Intégration de la signature électronique avec la solution Immovision de Figaro Classifieds grâce aux API DocuSign : gain de temps, d'argent et simplification de l'activité. www.docusign.frRead more >
In light of the recent publishing of thousands of CIA-related documents by WikiLeaks - the largest leak of classified documents in CIA history, we will discuss the implications of the revealed information across industries and users, in the US and globally.
Join the discussion and learn more about:
- What is Vault 7 and how does it affect you?
- What can we expect, as more documents get releases?
- How will this affect organizations, and the relationship between the tech industry and government agencies?
- Recommendations on how we can better secure our data and privacy
- Paul Kurtz, CEO & Co-Founder of TruSTAR Technology
- Brian White, COO of RedOwl Analytics
- Alex Rice, CTO of HackerOne
IDC called SSH keys “the gaping hole in your IAM strategy.” For a reason, when many banks and enterprises have literally millions of unaudited credentials granting access to their production servers and use OpenSSH configurations that allow any system administrator to self-provision permanent access to any server they use - for themselves and others - and there is no termination process for this access.
It is a fundamental question of Who can access what, of separation of duties, and of enforcing internal boundaries (to PCI systems, financial data, health information, development vs. production, or classified compartments). Every cybersecurity regulation requires basic control of identities and access, and that is where real security starts.
Half of the top 10 banks in US and UK have now began addressing the issue. Most other enterprises are only beginning to grasp the problem.
This talk explains the issue and how to start addressing it. By the principal author of NIST IR 7966, the NIST guidelines for managing SSH access.
About the Presenter:
Tatu Ylonen is a cybersecurity pioneer with over 20 years of experience from the field. He invented SSH (Secure Shell), which is the plumbing used to manage most networks, servers, and data centers and implement automation for cost-effective systems management and file transfers. He is has also written several IETF standards, was the principal author of NIST IR 7966, and holds over 30 US patents - including some on the most widely used technologies in reliable telecommunications networks.
In today's digital age, a person's identity is classified by a username and password. With Gartner research predicting 26b connected devices in the world (6.5 devices per person) by 2020, what impact is that going to have on the identity of global citizens? In this 30 minute webinar, Bianca Lopes will go over the impact that biometrics can have on the connected world focusing in particular on authentication.
Biometrics & Identity in the Connected World
-Identity - the history + what that means today (username + password)
-Connected World - stats on connected devices + problems that creates in the system (fraud, social inclusion/exclusion)
-What is biometrics - I’ve been told I need to learn about biometrics, what do I actually need to know?
-Common challenges within this industry - suggestions for how to tackle it
Join Jabez Tan, Keynote speaker at Data Centre World Hong Kong and Cloud Expo Asia, as he takes an in-depth look at the primary metrics that tell the story of the Hong Kong colocation market.
We track the market’s size and growth trajectory and provide a five-year CAGR projection, along with a detailed analysis of the underlying supply and demand dynamics. Our proprietary methodology takes this analysis to a number of levels.
First, colocation supply is measured from both a space and power perspective.
Second, all market metrics – including space, power and revenue – are classified and then measured as either retail or wholesale colocation.
Third, we size the market – again, from both a retail and colocation perspective – on an aggregated and sub-regional basis.
This webinar is an excellent resource for any service provider, investor or end user (service provider or enterprise) that is looking to understand and project the data centre market in Hong Kong or find a service provider.
Precision Content is a series of methods and principles for structured authoring developed by Rob Hanna in 2013. This methodology is based on a well-known body of research founded in cognitive and behavioral sciences that theorizes that all structured information can be classified into one of a discrete number of information types. Each of these information types defines how the information is best structured and written to suit the intended reader response.
Join Scott Abel, The Content Wrangler and his special guest, Rob Hanna, President of Precision Content for this free, one-hour webinar. In this session, Rob will guide you through an interactive exploration into how our brains work with information; explain how the Precision Content information types work to capture information used in any piece of business or technical content; discuss how Precision Content can help authors working with DITA/XML, and demonstrate how Precision Content is used to provide better clarity and precision to information.
