Hi [[ session.user.profile.firstName ]]
Sort by:
    • How to Make Endpoint Security Easy
      How to Make Endpoint Security Easy Ryan Manni, Manager, Security Operations, Hologic Recorded: Jun 27 2018 4:00 pm UTC 45 mins
    • Traditional antivirus can’t keep up with the pace of emerging threats. What if you could prevent attacks before they occur and spend less time managing multiple agents?

      Join us for a live webinar with Ryan Manni, Manager, Security Operations, Hologic, as we discuss their evaluation of cloud-based endpoint security and why they chose Cb Defense. Hologic is an innovative medical technology company focused on improving women’s health. Their security challenges included preventing non-malware attacks, gaining visibility into remote employees, and managing complex infrastructure with a small IT staff.

      Join this webinar and learn:

      - Learn why Hologic replaced its traditional AV solution with Cb Defense
      - Discover how Cb Defense can help you get ahead of emerging attacks and simplify your security stack
      - Get practical advice on replacing traditional AV with a cloud-based security platform

      Read more >
    • In-house or Outsourced Security Operations Center?
      In-house or Outsourced Security Operations Center? Oliver Rochford, VP of Security Evangelism - DFLabs, Sebastian Hess, AIG Cyber Risk Executive for Germany/Austria/Switzerland Recorded: Nov 27 2017 3:00 pm UTC 34 mins
    • The need to have a Security Operations Center (SOC) is becoming increasingly evident with each passing day, with data breaches being a common occurrence for many organizations around the globe. But, when organizations start thinking about setting up a SOC, they face a big dilemma - whether to build one in-house, or go with an outsourced or managed services model.

      This webinar offers a deeper look into the factors that should play a role in deciding which option is a better fit for organizations, based on their needs and the resources at their disposal.

      Key takeaways:
      - A SOC must strike a proper balance between people, processes and technology
      - People are the key to any SOC, but are scarce due to a skills shortage
      - The right technologies are a key enabler for any SOC, but can often also be remotely delivered
      - Getting processes right in an outsourced SOC model can be challenging, but the unavailability of skilled resources may be the bigger challenge

      Join us on this webinar as we try to answer the question of how best to handle your security needs, by explaining the pros and cons of both an in-house SOC and an outsourced one, so you can make an informed decision that would be best suited for your organization.

      Read more >
    • Modernizing Security Operations: Preparing to Better Secure Your Organization
      Modernizing Security Operations: Preparing to Better Secure Your Organization Travis Wiggins, Principal Cyber Security Operations Consultant, SecureWorks Recorded: May 2 2017 6:00 pm UTC 59 mins
    • According to a recent SANS report, more than 60 percent of large-company CISOs brief the board at least annually and by the end of 2018, 70 percent of all boards will require CISOs to brief them quarterly.^

      Deciding to what degree your security operations should be in-house vs outsourced is a major decision with significant cost and resource ramifications. Currently organizations globally face persistent security challenges, which collectively require people, process, technology, and strategy to address. This collection of challenges are further complicated by evolving business needs; expanding toolsets and platform options; and staffing retention and attrition. Join us to learn how a modern approach to security operations can help address these challenges.

      SecureWorks Principal Cyber Security Operations Consultant and former Security Operations Center (SOC) manager, Travis Wiggins, will discuss how security leaders and practitioners can leverage his experience to more clearly define the requirements and make informed decisions about protecting your organization.

      You Will Learn:
      • Why making the right security operations decisions is critical to reduce business risk
      • What to consider when planning a SOC and how to position the plan to leaders
      • How to address talent retention, accountability, and scalability
      • Why strategy and proper tools are key components in a successful SOC implementation

      ^ Cyber Security Trends: Aiming Ahead of the Target to Increase Security in 2017 - https://www.sans.org/reading-room/whitepapers/analyst/cyber-security-trends-aiming-target-increase-security-2017-37702

      Read more >
    • Voice of the Analyst Study:  An Inside Perspective on Security Operations
      Voice of the Analyst Study: An Inside Perspective on Security Operations Wade Baker, Cyentia Institute Founder and Chris Calvert, VP Product Strategy and Co-Founder, Respond Software Recorded: Feb 28 2018 6:00 pm UTC 40 mins
    • In the security world, the bad guys and their malicious activities are frequently the center of attention. We think it’s time to shed some light on the good guys--the Security Analysts—and what a day in the life is like for them. The 2017 Cyentia “Voice of the Analyst Study” is the first report to give the security analyst a collective voice that reveals new insights about their jobs and how this might affect a security operations center. Security analysts are our most critical resource, and often one of the organization’s largest operational costs. While these analysts are on the front line of cyber defense, it may be unclear how they spend their time and how they view their role. Join Wade Baker, Cyentia Institute Founder and Chris Calvert, VP Product Strategy and Co-Founder, Respond Software as they share the surprising results of the survey, including security analysts' opinions about catching the bad guys and what needs to change in their work environment so they can be more effective in their role.

