Hi [[ session.user.profile.firstName ]]
Sort by:
    • Getting Started with Security Operations: How to Access Basic Security Posture
      Getting Started with Security Operations: How to Access Basic Security Posture Jae Lee – Director Product Marketing, Security Markets, Splunk Upcoming: Dec 18 2018 5:00 pm UTC 63 mins
    • Assessing and monitoring basic security posture is critical. Security teams need the ability to identify and alert on a particular type of malicious activity, AND determine whether that alert is meaningful in a broader context.

      Splunk can help your organization get up and running very quickly with the ability to assess basic security posture. With Splunk, you can centralize security visibility and adopt an investigative mindset to answer questions like:

      - How secure are my endpoints?
      - What is happening on my network?
      - Where is it most critical for me to apply updates?
      - Are user accounts configured properly?
      - Is there any suspicious traffic going out?
      - How is overall security posture in my AWS environment?

      This webinar is perfect for organizations that are just getting started with formalizing their security operations. We’ll show you how with Splunk Security Essentials, a use case framework tool that you can download and stand up quickly to immediately glean security value using your own data sources.

      Read more >
    • How to Make Endpoint Security Easy
      How to Make Endpoint Security Easy Ryan Manni, Manager, Security Operations, Hologic Recorded: Jun 27 2018 4:00 pm UTC 45 mins
    • Traditional antivirus can’t keep up with the pace of emerging threats. What if you could prevent attacks before they occur and spend less time managing multiple agents?

      Join us for a live webinar with Ryan Manni, Manager, Security Operations, Hologic, as we discuss their evaluation of cloud-based endpoint security and why they chose Cb Defense. Hologic is an innovative medical technology company focused on improving women’s health. Their security challenges included preventing non-malware attacks, gaining visibility into remote employees, and managing complex infrastructure with a small IT staff.

      Join this webinar and learn:

      - Learn why Hologic replaced its traditional AV solution with Cb Defense
      - Discover how Cb Defense can help you get ahead of emerging attacks and simplify your security stack
      - Get practical advice on replacing traditional AV with a cloud-based security platform

      Read more >
    • Expert Tips on Detecting and Responding to Data Breaches
      Expert Tips on Detecting and Responding to Data Breaches Brad Bierman, Manager of Security Operations - Arctic Wolf Networks Recorded: Nov 6 2018 6:30 pm UTC 23 mins
    • It is not a matter of if but when a data breach will occur, and whether your IT organization is prepared to detect and respond to it. Experienced hackers are constantly inventing ways to get through your defenses and steal company confidential data or personal identifiable information (PII) to make money. Focusing on prevention alone is not sufficient.

      Brad Bierman, Director of Security Operations at Arctic Wolf Networks, and his team of Concierge Security™ Engineers have helped hundreds of customers detect and respond to data breaches. He will walk through a few cyberattack scenarios and provide expert tips on the following.

      1.What tools do you need to have in place to detect a data breach?
      2.Who do you need to engage to respond to a data breach?
      3.How do you respond appropriately to data breach?

      To learn more, join this webinar!

      About our key speaker:

      Brad Bierman has over 17 years of varied experience in the information security field. Some highlights are communications interceptions, SIEM engineering, mobile and computer forensics, security monitoring, and incident response. Prior to becoming a security professional, Brad was a hardware/firmware engineer for embedded networking solutions.

      Read more >
    • In-house or Outsourced Security Operations Center?
      In-house or Outsourced Security Operations Center? Oliver Rochford, VP of Security Evangelism - DFLabs, Sebastian Hess, AIG Cyber Risk Executive for Germany/Austria/Switzerland Recorded: Nov 27 2017 3:00 pm UTC 34 mins
    • The need to have a Security Operations Center (SOC) is becoming increasingly evident with each passing day, with data breaches being a common occurrence for many organizations around the globe. But, when organizations start thinking about setting up a SOC, they face a big dilemma - whether to build one in-house, or go with an outsourced or managed services model.

      This webinar offers a deeper look into the factors that should play a role in deciding which option is a better fit for organizations, based on their needs and the resources at their disposal.

      Key takeaways:
      - A SOC must strike a proper balance between people, processes and technology
      - People are the key to any SOC, but are scarce due to a skills shortage
      - The right technologies are a key enabler for any SOC, but can often also be remotely delivered
      - Getting processes right in an outsourced SOC model can be challenging, but the unavailability of skilled resources may be the bigger challenge

      Join us on this webinar as we try to answer the question of how best to handle your security needs, by explaining the pros and cons of both an in-house SOC and an outsourced one, so you can make an informed decision that would be best suited for your organization.

