Hi [[ session.user.profile.firstName ]]
Sort by:
    • Breach Readiness: Next Generation of Incident Preparedness
      Breach Readiness: Next Generation of Incident Preparedness Russell Teague, Managing Director, Mandiant, a FireEye Company Recorded: Oct 2 2016 3:30 pm UTC 56 mins
    • Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, a FireEye Company, will discuss the Next Generation of Incident Preparedness. Mandiant is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches. Russell will discuss what companies need to do to be breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.

      Incident preparedness is more than having an incident response plan, it's more than having skilled personnel on staff. Come join us in an eye-opening discussion on key elements that every company should consider. Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen. Learn how to become prepared from the industry leader in breach management and ultimately control your cost in post breach recovery.

      Read more >
    • Breach Readiness:  Next Generation of Incident Preparedness
      Breach Readiness: Next Generation of Incident Preparedness Russell Teague, Managing Director, Mandiant, a FireEye Company Recorded: Jun 7 2016 6:00 pm UTC 56 mins
    • Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, a FireEye Company, will discuss the Next Generation of Incident Preparedness. Mandiant is the world leader in Incident Response Management; no other company is involved in more of today's largest breaches. Russell will discuss what companies need to do to be breach ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost.

      Incident preparedness is more than having an incident response plan, it's more than having skilled personnel on staff. Come join us in an eye-opening discussion on key elements that every company should consider. Major security breaches have become part of everyone's daily news feed, from the front page of the newspaper to the top of every security blog, you can’t miss the steady flood of new breaches impacting the world today. In today’s every changing world of business and technology, breaches are inevitable, you must be prepared before they happen. Learn how to become prepared from the industry leader in breach management and ultimately control your cost in post breach recovery.

      Register now for this compelling discussion on Next Generation Incident Preparedness.

      Read more >
    • BCI webinar: Organizational preparedness for active shooter incidents
      BCI webinar: Organizational preparedness for active shooter incidents Suzanne Blake & Stephen Austin (Witt O'Brien's) Recorded: Mar 17 2015 2:00 pm UTC 60 mins
    • This webinar will delve into organizational preparedness, response, recovery, and business continuity considerations for active shooter incidents, including:

      -Training and education before an incident occurs, so that individuals are empowered to make choices as to how they will react when confronted with an active shooter incident, as well as how to best coordinate with law enforcement and other pertinent stakeholders on preparedness measures for an active shooter incident.
      -The importance of emergency notification, and having the tools and procedures in place so that they work seamlessly in emergencies like active shooter incidents that require immediate attention.
      -The crisis management efforts required in the aftermath of an active shooter incident and associated challenges, including public information and outreach, deploying mental health and counseling resources, planning and conducting memorial services, and facilitating the resiliency of the organization and its people.
      -Balancing the response and emotional aftermath of an active shooter incident with business continuity priorities and continuing essential functions and critical operations, including the challenges associated with dedicating the multitude of resources required to manage such an incident.

      Read more >
    • Ask the Analyst: Breach Planning and Preparedness
      Ask the Analyst: Breach Planning and Preparedness Eric Ogren, 451 Analyst; Brian Hussey, Trustwave SpiderLabs Global Director Recorded: Jan 27 2016 4:00 pm UTC 60 mins
    • It is always a good idea to be prepared. A quick and efficient response to an attack on your network can save an untold amount of time, money and staff hours. Even more, in today’s risk environment you need to know what tools to have in place to flag potential indicators of a compromise, have a response team on the ready and have a digital evidence trail for legal protection.
      Join us for an interactive discussion with guest speaker, 451 Research Senior Analyst, Eric Ogren and Trustwave SpiderLabs Global Director of Incident Response and Digital Forensics, Brian Hussey, to learn more about what you should do before, during and after a breach. Help drive the conversation by submitting a question for Eric and Brian in advance so we can tackle your biggest security concerns such as:
      • What is the likelihood of getting breached?
      • Best practices around building an IR plan
      • If you’ve been breached, what is the first thing you should do?

