On Tuesday 24th May, Kevin Loome will provide a fund update for the Henderson Horizon Global High Yield Bond FundRead more >
Year over year, newer and more inventive social-engineering techniques, such as watering hole attacks and spear phishing, are combined with malware attacks to trick users into handing over their personal information. Traditional security solutions are unable to keep up with these new threats and provide effective solutions. By using big data analytics and security intelligence, a Security-as-a-Service platform provides real-time protection to millions of end users daily. This will define the next generation of cloud-based threat identification and advanced persistent threat prevention by leveraging collective cloud-hosted intelligence to offer up-to-the-minute protection—both on the web and across all device platforms.
Attendees will leave this presentation with:
• An overview of the common threats and methods used to perform attacks.
• A summary of the impact such threats bring to both users and businesses.
• A better understanding of the challenges and benefits of deploying a cloud-based security solution.
There is a substantial cost associated with reaching and maintaining PCI DSS compliance requirements, but the cost of non-compliance is often much greater. While the initial cost of the technology, staff and other resources necessary to implement satisfactory controls has its price tag, it is vital that all organizations affected by the PCI standard consider both the short and long-term costs of non-compliance as well as the benefits to meeting the requirements.
This is especially important as PCI DSS evolves and increase in complexity as the standard moves towards becoming a federal regulation. The costs of non-compliance can far exceed the cost of systems to bring a company into compliance, as demonstrated by so many high profile data breaches. Join this executive panel as we discuss ways to prevent costly cases of non compliance with PCI DSS.
The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.
This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
Halten Sie Ihr Colocation Business mit den richtigen Tools und Methoden auf Wachstumskurs!Read more >
The bad news: A staggering 80% of businesses believe that right now there is a severe shortage of security staff. Even worse is that by 2020 there will be a workforce shortage of 1.5 million security professionals.
The risk of security breaches and cyber-attacks are increasing. To meet security threats, either you divert existing staff away from their intended tasks, or you hire expert help from a skilled pool that is already shrinking.
There is a better way.
Join our webinar where you will learn how to stop simply coping and seize control of your security program whilst looking ahead to deal proactively with possible attacks.
Over the next three months, we’ll be holding a series of 4 webinars tackling threat and information protection.
1) €20 million reasons to embrace the new EU GDPR (21st April 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195977
2) The Cloud: Eliminate risks, Gain Control; release benefits (11th May 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195987
3) How are you managing the security skills shortage? (2nd June 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195991
4) Clouds, hurricanes and cyber-attacks… (29th June 10:30am GMT) - https://www.brighttalk.com/webcast/5691/195993
iSCSI is an Internet Protocol standard for transferring SCSI commands across an Ethernet network, enabling hosts to link to storage devices wherever they may be. In this Webcast, we will discuss the evolution of iSCSI including iSER, which is iSCSI technology that takes advantage of various RDMA fabric technologies to enhance performance. Register now to hear:
•A brief history of iSCSI
•How iSCSI works
•IETF refinements to the specification
•Enhancing iSCSI performance with iSER
The Webcast will be live, so please bring your questions for our experts.
Dynamic analysis of android apps is all about analyzing apps in real time, for the purpose of detecting application level vulnerabilities and for the sake of manipulating applications while they execute. It is often used as a last resort due to its complexity, when other pentesting techniques mainly focused on static analysis are not enough. Common usages of dynamic analysis are extraction of sensitive data from application memory variables, stealing encryption keys, manipulating signature mechanisms and so on.
During this talk we will focus on memory dumps, remote debugging, small debugging, native debugging, usage of ReFrameworker platform and other interesting things.
This talk is based on a similar chapter as part of the Android application hacking course given by the speaker at recent BlackHat USA 2015
Tune in to this webcast to learn how educational institutions can simplify IT, improve security, and empower your mobile workforce.
Create a dynamic and diverse institution that gives educators the tools to inspire students to consume and create knowledge
EMS Defined (Microsoft’s Answer to Security)
Microsoft Identity Management
How to secure the Enterprise in Education using EMS
Leveraging EMS for Education Industry
Schlechte Nachrichten: 80% aller Unternehmen sehen einen akuten Mangel an IT Sicherheit-Fachkräften. Bis 2020 sollen ca. 1,5 Millionen (!) solcher Fachkräfte fehlen, wenn nichts getan wird. Währenddessen steigt das Risiko erfolgreicher Angriffe und Daten-Verluste. Um sich diesen Gefahren stellen zu können kann man entweder bestehendes Personal refokussieren oder man stellt externe Hilfe ein, was immer schwieriger und kostspieliger wird. Es gibt auch einen anderen Weg: in unserem dritten Webcast betrachten wir mögliche Ansätze mit der neuen Gefahrenlage umzugehen und die Kontrolle bewahrt bzw. auch proaktiv nach vorne blicken kann.Read more >
Understanding your customer is critical to crafting a great Customer Experience. By knowing their motivations, goals and behavior, you can identify clear paths to improvement. In this fourth webinar in our series, join Forrester analyst Deanna Laufer as she discusses how you can gain a complete picture of your customers, and build experiences guaranteed to transform them into loyal brand advocates.Read more >
Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.
Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.
No one can deny that the Fintech scene is booming in the Nordic countries. The collaboration culture that has been quite prominent among the banks in the region as well and on this panel we will discuss whether this slows down or accelerates fintech development.
More topics to be covered:
Fintechs vs. Banks: Are they a threat to existence of Banks or opportunity to thrive?
Why is it necessary to partner & understand Fintechies?
What benefits do Fintechies have over banks?
Why do Fintechies need banks?
What successful models are there for partnering up with Fintechies?
What are the reasons should you choose to acquire a Fintech company?
Marketers are ignoring one of the most fundamental customer needs: community. Hundreds of millions has been spent on customer centricity and understanding the persona to the nth degree in order to provide 'killer customer insight'. But we have all been blind to one of the most fundamental needs in human life that only comes second to food and shelter: the need to belong.
The stuff of the human condition is to belong, to make meaning, feel secure, have order within chaos and create identity. Marketers ignore these constituent building blocks of humanity at their peril.
This webinar will explain what a branded community is, why it is fundamental for marketing now and in the future, and how to build one for your organisation.
Deploying new WAN services can take a long time and require a significant up-front capital investment. The software-defined nature of SD-WAN enables service agility, rapid rollout, and instant-on WAN that the Service Provider can immediately benefit from. This accelerates the time to market and time to revenue.
Hear from experts at VeloCloud discuss the key SD-WAN capabilities and how the Service Providers already leverage them to create and operate new WAN services.
Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.
Consider these statistics from IDC:
• Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
• Over 90% of threats to enterprises emanate from email
• 65% of threats go undetected for weeks/months
IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.
Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.
Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.
Learn how to enhance your Office 365 security to:
• Shield Email From Phishing, Sophisticated Malware and Spam
• Neutralize Advanced Threats and Targeted Attacks
• Safeguard Your Sensitive Data
•Control Access with Strong Authentication
Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
For product designers, research scientists and engineers, a computational model that predicts the behaviour of a design is only the first step in the modelling process. Once a model has been solved the next step is to optimize the design. This might involve minimising the amount of material needed to safely support a structure, or maximising the throughput of a chemical in a chemical reactor. This optimization process can be automated using the Optimization Module in COMSOL Multiphysics®. You can pick one or more objective functions to be minimised, identify which modelling inputs can be varied to achieve the optimal design, and specify a set of constraints that a model must satisfy. In this webinar we will show you how to use the geometry optimization capabilities of COMSOL Multiphysics® version 5.2 to find the best designs quickly and easily. The presentation will feature a live modelling demo and finish with a Q&A session.Read more >
We look at how ready EU businesses are for the impending data privacy revolution and how a holistic approach to Information Governance not only helps you prepare for the regulation, but brings agility and innovation back to your IT systems.Read more >
As companies expand and rapidly bring new branches online, the need arises to quickly establish connectivity to the datacenter and cloud applications - as well as build the extended network infrastructure. However, the skyrocketing cost and length of time required to connect users to applications via MPLS coupled with the disparate nature of the branch infrastructure is putting increased pressure on IT budgets and resources. While costs soar and time to market increases an organization’s competitiveness is compromised.
Nutanix, delivering invisible infrastructure for next-generation enterprise computing and Silver Peak, the leader in building broadband and hybrid wide area networks, have partnered to deliver a combined solution that solves this problem – dramatically driving down costs, increasing performance and accelerating branch deployments.
Join this webinar to learn how you can:
•Eliminate under-utilized infrastructure silos, using up to 80% less space and 50% lower CAPEX
•Save up to 90% in WAN OPEX by leveraging broadband vs MPLS
•Speed up deployment with rapid connectivity, a turn-key infrastructure and zero-touch deployment of broadband WAN
•Securely connect and accelerate remote office applications
•Achieve centralized management and control with enhanced visibility into the network and applications
Join our webinar on Tuesday, 24 May where we’ll be looking at key challenges for hundreds and thousands of SMEs facing auto-enrolment (AE) in 2016 – and how to solve them.
From the basic requirements to the obvious pitfalls and issues to watch out for, our auto-enrolment specialists, Adam Bexson and Steve Elliott, will take you step-by-step through the process.
We’ll help you to understand what you should be doing in the run up to your staging date, as well as what you can expect during and post staging date, covering topics such as:
•The difference between eligible and non-eligible jobholders;
•How long you can postpone for and how often; and
•The cheapest way to satisfy the requirements in terms of contributions;
•Navigating your way through AE legislation efficiently;
•Ensuring your auto-enrolment scheme meets the legislation; and
•How to be certain that your approach to AE is correct.