In this webinar we describe the inner workings of this critical vulnerability, detail the detection mechanisms used by Qualys, and cover less-visible instances of Heartbleed that you might be missing. To provide a real-world perspective, the CISO of the State of Colorado Jonathan Trull will describe how the state took on Heartbleed.Read more >
In this episode, we talk about Renaud Laplanche's new company Upstart, Elevate's IPO, who and why Colorado sued, a Securitization Tracker & big data for the lending industry
2 Events happening:
1) Lend it China - Shanghai
- July 15,16. 15% off. Earlybird ticket. Code: LTIMES17LDF
A Case Study by the University of Colorado
In this webinar, the University of Colorado shares how its central security team built and now manages an effective vulnerability and patch management program covering the networks and systems for four campuses and almost 60,000 students, faculty, and staff. University staff will discuss common challenges and barriers to success and layout best practices for others to follow.
Learn how multiple innovation award recipient State of Colorado, has transformed the health insurance marketplace model and is building broader citizen engagements on the Government Success Platform with Salesforce.
Join us to hear Antoinette Taranto, Chief Client Officer Department of Healthcare Policy & Financing for the State of Colorado describe how they have designed and delivered high quality health and human services that improve the safety, independence, and well-being of the people of Colorado.
CCNG talks with representattives from the ICSA Colorado Chapter about their Annual Quality Summit...a gathering of customer service professionals to concentrate on quality tools and methods that we can apply in our daily roles. This years focus is on quality of leadership providing participants with new views of how to measure quality within their leadership ranks, how to structure a leadership assessment in their organization and other related topics. The morning session is interactive and the afternoon session will be a dynamic summary and challenge for the future.Read more >
BrightTALK caught up with vArmour's Chief Strategist, Mark Weatherford for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The rise of Ransomware and where companies are more vulnerable
- DDoS and why it's still a key threat to businesses
- The increased vulnerability of the IoT
- Challenges for Donald Trump and his new cyber team
- How to boost equality and diversity in the information security industry
- How cloud and virtualization are changing the security game
About the Speaker:
Mark Weatherford is Chief Cybersecurity Strategist at vArmour, the data center and cloud security company. He was formerly a Principal at the Chertoff Group, was Deputy Under Secretary for Cybersecurity at DHS, was Chief Security Officer at the North American Electric Reliability Corporation (NERC) and was the CISO for the states of California and Colorado. He also served as a cryptologic officer in the US Navy. Weatherford is a Director on the Boards of Coalfire, the Center for Cyber and Homeland Security (CCHS) at the George Washington University, and the National Cybersecurity Center (NCC) in Colorado Springs. He is also on the Advisory Board at both Cylance and AlertEnterprise.
In our webinar, Identifying Men with Prostate Cancer—The Role of phi and Other Biomarkers, Dr. E. David Crawford will discuss key issues that challenge a physician's ability to make informed decisions regarding whom to biopsy for prostate cancer. After the webinar, you will be able to:
• Understand the historical perspective and controversy regarding prostate-specific antigen (PSA) screening
• Improve your interpretation of a PSA result
• Use biomarkers, such as Prostate Health Index (phi), to reduce negative biopsies and have more confidence in the decision to biopsy
• Understand how the phi score, combined with family and patient history, can determine patient management decisions
Dr. Crawford is an internationally renowned urologist and distinguished endowed professor of surgery, urology and radiation oncology. He also serves as the head of the section of urologic oncology at the University of Colorado Anschutz Medical Campus in Aurora, Colorado. Dr. Crawford received his medical degree from the University of Cincinnati. His postgraduate training included an internship and residency in urology at the Good Samaritan Hospital in Cincinnati. He subsequently completed a genitourinary cancer fellowship at the University of California Medical Center in Los Angeles.
Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.
Steve Smith, CTO, Cloud, Imagine Communications
Stephen Smith is the CTO, Cloud, for Imagine Communications, where he leads the transformation of solutions to support media and entertainment markets in a future defined by IP, software, virtualization and cloud. Previously, Smith was the Executive Director of Media Systems at Starz Entertainment in Colorado, where he was responsible for the technology, implementation and operation of their Media Asset Management and Content Processing platforms. With 20+ years in the industry, Stephen has extensive experience in architecting, deploying, owning and operating complex media processing, origination and distributions systems.