      Read more >
    • Economic Impact of Deploying Palo Alto Networks Security Operating Platform
      Economic Impact of Deploying Palo Alto Networks Security Operating Platform Scott Simkin, director of threat intelligence from Palo Alto Networks and Henry Huang, principal consultant from Forrester Upcoming: Aug 2 2018 4:00 pm UTC 60 mins
    • Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.

      Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.

      The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:

      •Realize security operation efficiencies of $4.75M
      •Avoid alternative security purchases of $3.5M
      •Generate an ROI of 65%

      Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.

      ***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks

      Read more >
    • How Du Telecom Streamlined Its Security Ops with HPE ArcSight SIEM Solution
      How Du Telecom Streamlined Its Security Ops with HPE ArcSight SIEM Solution Tamer El Refaey, Senior Director, Security Monitoring and Operations, du Telecom and Arun George, Regional Sales Manager, HPE Recorded: Jun 13 2017 8:00 am UTC 51 mins
    • As a rapidly growing mobile and fixed line service provider, du Telecom was faced with protecting its growing network and IT infrastructure while controlling costs and efficiently managing IT operations. Recognizing this need, du Telecom embarked on a journey to transform its security operations as it knew that a strong security foundation — one that can automate security and compliance monitoring to cost-effectively support corporate growth — would be critical to its success. To achieve these goals, du Telecom turned to ArcSight.

      Join this webinar to participate in a candid conversation with Tamer El Bahey, Senior Director - Security Monitoring & Operations at du Telecom, as he shares how the company simplified its security operations across the enterprise and laid the groundwork for an award winning Security Operations Center (SOC) using ArcSight SIEM solution. Learn from du Telecom's approach and lessons learned which resulted in reduced security expenditures by 85% in 3 years.

      Register now to see how the power of ArcSight SIEM solution can also transform your Security Operation Center to operate more efficiently and protect against cyber threats.

      Read more >
    • The State of Security Operations
      The State of Security Operations Duncan Brown, Associate Vice President, European Security Practice at IDC & Jae Lee, Security Product Marketing, Splunk Recorded: Nov 2 2017 3:00 pm UTC 45 mins
    • Cyber attacks are top of mind for organizations across the globe. In fact, 62 percent* of firms are being attacked at least weekly. But do organizations have the processes in place to investigate and effectively respond to these incidents?

      IDC recently surveyed security decision-makers at 600 organizations to understand the state of security operations today. Watch this on-demand session to learn -

      • The time and associated cost security teams spend on incident response and how you compare to your peers
      • How organizations are coping with an average of 40 actionable security incidents per week
      • Where teams are focusing their security efforts
      • What activities are currently happening within organizations to prepare for the GDPR
      • Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture

      Read more >
    • Best Practices for Outsourcing Your IT Security
      Best Practices for Outsourcing Your IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Recorded: Jun 19 2018 6:00 pm UTC 62 mins
    • With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

      By attending, you’ll:

      - Understand best practices for working most effectively with third party providers
      - Discover what security functions can be handled by third parties and what should be kept in-house
      - Recognize how to avoid common pitfalls of working with third parties
      - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

      Save your seat now to learn more!

      Read more >
    • Key Findings from the 2017 State of Security Operations Report
      Key Findings from the 2017 State of Security Operations Report Kerry Matre, Director, Security Portfolio Marketing, HPE Recorded: Jan 25 2017 6:00 pm UTC 34 mins
    • Taking your Security Operations Center (SOC) to the next level has never been more critical. Organizations around the globe are investing heavily in cyber defense capabilities to protect their most critical assets. Don’t miss this webinar to explore key findings from the 2017 State of Security Operations report on cyber defense organizations’ capabilities and maturity.

      Learn what the most successful SOCs in the world are doing right, regional trends in the maturity of cyber defense capabilities and best practices to apply within your organization. Get the latest information on:

      • Opportunities in automation
      • Threat hunt teams and whether they are working
      • New compliance regulations impacting SOCs

      Register now and gain insight on the next steps your business can take to mature security operations in 2017.

