Hi [[ session.user.profile.firstName ]]
Sort by:
    • Next-Generation Mission Critical IT: Modernizing Your Environment
      Next-Generation Mission Critical IT: Modernizing Your Environment Sajid Khan, Mission Critical Segment Manager, Intel Daniel Sullivan, Technical Solution Manager, IBM Recorded: Dec 18 2012 6:00 pm UTC 61 mins
    • Keeping the most important workloads up and running smoothly, 24/7 can keep IT managers up at night. Additionally, the need to rapidly analyze the ever-increasing amounts of data being generated in connected world is major imperative. Increasingly, these challenges need to be met in a tight budgetary environment.

      You’re faced with a strategic choice: Continue to try to meet these growing demands with legacy infrastructure, or migrate your mission-critical deployments to an open-standards-based environment built upon Intel® Xeon® processor-based solutions solution stacks.


      Join our panel of experts to learn a proven approach to modernization. Topics include:
      · Trends and market data related to mission-critical application modernization and a perspective on the updated solution stack

      · Strategic options to address the current software-, hardware-, and business-related challenges in your mission-critical environment

      · Practical steps for your mission-critical migration projects, including which workloads to transition first, and ways to divide the project into manageable pieces

      · Lessons learned in modernizing mission-critical environments, based on a rich history of innovation and global experience from IBM and Intel


      Bring your most pressing mission-critical questions and challenges and ask the experts. This webinar will be live.

      Read more >
    • Securing Critical Systems in the Age of IoT
      Securing Critical Systems in the Age of IoT Aaron Turner, IANS IoT Research Faculty & Dimitri Vlachos, VP Marketing, Pwnie Express Recorded: Jun 21 2017 7:00 pm UTC 48 mins
    • Smart stadiums, connected healthcare, personalized retail experiences are just a few industries where the Internet of Things (IoT) is fundamentally changing the boundaries of cyber and physical security. Once separate, isolated business critical systems are now connected. Medical devices monitoring patient health during operations sit side by side with guest wifi networks. HVAC and coach communication systems run in the same environment as the interactive fan experience, all critical to today’s stadium experience. Retail point of sale (POS) systems are connected to inventory management robots in grocery stores.

      Join this webinar and learn more about:

      - How security programs must adapt to an IoT connected world
      - Why isolation is no longer a practical solution for protecting critical systems
      - Cybersecurity risks stemming from the IoT

      This talk will explore and discuss how security programs must adapt to an IoT connected world where isolation is no longer a practical solution for protecting critical systems and their customers. As the IoT is integrated into nearly every aspect of a modern business, cyber-related risks elevate from a primary focus on data, to that of physical facilities integrity and business availability.

      Read more >
    • IoT and Critical Infrastructure: Why We Need Intelligence Exchange
      IoT and Critical Infrastructure: Why We Need Intelligence Exchange Paul Kurtz, CEO & Co-Founder of TruSTAR Recorded: Jun 21 2017 3:00 pm UTC 44 mins
    • Today we fight adversaries individually, not collectively. Companies are working in silos to defend their individual infrastructures. Security operators and defense teams do not have visibility into cyber security incident information from their peers, even though they may be seeing the same attack methods or adversaries. The lack of an effective exchange and collaboration between companies is the Achilles heel our enemies continue to exploit.

      Come and join a discussion about a new cybersecurity model that maximizes the use of the network (much like the bad guys) and incentivizes the exchange of actionable threat incident data.

      We'll look at recent critical infrastructure hacks such as Grizzly Steppe, WannaCry and CrashOverride and discuss how we can better protect ourselves for future attacks.

      Read more >
    • Auditing Neglected Critical Infrastructure
      Auditing Neglected Critical Infrastructure Ian Whiting - CEO Titania Group Recorded: Jan 18 2017 2:00 pm UTC 33 mins
    • Key network infrastructure devices are overlooked yet they provide critical functionality. Exploiting web application weaknesses and service buffer overflows is exciting, but the housekeeping of network infrastructure is not. Issues in network infrastructure devices can lead to network wide problems that would cause system admininstration nightmares. This presentation provides a review of key security devices, often side-lined when looking at security. It covers the value of these devices to "Blue Teams", issues "Red Teams" can highlight, desired outcomes and auditing practices.

      Read more >
    • Grid Cyber Lockdown: Ransomware in Critical Infrastructure
      Grid Cyber Lockdown: Ransomware in Critical Infrastructure - Recorded: Aug 25 2016 9:00 am UTC 60 mins
    • Hear from your industry peers and other security experts on this very important topic of Ransomware in Critical Infrastructure:
      - A brief history of ransomware and its current state in terms of technology and methods utilized by attackers.
      - A roundtable discussion on security and compliance risks associated with ransomware at different points of integrated IT-OT infrastructure.
      - Best practices and technologies for protecting your organization against ransomware.

      Panelists
      Billy Glenn, Pacific Gas & Electric, Principal Security Solution Architect
      Gavin Worden, Sempra Energy Utilities, Manager, Information Security Operations Center
      Christopher Ellefsen, BKK Group, Senior Network Engineer
      Bryan Lee, Palo Alto Networks - Unit 42, Threat Intelligence Researcher
      Jack Whitsitt, EnergySec, Senior Security Strategist
      Del Rodillas, Palo Alto Networks, Solution Lead for ICS/SCADA Security

      Read more >