Host: Limor Schafman, Content Development Director, TIA
In today’s online driven world, a website is often one of the most important marketing tools for a business. Yet, many websites even lack the most basic search engine optimization (SEO) best practices.
Being able to research, identify and optimize your website for the keywords your potential customers type into Google is crucial to succeeding with SEO. In fact, it’s essential to outrank your competition in the search engines.
Any professional SEO agency will perform in-depth keyword research before starting a project, and so should you. In this 45-minute long online session, Chris Raulf, Founder & President of Boulder SEO Marketing, will present:
• Why you NEED to perform keyword research
• Tools, tools, tools: Keyword research is a (free and paid) tools driven process
• How to research and select the initial list of target SEO keywords and phrases
• How to identify the “low-hanging fruit” keywords that will immediately increase search traffic to your site
• How to put the keywords to work for you
• How to measure the performance and effectiveness of your target SEO keywords
Webinar attendees will learn the concept of keyword research for SEO and be able to measure and monitor the effectiveness of their target SEO keywords.
About Chris Raulf
Chris Raulf is the founder of Boulder SEO Marketing, a boutique digital marketing training and consulting agency located in beautiful Denver and Boulder, Colorado. Chris is an SEO training expert and he teaches students around the globe on how to improve their website’s rankings in Google search results. His international background makes him one of the few professionals in the industry who truly live and breath multilingual search engine optimization on a daily basis.
Learn more about Chris and Boulder SEO Marketing by connecting with him on LinkedIn (https://www.linkedin.com/in/chrisraulf) and Twitter (@swisschris).
Business units want a policy that allows them to save everything. Legal wants the minimum saved. IT just wants something easy to execute. What should we do? A committee is formed, with legal, IT, records management, HR, and others. The committee meets. Discussions ensue: Which are business records? How long should we save them? Do we allow exceptions?
The committee meets again. And again. We’re stuck.
Join Ed Rawson , Michelle Hanrahan, Shawn Cheadle and Mark Diamond as they discuss strategies for building consensus across your organization and making sure your initiative doesn't get stuck!
About the speakers:
Ed Rawson is a strategic, results-oriented thought leader who has dedicated over 30 years of his career to helping organizations manage their paper and digital content lowering cost and increasing productivity. Ed has helped organizations to align information with business value and operational direction to maximize the return on investments, lowering risk and maintaining compliance.
Michele Hanranhan is Records Manager at Sound Transit since January 2015 and is leading a RIM group to implement ECM solution organization wide. She previously worked at Federal Home Loan Bank of Seattle, PATH, and Washington State Department of Transportation and has over 16 years of experience in Records and Information (RIM) with a variety of business, government and non-profit organizations.
Shawn Cheadle is General Counsel to the Military Space line of business at Lockheed Martin Space Systems. He supports government and international contracts negotiations, drafting and dispute resolution. He also supports information governance, eDiscovery, records management, counterfeit parts investigations, and other functional organizations at Lockheed Martin. He is an ACC Global Board Member, current Information Governance Committee Chair and former Law Department Management Chair, and former Board member and President of ACC Colorado.
Multi-vector protection from Webroot is the only way to secure your endpoints and users across all stages of a cyberattack in real time. Using advanced behavioral heuristics to identify and protect against never-before-seen threats, see how Webroot is the Smarter Cybersecurity™ solution.Read more >
WannaCry and NotPetya have wreaked the most havoc seen by ransomware yet. Not only was it able to hit computers previously unsusceptible to ransomware by using NSA exploits, but it was also able to severely disrupt the infrastructure of nations like Ukraine and Health organization in the UK. Over 150 International Corporations ranging from car factories to container ships vessels had to halt in tracks to deal with this ransomware. In this Deep Dive presentation you will learn about these types of ransomware in depth and also learn how to keep your clients safe.
Webinar highlights include:
How Petya-based & WannaCry ransomware works and spreads
The unpacked code analysis
Other potential exploits and attack vectors to keep an eye on
How you can protect your clients
Malware defenses have typically been concentrated at the network edge and then at the endpoint layer. When so much business is now in the cloud and user Internet requests are resolved outside the network it’s time to manage and control at the cloud ‘domain’ layer too. This webinar looks at a simple, fast, highly effective and easy way to block most malware before it reaches your network and deliver more secure Internet access at the same time.Read more >
8 Reasons Webroot is SmarterRead more >
- Broadcast LIVE from Las Vegas during Black Hat 2017 -
Small and medium businesses face countless threats, most of which have a human at their origin. These criminals, driven by financial gain, are essentially business owners – not unlike yourself – who are looking to spend as little money and as few resources as necessary to generate as much revenue as possible. Therefore, most cybercriminals target businesses that have a false sense of security.
