Hi [[ session.user.profile.firstName ]]
Sort by:
    • Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember Recorded: Dec 3 2015 6:00 pm UTC 62 mins
    • According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.

      Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.

      Join this webinar to learn:
      • The key stages in the evolution of a post-infrastructure approach to security
      • Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
      intelligence
      • Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps

      Read more >
    • To the Cloud: Ready or Not! …The Catalyst for Better Cybersecurity? To the Cloud: Ready or Not! …The Catalyst for Better Cybersecurity? Mark Weatherford, Chief Cybersecurity Strategist, vArmour Recorded: Jul 12 2016 5:00 pm UTC 34 mins
    • As the global cyber threat environment continues to evolve, organizations need to begin thinking differently about information security and the protection of their infrastructure. The evolution from perimeter-centric, hardware-based environments to virtualized data centers and the cloud is underway and many organizations are late to the game. As CIO’s and CISO’s are driven to transition their CapEx investments to OpEx spending, the economic efficiencies of the cloud provide a rational path to those goals. From a security perspective however, security models that don’t sufficiently address workload and application-aware segmentation, lateral traffic visibility, and network-based threat detection of on-premises data center and public cloud-based environments leave a huge gap in the overall security posture.

      This talk will provide CIO's and CISO's struggling with decisions about migration to the cloud with some thoughts about how the cloud can be the catalyst that improves security while also reducing costs and technology footprint.

      Read more >
    • Six Key Capabilities For Securing Office 365 Email Six Key Capabilities For Securing Office 365 Email Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Kelley Mak, Forrester Analyst Recorded: May 3 2016 6:00 pm UTC 62 mins
    • Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.


      While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.


      Key takeaways include:
      • Why the shift to Office 365 increases criticality of email security
      • Common pitfalls to avoid in the planning stages
      • Key security capabilities to protect from advanced threats

      Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.

      Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.

      Read more >
    • Cybersecurity Predictions for 2016: Targeting the human factor Cybersecurity Predictions for 2016: Targeting the human factor Patrick Wheeler, Director, Threat Security at Proofpoint Recorded: Dec 16 2015 6:00 pm UTC 42 mins
    • The aggressive incorporation of social engineering techniques in the malicious document attachment campaigns that have dominated the threat landscape of 2015 highlights the central place of ‘the human factor’ in the attack chain.

      In 2016, people are the targets: from email and web to social media and mobile apps, attackers will build on the successes of 2015 by developing campaigns that leverage the human factor to bypass increasingly sophisticated automated detection and response capabilities.

      Join Patrick Wheeler, Director, Threat Security at Proofpoint, as he presents Cybersecurity Predictions for 2016: Targeting the human factor addressing the shift to increasingly targeted attacks on people behind the devices.

      Learn how your organization must demand solutions that enable you to:
      • Take measures to secure data
      • Effectively track incidents and remediate incidents
      • Report out on compliance status

      Read more >
    • Cybersecurity and Investors Cybersecurity and Investors Jacob Olcott, Vice President, BitSight, Nell Minow Recorded: Oct 26 2015 6:00 pm UTC 49 mins
    • There’s no doubt that cyber attacks cause real financial harm to businesses. Money can be stolen, business operations disrupted. Cyber theft can provide international competitors with years worth of valuable intellectual property or trade secrets virtually overnight, jeopardizing current and future market opportunities. Cyber attacks can seriously damage an organization’s reputation with customers and result in legal liability for the company, executives, and board members.

      As companies race to protect themselves, how do investors know if the organizations they are investing in are secure?

      Join Jacob Olcott, VP at BitSight, and Nell Minow, corporate governance expert and co-founder of Institutional Shareholder Services (ISS), for a discussion of key issues, including:

      -How investors assess cybersecurity in the M&A diligence process

      -What institutional shareholders want to know about cyber risks to their investments

      -How shareholders can meaningfully engage with companies on cybersecurity

      Read more >
    • Mission Critical: An Update on Federal Cybersecurity Mission Critical: An Update on Federal Cybersecurity Presented by: Nextgov | Underwritten by: Adobe Upcoming: Aug 11 2016 12:30 pm UTC 120 mins
    • Over the past year, a spotlight has been cast on the federal government's insecure,often outdated, digital infrastructure and activities underway to identify and tackle threats to high-value content. What is the current state of security in federal government and how are agencies across government protecting their most prized data?

      At this event, Nextgov will sit down with experts to discuss how cybersecurity has changed the wake of recent breaches of federal IT systems as well as the various policy responses to these breaches and how they are being implemented at an agency level. We'll take a look at federal cybersecurity spending, the new layers of cyber defense through data protection, and how agencies have used the Cybersecurity Strategy and Implementation Plan to improve their systems against hackers and other cyber threats.

