Hi [[ session.user.profile.firstName ]]
Sort by:
    • Breaches, Threats and How to Improve Security in 2018
      Breaches, Threats and How to Improve Security in 2018 Shimon Oren (Deep Instinct), Ted Harrington (ISE), Greg Foss (LogRhythm) Upcoming: Nov 14 2017 4:00 pm UTC 60 mins
    • 2017 is not yet over and it's already the year of cyber attacks. From phishing, to hacks, to classified hacking tools leaked and the biggest ransomware attacks to date (Wannacry, NotPetya), security professionals across the world are looking to apply the lessons learned in 2017 for an improved cyber security next year.

      Join this live interactive Q&A panel with experts from the artificial intelligence, deep learning and IoT security space to learn about:
      - The biggest attack trends seen so far
      - Impact across industries
      - Threats on the horizon
      - Recommendations to better secure your data and company in 2018

      - Shimon Oren, Head of Cyber-Intelligence at Deep Instinct
      - Ted Harrington, Executive Partner at Independent Security Evaluators
      - Greg Foss, Global SecOps Manager at LogRhythm

      Read more >
    • The Future of the Data Center Colocation Market: Trends & Growth Drivers
      The Future of the Data Center Colocation Market: Trends & Growth Drivers Jabez Tan, Research Director, Data Centers, Structure Research Recorded: Aug 17 2017 3:00 pm UTC 36 mins
    • Join Jabez Tan, Keynote speaker at Data Centre World Hong Kong and Cloud Expo Asia, as he takes an in-depth look at the primary metrics that tell the story of the Hong Kong colocation market.

      We track the market’s size and growth trajectory and provide a five-year CAGR projection, along with a detailed analysis of the underlying supply and demand dynamics. Our proprietary methodology takes this analysis to a number of levels.

      First, colocation supply is measured from both a space and power perspective.
      Second, all market metrics – including space, power and revenue – are classified and then measured as either retail or wholesale colocation.
      Third, we size the market – again, from both a retail and colocation perspective – on an aggregated and sub-regional basis.

      This webinar is an excellent resource for any service provider, investor or end user (service provider or enterprise) that is looking to understand and project the data centre market in Hong Kong or find a service provider.

      Read more >
    • Data Security Briefings Part 1: Neutralizing Data Breach and Insider Threat
      Data Security Briefings Part 1: Neutralizing Data Breach and Insider Threat Terence Spies, CTO, HPE: Brandon Dunlap, Moderator Recorded: May 11 2017 4:00 pm UTC 57 mins
    • Governments and enterprises are more challenged than ever to protect their most valuable data, from a citizen’s social security number to highly classified data. But endpoint or network security can’t stop attackers, and much less a malevolent insider. The solution lies in protecting the data itself. Recent NIST and FIPS validations make groundbreaking Format-Preserving Encryption (FPE) technology available to government and enterprises. FPE “de-identifies” sensitive data, rendering it useless to attackers, while maintaining its usability and referential integrity for data processes and applications, and easily layering protection into decades-old legacy systems. Join HPE and (ISC)2 for an exploration of this topic in the 1st part of a three part series.

      Read more >
    • Operationalizing a Practical Insider Threat Program
      Operationalizing a Practical Insider Threat Program Brandon Swafford Recorded: Jul 14 2017 8:40 pm UTC 30 mins
    • When the phrase “insider threat” comes to mind, most automatically think of fraud, sabotage and theft; it’s natural to do so, as malicious insider threats make regular headlines.

      The truth is that 68% of all insider threats are attributed to accidental users, who unintentionally put their organizations at risk because of a user error or lack of training. Insiders are really anyone that works with sensitive data inside the network.

      In Operationalizing a Practical Insider Threat Program, we’ll review:

      -Requirements for building an insider threat program
      -An overview of the stakeholders and investigative best practices
      -Real world examples of an insider threat program in action


      Brandon Swafford, CTO of Data & Insider Threat Security, Forcepoint

      Brandon Swafford has more than 12 years of experience in legal investigations and security, including hedge funds where he built security technology and the U.S. Intelligence Community as a Cyber Counterintelligence consultant and analyst. Within the intelligence community, Brandon covered several classified agencies and worked closely with the National Insider Threat Task Force and National Counterintelligence Executive. In addition, Brandon provided insider threat analysis and investigation consulting to the International Monetary Fund in Washington, D.C.

