Hi [[ session.user.profile.firstName ]]
Sort by:
    • ¿Por qué importa la seguridad?  Perspectivas de Latinoamérica de Unisys Security
      ¿Por qué importa la seguridad? Perspectivas de Latinoamérica de Unisys Security Leonardo Carissimi, Security Solutions Director, Unisys Latin America Recorded: Nov 14 2018 8:30 pm UTC 62 mins
    • Unisys Security Index es una importante encuesta regular de las preocupaciones de seguridad llevada a cabo en todo el mundo. Lanzada a nivel mundial desde 2007, proporciona una medida regular y estadísticamente sólida de las preocupaciones que tienen los consumidores de 13 países con respecto a los principales aspectos de la seguridad, incluyendo seguridad nacional, financiera, personal y ciber seguridad.
      Únase a este webinar para escuchar a Leonardo Carissimi, director de Ciberseguridad para Unisys América Latina, compartir los resultados y realidades de la encuesta sobre de las preocupaciones de seguridad de los consumidores en Argentina, Colombia y México.
      Leonardo usará los resultados de este año, yuxtapuestos con más de una década de historial de encuestas realizadas para proporcionar un informe convincente sobre el estado de la seguridad desde la perspectiva que más importa: la del usuario.

      Read more >
    • How to Phish Your Employees For Functional Security
      How to Phish Your Employees For Functional Security Josh Green of Duo Security Recorded: Oct 18 2018 4:00 pm UTC 45 mins
    • More than 90% of reported data breaches and security incidents in 2016 involved a successful phishing attack*. Attackers rely on phishing as a primary strategy because it continues to be both effective and efficient, as users remain the most vulnerable attack vector.

      The best defense against phishing is proactively educating your users, through a shame-free campaign that prepares them for real-world phishing attempts. Along with teaching your users what to watch for, an internal phishing exercise can result in faster user reports of possible phish attempts and reinforce your security response plan.

      In this webinar, you will learn how to:

      - Quickly and easily assess your security posture
      - Help build the business case for addressing your organization’s security needs
      - Build and deploy effective phishing simulations within minutes
      - Identify vulnerable users and devices
      - Increase the speed of user reporting for possible phishing messages

      * Verizon 2017 Data Breach Investigations Report, page 30

      Read more >
    • Application Security at the Speed of DevOps
      Application Security at the Speed of DevOps James Rabon - Product Manager, Fortify Software Security Center and Tools Recorded: Oct 24 2017 6:00 pm UTC 60 mins
    • Faster time-to-market and business value driven application functionality are the biggest drivers for DevOps. With DevOps, more frequent releases require shorter development and test cycles creating a higher risk of breaches exploiting the application layer. The last couple of years have shown business value can take a significant hit with security breaches. Building security features at the speed of DevOps, and reducing risk with the right security architecture, processes, and collaboration is key to staying in business. This is the genesis of DevSecOps.

      In this Webinar, Derek Brink from Aberdeen Research describes how the shift towards rapid application delivery methods creates new opportunities for improving application security and reducing risk. MicroFocus’ James Rabon (Product Manager, Fortify Software Security Center and Tools) and Paladion's Vinod Vasudevan (Co-founder and CTO) discuss how MicroFocus and Paladion are helping customers integrate security and compliance into DevOps processes.

      Key Takeaways from the Webinar:

      - Trends in application delivery: from waterfall, to Agile and DevOps
      - How characteristics of Agile, DevOps provide a high-level blueprint for what application security in that environment should look like
      - Capabilities you should be looking for to improve application security at the speed of DevOps
      - How to adopt non-disruptive and continuous application security processes
      - Bringing in around-the-clock security monitoring for cloud assets

      Read more >
    • Security is NOT an Abstract Concept – Building Consensus in the Boardroom
      Security is NOT an Abstract Concept – Building Consensus in the Boardroom Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Apr 24 2018 9:00 am UTC 35 mins
    • Making the connection between “Cause and Effect” is difficult enough but when technology executives need to explain their strategy to a non-technical audience, all too often the key message is lost in technical jargon.

      When technology is embraced by business leaders, it’s because of the perceived business benefit the technology could bring to the organization. What is frequently not discussed, or even thought about at this level, are the security implications associated with technology. The challenge for the senior technology executives is to be able to associate technology with risk, and risk with business disruption, without resorting to a Fear, Uncertainty and Doubt strategy.

      This session will focus on how senior technology executives can better relate to a non-technical audience, using tangible and quantifiable examples, to both inform and persuade of the need of making security an essential component of any business plan.

      Read more >
    • To Outsource, or Not To Outsource: Best Practices for IT Security
      To Outsource, or Not To Outsource: Best Practices for IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Sep 13 2018 6:00 pm UTC 63 mins
    • With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

      By attending, you’ll:

      - Understand best practices for working most effectively with third party providers
      - Discover what security functions can be handled by third parties and what should be kept in-house
      - Recognize how to avoid common pitfalls of working with third parties
      - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

      Save your seat now to learn more!

