Hi [[ session.user.profile.firstName ]]
Sort by:
    • Top cyber threats in the financial sector
      Top cyber threats in the financial sector Candid Wueest, Principal Threat Researcher, Symantec Recorded: Nov 16 2017 3:00 pm UTC 49 mins
    • Financial institutions are increasingly facing attacks on multiple fronts.

      Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions. While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing new types of attacks in the form of large-scale financial heists.

      Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards. They are using living off the land and fileless attack tactics similar to APT groups. But also extortion with DDoS attacks or business email compromise (BEC) scams are increasingly bothering financial corporations.

      In this webcast on the current financial threat landscape, Symantec takes a look at the most prevalent and significant financial threats.

      In this webcast we will review:
      - The top threats facing financial institutions with statistics and examples
      - Explore the most common techniques employed in financial attacks
      - Provide case studies of the most high-profile financial attacks of the past 12 months

      Read more >
    • Digital GRC: Innovations for Early Identification and Management of Risk
      Digital GRC: Innovations for Early Identification and Management of Risk Moderated by Colin Whittaker; Yo Delmar, MetricStream; Jason Ford, Contegix; and Cameron Jackson, Riskonnect Recorded: Nov 16 2017 6:00 pm UTC 62 mins
    • Attendees can earn 1 CPE credit on this session.

      Digitization has become deeply embedded in enterprise strategy, as nearly all businesses and activities have been slated for digital transformations. The significant advantages of digitization, with respect to customer experience, revenue, and cost, have become increasingly compelling, and we are starting to see digital transformations in risk create real business value by improving efficiency and the quality of risk decisions.

      The state of risk management at most global, multiregional, and regional banks is abundant with opportunity. Current processes are resource intensive and insufficiently effective, as indicated by average annual fines above $400 million for compliance risk activities alone. By improving the efficiency and effectiveness of current risk-management approaches, digital risk initiatives can reduce operating costs for risk activities by up to 30 percent, and a digitized risk function can provide better monitoring and control and more effective regulatory compliance. On this webinar our panel of experts will discuss digital innovations for risk management success.

      Read more >
    • Security Heretic: What got us here, won't get us there
      Security Heretic: What got us here, won't get us there Gary Marsden, Senior Director of Data Protection Solutions at Gemalto Recorded: Nov 16 2017 4:00 pm UTC 57 mins
    • Cybersecurity is at a crossroads and requires a dramatic shift to adequately support the needs of business owners and security administrators as digital transformation challenges their needs and investments. Managing multiple cloud providers and dramatic increases in the number of endpoints generating data and the subsequent volume of data means enterprise security teams no longer have the requisite skills and bandwidth to deal with complicated security products. Building in security from the beginning quickly and cost-effectively is an industry game changer, especially with new growth markets like Big Data, Blockchain, Cloud Computing, Internet of Things and Digital Payments.

      Multi-cloud environments and government regulations and industry compliance add to the complexity of maintaining a manageable and effective data protection strategy. Transforming encryption and key management (data protection in general) into a click and deploy model reduces internal business barriers between security teams, DevOps and product teams and alleviates disparate security policies, so you know where your data is and that it is secure. The way people consume security is changing by taking an on-demand approach similar to the Netflix philosophy. In this webinar, we will discuss how cloud-based security is simplifying workflow processes, changing cost/benefit models to drive us towards a pervasiveness of encryption and key management that will de-risk data and connectivity in similar ways to anti-virus and firewalls.

      Join this interactive presentation to learn about:
      • The role of security in today's connected world
      • The drivers for and impact of simplifying security on business and workflow
      • How security is providing valuable business intelligence through connected systems and meeting compliance mandates
      • Gemalto’s solution to solving on-demand data protection
      • Upcoming cybersecurity trends and how to prepare

      Read more >
    • Just When You Thought it Was Safe to Jump Back into the Cyber Pool...
      Just When You Thought it Was Safe to Jump Back into the Cyber Pool... Simon Bryden, Consulting Systems Engineer Recorded: Nov 16 2017 10:00 am UTC 45 mins
    • If nothing else, the last 12 months have proved that we can never overestimate what can happen when you combine poor security hygiene with politics, human ingenuity and human error - if we can believe the latest headlines.