      Read more >
    • Architecting Security for the Future: NetOps and SecOps
      Architecting Security for the Future: NetOps and SecOps Dan Conde of ESG and Graham Melville of Gigamon Recorded: Mar 1 2018 7:00 pm UTC 54 mins
    • Please join us as Dan Conde from Enterprise Strategy Group, Inc. reveals survey data highlighting the issues facing security operations today and Graham Melville from Gigamon Inc. explains how enterprises have started to move to a new security architecture to overcome these issues and stay ahead of their competitors.

      In this session you will learn:
      - The issues and challenges facing your industry colleagues
      - How to simplify your security architecture without throwing out security tools or flattening the network
      - How to improve network performance and reduce outages while maintaining security
      - How to spend less yet get more from your network security tools

      If you or your organization wants to be, or are, a security leader in your industry, you won’t want to miss this webinar.

      Read more >
    • The SOC Protection You Need To Defend Against Cloud Threats
      The SOC Protection You Need To Defend Against Cloud Threats John Carse, VP Security Operations, Alert Logic Recorded: Feb 21 2018 4:00 pm UTC 36 mins
    • It’s more critical than ever to focus on your cloud security strategy. But what does iron-clad protection really look like? It’s all about the people, process, and technology working in sync. A Security Operations Center (SOC) provides proactive threat monitoring, detection, verification, and identification of suspicious behavior, which enables you to respond to threats more quickly. Many businesses don’t realize the full extent of resources and effort required to ensure their data and workloads are not at risk. But getting fully managed, around-the-clock, threat monitoring and detection doesn’t have to be complicated or costly.

      Join John Carse, Vice President of Security Operations at Alert Logic, as he explains the true value of a SOC, why every business needs one, and the unique benefits that make them vital to a more proactive security posture.

      Register now to get answers to these important questions:

      • What critical role does a SOC play in a defensive security strategy in cloud and hybrid environments?
      • How does a 24x7 managed security service integrate with and enhance your security capabilities?
      • How can Alert Logic’s unique SOC and security experts can help you stay ahead of threats without adding staff?

      Read more >
    • Security Operation Platform: Une nouvelle réponse avec FireEye Helix
      Security Operation Platform: Une nouvelle réponse avec FireEye Helix Jerome Delaville, System Engineer, FireEye France Recorded: Mar 22 2018 1:00 pm UTC 41 mins
    • Les plateformes de sécurité présentent aujourd'hui beaucoup de challenges qui les rendent difficiles à gérer : manque de visibilité, trop volume d'alertes, peu de contextualisation… Le résultat est une perte d'efficacité, et de vitesse dans la prise en compte des incidents de sécurité.
      FireEye a conçu une plateforme de gestion des opérations de sécurité avec ces objectifs en tête, plus de visibilité, une meilleure lisibilité et une contextualisation de la menace, le but ultime étant de fournir une plateforme facile à déployer, à administrer et qui répond aux besoins d'aujourd'hui.

      Lors de ce webinaire nous couvrirons les points suivants :
      Comment HELIX centralise les opérations de sécurité :
      - Améliore la visibilité de bout en bout
      - Aide à la Priorisation et la contextualisation des alertes
      - Accompagne à la prise Prise de décisions et à la levée de doutes

      Nous terminerons par une démonstration de la plateforme à travers un Business Case réel et nous laisserons le temps aux différentes questions en live.

      Read more >
    • Aflac Protects You. See Who Protects Them
      Aflac Protects You. See Who Protects Them DJ Goldsworthy, Director of Security Operations and Threat Management at Aflac Recorded: Oct 25 2017 4:00 pm UTC 65 mins
    • In 2016, Aflac, a Fortune 500 company providing financial protection to more than 50 million people worldwide, embarked on a mission to build a custom threat intelligence system in response to the rapid increase in security threats targeting its network of 15,000 worldwide employees.

      Join this webinar to hear from DJ Goldsworthy, director of Security Operations and Threat Management at Aflac, about how Aflac deployed Splunk Enterprise Security at the heart of its internal Threat Intelligence System and augmented it with Splunk User Behavior Analytics to:

      • Automate threat hunting and 90 percent of its security metrics process in just two months
      • Replace a legacy SIEM and determine risk for automated remediation
      • Identify insider threats and rapidly investigate threats
      • Block more than 2 million connections with less than 12 false positives

      Girish Bhat, director of Security Product Marketing at Splunk, will share examples of Splunk customers that are to solving a wide range of security analytics use cases: Rapid Incident Detection and Investigation, Ransomware, External Attacks, Cyber Command Center and more.

      Read more >