      Read more >
    • How to Address the Biggest Hole in Identity and Access Security
      How to Address the Biggest Hole in Identity and Access Security Tatu Ylonen, Founder & SSH Fellow, SSH Communications Security, Inc. Recorded: May 17 2017 3:00 pm UTC 64 mins
    • IDC called SSH keys “the gaping hole in your IAM strategy.” For a reason, when many banks and enterprises have literally millions of unaudited credentials granting access to their production servers and use OpenSSH configurations that allow any system administrator to self-provision permanent access to any server they use - for themselves and others - and there is no termination process for this access.

      It is a fundamental question of Who can access what, of separation of duties, and of enforcing internal boundaries (to PCI systems, financial data, health information, development vs. production, or classified compartments). Every cybersecurity regulation requires basic control of identities and access, and that is where real security starts.

      Half of the top 10 banks in US and UK have now began addressing the issue. Most other enterprises are only beginning to grasp the problem.

      This talk explains the issue and how to start addressing it. By the principal author of NIST IR 7966, the NIST guidelines for managing SSH access.

      About the Presenter:
      Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.

      Read more >
    • What is Precision Content and Why Do We Need It?
      What is Precision Content and Why Do We Need It? Rob Hanna, President of Precision Content Recorded: Dec 7 2016 9:00 pm UTC 60 mins
    • Precision Content is a series of methods and principles for structured authoring developed by Rob Hanna in 2013. This methodology is based on a well-known body of research founded in cognitive and behavioral sciences that theorizes that all structured information can be classified into one of a discrete number of information types. Each of these information types defines how the information is best structured and written to suit the intended reader response.

      Join Scott Abel, The Content Wrangler and his special guest, Rob Hanna, President of Precision Content for this free, one-hour webinar. In this session, Rob will guide you through an interactive exploration into how our brains work with information; explain how the Precision Content information types work to capture information used in any piece of business or technical content; discuss how Precision Content can help authors working with DITA/XML, and demonstrate how Precision Content is used to provide better clarity and precision to information.

      Read more >
    • Driving adoption of Commercial Analytic solutions
      Driving adoption of Commercial Analytic solutions Dominic Tyer Recorded: Oct 25 2016 2:30 pm UTC 50 mins
    • Commercial analytic solutions are becoming more and more common within the Pharma industry. Companies are spending millions implementing tools which are aimed at helping users identify opportunities to improve the bottom line, segment customers, track multichannel campaign success and meet a myriad of other objectives. Despite all the 'perceived' value these tools can add, they remain largely unused. Excuses for the lack of adoption are varied but can generally be classified into one of three areas - they are either too complex, it isn't convenient to use or it just doesn't deliver on the value promised. These issues are compounded by the fact that they are generally only identified when the solution has been deployed and expected to be used. By ensuring that these issues are addressed at all stages during the development and not just when adoption targets are not being met, commercial analytic solutions can be exploited to attain the anticipated value and more.

      Read more >
    • Skin Cancer and Immunohistochemistry
      Skin Cancer and Immunohistochemistry Jeff Gordon, Director OEM Sales - Cell Marque Corporation, Rocklin CA Recorded: Jun 22 2016 3:00 pm UTC 63 mins
    • Skin cancer is by far the most prevalent cancer. Each year, approximately 3.4 million people in the US alone are diagnosed with some form of skin cancer. Skin cancer can be highly treatable if it is detected and classified early, and this detection and classification is often aided by immunohistochemistry. This presentation covers many of the basic science, facts, and statistics of skin cancer, as well as the utility of immunohistochemical testing with markers such as S-100, SOX-10, Ber-Ep4, and HHV-8 in the accurate diagnosis and survival rates of skin cancer. Continuing education credits for attending this webinar will be offered through the National Society of Histotechnology

      Read more >
    • Lessons from the Trenches: 6 Years of Continuous Monitoring
      Lessons from the Trenches: 6 Years of Continuous Monitoring Jake Olcott, VP of Strategic Partnerships, BitSight Recorded: Sep 14 2017 5:00 pm UTC 47 mins
    • Join Jake Olcott, VP of Strategic Partnerships at BitSight, as he discusses best practices and lessons learned from top risk leaders and organizations, along with unique data and insight into recent events like WannaCry. This webinar will cover:

      - The evolution of vendor risk management and the increasing importance of investment in cybersecurity programs to monitor and mitigate emerging threats.

      - A breakdown of the Fortune 1000’s security performance according to BitSight researchers.

      - BitSight’s recent research on data breaches, especially the correlation between ransomware attacks like WannaCry and outdated systems.

      - The value of continuous monitoring with security ratings throughout the vendor lifecycle.