      Read more >
    • Improve Your Disaster Recovery Preparedness
      Improve Your Disaster Recovery Preparedness Chris Horne, Principal Virtualization Consultant at IT Weapons and David Styczynski, Channel Systems Engineer at VMware. Recorded: Mar 21 2012 3:00 pm UTC 57 mins
    • Do you worry about the business impact of data loss if disaster strikes? Does your DR plan depend on complicated, error-prone run books and manual processes? Do you refrain from testing your DR plan because it's expensive and difficult? If you've answered yes to these questions, then you're not prepared, and your business may be at risk.

      True business resilience requires investment, and monetary cost is only a portion of this investment. Developing the right disaster recovery strategy for your organization takes time and planning. Join IT Weapons and VMware for this webcast to see strategies and solutions that will improve the disaster recovery preparedness for your business.

      Attend this webcast to learn:
      •The 3 key phases to providing robust Disaster Recovery services
      •How automating processes with VMware Site Recovery Manager 5 can simplify management and ensure fast and reliable recovery
      •How IT Weapons Data Protection Services can help your organization

      Read more >
    • Disaster Preparedness for Small Business Owners
      Disaster Preparedness for Small Business Owners Oz Hill and Jim Satterfield, Firestorm Recorded: May 23 2012 6:00 pm UTC 60 mins
    • This webinar topic isn't meant to scare you. It's not meant to make you feel guilty either. But, it is meant to help you--by forcing you to think about your important business assets and a recovery plan.

      Disaster is an ugly word. It's not something that you think about everyday. It's something you read about or hear about in the news that affects someone else. But you should think about it--and you should be concerned if you don't have a contingency plan for business-as-usual operations after a catastrophic event.

      Especially in the past couple of years, Americans have been exposed to increasing national disasters, including floods, tornados, hurricanes and wildfires. And that doesn't begin to speak to fires, break-ins and robberies, etc.

      The question is "could your business survive any of these types of events"?

      Recent University of Texas research suggests that only 6% of companies could survive a catastrophic data loss, and that 43% would never re-open, and of those that do re-open--51% would be forced to close within 2 years. Plus, Gartner Research estimates that only 35% of America's small/medium businesses have a comprehensive disaster recovery plan in place.

      We thought this would be a good time to introduce your small business to some very nice and very knowledgeable guys from a company called Firestorm. Founded in 2005, Firestorm is working hard to protect and to serve small businesses, like yours! During this webinar, Firestorm will provide you with tools and information you'll need to begin preparing your business--should any type of disaster strike in your area.

      The best way that you can help your business today is to be prepared for whatever tomorrow may bring. This is your chance to learn how you can protect all of your company's assets--and an opportunity to ask our panel of experts about your individual concerns.

      Read more >
    • Breach Defense: Prepare & Respond
      Breach Defense: Prepare & Respond Vipul Kumra,Consulting Engineer, FireEye India,Shantanu Mahajan, Consulting Engineer, FireEye India Recorded: Oct 25 2016 5:00 am UTC 49 mins
    • Are you ready to handle a security breach? In the age of relentless cyber crimes and nation state sponsored cyber attacks, companies need to be breach-ready, and be proactive in their incident preparedness. This could essentially save organisations from devastating cost.
      Incident preparedness is more than having an incident response plan, it’s more than having skilled personnel on staff. Come join us for a discussion on key elements that every company should consider. Major security breaches have become part of everyone’s daily news feed—from the front page of the newspaper to the top of every security blog—you can’t miss the steady flood of new breaches impacting the world today. In today’s ever-changing world of business and technology, breaches are inevitable: you must be prepared and know how to respond before they happen

      Read more >
    • How to Achieve Cyber Resiliency in an Evolving Threatscape - Roundtable
      How to Achieve Cyber Resiliency in an Evolving Threatscape - Roundtable Dante Disparte, John Bone, Ed Liebig, Sidney Pearl Upcoming: Feb 28 2017 4:00 pm UTC 60 mins
    • Join fellow security executives for a roundtable discussion over the necessity and importance of staying secure in a dynamically evolving and competitive landscape.

      The cyber resiliency assessments are based on the U.S. Department of Defense’s mission-critical procedures and Unisys’ commercial best business practices. They provide an unbiased 3rd party expert assessment of the client’s Incident Response Capabilities, deliver a Security Enhancement Playbook, and identify the gaps in their cyber defense network that leads to improved cyber resiliency.