      Read more >
    • Overcoming Cybersecurity Challenges through Analytics Overcoming Cybersecurity Challenges through Analytics Presented by: IBM Upcoming: Aug 17 2016 5:00 pm UTC 60 mins
    • Cyberattacks are on the rise, with increasingly sophisticated and persistent cyber threats promoting the Obama administration to issue the Cybersecurity Strategy and Implementation Plan (CSIP) and Cybersecurity National Action Plan (CNAP) to enhance cybersecurity capabilities within the federal government and across the country.

      As agencies work to implement these plans, issues such as outdated infrastructure systems, inconsistent capabilities, and inadequate resources hinder their efforts to detect, prevent, and recover from cyber attacks. In this webcast, we will explore the power of big data and analytics to overcome these challenges and talk with experts about leveraging existing infrastructure with an integrated cyber analytics approach to help government agencies:
      •Detect the overall exposure
      •Predict and prevent cyber attacks
      •Improve cyber defense
      •Automate threat indicator sharing

      Read more >
    • Cybersecurity Challenges, Risks, Trends and Impacts:  Key Survey Insights Cybersecurity Challenges, Risks, Trends and Impacts: Key Survey Insights Julian Dana (Director, Latin America, Mandiant), Chris Leach (Chief Technologist, HPE) Recorded: Jul 21 2016 3:00 pm UTC 59 mins
    • No question about it: Information security—or, more precisely, the lack of it—is firmly on the radar for business and information-technology leaders in organizations of all sizes and in every sector. Many executives and managers fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyber attacks, and a shortage of in-house security expertise remains of widespread concern.

      Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review Custom in February 2016. Commissioned by Hewlett Packard Enterprises Security Services and FireEye, join our experts as they discuss this industry survey to uncover:

      •Implications of breach impacts for organizations
      •Benefits of a risk management strategies
      •Current trends in information-security threats

      Register for this webinar today!

      Read more >
    • The real cybersecurity risks for SCADA and ICS networks The real cybersecurity risks for SCADA and ICS networks Palo Alto Network Senior Industry Expert in SCADA/ICS Networks Recorded: May 18 2016 2:00 am UTC 44 mins
    • It has been well known for some time now that cyber threats to critical national infrastructure has been escalating with many attacks making headline news.

      Normal information assurance approaches used in the corporate environment may not be suitable for your critical infrastructure systems.

      We understand the cybersecurity challenges you are facing today, and believe utilising a platform approach can effectively protect your key infrastructure by:

      •Gaining granular visibility over operational network traffic
      •Segmenting networks with access controls while meeting performance requirements
      •Protecting unpatched commercial-off-the shelf (COTS) systems
      •Preventing advanced cyber attacks which utilise ‘Zero Day’ methods

      Read more >
    • The real cybersecurity risks for SCADA and ICS networks The real cybersecurity risks for SCADA and ICS networks Palo Alto Network Senior Industry Expert in SCADA/ICS Networks Recorded: May 18 2016 9:01 am UTC 44 mins
    • It has been well known for some time now that cyber threats to critical national infrastructure has been escalating with many attacks making headline news.

      Normal information assurance approaches used in the corporate environment may not be suitable for your critical infrastructure systems.

      We understand the cybersecurity challenges you are facing today, and believe utilising a platform approach can effectively protect your key infrastructure by:

      •Gaining granular visibility over operational network traffic
      •Segmenting networks with access controls while meeting performance requirements
      •Protecting unpatched commercial-off-the shelf (COTS) systems
      •Preventing advanced cyber attacks which utilise ‘Zero Day’ methods

      Read more >
    • Defending Against Cybersecurity Threats with Windows 10 Defending Against Cybersecurity Threats with Windows 10 Susie Adams, Microsoft Recorded: Apr 20 2016 3:00 pm UTC 20 mins
    • Today we're experiencing tectonic shift in our threat landscape, where nation states and terror groups engage in highly sophisticated cyber-attacks. Windows 10 is designed to help curb this trend and return control back to your organization. At the top of our nation's defense command center, the Department of Defense recently made an announcement to switch over 4 million seats to Windows 10 to leverage the security features Windows 10 provides, while reducing cost to its IT processes and infrastructure. Windows 10 is your trusted platform to protect your hardware, your identity, and your data.

      In this webcast, viewers will learn more about:
      •Why the Department of Defense is moving its 4 million seats to Windows 10
      •Why Cybersecurity should be top of mind for everyone
      •How Windows 10 combats today's cybersecurity issues

      Read more >