Why would a cybercriminal spend a fortune going after a Fortune 1,000 when they can spend a few bucks to crack a small business? Exactly!
During this live webinar, we’ll explore the types of threats that small and medium businesses face and the business risk associated with these threats. It’s easier to get hacked than you think and it’s only a matter of time before it happens. Will your business be prepared? Are you doing everything you can to protect yourself beforehand?
Knowing that perfection is not possible, our panel of experts will look at 4 key steps that small and medium businesses should take to reach a reasonable level of cybersecurity:
- How to conduct an analysis to determine risk and the need to focus on cybersecurity within your business
- How to assess the cost of a breach, a loss of information and the impact that a cybersecurity event can have on your customers and partners
- How to create a plan to protect your systems, information, revenue and customers’ data
- Best practices for guiding your implementation, from segmentation to employee access control policies to information protection controls
Join us for an extremely informative session geared towards small and medium business owners and their IT staff.
Sean Martin, CISSP, Editor-in-Chief, ITSPmagazine
Rusty Sailors, President / CTO at LP3 and Chairman, Protecting Tomorrow
Russell Mosley, Director, Infrastructure & Security, Dynaxys
Tom Caldwell, Senior Director of Engineering at Webroot
Get insights into the threat landscape.
Presented by Tyler Moffitt, senior threat research analyst at Webroot, this webinar is based on data derived from the Webroot Threat Intelligence Platform, Webroot’s machine learning and contextual analysis engine.
Comprised of millions of connected sensors and endpoints, in 2016 the Webroot Threat Intelligence Platform observed:
•94% of malware and PUAs were seen only once
•Approximately 1/3 of URLs were high risk
•Zero-day phishing URLs doubled
Get the insights you need to stay ahead of the malware curve in 2017.
We hope you can join us for this live, educational session!
Frankly I’m confused (and I work in endpoint security). In many ways you shouldn’t have to care about the terminology a vendor is using, but when it’s used to confuse and obscure reality, then you do.
What really matters is how effective is your endpoint security at stopping users and devices from being compromised? How many ways will it prevent attacks and how do they all add up in delivering high performance, multi-vector protection?
In this BrightTalk webinar we will be calling it as we see it, dispelling the ambiguous words and techno-babble being used and focusing on the core requirements you should ask all endpoint vendors for?
Finally, this webinar is not going to be a pitch. At Webroot we have never claimed, and are not claiming that we’re a magic ‘silver bullet’, and with five years of cloud-driven endpoint security we’re not the ‘Emperor’s New Clothes’ either.
What we want you to come away from this webinar with is the ammunition to ask hard questions about your endpoint security that will help you make better endpoint security decisions, when you or your colleagues have to make them.
We want you to recognize the FAKE NEWS in endpoint security for what it really is – BS.
This presentation provides an overview of the threats against a wide range of organizations and individuals during 2016. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of top ransomware variants, details on the changes to exploit kits, phishing detection statistics, insights into file reputation and encounter rates with malware and new information on the IoT environment. All data presented comes from Webroot’s Intelligence Network and was observed during 2016. We will also be looking forward into 2017 and making our predictions regarding the evolving threat landscape.Read more >
Discover the smarter way to protect endpoints.
Today’s threats evolve at an alarming pace. That means cybersecurity and threat intelligence have to move even faster to help businesses stay secure against modern cyberattacks. Join us for in-depth technical demonstration of Webroot SecureAnywhere® Business Endpoint Protection to learn how Webroot works to safeguard your employees, clients, and data without adding complexity or slowing users down.
This webinar will provide expert insights on the latest cybercriminal activity and recognize the year's most innovative, dangerous, and pervasive malware. Specifically, we will be covering the latest developments and providing updates on Angler, Neutrino, CryptXXX, TeslaCrypt, Locky, Cerber, CryptoMix, and RaaS. Come learn about these developments and strategies to help secure your organization from ransomware and next-generation cyberthreats.Read more >