      Read more >
    • Improving the Maturity of Your Vendor Risk Management Program
      Improving the Maturity of Your Vendor Risk Management Program Erinmichelle Perri, CISO, Multiplan; Joel Alcon, Product Marketing Manager, BitSight Upcoming: Oct 31 2017 3:00 pm UTC 30 mins
    • As the complexity of cyber attacks grows, healthcare organizations are keenly aware of the sensitive data that is at the heart of their businesses. Healthcare companies must remain vigilant about their security posture as well as the security of their third and fourth party vendors, especially as patient data continues to migrate to digital systems.

      In this webinar, Erinmichelle Perri, CISO of MultiPlan, and Joel Alcon, Product Marketing Manager at BitSight will discuss:

      - The biggest security challenges facing the healthcare industry today and proactive ways these organizations can mitigate cyber risk.

      - How MultiPlan effectively reports on their security and vendor risk management programs to their Board of Directors using security ratings.

      - How MultiPlan has established a scalable vendor risk management strategy that fosters collaboration between MultiPlan and its trusted vendors.

      Read more >
    • A Growing Risk Ignored: Exploring the Risks & Pitfalls of Outdated Systems
      A Growing Risk Ignored: Exploring the Risks & Pitfalls of Outdated Systems Dan Dahlberg, Data Scientist, BitSight Recorded: Sep 27 2017 3:00 pm UTC 41 mins
    • This past May, over 300,000 computers in over 150 countries were affected by the WannaCry ransomware attacks. Despite an available patch from Microsoft, many of the companies failed to install critical updates prior to the attack-- leaving them vulnerable. Thousands of machines were infected and the worm caused network outages, flight cancellations, and ATM failures.

      Given the increasing number of endpoint devices connected to corporate networks, the ever- expanding supply chain, and the complexity of cyber attacks, are companies adequately updating their operating systems? In this webinar, BitSight Data Scientist Dan Dahlberg will discuss:

      - BitSight’s own research on outdated endpoints and their correlation to the May 2017 WannaCry attacks
      - The risk of running outdated systems on your business’ bottom line
      - The risks organizations face if companies in their supply chain are not keeping up with their patching process

      Read more >
    • Assessing the Cyber Performance of the Financial Services Supply Chain
      Assessing the Cyber Performance of the Financial Services Supply Chain Tom Montroy, Data Scientist, BitSight; Noah Simon, Product Marketing Manager, BitSight Upcoming: Nov 8 2017 4:00 pm UTC 60 mins
    • An increasing number of data breaches begin with the compromise of a key vendor or business partner. This was evident with the spread of NotPetya ransomware this past June, which highlighted to the world the importance of updating systems within corporate networks to prevent susceptibility to breach. Now more than ever, it’s critical that organizations are aware of both the vulnerabilities within their own networks and those within their supply chain.

      Join Noah Simon (Product Marketing Manager, BitSight) and Tom Montroy (Data Scientist, BitSight) as they analyze BitSight’s findings on common security issues found within the supply chain of the Financial Services industry, and what any organization managing third-party risk needs to know. In this webinar, they will discuss:

      - The security performance of over 5,200 Legal, Technology, and Business Services companies monitored by hundreds of Financial Services firms on the BitSight Security Rating platform.

      - BitSight’s research on botnet infections, outdated systems, and peer-to-peer file sharing within the Financial Services industry.

      - Best practices for managing third-party cyber risk and analyzing weak links in your supply chain.

      Read more >
    • Vendor Risk Management Performance: Key Reporting Metrics for Executives
      Vendor Risk Management Performance: Key Reporting Metrics for Executives Rebecca Ruiz (Southern California Edison), Tom Stumpek (Former CIO & CISO, General Electric), Joel Alcon (BitSight) Upcoming: Nov 15 2017 4:00 pm UTC 60 mins
    • Organizations continue to outsource critical operations to third parties. As a result of this trend, security ratings are quickly becoming a key component of effective vendor risk management (VRM) strategies.

      Although Boards of Directors and senior executives are interested in their organization’s security posture, information security and risk management teams often lack the necessary information to help them understand details and clearly communicate about the aggregate risk of their vendor ecosystem.

      Join us as Rebecca Ruiz (Principal Advisor, IT Cybersecurity & Compliance, Southern California Edison), Tom Stumpek (former CISO and CIO, General Electric), and Joel Alcon (Product Marketing Manager, BitSight) discuss best practices for reporting metrics to senior executives around vendor risk management performance.

      Join this interactive webcam panel webinar to learn more about:
      - Southern California Edison’s methods of effectively reporting their vendor risk management program performance to their cybersecurity oversight group.
      - An executive perspective on the “do’s and don’ts” of successfully presenting your organization’s security posture through metrics and beyond.
      - Proactive ways to mitigate third party risk.

      Read more >