We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.
Chart Industries — a global manufacturer with 5,000 employees and 45 locations — was facing a huge volume of malicious activity every day resulting in excessive break-fix work for their small security team. They had thousands of unmanaged mobile and guest devices connecting to their networks. And neither web proxies nor endpoint security could fully protect them. They needed a new layer of malware and breach protection. But it also had to be a painless deployment and it needed to be a transparent experience for their employees and guests.
Hear directly from Jack Nichelson, Chart’s Director of IT Infrastructure and Security to learn:
-Why they use a layered approach to security and how OpenDNS complements their security stack
-How long it took to deploy OpenDNS Umbrella globally
-How his security analyst, Kevin Merolla, quickly responds to incidents or false positives using OpenDNS Investigate
InfoSec 2016 - What is risk-based security?Read more >
Interview with FortyCloud during InfoSec 2014, the interview talks about the main challenges of IT security in 2014 and where are the best places to start dealing with those challenges.Read more >
In Westeros - the land of dark knights, backstabbing royals, and a myriad of other characters - even the youngest ones have to learn basic self-defense to have any hope of surviving the cruel world imagined by A Game of Thrones (GOT) author, George R. R. Martin. And so too, must every CISO and security pro learn the latest information security best practices if they’re to survive today’s Internet threat landscape.
Intrigued? In this fun yet informative webinar, noble Corey Nachreiner, Director of Security Strategy and Research at WatchGuard Technologies, will explore the information security tips you could extract from the morbidly dark, yet inescapably addictive fantasy series. He’ll cover lessons such as:
· Depending on just “The Wall” for defense isn’t wise. The best defense has layers.
· Never ignore the warnings of ravens because they may contain hints of potential security breaches.
· Building a strong castle won’t prevent an attacker from tricking an untrained guard into opening your gates.
Join us. Advance your training and, much like a GOT warrior, learn how you should always stay vigilant.
For the second year in a row, a comprehensive survey was conducted with the 300,000 members of the LinkedIn Information Security Community on the state of cloud security. This year’s survey results delve into many issues including: Are attitudes towards perceived security risks changing? Are organizations migrating to the cloud at the pace they suspected they would? How are technologies helping or hindering cloud adoption?... and more.
Join Holger Schulze, Founder of the LinkedIn Information Security Community and Ram Krishnan, Chief Product Officer at CloudPassage on this informative web seminar to:
• Learn how your peers’ strategies for securing cloud infrastructure have evolved in the last year
• Gain valuable insights on how your organization compares to others in the industry
• Find out what the top trends and priorities are for cloud security in 2016 and beyond
With the concept of the traditional datacenter boundary blurring across hosting providers, cloud services and other areas of the new enterprise, discovery and protection of critical assets has emerged as a challenge to Infosec professionals in all industries. Join (ISC)2 and McAfee on August 14, 2014 at 1:00PM Eastern as we explore strategies and tactics for gaining the insights and counter-measures you need to ensure your farthest flung assets are meeting your security requirements, no matter where they may be.Read more >
The security of Microsoft products has been the target of jokes in IT and infosec for years. While modern Microsoft software has significantly more advanced security properties, how fast are old devices and software going the way of Clippy? Are your Microsoft environments actually safe? What combinations of Microsoft products are IT admins and users really running, and what impact does that have on security?
Join this presentation and learn the risks that Duo Security found by looking at more than one million Microsoft devices deployed in an enterprise environment.
Threat and adversarial information has become easily accessible and gone mainstream in the last couple of years. However managing the threat lifecycle, can still be challenging for organizations continuously under pressure for the next attack and low on resources. Prioritizing threats, managing incidents and neutralizing the attackers successfully requires dedicated tools, processes as well as broad adoption by the IT Security staff. Join (ISC)2 and Intel Security at 1:00PM on March 19, 2015 as we discuss leveraging SIEM and effective means for improving your discovery and responses to today's emerging threats.Read more >
Does today's business imperative create security schizophrenia? All businesses are set to create and deliver value, but increasingly the emphasis is to do so both securely and fast. 'Security' and 'agility', in theory contradicting objectives, can they coexist? And if so, how?
This webinar reviews the journey to DevOps and 'Hyper Hybrid' IT hosting through an InfoSec perspective.
Duration: 30 mins + Q&A
In this webinar we view security through two diverse mindsets, as ‘played out’ by our Head of Security & Compliance, Simon Schofield, and our Director of Strategy & Architecture, Kevin Linsell.
Areas covered include:
- Moving beyond the traditional cloud journey
- Managing security as a Cloud Service Provider
- The psychology of security in Hyperscale
- A security perspective on DevOps & Hybrid IT hosting
- How to avoid security schizophrenia
This is a webinar for business and IT executives looking to understand the realities of managing security in todays’ ever more agile (IT) environment.
With the US and other nations on high alert for anyone running a fever (AKA: "presenting symptoms"), many healthcare facilities are merging electronic health record (EHR) systems with travel history, looking to "flag" patients who might be at risk.
- How does this information impact medical personnel workflow?
- How is the "mashup" of this information impacting privacy and security concerns?
- Should this information be shared if collected (and with whom)?
- Are these travel and EHR systems up to the task?
Join (ISC)² and several healthcare infosecurity practitioners on February 5, 2015 at 1:00pm as we discuss this hot button topic.
Good security operations have never been more critical for a business than today. More and more businesses are suffering damaging breaches. Outdated or overly complex security measures are a barrier to productivity, and to adopting new technologies.
Plus, manual processes and a lack of visibility into unusual network behaviour by a user, machine or network device, can slow a security team down.
How can advancements in security technology help to connect, unite and enable better processes to help drive greater business agility?
In this webinar we will address:
• SIEM’s role in enabling fast detection and response to modern-day threats
• Implementing a security strategy that protects company assets and aligns to business objectives
• How having faster access to the right data at the right time, enables better decision making and increased productivity
• How to modernise your operations with real-time visibility and actionable intelligence
InfoSec Magazine Interview - Brian Maccaba
With a recent increase in high-profile security breaches and compliance violations, traditional security mechanisms, such as firewalls, IDS, and antivirus are no longer enough to defend against external attackers, and insider threats. By having increased visibility into internal changes, configurations, access events, and permissions across the IT infrastructure, organizations can far more effectively defend against such attacks.
So, please join our local auditing and compliance team from Netwrix, Pete Smith (Regional Sales Manager Europe) and Russell McDermott (Pre-Sales Engineer) and see how Netwrix Auditor can unlock the door into possible breaches in your IT environment.
From our brief session you will learn:
• How deeply security breaches and data leaks are really effecting organizations
• How to protect your data from the insider threats
• How to have “peace of mind”, and achieve complete visibility of your IT infrastructure
Why does a charity need security? What do they have to protect? Who would want to attack them? How do they protect themselves? What resources do they have? What else can they do?Read more >