      These assessments provide leadership with:
      - A deeper insight into the effectiveness of decision making
      - Understanding of the vulnerabilities in their cyber defenses
      - How to enhance adaptability to the unanticipated and the capacity to emerge from a crisis faster with less damage to profitability, brand and customer loyalty.

      We will also discuss how crisis-preparedness exercises help your team experience real-world threat scenarios in order to assess the team’s ability to address, contain, respond and mitigate security threats.

      Facilitator:
      Dante Disparte, CEO of Risk Cooperative

      Panelists:
      John Bone, Global Director of Cyber Resilience, Unisys
      Ed Liebig, VP of Global Security, Professional Services, Unisys
      Sidney Pearl, Global MSS Executive Architect, Unisys

      Read more >
    • 10 Components for Proactive Cyber Security
      10 Components for Proactive Cyber Security Tim Appleby, Sr. Manager, Security Program Assessments, Mandiant Consulting. Recorded: Oct 26 2016 6:00 pm UTC 59 mins
    • Cybersecurity awareness is growing as more organizations learn they are vulnerable to an attack. While compliance with regulatory and security audit requirements provides a starting point, it alone will not keep the organization safe. An effective security program needs to be multifaceted, integrating people, processes and technologies across all layers of the organization. The specifics vary due to industry, size and geographic presence, as well the level of risk the organization is willing to accept.

      Mandiant Sr. Manager Tim Appleby will discuss the benefits of proactive preparedness and 10 key areas that should be considered in order to form a holistic security program, and discuss how priorities can vary based on industry, size and geography.

      As usual, we'll leave plenty of time for Q&A.

      Read more >
    • Certified Network Defender CND - Sneak peek to the course content
      Certified Network Defender CND - Sneak peek to the course content Mane Pipervski Recorded: Feb 7 2017 9:05 am UTC 56 mins
    • Certifed Network Defender (CND ) is a vendor-neutral, hands-on, instructor-led comprehensive network security certifcation training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The program prepares network administrators on network security technologies and operations to attain Defense- in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. Joint the webinar to learn more about the course and meet the EC-Council Certified Instructor Mane Piperevski, who will give a short technical demo about what you will learn on the CND course.

      Schedule
      09:45 Sign in. Checking all the technical issues.
      10:00 Mane Pipervski's presentation
      10:50 Q&A


      Speaker

      Mane is an Information Technology Expert with extensive experience in Information Security. Over 10 years in IT industry and 5 years’ experience in field of Information Security. With a breadth of technology skills, including networks, operating systems, databases and application development, Mane has provided IT services in various industry sectors such as banking, electronic payment services, transportation, software development companies, utilities, pension and disability insurance, state courts and government institutions. As experienced trainer and instructor Mane has conducted official EC-Council and Microsoft training classes for over 300 students all over Europe. As Security Expert he understands and knows how to look for the weaknesses and vulnerabilities in systems, how they work, how to investigate them and exploit for Proof of Concept.

      Read more >
    • Securing Fintech: Threats, Challenges & Best Practices
      Securing Fintech: Threats, Challenges & Best Practices Ulf Mattsson, CTO Security Solutions at Atlantic BT Upcoming: May 18 2017 9:00 pm UTC 60 mins
    • Cyber attacks have increased in frequency and severity, and financial institutions are particularly interesting targets to cyber criminals. Join this presentation to learn the latest cybersecurity threats and challenges plaguing the financial industry, and the policies and solutions your organization needs to have in place to protect against them.

      Viewers will learn:
      • Current trends in Cyber attacks
      • FFIEC Cyber Assessment Toolkit
      • NIST Cybersecurity Framework principles
      • Security Metrics
      • Oversight of third parties
      • How to measure cybersecurity preparedness
      • Automated approaches to integrate Security into DevOps

      About the Presenter:
      Ulf Mattsson is the Chief Technology Officer of Security Solutions at Atlantic BT, and earlier at Compliance Engineering. Ulf was the Chief Technology Officer and a founder of Protegrity, He invented the Protegrity Vaultless Tokenization, Data Type Preservation (DTP2) and created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security, and received a US Green Card of class ‘EB 11 – Individual of Extraordinary Ability’ after endorsement by IBM. Ulf is the inventor of more than 45 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention.

      Read more >