      Read more >
    • The 2019 Security Strategy from the former CSO of Facebook and Uber
      The 2019 Security Strategy from the former CSO of Facebook and Uber Joe Sullivan, Chief Security Officer of Cloudflare & Tim Fong, Head of Security Solutions Recorded: Dec 10 2018 5:00 pm UTC 42 mins
    • How are you planning to secure your employees, your company, and your customers in 2019?

      Prior to joining Cloudflare as its Chief Security Officer (CSO) in 2018, Joe Sullivan spent 5+ years as CSO for Facebook and 2.5 years as CSO for Uber. He also previously held security and legal roles at PayPal and eBay and served on the Obama Administration as a member of the Commission on Enhancing National Cybersecurity.

      With over a decade of experience from some of the world’s most influential companies, Joe will share the core strategies he is taking to help protect Cloudflare and, as a result, its 12M domains who rely on its services for security and performance.

      Register now to learn:

      - Major security risks to prepare for in 2019
      - The three areas Cloudflare is using its own products to secure the company
      - The plan to improve internal discipline around “incident response”
      - The critical shift in thinking and strategy around the world becoming “borderless”
      - The “security maturity model” to evaluate and plan the security roadmap

      If you and your team are in the middle of planning how to maintain and improve your security posture for 2019, sign up to attend now. Registrants will also get a copy of the actual Security Maturity Model you can use with your own team.

      Read more >
    • InfoSec Institute & D3 Security: ATM, Card Skimming and Other Fraud
      InfoSec Institute & D3 Security: ATM, Card Skimming and Other Fraud Stan Engelbrecht (D3 Security) and Chris Sienko (InfoSec Institute) Recorded: Dec 7 2018 9:00 pm UTC 35 mins
    • On this episode of the InfoSec Institute's CyberSpeak podcast, Stan Engelbrecht, director of cyber security practice for D3 Security, discusses a scary topic that we’ve been hearing a lot about on the news: the practice of ATM fraud and the implications for other swipe- and chip-based technologies.

      In the podcast, Engelbrecht and host Chris Sienko discuss:

      How did you get started in computers and security? (1:00)

      When did the recent ATM attacks that the U.S. Secret Service has been warning financial institutions about begin? (4:00)

      What warnings signs should ATM users be looking for to ensure they’re not putting their account information at risk? (7:20)

      If you suspect an ATM is compromised, who do you report it to? (10:10)

      Is the technique known as shimming, which uses paper-thin shims containing embedded microchips and flash storage to compromise payment cards, on the rise? (11:40)

      Are there any tips for consumers who will be making additional transactions during the busy holiday season? (15:25)

      Are tap-to-pay systems more or less safe than more traditional methods? (17:50)

      What are the impediments to universal implementation of safer cards? (19:35)

      Are newer ATMs better more secure? (20:55)

      Are their any legislative incentives that could be implemented to make these devices more secure? (24:10)

      Are there any new technologies or methods that can help secure these devices? (25:10)

      Is the firmware/software side of the AMT issue being properly addressed? (28:50)

      Can you tell us a little bit about your company, D3 Security? (31:25)

      Tune in for this engaging, and timely, discussion of ATM and payment fraud.

      Read more >
    • Getting Started with Security Operations: How to Access Basic Security Posture
      Getting Started with Security Operations: How to Access Basic Security Posture Jae Lee – Director Product Marketing, Security Markets, Splunk Upcoming: Dec 18 2018 5:00 pm UTC 63 mins
    • Assessing and monitoring basic security posture is critical. Security teams need the ability to identify and alert on a particular type of malicious activity, AND determine whether that alert is meaningful in a broader context.

      Splunk can help your organization get up and running very quickly with the ability to assess basic security posture. With Splunk, you can centralize security visibility and adopt an investigative mindset to answer questions like:

      - How secure are my endpoints?
      - What is happening on my network?
      - Where is it most critical for me to apply updates?
      - Are user accounts configured properly?
      - Is there any suspicious traffic going out?
      - How is overall security posture in my AWS environment?

      This webinar is perfect for organizations that are just getting started with formalizing their security operations. We’ll show you how with Splunk Security Essentials, a use case framework tool that you can download and stand up quickly to immediately glean security value using your own data sources.

      Read more >
    • Taking back control of cloud security with CASB
      Taking back control of cloud security with CASB Scott Reeves, Senior Systems Engineer Cloud Security Recorded: Oct 4 2018 9:00 am UTC 67 mins
    • Cloud apps can significantly improve an organisation’s productivity. But many of them can be set up without IT involvement, thanks to pay-as-you-go subscriptions and no on-premises infrastructure.

      The result? IT teams no longer complete visibility of all the systems being used across their organisation. This so-called Shadow IT can significantly increase an organisation’s security risks.

      In this webinar, Symantec Cloud Security expert Scott Reeves talks about how to secure cloud apps and master Shadow IT. Register now to:
      •Understand the threats posed by cloud apps and shadow IT
      •Get to know the cloud security landscape
      •Discover how to govern cloud apps and enforce security

      Plus, you’ll learn how a Cloud Access Security Broker (CASB) gives you the visibility and control to beat the cloud chaos – even with limited resources.

      Read more >