Hi [[ session.user.profile.firstName ]]
Sort by:
    • How to Address the Biggest Hole in Identity and Access Security
      How to Address the Biggest Hole in Identity and Access Security Tatu Ylonen, Founder & SSH Fellow, SSH Communications Security, Inc. Recorded: May 17 2017 3:00 pm UTC 64 mins
    • IDC called SSH keys “the gaping hole in your IAM strategy.” For a reason, when many banks and enterprises have literally millions of unaudited credentials granting access to their production servers and use OpenSSH configurations that allow any system administrator to self-provision permanent access to any server they use - for themselves and others - and there is no termination process for this access.

      It is a fundamental question of Who can access what, of separation of duties, and of enforcing internal boundaries (to PCI systems, financial data, health information, development vs. production, or classified compartments). Every cybersecurity regulation requires basic control of identities and access, and that is where real security starts.

      Half of the top 10 banks in US and UK have now began addressing the issue. Most other enterprises are only beginning to grasp the problem.

      This talk explains the issue and how to start addressing it. By the principal author of NIST IR 7966, the NIST guidelines for managing SSH access.

      About the Presenter:
      Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.

      Read more >
    • The Future of the Data Center Colocation Market: Trends & Growth Drivers
      The Future of the Data Center Colocation Market: Trends & Growth Drivers Jabez Tan, Research Director, Data Centers, Structure Research Upcoming: Aug 17 2017 3:00 pm UTC 60 mins
    • Join Jabez Tan, Keynote speaker at Data Centre World Hong Kong and Cloud Expo Asia, as he takes an in-depth look at the primary metrics that tell the story of the Hong Kong colocation market.

      We track the market’s size and growth trajectory and provide a five-year CAGR projection, along with a detailed analysis of the underlying supply and demand dynamics. Our proprietary methodology takes this analysis to a number of levels.

      First, colocation supply is measured from both a space and power perspective.
      Second, all market metrics – including space, power and revenue – are classified and then measured as either retail or wholesale colocation.
      Third, we size the market – again, from both a retail and colocation perspective – on an aggregated and sub-regional basis.

      This webinar is an excellent resource for any service provider, investor or end user (service provider or enterprise) that is looking to understand and project the data centre market in Hong Kong or find a service provider.

      Read more >
    • What is Precision Content and Why Do We Need It?
      What is Precision Content and Why Do We Need It? Rob Hanna, President of Precision Content Recorded: Dec 7 2016 9:00 pm UTC 60 mins
    • Precision Content is a series of methods and principles for structured authoring developed by Rob Hanna in 2013. This methodology is based on a well-known body of research founded in cognitive and behavioral sciences that theorizes that all structured information can be classified into one of a discrete number of information types. Each of these information types defines how the information is best structured and written to suit the intended reader response.

      Join Scott Abel, The Content Wrangler and his special guest, Rob Hanna, President of Precision Content for this free, one-hour webinar. In this session, Rob will guide you through an interactive exploration into how our brains work with information; explain how the Precision Content information types work to capture information used in any piece of business or technical content; discuss how Precision Content can help authors working with DITA/XML, and demonstrate how Precision Content is used to provide better clarity and precision to information.

      Read more >
    • Driving adoption of Commercial Analytic solutions
      Driving adoption of Commercial Analytic solutions Dominic Tyer Recorded: Oct 25 2016 2:30 pm UTC 50 mins
    • Commercial analytic solutions are becoming more and more common within the Pharma industry. Companies are spending millions implementing tools which are aimed at helping users identify opportunities to improve the bottom line, segment customers, track multichannel campaign success and meet a myriad of other objectives. Despite all the 'perceived' value these tools can add, they remain largely unused. Excuses for the lack of adoption are varied but can generally be classified into one of three areas - they are either too complex, it isn't convenient to use or it just doesn't deliver on the value promised. These issues are compounded by the fact that they are generally only identified when the solution has been deployed and expected to be used. By ensuring that these issues are addressed at all stages during the development and not just when adoption targets are not being met, commercial analytic solutions can be exploited to attain the anticipated value and more.

