Hi [[ session.user.profile.firstName ]]
Sort by:
    • Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Is Your Cybersecurity Strategy Ready for the Post-Infrastructure Era? Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember Recorded: Dec 3 2015 6:00 pm UTC 62 mins
    • According to Gartner, organizations spend over 80% of their security product dollars on their networks and their endpoints. However, these spending priorities are increasingly at odds with the threat landscape: it’s been over a decade since network perimeter was declared dead, and with the advent of mobility and BYOD, endpoint security has become both more challenging and less relevant to stopping today’s threats. Advanced threats no longer target networks, servers or endpoints: they target users, the data they have access to, and the transactions they facilitate.

      Join Gartner Research VP Peter Firstbrook and Proofpoint SVP of Cybersecurity Strategy Ryan Kalember as they discuss how organizations can better position themselves to defend against advanced threats as they adjust to the cloud-enabled, mobile-friendly, and socially networked way their users work today.

      Join this webinar to learn:
      • The key stages in the evolution of a post-infrastructure approach to security
      • Strategies and tactics for dealing with post-infrastructure security challenges, from technologies to
      • Case studies in post-infrastructure threats, illustrated by cloud email, social media and mobile apps

      Read more >
    • To the Cloud: Ready or Not! …The Catalyst for Better Cybersecurity? To the Cloud: Ready or Not! …The Catalyst for Better Cybersecurity? Mark Weatherford, Chief Cybersecurity Strategist, vArmour Recorded: Jul 12 2016 5:00 pm UTC 34 mins
    • As the global cyber threat environment continues to evolve, organizations need to begin thinking differently about information security and the protection of their infrastructure. The evolution from perimeter-centric, hardware-based environments to virtualized data centers and the cloud is underway and many organizations are late to the game. As CIO’s and CISO’s are driven to transition their CapEx investments to OpEx spending, the economic efficiencies of the cloud provide a rational path to those goals. From a security perspective however, security models that don’t sufficiently address workload and application-aware segmentation, lateral traffic visibility, and network-based threat detection of on-premises data center and public cloud-based environments leave a huge gap in the overall security posture.

      This talk will provide CIO's and CISO's struggling with decisions about migration to the cloud with some thoughts about how the cloud can be the catalyst that improves security while also reducing costs and technology footprint.

      Read more >
    • Six Key Capabilities For Securing Office 365 Email Six Key Capabilities For Securing Office 365 Email Ryan Kalember, Proofpoint SVP of Cybersecurity with Guest Speaker Kelley Mak, Forrester Analyst Recorded: May 3 2016 6:00 pm UTC 62 mins
    • Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.

      While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.

      Key takeaways include:
      • Why the shift to Office 365 increases criticality of email security
      • Common pitfalls to avoid in the planning stages
      • Key security capabilities to protect from advanced threats

      Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.

      Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.

      Read more >
    • Cybersecurity Predictions for 2016: Targeting the human factor Cybersecurity Predictions for 2016: Targeting the human factor Patrick Wheeler, Director, Threat Security at Proofpoint Recorded: Dec 16 2015 6:00 pm UTC 42 mins
    • The aggressive incorporation of social engineering techniques in the malicious document attachment campaigns that have dominated the threat landscape of 2015 highlights the central place of ‘the human factor’ in the attack chain.

      In 2016, people are the targets: from email and web to social media and mobile apps, attackers will build on the successes of 2015 by developing campaigns that leverage the human factor to bypass increasingly sophisticated automated detection and response capabilities.

      Join Patrick Wheeler, Director, Threat Security at Proofpoint, as he presents Cybersecurity Predictions for 2016: Targeting the human factor addressing the shift to increasingly targeted attacks on people behind the devices.

      Learn how your organization must demand solutions that enable you to:
      • Take measures to secure data
      • Effectively track incidents and remediate incidents
      • Report out on compliance status

      Read more >
    • Cybersecurity and Investors Cybersecurity and Investors Jacob Olcott, Vice President, BitSight, Nell Minow Recorded: Oct 26 2015 6:00 pm UTC 49 mins
    • There’s no doubt that cyber attacks cause real financial harm to businesses. Money can be stolen, business operations disrupted. Cyber theft can provide international competitors with years worth of valuable intellectual property or trade secrets virtually overnight, jeopardizing current and future market opportunities. Cyber attacks can seriously damage an organization’s reputation with customers and result in legal liability for the company, executives, and board members.

      As companies race to protect themselves, how do investors know if the organizations they are investing in are secure?

