Hi [[ session.user.profile.firstName ]]
Sort by:
    • Comodo Cybersecurity: Render Attacks Useless
      Comodo Cybersecurity: Render Attacks Useless Comodo Cybersecurity Recorded: Jun 26 2018 7:05 pm UTC 2 mins
    • Trojans, and other malicious “wares” generate approximately one million new specimens of hostile software every day. Although many cybersecurity vendors will promise full protection against threats —the truth is, they can’t, no one can. Businesses and people must accept that malware cannot be successfully blocked 100% of the time. As a leader in cybersecurity for over twenty years, Comodo Cybersecurity seeks to protect businesses by understanding the true nature of the digital environment and what malware needs to survive.

      Read more >
    • How to Build your People-Centered Cybersecurity Strategy
      How to Build your People-Centered Cybersecurity Strategy Ryan Kalember, SVP Cybersecurity Strategies at Proofpoint Upcoming: Sep 12 2018 5:00 pm UTC 60 mins
    • Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.

      But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO.

      The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember for a webinar on September 12 to learn how to build a strategy that:

      •Reveals who is targeted and how
      •Combats attacks before they reach your users, and
      •Mitigates damage from the attacks that inevitably will

      About the presenter:

      With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

      Read more >
    • IT Trends in 2018: Cybersecurity
      IT Trends in 2018: Cybersecurity Matthew Gyde Cybersecurity, & Craig Jett Global Security, Dimension Data Recorded: Nov 1 2017 2:00 pm UTC 47 mins
    • 2017 saw a wave of high profile hacks, Ransomware attacks and data security breaches which pushed cybersecurity even further up the business agenda. With customers more concerned about this issue than ever before, companies are turning to technologies such as Artificial Intelligence, blockchain and deep learning software to help them in the fight against digital crime and secure customer data.

      In this webinar we explore how the threat of cybercrime has evolved and advise how these technologies and others can help companies strengthen their defences in 2018.

      Speakers:
      Matthew Gyde, Group Executive, Cybersecurity Dimension Data
      Craig Jett
      VP, Global Security Strategy & Consulting Dimension Data

      Read more >
    • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations
      [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Palo Alto Networks Cybersecurity Experts Recorded: Jan 22 2018 6:00 pm UTC 63 mins
    • Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

      Here’s a sampling of some of the predictions our cybersecurity experts will review:

      •Ransomware Prevention more important than ever
      •The Internet of Things blurs the line between personal and corporate security
      •The era of Software Supply-Chain attacks has begun
      •The Cloud will accelerate channel partner migration to next-generation security innovators
      •Advances in Machine Learning will improve both patient care and cybersecurity
      •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls

      Read more >
    • Jumpstart Your Cybersecurity Strategy with NIST Guidance
      Jumpstart Your Cybersecurity Strategy with NIST Guidance Donna Dodson, Chief Cybersecurity Advisor, NIST; Hemma Prafullchandra, CTO and EVP Products, HyTrust Recorded: Feb 20 2018 8:30 pm UTC 63 mins
    • In 2017, the total cost of a data breach averaged $3.62 million. Companies who experienced a data breach have a 27.7% likelihood of a recurring material data breach over the next two years. These staggering statistics from a 2017 Ponemon Study highlights the need for a strong cybersecurity strategy going into this year.

      In this webinar, experts from the National Institute of Standards and Technology (NIST) will share:

      -Observations and accomplishments from 2017 NIST initiatives
      -NIST’s 2018 cybersecurity focus areas, such as cloud security, internet infrastructure, and industry-aligned (healthcare, financial services) cybersecurity projects
      -Opportunities for industry engagement

      HyTrust experts will provide perspectives on:

      -Best practices for automation and continuous compliance with the NIST Cybersecurity Framework
      -Tips to strengthen your security posture and avoid common pitfalls
      -Key resources to jumpstart your 2018 cybersecurity strategy

      View this webinar to learn more about the state of cybersecurity and what you need to know now to succeed in 2018.

      Read more >
    • Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era?
      Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember Recorded: Dec 3 2015 6:00 pm UTC 62 mins
    • According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.

      Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.

      Join this webinar to learn:
      • The key stages in the evolution of a post-infrastructure approach to security
      • Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
      intelligence
      • Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps

      Read more >
    • Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law
      Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law Mary Chaney, Expert in Cybersecurity Law and WSC VP Jessica Gulick Recorded: Feb 16 2018 12:00 am UTC 60 mins
    • Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

      Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

      Guests: Mary Chaney, Attorney At Law, The Law Offices of Mary N. Chaney, P.L.L.C.
      Threat Intelligence and Forensics Expert, Founder of Horton Technologies, LLC

      Hosted by Jessica Gulick, VP of the Women's Society of Cyberjutsu

      About the Speaker:
      Mary N. Chaney, Esq., CISSP, has 20+ years of experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law. She spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve by becoming a Special Agent for the FBI where she investigated cybercrime as their Information Systems Security Officer.
      Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. She has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital. As an adjunct professor with the University of Cincinnati, she assisted with the establishment of their Cybersecurity Certificate program.
      Currently, Ms. Chaney practices cyber security law for her own firm, The Law Offices of Mary N. Chaney, P.L.L.C. where she specializes in helping the CIO, CISO and General Counsel understand each other to legally protect the enterprise from cyber security risk.

