scaling a 100% Cloud & Mobile IT Organization Daniel Lu, Product Marketing Manager, Okta Recorded: Apr 17 2017 7:55 pm UTC 57 mins
    • Today’s modern IT departments have fully adopted the cloud company-wide. Many organizations are being built 100% in the cloud with services like Google, but are beginning to see challenges staying 100% in the cloud as they continue to scale. At the same time, existing organizations with on-prem resources are actively perusing a “cloud and mobile first” strategy and are looking at initiatives such as migrating off AD and enabling a BYOD environment.

      In this webinar, we’ll talk about the key players that help organizations both large and small build out a 100% cloud and mobile IT strategy. Whether you started in the cloud and want to stay there or you are developing your “cloud-first” strategy, you will learn about the key decisions and challenges of achieving a 100% cloud and mobile IT environment.

      You'll learn:
      - How to scale while staying 100% in the cloud
      - Strategies for moving on-prem resources to the Cloud
      - Key decisions and challenges of achieving 100% cloud and mobile IT

      Read more >
    • Building the Digital Government of the Future in a Secure Cloud
      Building the Digital Government of the Future in a Secure Cloud eSignLive | Nintex | Drawloop Recorded: Mar 2 2017 7:00 pm UTC 59 mins
    • In this webcast, our panel of experts will discuss the benefits of using a secure FedRAMP compliant cloud and how to fulfill the government’s paperless and “cloud-first” mandate securely and with confidence – while giving your employees and citizens the digital government they want.

      We will cover:
      • The top digital use cases in government for integrated workflow and e-signatures
      • How FedRAMP compliance provides a standardized security approach for cloud services and benefits of using FedRAMP compliant solutions together to offer next-generation solutions
      • Demonstration of digital HR Recruiting application using CRM, Workflow and e-signature FEDRAMP technologies
      • Best Practices/Considerations for getting started

      Read more >
    • Cloud First: A New Competitive Advantage for Modern Enterprises
      Cloud First: A New Competitive Advantage for Modern Enterprises Todd Bernhard, Product Marketing Manager, CloudCheckr Upcoming: May 23 2017 5:00 pm UTC 60 mins
    • The cloud has the potential to eliminate overhead, waste, security risks, and human error, without the hassles of running a traditional data center. Savvy enterprises are taking a “Cloud First” approach to computing resources as a major competitive advantage, enabling organizations to stay lean and increase operational efficiencies, mitigate risks, and save money as they grow.

      During this webcast, CloudCheckr Product Marketing Manager Todd Bernhard will uncover why and how modern enterprises are transitioning to a Cloud First approach, including:

      - Going all-in with the cloud as a major competitive advantage

      - Understanding the differences between on-prem vs. operating in the cloud

      - Choosing the right cloud management tools to gain complete visibility

      Read more >
    • Balancing Security & Usability with Cloud Identity & Access Management Solutions
      Balancing Security & Usability with Cloud Identity & Access Management Solutions Joe Diamond, Director, Security Product Marketing Management Okta Recorded: May 9 2017 7:00 pm UTC 41 mins
    • As financial services firms warm up to the idea of being “cloud first” by deploying applications in a private or public cloud, the challenges of managing identities become increasingly complex.
      With each solution generally coming to the table with its own authentication paradigm and notion of user management, it’s easy for a user to have excessive user names and passwords that often go unmanaged.

      Join this session to hear about how next-generation identity solutions can drastically improve your security posture, while also enhancing end user experience through seamless access to business applications.

      During this webinar, you will learn about:

      • Centralized identity and access control for cloud, mobile and legacy on-prem applications
      • Guaranteeing strong authentication across all services, everywhere
      • Attacking surface reduction through automated provisioning and de-provisioning
      • Using authentication threat insights to identify and response to compromise

      Read more >
    • Delivering Applications in Hybrid and Multi-Cloud Environments
      Delivering Applications in Hybrid and Multi-Cloud Environments Ashish Shah Recorded: Nov 17 2016 5:00 pm UTC 37 mins
    • Enterprises are increasingly adopting hybrid and multi-cloud computing strategies to speed up application rollouts, gain operational and cost benefits, and improve business agility. According to RightScale’s “Cloud Computing Trends: 2016 State of the Cloud” survey and report, hybrid cloud adoption increased from 58% to 77% year-over-year. 17% of enterprises now have more than 1000 VMs in the public cloud, up from 13% in 2015. This of course means that businesses need to consider application services that work across data centers and multiple cloud environments.

      Join Avi Networks for a webinar to learn how to:

      -Deliver consistent load balancing and application services across cloud environments
      -Leverage the power of hybrid clouds, elastic on-demand scaling, and cloud bursting
      -Troubleshoot application issues in mere minutes with pinpoint analytics
      -Reduce the risk of cloud vendor lock in

      In just 40 minutes, you will learn how next-gen load balancing architectures can play an expanded role in delivering and scaling your applications across clouds, providing performance insights, and automating application services.

      Read more >
    • Discover the Spin-Merge Benefits to our ITOM Software Portfolio
      Discover the Spin-Merge Benefits to our ITOM Software Portfolio Chris Hsu, EVP, GM & COO, Tony Sumpster, SVP & GM ITOM, Roy Ritthaler, VP, Product Marketing, ITOM Recorded: Nov 3 2016 5:00 pm UTC 61 mins
    • On September 7, Hewlett Packard Enterprise announced plans for a spin-off and merger of our Software business unit with Micro Focus, a global software company dedicated to delivering and supporting enterprise software solutions. The combination of HPE’s software assets with Micro Focus will create one of the world’s largest pure-play enterprise software companies. We will remain focused on helping you get the most out of the software that runs your business.

      Join the HPE IT Operations Management Executive team to hear firsthand about the recently announced HPE Software and Micro Focus spin-merge. What does it mean for us, what does it mean for you, and most importantly how it strengthens HPE’s ability to help transform traditional IT environment into a digital enterprise with automation, orchestration and ultimately, transformation solutions. Hear about the ITOM strategy and commitments to the roadmap including upcoming. These solutions help IT organizations automate tasks to drive efficiency across the virtualized data center, orchestrate processes with speed and agility to evolve to a “cloud inspired” IT service model, and transform the support & delivery of services to modernize the customer experience, leveraging the full power of the hybrid cloud
      Bring your questions and join us on this new journey to success.

      Read more >
    • Baking Security into Digital and Cloud Initiatives: Infor’s Journey
      Baking Security into Digital and Cloud Initiatives: Infor’s Journey Mark Bloom Director, Product Marketing Sumo Logic & Jim Hoover CISO Infor Recorded: Dec 2 2016 5:35 pm UTC 47 mins
    • Continuous innovation and speed to market are mandating dynamic paradigm shifts in how companies conceive, develop and implement IT operations and security strategies. Digital enterprises are migrating mission-critical workloads to the cloud and leveraging advanced AWS infrastructure to reap the benefits of agile development and competitive advantage. However, a lack of real-time visibility inhibits robust and consistent “cloud-first” security strategy… and keeps business executives awake at night.

      In today’s evolving market, advice from the experts is the best way to go! Infor Global Solutions has a long history of building, running and securing workloads in the AWS cloud. Listen in on this interactive discussion in which Mark Bloom of Sumo Logic will be joined by the security experts at Infor – Jim Hoover, CISO, Jim Plourde, VP Cloud Hosting and Durga Dash, Dir. Cloud Operations. We will be covering:

      Expert tips and lessons on the journey to the cloud
      How did the approach to security and operations change from DC to public cloud
      How to extract operational and security visibility from your security stack in AWS
      How the move to the cloud changed the interactions / dynamics between security and applications teams

      Read more >
    • Malware Attack "Fan-out" Effect in the Cloud
      Malware Attack "Fan-out" Effect in the Cloud Krishna Narayanaswamy, Founder and Chief Scientist, Netskope Recorded: Jun 21 2016 5:00 pm UTC 60 mins
    • The rapid rise in cloud adoption – of which corporate IT has underestimated the scope by as much as 10x - has created a new effect: a “cloud attack fan-out.” Between many connected devices, which increase the attack surface, and capabilities like sync and share, which increase data velocity in the cloud, both the propensity and the severity of a breach rise.

      Join Krishna Narayanaswamy, Founder and Chief Scientist of cloud security company Netskope, as he takes an in-depth look at data breaches involving cloud services and how they come about. Krishna will take a fun, CSI-like presentation approach and draw upon unique, anonymized data seen in the cloud to illustrate:

      - The multiplier effect that that the cloud can have on the probability of a data breach
      - Three real-world examples in which the cloud can play a role in data breaches, including a step-by-step review of a recent exploit found in a cloud storage app
      - How to identify data breaches in an enterprise cloud environment using advanced anomaly detection techniques
      - A forensic walk-through in the reconstruction of a complex audit following a data breach
      - Best practices for mitigating breaches as well as monitoring and protecting sensitive enterprise data in the cloud

      Read more >