      Read more >
    • Skin Cancer and Immunohistochemistry
      Skin Cancer and Immunohistochemistry Jeff Gordon, Director OEM Sales - Cell Marque Corporation, Rocklin CA Recorded: Jun 22 2016 3:00 pm UTC 63 mins
    • Skin cancer is by far the most prevalent cancer. Each year, approximately 3.4 million people in the US alone are diagnosed with some form of skin cancer. Skin cancer can be highly treatable if it is detected and classified early, and this detection and classification is often aided by immunohistochemistry. This presentation covers many of the basic science, facts, and statistics of skin cancer, as well as the utility of immunohistochemical testing with markers such as S-100, SOX-10, Ber-Ep4, and HHV-8 in the accurate diagnosis and survival rates of skin cancer. Continuing education credits for attending this webinar will be offered through the National Society of Histotechnology

      Read more >
    • Ransomware & Other Cybersecurity Trends In Major Industries
      Ransomware & Other Cybersecurity Trends In Major Industries Jay Jacobs, Joel Alcon: BitSight Upcoming: May 31 2017 5:00 pm UTC 60 mins
    • Large-scale data breaches continue to hit all industries, leading to millions of compromised records. According to the Identity Theft Resource Center, there were 780 data breaches in which nearly 178 million records were compromised. While no industry is immune to data breaches, some are more prepared than others.

      Join Jay Jacobs, Senior Data Scientist at BitSight as he explains how security posture differs in six major industries. This webinar will highlight new findings on:

      - The most common ransomware infections
      - The rate of ransomware infections found across major industries
      - The aggregate BitSight Security Rating for each industry

      Read more >
    • Are Common Business Partners Putting You At Risk?
      Are Common Business Partners Putting You At Risk? Jay Jacobs, Senior Data Scientist, BitSight Technologies Recorded: Apr 18 2017 5:00 pm UTC 28 mins
    • BitSight researchers recently studied the security performance of Fortune 1000 companies alongside a random sample of companies with a similar industry breakdown. How did they compare, and what should organizations take away from the study?

      Join Jay Jacobs, Senior Data Scientist at BitSight to learn about the security strengths and weaknesses found within Fortune 1000 companies. In this webinar, you’ll learn:

      - How the security hygiene of Fortune 1000 companies compare to similar counterparts
      - Why Fortune 1000 companies disclose nearly twice the amount of data breaches as other companies
      - Common machine comprises found in Fortune 1000 companies
      - What all businesses can take away as a result

      Register today and get a copy of the report upon attending the webinar!

      Read more >
    • How to Mitigate Cyber Risk with Efficient Vendor Risk Management
      How to Mitigate Cyber Risk with Efficient Vendor Risk Management Kevin Roden and Julia Grunewald Recorded: Feb 22 2017 6:00 pm UTC 42 mins
    • Over the past few years, outsourcing business functions to vendors has been on the rise. In fact, there are more third-party relationships today than ever before. However, as the number of supplier relationships grows, so grows the amount of risk those suppliers pose. And in today’s hyper-connected landscape, cyber risk has taken center stage when it comes to vendor risk.

      Join former CIO, Kevin Roden, and BitSight’s Senior Customer Success Manager, Julia Grunewald, on Wednesday, February 22nd at 1pm ET, as they discuss traditional and emerging vendor risk management (VRM) tactics.

      In this webinar you’ll learn:
      - How VRM has traditionally been handled
      - Why traditional strategies alone aren’t enough
      - Advice on how to effectively and efficiently mitigate cyber risk

      Read more >
    • Presenting Cybersecurity to the Board: Your How-to for Success
      Presenting Cybersecurity to the Board: Your How-to for Success Richard Clarke, Jasper Osstenjuk, Jake Olcott Recorded: Jan 25 2017 6:00 pm UTC 62 mins
    • Today, cybersecurity is a #1 concern for board members. But what do they need to know? And how should it be presented?

      Richard Clarke has a pretty good idea. As a senior White House advisor to four U.S. Presidents, a member of three corporate boards, and CEO of Good Harbor Security Risk Management, he’s talked cybersecurity in both the Situation Room and the boardroom.

      Jasper Ossentjuk also knows how to present cybersecurity in the boardroom. As SVP and CISO for TransUnion, Jasper regularly presents information to his Board about his organization's security posture.

      On January 25th at 1:00PM ET, join Richard and Jasper for a discussion of:

      - What cybersecurity metrics and measurements are most important for the board
      - Methods for security leaders to communicate security issues across the enterprise
      - How to graphically represent your cybersecurity program

      Read more >