Hi [[ session.user.profile.firstName ]]
Sort by:
    • Actionable Intelligence for Anti-Money Laundering Compliance Actionable Intelligence for Anti-Money Laundering Compliance Vamsi Chemitiganti, GM of Financial Services, Hortonworks Recorded: Mar 2 2016 5:00 pm UTC 63 mins
    • In this 1-hour webinar, Vamsi Chemitiganti, Hortonworks GM for Financial Services, will discuss the key business issues and technology considerations in moving a financial services anti-money laundering (AML) regime onto Hortonworks Connected Data Platforms and the key benefits in doing so. Banks and capital markets firms can use Hortonworks Data Platform and Hortonworks DataFlow to process huge amounts of transaction-related data from both traditional and non-traditional sources. Compliance teams can then analyze that data-in-motion and data-at-rest for actionable intelligence required for Suspicious Activity Reports—to discover illegal activity and provide detailed reporting to authorities. There will be time for Q&A at the end of the presentation.

      Read more >
    • Better Anti Money Laundering (AML) Compliance with Hortonworks Better Anti Money Laundering (AML) Compliance with Hortonworks Vamsi K Chemitiganti, General Manager - Financial Services, Hortonworks Recorded: Nov 24 2015 3:00 pm UTC 59 mins
    • In 2015, it goes without saying that Banking is an increasingly complex as well as a global business. Leading Banks now generate a large amount of revenue in Global markets and this is generally true of all major worldwide banks. Financial crime is a huge concern for banking institutions given the complexity of the products they offer their millions of customers, large global branch networks and operations spanning the spectrum of financial services. The BSA (Bank Secrecy Act) requires U.S. financial institutions to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable instruments, to file reports of cash transactions exceeding $10,000 (daily aggregate amount), and to report suspicious activity that might signify money laundering, tax evasion, or other criminal activities. After the terrorist attacks of 2001, the US Patriot Act was passed into law by Congress. The Patriot Act augments the BSA with Know Your Customer (KYC) legislation which mandates that Banking institutions be completely aware of their customer’s identities and transaction patterns with a view of monitoring account activity. This webinar discusses the key business issues and technology considerations in moving your AML regime to a Hadoop based infrastructure and the key benefits in doing so.

      Read more >
    • Security practices for safe mobile money transfers Security practices for safe mobile money transfers Tom Meredith (SmartToken Chain), Ali Raza (CCG Catalyst) Recorded: Jul 20 2016 3:00 pm UTC 62 mins
    • Every person on the planet has a mobile phone, but 2 Billion people are “Un-banked”.
      Banks and telecoms are in a Gold Rush to bank the unbanked, but many obstacles remain. Money transfers are some of the most popular transactions made by both the banked and the unbanked. However, building trust in this new service is definitely a challenge.

      Join this panel where discussion points will include:

      -Who has the upper hand: Banks or Carriers?
      -How can Fintech companies ensure trust and security when it comes to mobile money transfers?
      -Global ISO Standards Authenticate ID and Asset Verification
      -ISO Reduces Fraud and Speeds up Asset Transfers
      -What are some of the security challenges new payment services are able to overcome?
      -Are “Standards” emerging to reduce implementation and compliance costs?
      -How do you create cross-border and Inter-bank/carrier transactions?
      -How can banks and telecoms successfully bank the unbanked?

      Read more >
    • How to Stop Wasting Money and Start Managing Cybersecurity How to Stop Wasting Money and Start Managing Cybersecurity Shay Zandani, CEO, Cytegic Recorded: Jan 21 2015 9:00 am UTC 40 mins
    • In today’s world, decision-makers are overwhelmed by the sheer amount of cyber-threat information and cyber-security technologies available.

      CISOs who are tasked with securing business assets in face of rapidly evolving threats, find themselves with insufficient capability to measure the effectiveness and efficiency of their organization security apparatus and equipped with inadequate tools for determining optimal resource allocation, while constantly having to display the risk levels posed by cyber threats to the organizations’ management. It is nearly impossible to estimate if money spent on one technology could have had better security and business impact invested elsewhere.

      This Webinar will present the challenging state of affairs today and will suggest how to remedy the situation using automation, analytical tools and intelligence forecasting and simulation.

      Read more >
    • Stopping Data Breaches: Show me the money Stopping Data Breaches: Show me the money Dave Finger, Director of Product Marketing, Fortinet Recorded: Jun 3 2015 3:00 pm UTC 40 mins
    • Yes, there are annual studies that calculate the cost of the average data breach. And yes, within weeks of a major data breach the headlines shift from number of records lost to estimated cost. So it is unsurprising, if troubling, that a recent survey of enterprise executives indicated that the #1 thing they are most concerned about protecting from cyber attack is customer data. However, there are other important aspects to making a business case for improving your security posture. This webcast will discuss what we feel you should be concerned about losing and why…and it’s not just customer records that require costly breach notification.

      Read more >
    • Big data’s big advantage for financial institutions Big data’s big advantage for financial institutions Mark Melton, Sales Engineer, Platfora Recorded: Apr 28 2016 3:00 pm UTC 53 mins
    • For global financial institutions, it’s nearly impossible to keep up with market changes, regulatory changes, security concerns, and technology advancements. But the right big data discovery solution lets you quickly extract insights—and enables everyone across your organization to dig deep into your big data to stay ahead of market and compliance requirements. What’s more, you can view the insights directly in Platfora or export your findings into any BI tool you prefer.

