Hi [[ session.user.profile.firstName ]]
Sort by:
    • Microservices with OpenShift: Experience from the fields
      Microservices with OpenShift: Experience from the fields Sébastien Pasche, Security Architect Recorded: Feb 21 2017 5:00 pm UTC 63 mins
    • Microservices within a distributed environment is nothing new. But nowadays, when you design a microservices environment, you have to take more into consideration than just the software itself. Designing a distributed application within stateless and immutable environment can be challenging. In this session, we'll share our experimentation with SPA, monitoring, architecture, services design, release management, systems deployment, job executions, authentication, and more. We'll also share our experience splitting a 5M line-of-code app into more than 300 microservices running on OpenShift and Docker. We won't share an absolute set of rules, but what worked for us and what didn't.

      Read more >
    • Real-Time Contextual Learning and Adaptation in an Era of Targeted Attacks
      Real-Time Contextual Learning and Adaptation in an Era of Targeted Attacks Simon Crosby, Co-Founder & CTO of Bromium Recorded: Feb 22 2017 10:00 pm UTC 52 mins
    • You’ve heard a lot about using artificial intelligence and machine learning to change the odds in your favor in cyber-attacks. Unfortunately it turns out that the bad-guys have great AI too, and with each click they can stealthily adapt, morphing into a new hard-to-detect form. But what if we apply learning in real time, on every endpoint, and allow the endpoints to collaborate to identify the threat?

      In this talk Simon Crosby, co-founder and CTO of Bromium, will explore how this new approach can give defenders the edge in an era of targeted attacks.

      About the Presenter:
      Simon Crosby is a co-founder and CTO of Bromium Inc. – the pioneer of micro-virtualization, which enables PCs to defend themselves by design from all malware. Previously Simon was CTO, Data Center & Cloud at Citrix Systems, which acquired XenSource, where he was co-founder and CTO. He was formerly a Principal Engineer at Intel where he led strategic research on platform security and trust, and founder & CTO of CPlane Inc., a pioneer in Software Defined Networking. He was a faculty member in the Computer Laboratory at the University of Cambridge, UK from 1994-2000. He holds a PhD in Computer Science from the University of Cambridge, UK, and is author of more than 50 peer reviewed papers and patents.

      Read more >
    • Account-Based Marketing: A Constellation of Multivendor Offerings
      Account-Based Marketing: A Constellation of Multivendor Offerings Keith Dawson Recorded: Feb 23 2017 4:00 pm UTC 45 mins
    • Join 451 Research to learn how account-based marketing (ABM) is taking on new prominence in the marketing technology stack. In this webinar we’ll examine how ABM has developed into a key methodology for aligning marketing and sales teams in B2B environments. Critical to its evolution have been advances in data science and machine learning, which allow marketers to find and target leads more accurately and with better relevance. Vendors across the martech landscape are developing features that augment ABM practices; in this discussion we will talk about the practicalities of fitting ABM into existing marketing automation frameworks, and how vendors can differentiate their offerings and clarify the landscape for buyers.

      Read more >
    • How to Mitigate Cyber Risk with Efficient Vendor Risk Management
      How to Mitigate Cyber Risk with Efficient Vendor Risk Management Kevin Roden and Julia Grunewald Recorded: Feb 22 2017 6:00 pm UTC 42 mins
    • Over the past few years, outsourcing business functions to vendors has been on the rise. In fact, there are more third-party relationships today than ever before. However, as the number of supplier relationships grows, so grows the amount of risk those suppliers pose. And in today’s hyper-connected landscape, cyber risk has taken center stage when it comes to vendor risk.

      Join former CIO, Kevin Roden, and BitSight’s Senior Customer Success Manager, Julia Grunewald, on Wednesday, February 22nd at 1pm ET, as they discuss traditional and emerging vendor risk management (VRM) tactics.

      In this webinar you’ll learn:
      - How VRM has traditionally been handled
      - Why traditional strategies alone aren’t enough
      - Advice on how to effectively and efficiently mitigate cyber risk

      Read more >
    • Reducing Open Source Risk and Remediation Costs Early in the SDLC
      Reducing Open Source Risk and Remediation Costs Early in the SDLC Pat Durante, Senior Director Education Services; John Beaudoin, Senior Instructional Designer Recorded: Feb 22 2017 4:00 pm UTC 74 mins
    • Increasingly, organizations worldwide are implementing open source security and license risk assessment capabilities early in the software development lifecycle when the cost to remediate issues is lowest. This webinar will demonstrate Black Duck Hub’s effectiveness in providing comprehensive risk assessments when used in combination with our Eclipse IDE plugin, Build Tool, and CI Tool integrations. Additionally, we'll review valuable new features in Black Duck Hub 3.5.
      You’ll also learn:
      - How to improve the accuracy of your open source inventory by leverage open source dependency discovery techniques for build tools and package managers
      - Options for incorporating Hub scanning into your Continuous Integration environments
      - How to track remediation tasks using the Hub-Jira integration
      - How to streamline your component review process
      - Use cases for scanning binary repositories such as Artifactory

      Read more >
    • Threat Actors Are Using Automation.. Are You Automating Threat Response?
      Threat Actors Are Using Automation.. Are You Automating Threat Response? Joseph Yun, Sr. Product Evangelist, ProofPoint Recorded: Feb 21 2017 9:00 pm UTC 43 mins
    • Threat Actors figured out long ago that automating and orchestrating their attacks gives them the ability to conduct their campaigns more efficiently and effectively. The byproduct of these automated attacks is a high volume of events and alerts meant to overwhelm enterprises. Enterprises conducting predominantly manual investigations and remediations will never be able to scale to the level of those attackers utilizing automated tactics.