      Join Jacob Olcott, VP at BitSight, and Nell Minow, corporate governance expert and co-founder of Institutional Shareholder Services (ISS), for a discussion of key issues, including:

      -How investors assess cybersecurity in the M&A diligence process

      -What institutional shareholders want to know about cyber risks to their investments

      -How shareholders can meaningfully engage with companies on cybersecurity

      Read more >
    • Communicate to Convince: Prioritizing Cybersecurity in State & Local Government Communicate to Convince: Prioritizing Cybersecurity in State & Local Government Presented by: Route Fifty | Underwritten by: CenturyLink Recorded: Oct 19 2016 6:00 pm UTC 62 mins
    • Although cyber attacks are on the rise, cybersecurity in state and local governments around the country often remain woefully underfunded. In an era of limited budgets and competing priorities, the behind-the-scenes risk mitigation of cybersecurity can be underappreciated and pushed down the list.

      This digital viewcast will explore some of the biggest cyber challenges facing state and local governments such as outdated IT systems, the rise of IoT, budgetary constraints and hiring the correct workforce, while also examining how to effectively communicate cyber risks to both internal and external stakeholders. Route Fifty will sit down with cyber experts to discuss the following essential elements of a successful cybersecurity program:

      - Implementing the strategy: Defining the correct priorities, tools, and tactics
      - Training the workforce: Communicating best practices in cybersecurity to employees across an organization
      - Transforming the culture: Instilling the importance of cybersecurity beyond just the office of information technology
      - Developing the partnerships: Working across both different agencies and different levels of government and collaborating with the private sector
      - Making the case: Effectively securing cybersecurity funding from skeptical stakeholders

      Read more >
    • Panel: The Cybersecurity Agenda for the Next President Panel: The Cybersecurity Agenda for the Next President Ely Kahn, Adam Isles, Rob Knake, Paul Kurtz, and Jacob Olcott Upcoming: Nov 7 2016 7:00 pm UTC 60 mins
    • On November 8th, the citizens of the United States will elect their next President, who will be facing a variety of cybersecurity issues that he or she will need to address.

      On November 7th at 11 AM PT, a panel of former senior government officials will come together to discuss these cybersecurity issues that the next President will be facing.

      Moderator: Ely Kahn, Co-Founder of Sqrrl and former Director of Cybersecurity at the National Security Council, White House

      - Adam Isles - Principal at The Chertoff Group and former Director of International Economic Affairs at the National Security Council, White House
      - Rob Knake - Senior Advisor at Context Relevant and former Director of Cybersecurity at the National Security Council, White House
      - Paul Kurtz - Co-Founder and CEO of TruStar and former Special Assistant to the President for Critical Infrastructure Protection at the National Security Council, White House
      - Jacob Olcott - Vice President Business Development at BitSight and former Counsel at the US Senate

      Read more >
    • Modern Cybersecurity:  Enhancing Your Recovery Capabilities to Better Survive Modern Cybersecurity: Enhancing Your Recovery Capabilities to Better Survive Jim Shook Recorded: Sep 28 2016 4:00 pm UTC 47 mins
    • Ransomware and destructive attacks have changed the cybersecurity landscape. Modern business requires enhanced access to data to improve productivity, attract and retain customers, and run efficient supply chains – making the network perimeter more difficult to defend. At the same time, criminals are no longer content to just steal information, instead extorting ransoms after encrypting data or sometimes seeking to cripple organizations by destroying their data.

      In this webcast you will learn about:
      -Dangerous new threats such as ransomware and hacktivism, and how they differ from traditional threats
      -Why new threats require a new focus
      -Cybersecurity frameworks and best practices
      -Enhancing your data protection and recovery capabilities to improve your cybersecurity defenses
      -Why some data protection approaches may not be sufficient for advanced threats and how an Isolated Recovery approach provides a best layer of defense

      Read more >
    • Overcoming Cybersecurity Challenges through Analytics Overcoming Cybersecurity Challenges through Analytics Presented by: IBM Recorded: Aug 17 2016 5:00 pm UTC 56 mins
    • Cyberattacks are on the rise, with increasingly sophisticated and persistent cyber threats promoting the Obama administration to issue the Cybersecurity Strategy and Implementation Plan (CSIP) and Cybersecurity National Action Plan (CNAP) to enhance cybersecurity capabilities within the federal government and across the country.

      As agencies work to implement these plans, issues such as outdated infrastructure systems, inconsistent capabilities, and inadequate resources hinder their efforts to detect, prevent, and recover from cyber attacks. In this webcast, we will explore the power of big data and analytics to overcome these challenges and talk with experts about leveraging existing infrastructure with an integrated cyber analytics approach to help government agencies:
      •Detect the overall exposure
      •Predict and prevent cyber attacks
      •Improve cyber defense
      •Automate threat indicator sharing

      Read more >
    • Mission Critical: An Update on Federal Cybersecurity Mission Critical: An Update on Federal Cybersecurity Presented by: Nextgov | Underwritten by: Adobe Recorded: Aug 11 2016 12:30 pm UTC 113 mins
    • Over the past year, a spotlight has been cast on the federal government's insecure,often outdated, digital infrastructure and activities underway to identify and tackle threats to high-value content. What is the current state of security in federal government and how are agencies across government protecting their most prized data?