      Join this webinar to see how Big Data Discovery helps detect and monitor these top challenges:
      • Anti-money laundering
      • Financial liquidity monitoring
      • Sector equity within retail wealth management

      Read more >
    • The Next Generation of Cyber Crime is here The Next Generation of Cyber Crime is here Rob Coderre Upcoming: Aug 9 2016 1:00 pm UTC 45 mins
    • Evolving tactics, techniques and procedures (TTPs) of online criminal actors have left a number of notable victim organizations in their wake and raised the bar for the security teams and law enforcement agencies that have sworn to protect them. From the migration of online criminal markets to an even deeper underground, to online extortion making a big comeback in novel ways, to increasingly effective malware crafted to steal more money and private information, if you are a potential target for online criminals, you are up against a greater cyber criminal threat than in years past.

      Read more >
    • Ransomware: The Darker Side of Bitcoin Ransomware: The Darker Side of Bitcoin JP Vergne (Scotiabank Lab, Ivey B-School), Alexander Hinchliffe (Palo Alto), Samee Zafar (Edgar Dunn) Mark Lavender (BT) Upcoming: Jul 27 2016 4:00 pm UTC 60 mins
    • Bitcoin has been making remarkable breakthroughs in the currency world. Its ability to allow users to be fully in control of their transactions along with its no-borders transfer policy have made it attractive to both investors and consumers alike.

      However, recent reports have revealed a darker side to Bitcoin. The cryptocurrency is being hoarded by financial institutions as ransom money to pay off potential cyber attackers. Has Bitcoin officially crossed the line and now become a black market currency? Has its untraceable nature inspired the new generation of cyber criminals to initiate unprecedented levels of targeted Ransomware attacks?
      Join this panel of industry-leading speakers, who'll be discussing the following:

      -Why has Bitcoin-related ransomware become more popular in recent years?

      -How can you prevent a Ransomware outbreak in your organisation?

      -Is it possible to catch and subsequently prosecute blockchain criminals?

      -How can authorities and financial institutions adopt and adapt in the face of rising levels of Ransomware threats?

      Read more >
    • [SANS] Why Layered Security Strategies Do Not Work and What You Can Do About It [SANS] Why Layered Security Strategies Do Not Work and What You Can Do About It Navneet Singh, Product Marketing Director, Palo Alto Networks Recorded: Jul 19 2016 6:05 pm UTC 61 mins
    • Every year, enterprises spend record levels of money on new IT security technology yet major breaches and compromises are more prevalent than ever. The concept of layered security in which enterprises support a wide variety of security technologies in order to discourage attackers doesn't seem to be working.

      Its time to rethink IT security not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses a security architecture that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform matters in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • Why Layered Security Strategies Don’t Work, and What You Can Do About It Why Layered Security Strategies Don’t Work, and What You Can Do About It Ramon de Boer, Team Lead, EMEA ISE Recorded: Jun 2 2016 9:00 am UTC 31 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

       How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.

       How the architecture enables unique and specific security scenarios.

       How the architecture supports a prevention-oriented approach.

      Read more >
    • Preventing Ransomware in Healthcare Preventing Ransomware in Healthcare Matt Mellen, Security Market Architect, Palo Alto Networks Upcoming: Aug 24 2016 2:00 am UTC 60 mins
    • The business model behind crimeware has changed. In recent years, the price of stolen records has plummeted, compelling cyber attackers to look for new sources of income. Many attackers have turned to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data. Now, barely a week passes without another healthcare organization experiencing a ransomware event. These events impact the quality of care clinical facilities can provide, costs organizations money in remediation efforts, and hurts their reputation as competent providers of care. But while as scary as ransomware can be, with new variations coming out all the time, there are straightforward steps organizations can take to prevent this threat.

      In this presentation, Matt Mellen, a former Information Security Lead at a hospital, will discuss practical steps healthcare organizations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will cover practical steps healthcare organizations can take on systems and network devices to prevent exposure to this rampant attack.

      Palo Alto Networks invite you to attend a webinar where you can learn how to protect your healthcare organization from ransomware attacks. We will cover:
      - How the most current variants of ransomware work
      - How to prevent successful ransomware attacks in Healthcare

      Read more >
    • Preventing Ransomware in Healthcare Preventing Ransomware in Healthcare Matt Mellen, Security Market Architect, Palo Alto Networks Upcoming: Aug 24 2016 9:00 am UTC 60 mins
    • The business model behind crimeware has changed. In recent years, the price of stolen records has plummeted, compelling cyber attackers to look for new sources of income. Many attackers have turned to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data. Now, barely a week passes without another healthcare organization experiencing a ransomware event. These events impact the quality of care clinical facilities can provide, costs organizations money in remediation efforts, and hurts their reputation as competent providers of care. But while as scary as ransomware can be, with new variations coming out all the time, there are straightforward steps organizations can take to prevent this threat.

      In this presentation, Matt Mellen, a former Information Security Lead at a hospital, will discuss practical steps healthcare organizations can take to stop ransomware. Drawing from his first-hand experience responding to ransomware, combined with recommendations from the FBI, Matt will cover practical steps healthcare organizations can take on systems and network devices to prevent exposure to this rampant attack.

      Palo Alto Networks invite you to attend a webinar where you can learn how to protect your healthcare organization from ransomware attacks. We will cover:
      - How the most current variants of ransomware work
      - How to prevent successful ransomware attacks in Healthcare

      Read more >
    • Why Layered Security Strategies Don’t Work Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Mar 16 2016 2:00 am UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • Why Layered Security Strategies Don’t Work Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Mar 16 2016 9:00 am UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >