Intégration de la signature électronique avec la solution Immovision de Figaro Classifieds grâce aux API DocuSign : gain de temps, d'argent et simplification de l'activité. www.docusign.frRead more >
Featuring STEALTHbits and Boldon James.
For many organizations, classification of legacy content presents a difficult challenge to overcome as well as being a critical compliance issue. Now there is an easy solution.
Join us to learn how integrating Boldon James Classifier with STEALTHbits’ solutions enables organizations to automatically identify and tag legacy documents, making users fully aware of data sensitivity and compliance requirements (e.g. GDPR, NYDFS, NIST, CUI etc), meaning appropriate security policies are enforced on classified content such that only the right people have access to the right information.
2017 is not yet over and it's already the year of cyber attacks. From phishing, to hacks, to classified hacking tools leaked and the biggest ransomware attacks to date (Wannacry, NotPetya), security professionals across the world are looking to apply the lessons learned in 2017 for an improved cyber security next year.
Join this live interactive Q&A panel with experts from the artificial intelligence, deep learning and IoT security space to learn about:
- The biggest attack trends seen so far
- Impact across industries
- Threats on the horizon
- Recommendations to better secure your data and company in 2018
- Shimon Oren, Head of Cyber-Intelligence at Deep Instinct
- Ted Harrington, Executive Partner at Independent Security Evaluators
- Greg Foss, Global SecOps Manager at LogRhythm
Join Jabez Tan, Keynote speaker at Data Centre World Hong Kong and Cloud Expo Asia, as he takes an in-depth look at the primary metrics that tell the story of the Hong Kong colocation market.
We track the market’s size and growth trajectory and provide a five-year CAGR projection, along with a detailed analysis of the underlying supply and demand dynamics. Our proprietary methodology takes this analysis to a number of levels.
First, colocation supply is measured from both a space and power perspective.
Second, all market metrics – including space, power and revenue – are classified and then measured as either retail or wholesale colocation.
Third, we size the market – again, from both a retail and colocation perspective – on an aggregated and sub-regional basis.
This webinar is an excellent resource for any service provider, investor or end user (service provider or enterprise) that is looking to understand and project the data centre market in Hong Kong or find a service provider.
Governments and enterprises are more challenged than ever to protect their most valuable data, from a citizen’s social security number to highly classified data. But endpoint or network security can’t stop attackers, and much less a malevolent insider. The solution lies in protecting the data itself. Recent NIST and FIPS validations make groundbreaking Format-Preserving Encryption (FPE) technology available to government and enterprises. FPE “de-identifies” sensitive data, rendering it useless to attackers, while maintaining its usability and referential integrity for data processes and applications, and easily layering protection into decades-old legacy systems. Join HPE and (ISC)2 for an exploration of this topic in the 1st part of a three part series.Read more >
In light of the recent publishing of thousands of CIA-related documents by WikiLeaks - the largest leak of classified documents in CIA history, we will discuss the implications of the revealed information across industries and users, in the US and globally.
Join the discussion and learn more about:
- What is Vault 7 and how does it affect you?
- What can we expect, as more documents get releases?
- How will this affect organizations, and the relationship between the tech industry and government agencies?
- Recommendations on how we can better secure our data and privacy
- Paul Kurtz, CEO & Co-Founder of TruSTAR Technology
- Brian White, COO of RedOwl Analytics
- Alex Rice, CTO of HackerOne
When the phrase “insider threat” comes to mind, most automatically think of fraud, sabotage and theft; it’s natural to do so, as malicious insider threats make regular headlines.
The truth is that 68% of all insider threats are attributed to accidental users, who unintentionally put their organizations at risk because of a user error or lack of training. Insiders are really anyone that works with sensitive data inside the network.
In Operationalizing a Practical Insider Threat Program, we’ll review:
-Requirements for building an insider threat program
-An overview of the stakeholders and investigative best practices
-Real world examples of an insider threat program in action
Brandon Swafford, CTO of Data & Insider Threat Security, Forcepoint
Brandon Swafford has more than 12 years of experience in legal investigations and security, including hedge funds where he built security technology and the U.S. Intelligence Community as a Cyber Counterintelligence consultant and analyst. Within the intelligence community, Brandon covered several classified agencies and worked closely with the National Insider Threat Task Force and National Counterintelligence Executive. In addition, Brandon provided insider threat analysis and investigation consulting to the International Monetary Fund in Washington, D.C.
IDC called SSH keys “the gaping hole in your IAM strategy.” For a reason, when many banks and enterprises have literally millions of unaudited credentials granting access to their production servers and use OpenSSH configurations that allow any system administrator to self-provision permanent access to any server they use - for themselves and others - and there is no termination process for this access.
It is a fundamental question of Who can access what, of separation of duties, and of enforcing internal boundaries (to PCI systems, financial data, health information, development vs. production, or classified compartments). Every cybersecurity regulation requires basic control of identities and access, and that is where real security starts.
Half of the top 10 banks in US and UK have now began addressing the issue. Most other enterprises are only beginning to grasp the problem.
This talk explains the issue and how to start addressing it. By the principal author of NIST IR 7966, the NIST guidelines for managing SSH access.
About the Presenter:
Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.
In today's digital age, a person's identity is classified by a username and password. With Gartner research predicting 26b connected devices in the world (6.5 devices per person) by 2020, what impact is that going to have on the identity of global citizens? In this 30 minute webinar, Bianca Lopes will go over the impact that biometrics can have on the connected world focusing in particular on authentication.
Biometrics & Identity in the Connected World
-Identity - the history + what that means today (username + password)
-Connected World - stats on connected devices + problems that creates in the system (fraud, social inclusion/exclusion)
-What is biometrics - I’ve been told I need to learn about biometrics, what do I actually need to know?
-Common challenges within this industry - suggestions for how to tackle it
Precision Content is a series of methods and principles for structured authoring developed by Rob Hanna in 2013. This methodology is based on a well-known body of research founded in cognitive and behavioral sciences that theorizes that all structured information can be classified into one of a discrete number of information types. Each of these information types defines how the information is best structured and written to suit the intended reader response.
Join Scott Abel, The Content Wrangler and his special guest, Rob Hanna, President of Precision Content for this free, one-hour webinar. In this session, Rob will guide you through an interactive exploration into how our brains work with information; explain how the Precision Content information types work to capture information used in any piece of business or technical content; discuss how Precision Content can help authors working with DITA/XML, and demonstrate how Precision Content is used to provide better clarity and precision to information.
Commercial analytic solutions are becoming more and more common within the Pharma industry. Companies are spending millions implementing tools which are aimed at helping users identify opportunities to improve the bottom line, segment customers, track multichannel campaign success and meet a myriad of other objectives. Despite all the 'perceived' value these tools can add, they remain largely unused. Excuses for the lack of adoption are varied but can generally be classified into one of three areas - they are either too complex, it isn't convenient to use or it just doesn't deliver on the value promised. These issues are compounded by the fact that they are generally only identified when the solution has been deployed and expected to be used. By ensuring that these issues are addressed at all stages during the development and not just when adoption targets are not being met, commercial analytic solutions can be exploited to attain the anticipated value and more.Read more >
Skin cancer is by far the most prevalent cancer. Each year, approximately 3.4 million people in the US alone are diagnosed with some form of skin cancer. Skin cancer can be highly treatable if it is detected and classified early, and this detection and classification is often aided by immunohistochemistry. This presentation covers many of the basic science, facts, and statistics of skin cancer, as well as the utility of immunohistochemical testing with markers such as S-100, SOX-10, Ber-Ep4, and HHV-8 in the accurate diagnosis and survival rates of skin cancer. Continuing education credits for attending this webinar will be offered through the National Society of HistotechnologyRead more >
Learn more about the BitSight Security Ratings product.Read more >
Most corporate networks are complex and include various operating systems, servers and massive amounts of data. This data is transferred, stored and accessed across the network. In 2014, 43% of data breaches were classified as a result of lost or stolen drives or due to accidently making data public . Encrypting this data is a great way to protect against these risks but with so many different platforms, operating systems, servers and applications, the task can be daunting.
In this webcast, we’ll show you how Symantec’s Encryption solutions can help you achieve heterogeneous encryption across your entire network and of all critical data whether it’s at rest or in motion.
Join us on January 26th at 10am PT to learn how.
Introduced in 2016, the General Data Protection Regulation (2016/679)—or GDPR—was created for the purpose of strengthening the European Union’s (EU) procedures and practices related to data protection. GDPR will impact organisations worldwide and implement maximum fines of up to €20,000,000 (or 4% of global turnover) if they fail to ensure compliance. Join BitSight’s Philip East and Metro Bank’s Julian Parkin as they discuss:
- The checklist organisations should review to align their business with GDPR.
- Noteworthy articles within GDPR and how they affect data governance/usage.
- BitSight’s recommendations for monitoring the GDPR alignment of third parties.
Join Jake Olcott, VP of Strategic Partnerships at BitSight, as he discusses best practices and lessons learned from top risk leaders and organizations, along with unique data and insight into recent events like WannaCry. This webinar will cover:
- The evolution of vendor risk management and the increasing importance of investment in cybersecurity programs to monitor and mitigate emerging threats.
- A breakdown of the Fortune 1000’s security performance according to BitSight researchers.
- BitSight’s recent research on data breaches, especially the correlation between ransomware attacks like WannaCry and outdated systems.
- The value of continuous monitoring with security ratings throughout the vendor lifecycle.