      At this event, Nextgov will sit down with experts to discuss how cybersecurity has changed the wake of recent breaches of federal IT systems as well as the various policy responses to these breaches and how they are being implemented at an agency level. We'll take a look at federal cybersecurity spending, the new layers of cyber defense through data protection, and how agencies have used the Cybersecurity Strategy and Implementation Plan to improve their systems against hackers and other cyber threats.

      Read more >
    • Cybersecurity Benchmarking For CIOs Cybersecurity Benchmarking For CIOs Jake Olcott, Tom Stumpek Upcoming: Nov 29 2016 5:00 pm UTC 60 mins
    • In order for a business to be competitive, it must be continuously improving. This is something the modern chief information officer (CIO) knows all too well. Further, technological advances and greater outsourcing in business have made cyber risk a key area that requires a great deal of thought from the CIO. So, how can CIOs know how their security programs are performing in order to make decisions on allocating funding, headcount, and policies?

      Join Jake Olcott. VP of Business Development at BitSight and Tom Stumpek, a Technology Advisor and former CIO for GE. Attendees will learn:

      - Why cybersecurity benchmarking is difficult for the modern CIO.
      - Different methods of benchmarking you may be involved in (or want to consider).
      - How Security Ratings may solve many benchmarking challenges.

      Read more >
    • Quantum Threats: The Next Undefended Frontier of Cybersecurity Quantum Threats: The Next Undefended Frontier of Cybersecurity Mike Brown, CTO and Co-Founder of ISARA Corporation Upcoming: Dec 7 2016 6:00 pm UTC 45 mins
    • Cybersecurity threats are evolving more quickly than most organizations can pivot to defend against them. The 2016 IDC report states that “worldwide spending on cybersecurity products and services [is expected] to eclipse $1 trillion for the five-year period from 2017 to 2021” but we still may not be combatting emerging threats in the right ways.

      While we’re battling against growing threats from conventional computers, quantum computers are a growing shadow on the threat landscape, and people are already starting to think about how to get ready. Quantum safe options are becoming available, and bring with them new ways of thinking about how to integrate security solutions based on fundamentally different problems. What happens to TLS? What happens to VPN? What happens to PKI? Is your business ready? What potential threats should you be evaluating in your security strategy for 2017?

      In this talk, we’ll cover the 360-degree view of becoming quantum resistant. What is a quantum computer? Why will it cause problems for your security systems? How do you use quantum safe security?! How does entering the quantum age impact common tools like TLS, VPN, and PKI, and what are the challenges they’ll face? And most importantly, when do you need to worry?

      Read more >
    • Cybersecurity Challenges, Risks, Trends and Impacts:  Key Survey Insights Cybersecurity Challenges, Risks, Trends and Impacts: Key Survey Insights Julian Dana (Director, Latin America, Mandiant), Chris Leach (Chief Technologist, HPE) Recorded: Jul 21 2016 3:00 pm UTC 59 mins
    • No question about it: Information security—or, more precisely, the lack of it—is firmly on the radar for business and information-technology leaders in organizations of all sizes and in every sector. Many executives and managers fear that their companies are ill-prepared to prevent, detect, and effectively respond to various types of cyber attacks, and a shortage of in-house security expertise remains of widespread concern.

      Those are among the initial findings of the Cybersecurity Challenges, Risks, Trends, and Impacts Survey, conducted by MIT Technology Review Custom in February 2016. Commissioned by Hewlett Packard Enterprises Security Services and FireEye, join our experts as they discuss this industry survey to uncover:

      •Implications of breach impacts for organizations
      •Benefits of a risk management strategies
      •Current trends in information-security threats

      Register for this webinar today!

      Read more >
    • SAE Technical Webinar: Cybersecurity for the Life of the Car SAE Technical Webinar: Cybersecurity for the Life of the Car Mike Ahmadi, Global Director, Critical Systems Security, Synopsys Software Integrity Group Recorded: Jul 14 2016 6:20 pm UTC 61 mins
    • Connectivity is making cybersecurity a must-have obligation from initial designs through end of life. Automakers and suppliers have several unique challenges as they attempt to provide connectivity in vehicles that have burgeoning amounts of software that must remain secure and efficient over long vehicle lifetimes. Throughout the industry, there is a race to leverage safeguards used in other industries in ways that meet automotive safety and reliability requirements.

      During this one-hour webinar, industry experts will address design, development, and implementation of security-critical cyber-physical vehicle systems; implementation strategies, process, and lifecycle management; and cybersecurity assurance verification and validation practices being implemented by members of SAE working groups. A number of tools will be employed, many using over the air (OTA) updating to fix vulnerabilities and adapt to changing threats.

      An audience Q&A will follow the technical presentations.

      Read more >