      Wannacry, NotPetya and Equifax have dominated headlines but it’s not hard to compile a much larger list if you look a little bit deeper. And while past results are no guarantee for future performance, it is that time of the year to look ahead to see what might be in store for 2018. However, looking ahead without taking the past into account can only give a partial perspective.

      This Fortinet “Threats on the Horizon” summit presentation will summarize what we have seen so far in 2017 and present our perspective for what we can expect in 2018.

      Read more >
    • Virtualizing Media Broadcast: TV Transformed
      Virtualizing Media Broadcast: TV Transformed Steve Reynolds - Imagine Communications, Limor Schafman - TIA Recorded: Nov 17 2017 4:00 pm UTC 46 mins
    • Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

      Speakers:
      Steve Reynolds, CTO, Imagine Communications

      Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.

      Host: Limor Schafman, Content Development Director, TIA


      NOT BICSI accredited.

      Read more >
    • Next Gen Apps Need Next Gen Databases
      Next Gen Apps Need Next Gen Databases James Curtis Senior Analyst of Data Platforms & Analytics at 451 Research; Leena Joshi, VP of Marketing at Redis Labs Recorded: Nov 16 2017 5:00 pm UTC 51 mins
    • The next generation of applications being built at the rising star companies are different from the clunky software being built in traditional businesses. As traditional companies modernize their software stacks, they need to incorporate renewed expectations into their applications such as tailored user experiences, built-in analytics and decision-making while meeting response time requirements under any conditions.

      James Curtis, senior analyst at 451 group, outlines top trends in user experience requirements and the higher bar for application developers when it comes to delivering complex analytics so users can take real time action. The wide availability of new NoSQL, streaming and advanced analytics technologies are enabling state of the art functionality in applications.  Join this session for a discussion of top drivers and barriers organizations face while overhauling their applications to incorporate cutting edge functionality.

      Leena Joshi, VP Product Marketing at Redis Labs examines specific advantages of the Redis Enterprise platform that simplify the implementation of real-time analytics functionality such as probabilistic counts, time-series analysis, leaderboards, personalized recommendations, location-based calculations into modern applications.

      Read more >
    • Software Defined Technologies: Building tomorrow’s digital infrastructure
      Software Defined Technologies: Building tomorrow’s digital infrastructure Phil Lees, Chief Technical Officer, WhiteSpider Recorded: Nov 17 2017 1:00 pm UTC 49 mins
    • To create greater competitive advantage and better customer experience, organisations need to build their digital capabilities with innovative solutions and initiatives.

      WhiteSpider is an expert in Software Defined Technologies - the building blocks of a digital infrastructure - and one of Cisco's leading partners in designing and delivering Application Centric Infrastructure

      In this webinar we will be looking at how Software Defined Technologies are supporting organisations as they create digital capabilities through:

      1. Enabling Scalability and Agility: Be able to rapidly scale, and react quickly to the changes in business requirements.
      2. Delivering intelligence: Detailed, predictive and actionable analytics
      3. Developing automation: Solutions that enable orchestration and automation reducing the need for, and cost of, human intervention.
      4. Promoting collaboration: Simplifying and unifying the communication between IT and Business.

      We will be looking at specific examples of where WhiteSpider has enabled these capabilities through solutions we have delivered in Motor Racing, Healthcare and Manufacturing.

      Read more >
    • Equifax Breach and Managing Your Vulnerabilities
      Equifax Breach and Managing Your Vulnerabilities Carl Wright (AttackIQ), Igor Baikalov (Securonix), Chris Petersen (LogRhythm), Sam Abadir (LockPath) Upcoming: Nov 22 2017 12:00 am UTC 60 mins
    • With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.

      What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?

      Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
      - The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
      - Managing IT risk and vulnerabilities
      - How to improve breach prevention, detection and response
      - What to expect in the future

      Speakers:
      - Igor Baikalov, Chief Scientist, Securonix
      - Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
      - Sam Abadir, Director of Product Management, LockPath

      Moderator:
      - Carl Wright, CRO, AttackIQ

      Read more >