Commercial analytic solutions are becoming more and more common within the Pharma industry. Companies are spending millions implementing tools which are aimed at helping users identify opportunities to improve the bottom line, segment customers, track multichannel campaign success and meet a myriad of other objectives. Despite all the 'perceived' value these tools can add, they remain largely unused. Excuses for the lack of adoption are varied but can generally be classified into one of three areas - they are either too complex, it isn't convenient to use or it just doesn't deliver on the value promised. These issues are compounded by the fact that they are generally only identified when the solution has been deployed and expected to be used. By ensuring that these issues are addressed at all stages during the development and not just when adoption targets are not being met, commercial analytic solutions can be exploited to attain the anticipated value and more.Read more >
Skin cancer is by far the most prevalent cancer. Each year, approximately 3.4 million people in the US alone are diagnosed with some form of skin cancer. Skin cancer can be highly treatable if it is detected and classified early, and this detection and classification is often aided by immunohistochemistry. This presentation covers many of the basic science, facts, and statistics of skin cancer, as well as the utility of immunohistochemical testing with markers such as S-100, SOX-10, Ber-Ep4, and HHV-8 in the accurate diagnosis and survival rates of skin cancer. Continuing education credits for attending this webinar will be offered through the National Society of HistotechnologyRead more >
Most corporate networks are complex and include various operating systems, servers and massive amounts of data. This data is transferred, stored and accessed across the network. In 2014, 43% of data breaches were classified as a result of lost or stolen drives or due to accidently making data public . Encrypting this data is a great way to protect against these risks but with so many different platforms, operating systems, servers and applications, the task can be daunting.
In this webcast, we’ll show you how Symantec’s Encryption solutions can help you achieve heterogeneous encryption across your entire network and of all critical data whether it’s at rest or in motion.
Join us on January 26th at 10am PT to learn how.
Join us on Wednesday, March 29th has Samit Shah, BitSight's Insurance Solutions Manager discusses how cyber insurers should approach portfolio risk aggregation and how other businesses can use this mindset to decrease risk across their portfolio of vendors.Read more >
Large-scale data breaches continue to hit all industries, leading to millions of compromised records. According to the Identity Theft Resource Center, there were 780 data breaches in which nearly 178 million records were compromised. While no industry is immune to data breaches, some are more prepared than others.
Join Jay Jacobs, Senior Data Scientist at BitSight as he explains how security posture differs in six major industries. This webinar will highlight new findings on:
- The most common ransomware infections
- The rate of ransomware infections found across major industries
- The aggregate BitSight Security Rating for each industry
Cybercrime continues to grow as an industry — costing the global economy billions per year. And government agencies in the US have become the leading target, with the number of attacks against public agencies outpacing those of the business sector. Watch this webinar “Cyberespionage: The New Paradigm” to find out:
How common cyberespionage tactics such as SQL injection and spear phishing are used to infiltrate government data and classified information
What enterprises can do to gain awareness of these activities that can inadvertently create a domino effect — impacting commercial and personal data and property
As business success grows more reliant on data, technology, and third parties, CISOs and security leaders are finding themselves more often in the spotlight. They're being asked to brief board members, respond to third party requests, guide critical decisions, and make tough strategic calls. These increasing expectations are creating great opportunities for CISOs to shine, but to do so, they need to rise to the occasion. This webinar takes best practices and lessons learned from "superstar" CISOs, explaining what top security leaders are doing to lead their companies successfully through some of today's most complex business and technology challenges.Read more >
The Software Defined OpenFlow instruction-set breaks the boundaries of what we previously classified as control, management, and application network planes. Lack of structure is not an option if we want a robust infrastructure that scales and extends therefore we examine the new emerging standards-based architecture of FlowMapping overlays. Proven in large-scale complex carrier SDN deployments, FlowMapping is taking advantage of the new found agility in OpenFlow application networking without sacrificing scale, distribution, and interoperability.Read more >
In today's world, a cybersecurity incident can quickly become a risk to an organization's reputation. Reputational risk management is a critical business practice to ensure that your organization is doing everything possible to minimize the potential damage to its character or value.
