Hi [[ session.user.profile.firstName ]]
Sort by:
    • HP Enterprise Security: Leading the Enterprise Security Vision
      HP Enterprise Security: Leading the Enterprise Security Vision Aarij M Khan, Director of Product Marketing, HP Enterprise Security Recorded: Nov 17 2011 2:00 pm UTC 56 mins
    • Both IBM and McAfee made headlines recently when they announced acquisitions in the Security Information and Event Management (SIEM) space. IBM’s intention to acquire Q1-Labs and McAfee’s planned acquisition of NitroSecurity reinforce the fact that SIEM solutions are now “must-have” technologies for organisations seeking to mitigate the risk from cyber threat and cyber crime. Join us to understand what this market consolidation means to you and how these and other recent events serve to validate HP's Security Intelligence and Risk Management Strategy.

      This webinar will also look at the HP ArcSight SIEM Platform, as well as other HP Enterprise Security Products, and will present specific factors to consider when evaluating different SIEM and enterprise security products.

      Read more >
    • Security is NOT an Abstract Concept – Building Consensus in the Boardroom
      Security is NOT an Abstract Concept – Building Consensus in the Boardroom Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Apr 24 2018 9:00 am UTC 35 mins
    • Making the connection between “Cause and Effect” is difficult enough but when technology executives need to explain their strategy to a non-technical audience, all too often the key message is lost in technical jargon.

      When technology is embraced by business leaders, it’s because of the perceived business benefit the technology could bring to the organization. What is frequently not discussed, or even thought about at this level, are the security implications associated with technology. The challenge for the senior technology executives is to be able to associate technology with risk, and risk with business disruption, without resorting to a Fear, Uncertainty and Doubt strategy.

      This session will focus on how senior technology executives can better relate to a non-technical audience, using tangible and quantifiable examples, to both inform and persuade of the need of making security an essential component of any business plan.

      Read more >
    • From DevOps to DevSecOps: Cloud & Security in the Enterprise
      From DevOps to DevSecOps: Cloud & Security in the Enterprise Tim Sandage, Brian Johnson, Tufin Upcoming: Nov 28 2018 6:30 pm UTC 60 mins
    • Join this live panel discussion with experts at AWS re:Invent 2018 for an in-depth look at the future of cloud, application security, and transitioning from DevOps to DevSecOps.

      Tune into this interactive Q&A session with world renowned Cloud, DevOps, and Security leaders while they discuss the following:

      - The challenges organizations are facing on how they can culturally come together
      - How security can be an integral part of the DevOps practice to solve these challenges
      - DevOps growth in the enterprise
      - Challenges with using traditional security tools/processes and collaboration through automation
      - Fostering shared responsibility among Security and DevOps

      This live panel will be streamed directly from AWS re:Invent in Las Vegas! Join us for live Q&A from the comfort of your desk.

      Moderator: Tim Sandage, Sr. Security Partner Strategist, AWS
      Panelists: Brian Johnson, CEO, DivvyCloud and Tufin

      Read more >
    • Cloud Security for Dummies, Enterprise Mobility Edition
      Cloud Security for Dummies, Enterprise Mobility Edition Christopher Campbell, Dir. Enterprise Mobility, VMware & authors of Cloud Security for Dummies, Lebin Cheng & Steve Malmskog Recorded: Apr 26 2016 5:00 pm UTC 56 mins
    • VMware AirWatch and Netskope present:

      Cloud Security for Dummies, Enterprise Mobility Edition

      As more mission-critical business workflows move to the cloud, yesterday’s security protocols and measures have become inadequate. And as cybersecurity threats increase, protecting business resources from compromised mobile endpoints is no longer a “nice to have” but a “must have” for the digital enterprise. More than half of all enterprise cloud app activities now occur over mobile devices with enterprise mobility at the epicenter and crossroad of business productivity and cybersecurity challenges.

      Join VMware AirWatch Director of Enterprise Mobility, Christopher Campbell and Netskope authors of Cloud Security for Dummies, Steve Malmskog and Lebin Cheng, for a lively discussion and reveal of the 10 “must haves" for cloud-consuming mobile workforces. Attendees will learn how to:

      Use intelligence about identity, device, and cloud usage to inform policy decisions on the device, in the app, and in the cloud;

      Identify cloud app usage trends to anticipate users’ needs and create a better mobile and cloud user experience;

      Proactively protect sensitive user and corporate information through policy; and

      Halt threats in the cloud before they propagate to users’ devices.

      Read more >
    • UK Enterprise Security Maturity: How Does Your Organisation Stack Up?
      UK Enterprise Security Maturity: How Does Your Organisation Stack Up? Jarad Carleton, Principal Consultant at Frost & Sullivan & Hadi Hosn, Global Consulting Solutions Lead at Secureworks Recorded: Nov 27 2017 2:00 pm UTC 51 mins
    • During March/April 2017, Secureworks and Frost & Sullivan partnered to conduct security readiness research amongst 201 IT leaders within large UK enterprises to determine how realistic their perceived level of security maturity is. The end result is the white paper, Measuring Cybersecurity Preparedness: Illuminating Perception vs Reality in UK Enterprise.

      In this webcast, Jarad Carleton, Principle Consultant at Frost & Sullivan, will present key findings from the research, which benchmarks UK enterprises against the Security Maturity Model (SMM), co-developed by Secureworks and Frost & Sullivan.

