Hi [[ session.user.profile.firstName ]]
Sort by:
    • IT Trends in 2018: Cybersecurity
      IT Trends in 2018: Cybersecurity Matthew Gyde Cybersecurity, & Craig Jett Global Security, Dimension Data Recorded: Nov 1 2017 2:00 pm UTC 47 mins
    • 2017 saw a wave of high profile hacks, Ransomware attacks and data security breaches which pushed cybersecurity even further up the business agenda. With customers more concerned about this issue than ever before, companies are turning to technologies such as Artificial Intelligence, blockchain and deep learning software to help them in the fight against digital crime and secure customer data.

      In this webinar we explore how the threat of cybercrime has evolved and advise how these technologies and others can help companies strengthen their defences in 2018.

      Speakers:
      Matthew Gyde, Group Executive, Cybersecurity Dimension Data
      Craig Jett
      VP, Global Security Strategy & Consulting Dimension Data

      Read more >
    • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations
      [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Palo Alto Networks Cybersecurity Experts Recorded: Jan 22 2018 6:00 pm UTC 63 mins
    • Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

      Here’s a sampling of some of the predictions our cybersecurity experts will review:

      •Ransomware Prevention more important than ever
      •The Internet of Things blurs the line between personal and corporate security
      •The era of Software Supply-Chain attacks has begun
      •The Cloud will accelerate channel partner migration to next-generation security innovators
      •Advances in Machine Learning will improve both patient care and cybersecurity
      •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls

      Read more >
    • Jumpstart Your Cybersecurity Strategy with NIST Guidance
      Jumpstart Your Cybersecurity Strategy with NIST Guidance Donna Dodson, Chief Cybersecurity Advisor, NIST; Hemma Prafullchandra, CTO and EVP Products, HyTrust Recorded: Feb 20 2018 8:30 pm UTC 63 mins
    • In 2017, the total cost of a data breach averaged $3.62 million. Companies who experienced a data breach have a 27.7% likelihood of a recurring material data breach over the next two years. These staggering statistics from a 2017 Ponemon Study highlights the need for a strong cybersecurity strategy going into this year.

      In this webinar, experts from the National Institute of Standards and Technology (NIST) will share:

      -Observations and accomplishments from 2017 NIST initiatives
      -NIST’s 2018 cybersecurity focus areas, such as cloud security, internet infrastructure, and industry-aligned (healthcare, financial services) cybersecurity projects
      -Opportunities for industry engagement

      HyTrust experts will provide perspectives on:

      -Best practices for automation and continuous compliance with the NIST Cybersecurity Framework
      -Tips to strengthen your security posture and avoid common pitfalls
      -Key resources to jumpstart your 2018 cybersecurity strategy

      View this webinar to learn more about the state of cybersecurity and what you need to know now to succeed in 2018.

      Read more >
    • Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era?
      Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember Recorded: Dec 3 2015 6:00 pm UTC 62 mins
    • According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.

      Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.

      Join this webinar to learn:
      • The key stages in the evolution of a post-infrastructure approach to security
      • Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
      intelligence
      • Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps

      Read more >
    • Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law
      Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law Mary Chaney, Expert in Cybersecurity Law and WSC VP Jessica Gulick Recorded: Feb 16 2018 12:00 am UTC 60 mins
    • Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

      Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

      Guests: Mary Chaney, Attorney At Law, The Law Offices of Mary N. Chaney, P.L.L.C.
      Threat Intelligence and Forensics Expert, Founder of Horton Technologies, LLC

      Hosted by Jessica Gulick, VP of the Women's Society of Cyberjutsu

      About the Speaker:
      Mary N. Chaney, Esq., CISSP, has 20+ years of experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law. She spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve by becoming a Special Agent for the FBI where she investigated cybercrime as their Information Systems Security Officer.
      Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. She has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital. As an adjunct professor with the University of Cincinnati, she assisted with the establishment of their Cybersecurity Certificate program.
      Currently, Ms. Chaney practices cyber security law for her own firm, The Law Offices of Mary N. Chaney, P.L.L.C. where she specializes in helping the CIO, CISO and General Counsel understand each other to legally protect the enterprise from cyber security risk.

      Read more >
    • Cybersecurity Webinar: The Unpatchables
      Cybersecurity Webinar: The Unpatchables Lindseigh Strickland, Cybersecurity Specialist and Ori Pliner, Systems Engineer Specialist at Palo Alto Networks Recorded: Mar 28 2018 2:00 pm UTC 38 mins
    • Patch management is often highlighted as a major issue for many organisations. The volume and frequency of updates makes it almost impossible to keep all machines up to date and secure. This issue is worse for older machines many of which cannot be patched at all.

      Join Lindseigh Strickland, Cybersecurity Specialist and Ori Pliner, Systems Engineer Specialist at Palo Alto Networks, for an exclusive cybersecurity webinar on March 28th at 3:00 p.m. to receive an insight into an alternative approach to securing older machines. We’ll also discuss how this approach provides more flexibility and control around patching and protecting unpatchable devices.

      This is a ‘must attend’ event if you want to understand:
      - The security, risk and compliance ramifications of operating unpatchable systems and applications
      - How to prevent security breaches on legacy machines when patching is not an option

      A live demonstration of Palo Alto Networks Advanced Endpoint Protection will also be provided.

      Read more >
    • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations
      [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Palo Alto Networks Cybersecurity Experts Recorded: Jan 24 2018 9:00 am UTC 70 mins
    • Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

      Here’s a sampling of some of the predictions our cybersecurity experts will review:

      •Ransomware Prevention more important than ever
      •The Internet of Things blurs the line between personal and corporate security
      •The era of Software Supply-Chain attacks has begun
      •The Cloud will accelerate channel partner migration to next-generation security innovators
      •Advances in Machine Learning will improve both patient care and cybersecurity
      •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls

      Read more >
    • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations
      [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Palo Alto Networks Cybersecurity Experts Recorded: Jan 24 2018 2:00 am UTC 64 mins
    • Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

      Here’s a sampling of some of the predictions our cybersecurity experts will review:

      •Ransomware Prevention more important than ever
      •The Internet of Things blurs the line between personal and corporate security
      •The era of Software Supply-Chain attacks has begun
      •The Cloud will accelerate channel partner migration to next-generation security innovators
      •Advances in Machine Learning will improve both patient care and cybersecurity
      •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls

      Read more >
    • Ensuring Data Protection with NIST Cybersecurity Framework
      Ensuring Data Protection with NIST Cybersecurity Framework Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec Recorded: Jul 20 2017 6:00 pm UTC 32 mins
    • When it comes to your data, regardless of your country or industry, you likely have compliance regulations to adhere to. We understand the challenges this can bring to your IT and compliance teams.

      Adopting the NIST Cybersecurity Framework (CSF) is one way that can help you achieve compliance with the many regulations you may be affected by. Developed in the United States, the CSF has been adopted by many organizations, including those in the international community with one example being the government of Italy, who has incorporated the Framework into its own National Framework for Cyber Security.

      Join us for a webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross CISSP, MCSE, CHSS, CCSK, CISM as he dives into the CSF to:

      • Identify sensitive data, where it is and who is accessing it

      • Protect that data by establishing policies which prevent exposure

      • Detect threats to which could extrapolate data by several means

      • Respond to threats with automated actions

      • Recover after a threat to produce reports to prove compliance

      Register Today

      Read more >