Hi [[ session.user.profile.firstName ]]
Sort by:
    • HP Enterprise Security: Leading the Enterprise Security Vision
      HP Enterprise Security: Leading the Enterprise Security Vision Aarij M Khan, Director of Product Marketing, HP Enterprise Security Recorded: Nov 17 2011 2:00 pm UTC 56 mins
    • Both IBM and McAfee made headlines recently when they announced acquisitions in the Security Information and Event Management (SIEM) space. IBM’s intention to acquire Q1-Labs and McAfee’s planned acquisition of NitroSecurity reinforce the fact that SIEM solutions are now “must-have” technologies for organisations seeking to mitigate the risk from cyber threat and cyber crime. Join us to understand what this market consolidation means to you and how these and other recent events serve to validate HP's Security Intelligence and Risk Management Strategy.

      This webinar will also look at the HP ArcSight SIEM Platform, as well as other HP Enterprise Security Products, and will present specific factors to consider when evaluating different SIEM and enterprise security products.

      Read more >
    • Security is NOT an Abstract Concept – Building Consensus in the Boardroom
      Security is NOT an Abstract Concept – Building Consensus in the Boardroom Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Apr 24 2018 9:00 am UTC 35 mins
    • Making the connection between “Cause and Effect” is difficult enough but when technology executives need to explain their strategy to a non-technical audience, all too often the key message is lost in technical jargon.

      When technology is embraced by business leaders, it’s because of the perceived business benefit the technology could bring to the organization. What is frequently not discussed, or even thought about at this level, are the security implications associated with technology. The challenge for the senior technology executives is to be able to associate technology with risk, and risk with business disruption, without resorting to a Fear, Uncertainty and Doubt strategy.

      This session will focus on how senior technology executives can better relate to a non-technical audience, using tangible and quantifiable examples, to both inform and persuade of the need of making security an essential component of any business plan.

      Read more >
    • Cloud Security for Dummies, Enterprise Mobility Edition
      Cloud Security for Dummies, Enterprise Mobility Edition Christopher Campbell, Dir. Enterprise Mobility, VMware & authors of Cloud Security for Dummies, Lebin Cheng & Steve Malmskog Recorded: Apr 26 2016 5:00 pm UTC 56 mins
    • VMware AirWatch and Netskope present:

      Cloud Security for Dummies, Enterprise Mobility Edition

      As more mission-critical business workflows move to the cloud, yesterday’s security protocols and measures have become inadequate. And as cybersecurity threats increase, protecting business resources from compromised mobile endpoints is no longer a “nice to have” but a “must have” for the digital enterprise. More than half of all enterprise cloud app activities now occur over mobile devices with enterprise mobility at the epicenter and crossroad of business productivity and cybersecurity challenges.

      Join VMware AirWatch Director of Enterprise Mobility, Christopher Campbell and Netskope authors of Cloud Security for Dummies, Steve Malmskog and Lebin Cheng, for a lively discussion and reveal of the 10 “must haves" for cloud-consuming mobile workforces. Attendees will learn how to:

      Use intelligence about identity, device, and cloud usage to inform policy decisions on the device, in the app, and in the cloud;

      Identify cloud app usage trends to anticipate users’ needs and create a better mobile and cloud user experience;

      Proactively protect sensitive user and corporate information through policy; and

      Halt threats in the cloud before they propagate to users’ devices.

      Read more >
    • UK Enterprise Security Maturity: How Does Your Organisation Stack Up?
      UK Enterprise Security Maturity: How Does Your Organisation Stack Up? Jarad Carleton, Principal Consultant at Frost & Sullivan & Hadi Hosn, Global Consulting Solutions Lead at Secureworks Recorded: Nov 27 2017 2:00 pm UTC 51 mins
    • During March/April 2017, Secureworks and Frost & Sullivan partnered to conduct security readiness research amongst 201 IT leaders within large UK enterprises to determine how realistic their perceived level of security maturity is. The end result is the white paper, Measuring Cybersecurity Preparedness: Illuminating Perception vs Reality in UK Enterprise.

      In this webcast, Jarad Carleton, Principle Consultant at Frost & Sullivan, will present key findings from the research, which benchmarks UK enterprises against the Security Maturity Model (SMM), co-developed by Secureworks and Frost & Sullivan.

      Hadi Hosn, Global Consulting Solutions Lead at Secureworks, will then explain the Secureworks point of view on some of the challenges UK enterprises are currently facing on their quest for greater security maturity, and how organisations can take positive steps to tackle them.

      During this live webcast we will cover:

      - How you rate against the UK’s Security Leaders
      - The top aspects of security Underprepared organisations should focus on
      - The key security weakness where even Security Leaders are vulnerable
      - Steps you can take to improve the security posture of your organisation

      Read more >
    • A Path to Achieving Network Security ZEN
      A Path to Achieving Network Security ZEN Den Jones, Director – Enterprise Security, Adobe Recorded: Aug 14 2018 4:00 pm UTC 57 mins
    • Finding a balance between a pleasant user experience and stringent security requirements can be a challenge. The need to use a certain username and password for some services while saving additional credentials for other services can contribute to a headache for both security pros and users. Is it even possible to balance security and enhancement of the overall user experience? Adobe believes this is possible. We want to help you achieve this balance by sharing our framework known as Project “ZEN.”