      Join us on February 21, 2017 at 1 PM PT and learn how to quickly and easily


      •Understand the scope of automation necessary to combat mass campaigns from attackers
      •Understand which automations can be accomplished with the fastest ROI
      •Understand how,you can automate and apply internal context, 3rd party intelligence, campaign data, and investigations
      •Deploy powerful and proven shortcuts to integrate with alert sources and enforcement systems

      Read more >
    • How to Gate, Watch and Guard your Sensitive Data Everywhere
      How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Recorded: Feb 23 2017 11:00 am UTC 55 mins
    • The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

      So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

      We will explain how Symantec technology addresses this approach and how you will benefit from:

      •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

      •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

      •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.

      Read more >
    • Under Attack: Managing Small Business Cybersecurity Risk in 2017
      Under Attack: Managing Small Business Cybersecurity Risk in 2017 Emory Simmons, President of CMIT Solutions of South Charlotte Recorded: Feb 23 2017 4:00 pm UTC 61 mins
    • Over the last few months, cyberattacks have dominated the news, creating uncertainty about how best to protect the value small business owners have worked to create. In this webinar, Emory Simmons, President of CMIT Solutions of South Charlotte, outlines today’s online threats and lays out a plan small businesses can use to manage risk.

      Invest an hour to attend, Under Attack: Managing Small Business Cybersecurity Risk in 2017, on February 23rd at 11:00 am EST for answers to the questions below:

      - What’s the likelihood my company will be targeted by a hacker?
      - If my data is in the cloud, they are responsible for data breaches, right?
      - Are ransomware attacks really that widespread?
      - Does business insurance cover breaches?
      - What can I do today to protect myself and my company?

      Read more >
    • HPE PPM Avoids the Pitfalls when Managing Project Time, Cost and Resources
      HPE PPM Avoids the Pitfalls when Managing Project Time, Cost and Resources Silvia Siqueria, HPE, Mohammed Wahab, HPE Recorded: Feb 21 2017 7:00 pm UTC 61 mins
    • Struggling to manage time, cost and resources across your business applications? Are you missing real-time critical information to make the right investment decisions at the right time? Then join us as we hear how industry practitioners standardize, manage and capture execution of their projects, resources and operational activities.

      Examine best practices by your peers who are using HPE Project and Portfolio Management to provide the business both visibility and data consolidation as they govern and collaborate across application projects and portfolio. Learn how they have differentiated their application delivery through speed and agility, while at the same time reducing costs for quality IT operations.

      Explore out-of-the-box methods for tracking project time, cost and resources
      Learn easy ways to establish standardization for your HPE PPM environment
      Hear customer-proven methods for project governance and collaboration through HPE PPM

      Read more >
    • Containing the Career Impact of Cybercrime
      Containing the Career Impact of Cybercrime Chris Leach, Chief Technologist, HPE. Josh Goldfarb, VP & CTO - Emerging Technologies, FireEye. Recorded: Feb 23 2017 4:00 pm UTC 55 mins
    • Cyber truths and CEOs
      Security industry experts say that the nature and complexity of today’s cyberattacks are beyond the scope of even the largest companies. We’ve seen the headline making news. Big brand companies once thought to be impenetrable, have fallen victim to targeted cyberattacks inflicting significant financial damages to their businesses.

      Financial fall out and executive reputation
      Such breaches are hitting corporations where it hurts the most: the bottom line. A prominent bank recently felt the staggering loss of $81 million resulting from a breach.

      Elevate and propagate
      Battling hackers, state actors, and sophisticated cybercrime organizations may seem like a never-ending, daunting task.

      Please join us as FireEye and HPE Chief Technology Officers reveal a five-point tactical plan to mitigate risk and keep your reputation intact.

      What you’ll learn:

      1.Creating a Risk Profile to assess your organization’s risk level.
      2.CEO engagement. Understanding the amount of time, resources and commitment needed to minimize threat exposure.
      3.Roles and investment. Guidelines for technology, personnel, and budget.
      4.Risks and ramifications. Pinpoint the gaps.
      5.Seek the advice of experts. Don’t stake your reputation by going it alone.

      See you online!

      The FireEye HPE team

      Read more >
    • Rise of the Zombie Army - A Study of Botnets
      Rise of the Zombie Army - A Study of Botnets Ronan Lavelle, General Manager EMEA, Zenedge Recorded: Feb 22 2017 1:00 pm UTC 36 mins
    • From Haitian folklore to George A. Romero’s Dawn of the Dead, the use of Zombies in fictional settings has experienced a strong resurgence in recent years. With fact mirroring fiction, the real world has also faced the terror of dealing with a rise of mindless automatons capable of creating mass devastation on an international scale.

      We are of course talking about the rise of Botnets.

      Come join us for an interactive presentation with chief zombie-wrangler, Ronan Lavelle, on the insidious rise of this threat looking at recent attacks, the link in growth to insecure IoT devices and just what we can do to combat them.

      This webinar is perfect for cyber professionals those who want to:

      - stop data loss by defending against botnets
      - better respond to incidents and remediate
      - reduce attack surfaces and counter threats

      Read more >