As the complexity of cyber attacks grows, healthcare organizations are keenly aware of the sensitive data that is at the heart of their businesses. Healthcare companies must remain vigilant about their security posture as well as the security of their third and fourth party vendors, especially as patient data continues to migrate to digital systems.
In this webinar, Erinmichelle Perri, CISO of MultiPlan, and Joel Alcon, Product Marketing Manager at BitSight will discuss:
- The biggest security challenges facing the healthcare industry today and proactive ways these organizations can mitigate cyber risk.
- How MultiPlan effectively reports on their security and vendor risk management programs to their Board of Directors using security ratings.
- How MultiPlan has established a scalable vendor risk management strategy that fosters collaboration between MultiPlan and its trusted vendors.
In today’s day and age, organizations understand that data breaches are a growing problem, but many fail to realize that a third party breach can impact them as much as a breach on their own network. In this webinar, BitSight’s Joel Alcon will discuss:
-Several misconceptions surrounding vendor risk management (VRM)
-The role both the Board of Directors and Regulators are playing in third party security practices
-How organizations can proactively create a strategy to avoid common pitfalls
This past May, over 300,000 computers in over 150 countries were affected by the WannaCry ransomware attacks. Despite an available patch from Microsoft, many of the companies failed to install critical updates prior to the attack-- leaving them vulnerable. Thousands of machines were infected and the worm caused network outages, flight cancellations, and ATM failures.
Given the increasing number of endpoint devices connected to corporate networks, the ever- expanding supply chain, and the complexity of cyber attacks, are companies adequately updating their operating systems? In this webinar, BitSight Data Scientist Dan Dahlberg will discuss:
- BitSight’s own research on outdated endpoints and their correlation to the May 2017 WannaCry attacks
- The risk of running outdated systems on your business’ bottom line
- The risks organizations face if companies in their supply chain are not keeping up with their patching process
From WannaCry to NotPetya, 2017 demonstrated an increase in the sophistication of cyber attacks occurring worldwide. As these incidents become more frequent and target more prominent organizations, is your business adequately prepared in your cyber risk strategy moving into 2018? Join BitSight CTO Stephen Boyer and Data Scientist Dan Dahlberg as they discuss:
- BitSight’s own research on outdated endpoints and their correlation to the May 2017 WannaCry attacks.
- Cybersecurity trends shown throughout the year, and their implications on the nature of the incidents we can expect in 2018.
- Recommendations for creating a strong security strategy that proactively mitigates risk within your organization and across your supply chain in 2018.
An increasing number of data breaches begin with the compromise of a key vendor or business partner. This was evident with the spread of NotPetya ransomware this past June, which highlighted to the world the importance of updating systems within corporate networks to prevent susceptibility to breach. Now more than ever, it’s critical that organizations are aware of both the vulnerabilities within their own networks and those within their supply chain.
Join Noah Simon (Product Marketing Manager, BitSight) and Tom Montroy (Data Scientist, BitSight) as they analyze BitSight’s findings on common security issues found within the supply chain of the Financial Services industry, and what any organization managing third-party risk needs to know. In this webinar, they will discuss:
- The security performance of over 5,200 Legal, Technology, and Business Services companies monitored by hundreds of Financial Services firms on the BitSight Security Rating platform.
- BitSight’s research on botnet infections, outdated systems, and peer-to-peer file sharing within the Financial Services industry.
- Best practices for managing third-party cyber risk and analyzing weak links in your supply chain.
Organizations continue to outsource critical operations to third parties. As a result of this trend, security ratings are quickly becoming a key component of effective vendor risk management (VRM) strategies.
Although Boards of Directors and senior executives are interested in their organization’s security posture, information security and risk management teams often lack the necessary information to help them understand details and clearly communicate about the aggregate risk of their vendor ecosystem.
Join us as Rebecca Ruiz (Principal Advisor, IT Cybersecurity & Compliance, Southern California Edison), Tom Stumpek (former CISO and CIO, General Electric), and Joel Alcon (Product Marketing Manager, BitSight) discuss best practices for reporting metrics to senior executives around vendor risk management performance.
Join this interactive webcam panel webinar to learn more about:
- Southern California Edison’s methods of effectively reporting their vendor risk management program performance to their cybersecurity oversight group.
- An executive perspective on the “do’s and don’ts” of successfully presenting your organization’s security posture through metrics and beyond.
- Proactive ways to mitigate third party risk.
As business success grows more reliant on data, technology, and third parties, CISOs and security leaders are finding themselves more often in the spotlight. They're being asked to brief board members, respond to third party requests, guide critical decisions, and make tough strategic calls. These increasing expectations are creating great opportunities for CISOs to shine, but to do so, they need to rise to the occasion. This webinar takes best practices and lessons learned from "superstar" CISOs, explaining what top security leaders are doing to lead their companies successfully through some of today's most complex business and technology challenges.Read more >