      Read more >
    • Cybersecurity Webinar LIVE: The Unpatchables
      Cybersecurity Webinar LIVE: The Unpatchables oin Lindseigh Strickland, Cybersecurity Specialist and Matt Smith, Systems Engineer at Palo Alto Networks Upcoming: Sep 12 2018 2:00 pm UTC 60 mins
    • Patch management is often highlighted as a major issue for many organisations. The volume and frequency of updates makes it almost impossible to keep all machines up to date and secure. This issue is worse for older machines many of which cannot be patched at all.

      Join Lindseigh Strickland, Cybersecurity Specialist and Matt Smith, Systems Engineer at Palo Alto Networks, for an exclusive cybersecurity webinar on March 28th at 3:00 p.m. to receive an insight into an alternative approach to securing older machines. We’ll also discuss how this approach provides more flexibility and control around patching and protecting unpatchable devices.

      This is a ‘must attend’ event if you want to understand:
      - The security, risk and compliance ramifications of operating unpatchable systems and applications
      - How to prevent security breaches on legacy machines when patching is not an option

      A live demonstration of Palo Alto Networks Advanced Endpoint Protection will also be provided.

      Read more >
    • Cybersecurity Webinar: The Unpatchables
      Cybersecurity Webinar: The Unpatchables Lindseigh Strickland, Cybersecurity Specialist and Ori Pliner, Systems Engineer Specialist at Palo Alto Networks Recorded: Mar 28 2018 2:00 pm UTC 38 mins
    • Patch management is often highlighted as a major issue for many organisations. The volume and frequency of updates makes it almost impossible to keep all machines up to date and secure. This issue is worse for older machines many of which cannot be patched at all.

      Join Lindseigh Strickland, Cybersecurity Specialist and Ori Pliner, Systems Engineer Specialist at Palo Alto Networks, for an exclusive cybersecurity webinar on March 28th at 3:00 p.m. to receive an insight into an alternative approach to securing older machines. We’ll also discuss how this approach provides more flexibility and control around patching and protecting unpatchable devices.

      This is a ‘must attend’ event if you want to understand:
      - The security, risk and compliance ramifications of operating unpatchable systems and applications
      - How to prevent security breaches on legacy machines when patching is not an option

      A live demonstration of Palo Alto Networks Advanced Endpoint Protection will also be provided.

      Read more >
    • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations
      [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Palo Alto Networks Cybersecurity Experts Recorded: Jan 24 2018 2:00 am UTC 64 mins
    • Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

      Here’s a sampling of some of the predictions our cybersecurity experts will review:

      •Ransomware Prevention more important than ever
      •The Internet of Things blurs the line between personal and corporate security
      •The era of Software Supply-Chain attacks has begun
      •The Cloud will accelerate channel partner migration to next-generation security innovators
      •Advances in Machine Learning will improve both patient care and cybersecurity
      •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls

      Read more >
    • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations
      [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Palo Alto Networks Cybersecurity Experts Recorded: Jan 24 2018 9:00 am UTC 70 mins
    • Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

      Here’s a sampling of some of the predictions our cybersecurity experts will review:

      •Ransomware Prevention more important than ever
      •The Internet of Things blurs the line between personal and corporate security
      •The era of Software Supply-Chain attacks has begun
      •The Cloud will accelerate channel partner migration to next-generation security innovators
      •Advances in Machine Learning will improve both patient care and cybersecurity
      •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls

      Read more >
    • How a Cybersecurity Executive Deals with Application Risk
      How a Cybersecurity Executive Deals with Application Risk Joe Silva, Vice President of Cybersecurity for TransUnion Recorded: May 16 2018 3:00 pm UTC 33 mins
    • Join Kenna Security for a discussion on how cybersecurity executives can benefit from taking a risk-based approach to application security – from aligning your teams around common goals to reduce the most risk, to metrics-based reporting to the board. Joe Silva, Vice President of Cybersecurity for TransUnion will provide real-world examples to explain how to overcome the unique challenges to application security to help you gain control over your application risk posture.

      Joe encounters the same challenges that plague you – application security testing data with limited coverage of the application attack surface or riddled with false positives; manual application analysis that simply can’t scale; and security teams that know there is risk, but simply don’t have the time, expertise, or context to find and remediate the relatively small percentage that are high-risk. He also understands what it’s like to have a security team that must convince developers to deviate from their primary responsibility to remediate the vulnerabilities.

      Read more >