      Project ZEN at Adobe is an initiative based upon principles found in zero-trust frameworks. Since there is no “off-the-shelf” solution to fully deliver on these principles today, ZEN is an investment in pioneering technology and policies to make the path to a zero-trust network more efficient and attainable.

      In this session you will: (a) learn about the principles behind Adobe ZEN, (b) understand the Adobe experience so you can start your own journey by leveraging existing security technology investments and targeted automation technologies, and (c) explore common issues you might encounter along the journey, with guidance on overcoming those issues.

      Read more >
    • Cloud Security - An Enterprise Perspective
      Cloud Security - An Enterprise Perspective Ed Reynolds, HP Fellow and Chief Technologist, HP Enterprise Security Services Recorded: Aug 29 2012 3:00 pm UTC 56 mins
    • For all of its appeal – reduced costs, greater agility, flexibility and scalability – there’s an equal amount of uncertainty around cloud. And the number one worry is security. Enterprises are looking for assurance that leveraging the cloud won’t add risk to their business. Hint: be sure you’re looking in the right place.

      Security in the cloud is not so much about securing the cloud as it is about securing the enterprise and its use of cloud-based services. Gone are the “safe harbor” of mainframes, servers, and storage and data networks. Instead, engineering security from the ground up in the beginning is necessary to provide secure services for cloud-based platforms.

      In this session of Innovation INSIGHT, HP Fellow and cloud security expert Ed Reynolds will discuss considerations for securing your enterprise’s use of cloud-based services.

      Read more >
    • To Outsource, or Not To Outsource: Best Practices for IT Security
      To Outsource, or Not To Outsource: Best Practices for IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Sep 13 2018 6:00 pm UTC 63 mins
    • With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

      By attending, you’ll:

      - Understand best practices for working most effectively with third party providers
      - Discover what security functions can be handled by third parties and what should be kept in-house
      - Recognize how to avoid common pitfalls of working with third parties
      - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

      Save your seat now to learn more!

      Read more >
    • The Practical Execution of Security in the Enterprise
      The Practical Execution of Security in the Enterprise Gee Rittenhouse, SVP Security Business Group, Cisco; Mike Iwanoff, SVP/CISO/CIO, iconectiv Recorded: Dec 5 2017 9:00 pm UTC 28 mins
    • As more of our business data will exist in the cloud and as the scale of IoT creates more weak links in the security chain, what systems in the network are designed securely that CIOs and CSOs can leverage? And will a lack of industry standards and technology architecture around the IoT makes it difficult to create security policies? Also, why do some contend that the IoT is impossible to secure?

      On this edition of NMGs podcast series, we invite Gee Rittenhouse, Senior Vice President, Security Business Group at Cisco and Mike Iwanoff, SVP/CISO/CIO at iconectiv.

      Key takeaways for listeners:

      a.Fraudsters are out in full force: Yesterday’s solution might not solve tomorrow’s problems/challenges

      b.Tips and Info: Top three things I can do to get more info/more data and improve my posture in this area
      •Threat Modeling
      •Risk Assessment
      •Risk Framework

      c.Determine whether you have the technology requirements for an acceptable risk posture:
      •Multi-cloud security
      •segmentation of the network
      •automation – allowing you to implement controls to recover from a threat, find the source and mitigate the threat from reoccurring.

      d.Communicate that risk posture to exec team and to the board - At the end, the company should know what their risks are and what
      they are willing to accept

      e.Understand the challenge and know that you don’t have to build your own security solutions.

      Read more >
    • Open Source Security Tools for Defending Enterprise Organizations
      Open Source Security Tools for Defending Enterprise Organizations Steve Kaufman (LogRhythm) and Paul Asadoorian (Security Weekly) Recorded: Nov 15 2018 6:00 pm UTC 57 mins
    • Tips & Tricks for Defending the Enterprise Using Open Source Tools

      One of the common complaints I hear from security professionals is, “I don’t have the budget for that.” Do you know many of the tools that can solve problems in the enterprise are free, as in free beer? You don’t have to buy commercial products to secure your entire enterprise. Sure, there are some areas that do require a PO, however, there are also several areas of your security program that can be implemented using free and/or open source tools.

      Learn which aspects of your security program can benefit the most from these tools, and how to configure and use them. (Free beer will NOT be provided during this webcast, however, you are encouraged to bring your own, as the presenter’s jokes may be funnier if you are enjoying an adult beverage.)

      – Lightweight threat intelligence: pi-hole in the cloud (+TacyonNet)
      – Vulnerability profiling: Integration with vFeed
      – Patching your systems with Ansible
      – Network monitoring with Bro
      – High-performance firewalls with OpnSense
      – The best free training resources

      Steve Kaufman, a Technical Product Manager from LogRhythm, will be joining the webinar to cover how security technology vendors are aligning with open source tools. He’ll explore how LogRhythm’s architecture, including elasticsearch, enables the product to integrate with open source tools.

      Read more >
    • IDC FutureScape: Worldwide Security Products & Services 2019 Predictions
      IDC FutureScape: Worldwide Security Products & Services 2019 Predictions Sean Pike, Program Vice President, Security Products Recorded: Nov 15 2018 4:00 pm UTC 52 mins
    • In this IDC FutureScape presentation, IDC's Sean Pike will lead a team discussion of the key predictions that will impact enterprise security purchase decisions over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

      About IDC FutureScape
      IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.

      To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape

      Read more >