      Hadi Hosn, Global Consulting Solutions Lead at Secureworks, will then explain the Secureworks point of view on some of the challenges UK enterprises are currently facing on their quest for greater security maturity, and how organisations can take positive steps to tackle them.

      During this live webcast we will cover:

      - How you rate against the UK’s Security Leaders
      - The top aspects of security Underprepared organisations should focus on
      - The key security weakness where even Security Leaders are vulnerable
      - Steps you can take to improve the security posture of your organisation

      Read more >
    • A Path to Achieving Network Security ZEN
      A Path to Achieving Network Security ZEN Den Jones, Director – Enterprise Security, Adobe Recorded: Aug 14 2018 4:00 pm UTC 57 mins
    • Finding a balance between a pleasant user experience and stringent security requirements can be a challenge. The need to use a certain username and password for some services while saving additional credentials for other services can contribute to a headache for both security pros and users. Is it even possible to balance security and enhancement of the overall user experience? Adobe believes this is possible. We want to help you achieve this balance by sharing our framework known as Project “ZEN.”

      Project ZEN at Adobe is an initiative based upon principles found in zero-trust frameworks. Since there is no “off-the-shelf” solution to fully deliver on these principles today, ZEN is an investment in pioneering technology and policies to make the path to a zero-trust network more efficient and attainable.

      In this session you will: (a) learn about the principles behind Adobe ZEN, (b) understand the Adobe experience so you can start your own journey by leveraging existing security technology investments and targeted automation technologies, and (c) explore common issues you might encounter along the journey, with guidance on overcoming those issues.

      Read more >
    • Cloud Security - An Enterprise Perspective
      Cloud Security - An Enterprise Perspective Ed Reynolds, HP Fellow and Chief Technologist, HP Enterprise Security Services Recorded: Aug 29 2012 3:00 pm UTC 56 mins
    • For all of its appeal – reduced costs, greater agility, flexibility and scalability – there’s an equal amount of uncertainty around cloud. And the number one worry is security. Enterprises are looking for assurance that leveraging the cloud won’t add risk to their business. Hint: be sure you’re looking in the right place.

      Security in the cloud is not so much about securing the cloud as it is about securing the enterprise and its use of cloud-based services. Gone are the “safe harbor” of mainframes, servers, and storage and data networks. Instead, engineering security from the ground up in the beginning is necessary to provide secure services for cloud-based platforms.

      In this session of Innovation INSIGHT, HP Fellow and cloud security expert Ed Reynolds will discuss considerations for securing your enterprise’s use of cloud-based services.

      Read more >
    • To Outsource, or Not To Outsource: Best Practices for IT Security
      To Outsource, or Not To Outsource: Best Practices for IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Sep 13 2018 6:00 pm UTC 63 mins
    • With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

      By attending, you’ll:

      - Understand best practices for working most effectively with third party providers
      - Discover what security functions can be handled by third parties and what should be kept in-house
      - Recognize how to avoid common pitfalls of working with third parties
      - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

      Save your seat now to learn more!

      Read more >
    • Trends in IAM: The Consumerization of Enterprise Security
      Trends in IAM: The Consumerization of Enterprise Security Danna Bethlehem, Director of Product Marketing Recorded: Mar 7 2018 4:00 pm UTC 34 mins
    • With a growing number of cloud apps in use, more employees working remotely increasing the need for stronger authentication. This is driving IT decision makers to find ways to ‘consumerize’ the login process. To get a better understanding of access management challenges and views on the industry Gemalto surveyed 1,000 IT decision makers to compile the 2018 Identity and Access Management Index. During this webinar, we will share some of the fascinating key findings that will shape cybersecurity and the way enterprise IT professionals evaluate and implement access management technology. Join us to learn more about:

      •2018 key findings and trends
      •How consumerization of IAM can be achieve in the enterprise security space
      •How organizations can maintain security while lowering barriers to authentication
      •Evolution of IAM Trends: A look at the historical numbers compared to the new findings

      Read more >
    • The Practical Execution of Security in the Enterprise
      The Practical Execution of Security in the Enterprise Gee Rittenhouse, SVP Security Business Group, Cisco; Mike Iwanoff, SVP/CISO/CIO, iconectiv Recorded: Dec 5 2017 9:00 pm UTC 28 mins
    • As more of our business data will exist in the cloud and as the scale of IoT creates more weak links in the security chain, what systems in the network are designed securely that CIOs and CSOs can leverage? And will a lack of industry standards and technology architecture around the IoT makes it difficult to create security policies? Also, why do some contend that the IoT is impossible to secure?

      On this edition of NMGs podcast series, we invite Gee Rittenhouse, Senior Vice President, Security Business Group at Cisco and Mike Iwanoff, SVP/CISO/CIO at iconectiv.

      Key takeaways for listeners:

      a.Fraudsters are out in full force: Yesterday’s solution might not solve tomorrow’s problems/challenges

      b.Tips and Info: Top three things I can do to get more info/more data and improve my posture in this area
      •Threat Modeling
      •Risk Assessment
      •Risk Framework

      c.Determine whether you have the technology requirements for an acceptable risk posture:
      •Multi-cloud security
      •segmentation of the network
      •automation – allowing you to implement controls to recover from a threat, find the source and mitigate the threat from reoccurring.

      d.Communicate that risk posture to exec team and to the board - At the end, the company should know what their risks are and what
      they are willing to accept

      e.Understand the challenge and know that you don’t have to build your own security solutions.

      Read more >