      Read more >
    • Modernizing Security Operations: Preparing to Better Secure Your Organization
      Modernizing Security Operations: Preparing to Better Secure Your Organization Travis Wiggins, Principal Cyber Security Operations Consultant, SecureWorks Recorded: May 2 2017 6:00 pm UTC 59 mins
    • According to a recent SANS report, more than 60 percent of large-company CISOs brief the board at least annually and by the end of 2018, 70 percent of all boards will require CISOs to brief them quarterly.^

      Deciding to what degree your security operations should be in-house vs outsourced is a major decision with significant cost and resource ramifications. Currently organizations globally face persistent security challenges, which collectively require people, process, technology, and strategy to address. This collection of challenges are further complicated by evolving business needs; expanding toolsets and platform options; and staffing retention and attrition. Join us to learn how a modern approach to security operations can help address these challenges.

      SecureWorks Principal Cyber Security Operations Consultant and former Security Operations Center (SOC) manager, Travis Wiggins, will discuss how security leaders and practitioners can leverage his experience to more clearly define the requirements and make informed decisions about protecting your organization.

      You Will Learn:
      • Why making the right security operations decisions is critical to reduce business risk
      • What to consider when planning a SOC and how to position the plan to leaders
      • How to address talent retention, accountability, and scalability
      • Why strategy and proper tools are key components in a successful SOC implementation

      ^ Cyber Security Trends: Aiming Ahead of the Target to Increase Security in 2017 - https://www.sans.org/reading-room/whitepapers/analyst/cyber-security-trends-aiming-target-increase-security-2017-37702

      Read more >
    • InfoSec Institute & D3 Security: ATM, Card Skimming and Other Fraud
      InfoSec Institute & D3 Security: ATM, Card Skimming and Other Fraud Stan Engelbrecht (D3 Security) and Chris Sienko (InfoSec Institute) Recorded: Dec 7 2018 9:00 pm UTC 35 mins
    • On this episode of the InfoSec Institute's CyberSpeak podcast, Stan Engelbrecht, director of cyber security practice for D3 Security, discusses a scary topic that we’ve been hearing a lot about on the news: the practice of ATM fraud and the implications for other swipe- and chip-based technologies.

      In the podcast, Engelbrecht and host Chris Sienko discuss:

      How did you get started in computers and security? (1:00)

      When did the recent ATM attacks that the U.S. Secret Service has been warning financial institutions about begin? (4:00)

      What warnings signs should ATM users be looking for to ensure they’re not putting their account information at risk? (7:20)

      If you suspect an ATM is compromised, who do you report it to? (10:10)

      Is the technique known as shimming, which uses paper-thin shims containing embedded microchips and flash storage to compromise payment cards, on the rise? (11:40)

      Are there any tips for consumers who will be making additional transactions during the busy holiday season? (15:25)

      Are tap-to-pay systems more or less safe than more traditional methods? (17:50)

      What are the impediments to universal implementation of safer cards? (19:35)

      Are newer ATMs better more secure? (20:55)

      Are their any legislative incentives that could be implemented to make these devices more secure? (24:10)

      Are there any new technologies or methods that can help secure these devices? (25:10)

      Is the firmware/software side of the AMT issue being properly addressed? (28:50)

      Can you tell us a little bit about your company, D3 Security? (31:25)

      Tune in for this engaging, and timely, discussion of ATM and payment fraud.

      Read more >
    • Voice of the Analyst Study:  An Inside Perspective on Security Operations
      Voice of the Analyst Study: An Inside Perspective on Security Operations Wade Baker, Cyentia Institute Founder and Chris Calvert, VP Product Strategy and Co-Founder, Respond Software Recorded: Feb 28 2018 6:00 pm UTC 40 mins
    • In the security world, the bad guys and their malicious activities are frequently the center of attention. We think it’s time to shed some light on the good guys--the Security Analysts—and what a day in the life is like for them. The 2017 Cyentia “Voice of the Analyst Study” is the first report to give the security analyst a collective voice that reveals new insights about their jobs and how this might affect a security operations center. Security analysts are our most critical resource, and often one of the organization’s largest operational costs. While these analysts are on the front line of cyber defense, it may be unclear how they spend their time and how they view their role. Join Wade Baker, Cyentia Institute Founder and Chris Calvert, VP Product Strategy and Co-Founder, Respond Software as they share the surprising results of the survey, including security analysts' opinions about catching the bad guys and what needs to change in their work environment so they can be more effective in their role.

      Read more >
    • Forrester Total Economic Impact Study on Security Operating Platform
      Forrester Total Economic Impact Study on Security Operating Platform Scott Simkin, director of threat intelligence from Palo Alto Networks and Henry Huang, principal consultant from Forrester Recorded: Aug 2 2018 4:00 pm UTC 57 mins
    • Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.

      Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.

      The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:

      •Realize security operation efficiencies of $4.75M
      •Avoid alternative security purchases of $3.5M
      •Generate an ROI of 65%


      Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.

      ***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks

      Read more >
    • Security Analysts: Monitor and Triage Web Filter Alerts in Real-Time
      Security Analysts: Monitor and Triage Web Filter Alerts in Real-Time Tim Wenzlau, Product Manager and Greg Taylor-Broun, Director of Research Recorded: Nov 7 2018 6:30 pm UTC 30 mins
    • Web filter logs contain valuable security data that can be used to recognize adversaries within your network. This data is a top source for incident responders and forensic investigations -- once an attack has already been identified. However, the size and complexity of this data makes it nearly impossible to analyze and monitor, let alone to be able to do this in real-time. Respond Analyst is the first security decision automation solution that brings this data to frontline analysis where it’s more valuable. Real-time analysis and triage of web filter data, during network and endpoint analysis, gives security teams an edge in reducing response times and limiting the impact of some of the most stealthy attacks.

      Key Takeaways:
      - Discover the value of analyzing web filter logs in real-time.
      - Learn how the Respond Analyst’s Intelligent Decision Engine uses probabilistic reasoning to correlate security data for faster and more accurate escalations.
      - Get details on Respond Analyst’s low impact proof of concept workshop to experience the increased capacity and capability of adding autonomous decision-making to your team.

      Read more >
    • The State of Security Operations
      The State of Security Operations Duncan Brown, Associate Vice President, European Security Practice at IDC & Jae Lee, Security Product Marketing, Splunk Recorded: Nov 2 2017 3:00 pm UTC 45 mins
    • Cyber attacks are top of mind for organizations across the globe. In fact, 62 percent* of firms are being attacked at least weekly. But do organizations have the processes in place to investigate and effectively respond to these incidents?

      IDC recently surveyed security decision-makers at 600 organizations to understand the state of security operations today. Watch this on-demand session to learn -

      • The time and associated cost security teams spend on incident response and how you compare to your peers
      • How organizations are coping with an average of 40 actionable security incidents per week
      • Where teams are focusing their security efforts
      • What activities are currently happening within organizations to prepare for the GDPR
      • Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture

      Read more >
    • Improving Security with Metadata
      Improving Security with Metadata Preetham Gopalaswamy, Senior Director, Product Management, Gigamon Recorded: Dec 4 2018 6:00 pm UTC 62 mins
    • Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to know who is talking to whom and get visibility into malware and bad actors that may be hiding on the network.

      Many enterprises aggregate information from various sources, such as events and logs from DNS servers, web servers and security tools, to hunt for threat events and indicators of compromise. But these are not reliable sources; logging can be turned off inadvertently or for performance reasons. Raw network data is the ultimate source of truth – but sending it all to a SIEM can become very expensive.

      The bottom line is visibility into your application traffic is elemental to security – if you can’t see it, you can’t secure it. What’s needed is deep insight into your applications. Attend this ISC2 webinar to learn how NetOps and SecOps can:
      •Identify which applications are contributing to network traffic.
      •Use application metadata to gain more context of potential threat events and to more easily enforce corporate compliance.
      •Lower tool cost and improve tool efficiency by filtering out low-risk, high-bandwidth traffic.
      •Send suspicious traffic to a tool on-demand when an anomaly is detected.

      If you need to monitor, identify, and filter application traffic so you can more easily identify anomalies and lateral propagation of threats, you’ll want to attend this webinar!

      Read more >
    • A CTO's Perspective: Network Security for the Cloud Generation
      A CTO's Perspective: Network Security for the Cloud Generation Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec Recorded: Oct 31 2018 3:00 pm UTC 30 mins
    • Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappear.

      In this webcast we’ll look at today’s new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.

      Join Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.

      In this session they’ll discuss:

      - A security insider’s view of market trends and the 24/7/365 demands of a distributed workforce
      - The increased complexity of managing full security stack with limited resources
      - The technical challenges of securing cloud applications
      - Cloud solutions that solve cloud problems

      It promises to be an insightful event for all security, network and IT professionals. After their presentation the speakers will also take questions from the audience.

      We highly encourage you to register and reserve your spot today.

      Register Now

      Read more >
    • To Outsource, or Not To Outsource: Best Practices for IT Security
      To Outsource, or Not To Outsource: Best Practices for IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Sep 13 2018 6:00 pm UTC 63 mins
    • With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

      By attending, you’ll:

      - Understand best practices for working most effectively with third party providers
      - Discover what security functions can be handled by third parties and what should be kept in-house
      - Recognize how to avoid common pitfalls of working with third parties
      - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

      Save your seat now to learn more!

      Read more >