Join our panelists Jake Olcott, VP of Business Development at BitSight, Siobhan Gorman, Director at Brunswick Group, and John Fiore, Former CIO of BNY Mellon as they discuss:
- How to mitigate reputational risk through cybersecurity risk management
- Ways in which reputational risk can affect your company's bottom line
- What executive leaders and board members care most about in regard to reputational risk
- Examples of successful and unsuccessful reputational risk management
- How security officials should be thinking about reputational risk management in their data security initiatives
BitSight researchers recently studied the security performance of Fortune 1000 companies alongside a random sample of companies with a similar industry breakdown. How did they compare, and what should organizations take away from the study?
Join Jay Jacobs, Senior Data Scientist at BitSight to learn about the security strengths and weaknesses found within Fortune 1000 companies. In this webinar, you’ll learn:
- How the security hygiene of Fortune 1000 companies compare to similar counterparts
- Why Fortune 1000 companies disclose nearly twice the amount of data breaches as other companies
- Common machine comprises found in Fortune 1000 companies
- What all businesses can take away as a result
Register today and get a copy of the report upon attending the webinar!
With new cyber attacks and data breaches emerging on a daily basis, today’s organizations need a deeper understanding of the security performance of their programs, policies, and third parties. That’s why many companies use security ratings to help measure and mitigate cyber risk across their business ecosystems.
Join this talk to learn how you can improve your organization’s security rating by improving your overall security posture.
In this webinar, you’ll learn:
- Three ways to improve your security performance in 2017
- What impact these changes could have on your Security Rating
- How to use BitSight Security Ratings to prioritize the remediation of security events and issues
Over the past few years, outsourcing business functions to vendors has been on the rise. In fact, there are more third-party relationships today than ever before. However, as the number of supplier relationships grows, so grows the amount of risk those suppliers pose. And in today’s hyper-connected landscape, cyber risk has taken center stage when it comes to vendor risk.
Join former CIO, Kevin Roden, and BitSight’s Senior Customer Success Manager, Julia Grunewald, on Wednesday, February 22nd at 1pm ET, as they discuss traditional and emerging vendor risk management (VRM) tactics.
In this webinar you’ll learn:
- How VRM has traditionally been handled
- Why traditional strategies alone aren’t enough
- Advice on how to effectively and efficiently mitigate cyber risk
In order for a business to be competitive, it must be continuously improving. This is something the modern chief information officer (CIO) knows all too well. Further, technological advances and greater outsourcing in business have made cyber risk a key area that requires a great deal of thought from the CIO. So, how can CIOs know how their security programs are performing in order to make decisions on allocating funding, headcount, and policies?
Join Jake Olcott. VP of Business Development at BitSight and Tom Stumpek, a Technology Advisor and former CIO for GE. Attendees will learn:
- Why cybersecurity benchmarking is difficult for the modern CIO
- Different methods of benchmarking you may be involved in (or want to consider)
- How Security Ratings may solve many benchmarking challenges
Today, cybersecurity is a #1 concern for board members. But what do they need to know? And how should it be presented?
Richard Clarke has a pretty good idea. As a senior White House advisor to four U.S. Presidents, a member of three corporate boards, and CEO of Good Harbor Security Risk Management, he’s talked cybersecurity in both the Situation Room and the boardroom.
Jasper Ossentjuk also knows how to present cybersecurity in the boardroom. As SVP and CISO for TransUnion, Jasper regularly presents information to his Board about his organization's security posture.
On January 25th at 1:00PM ET, join Richard and Jasper for a discussion of:
- What cybersecurity metrics and measurements are most important for the board
- Methods for security leaders to communicate security issues across the enterprise
- How to graphically represent your cybersecurity program