Hi [[ session.user.profile.firstName ]]
Sort by:
    • Fight the false marking fiasco
      Fight the false marking fiasco Managing IP, Nixon Peabody, University of Maryland School of Law Recorded: Dec 8 2010 5:00 pm UTC 94 mins
    • In 2008, a US district court said that expired patent numbers fall within the scope of “unpatented articles”, as defined by the section of the US statute relating to the standards for bringing lawsuits for false patent marking. Then, in December last year, the Federal Circuit ruled in Forest Group v Bon Tool that false marking defendants are subject to potentially much greater fines than had been previously awarded.

      These two cases have arguably incited a false marking frenzy in the US, with hundreds of suits having been filed this year alone. This webinar will discuss how we got here, proposals to curb the problem, and strategies for companies to both avoid and successfully navigate such actions.

      Speakers:

      Eileen McDermott, Managing IP (moderator)
      Lawrence M. Sung, University of Maryland School of Law
      Robert Krebs, Nixon Peabody
      Maia Harris, Nixon Peabody

      Read more >
    • 2017 Malware Trends - WannaCry, NotPetya, Emotet and more
      2017 Malware Trends - WannaCry, NotPetya, Emotet and more Jack Danahy, CTO, Barkly Recorded: Aug 29 2017 5:30 pm UTC 39 mins
    • Ransomware and destructive malware attacks have had tremendous growth and impact in 2017, and it’s only August. Not only has there been a rise in the severity and frequency of attacks, but the level of sophistication, attack vectors and attack motives have also changed.

      Join this webinar to hear Jack Danahy, CTO, Barkly discuss 2017 malware attack trends to date, including WannaCry, NotPetya, Emotet and more. You’ll learn the similarities and differences about these attacks and how the attack landscape is changing.

      Viewers will learn about:
      * 2017 Malware trends and stats
      * How the threat landscape is changing
      * How to protect your organization

      About the Presenter:
      Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.

      Read more >
    • DLP:  False Sense of Security or a Real Solution?
      DLP: False Sense of Security or a Real Solution? Edward Ray, CISO/CTO, MMICMAN, LLC Recorded: Apr 5 2012 4:00 pm UTC 42 mins
    • Data Loss Prevention (DLP) is a computer security term referring to systems that enable organizations to reduce the corporate risk of the unintentional disclosure of confidential information. Data-loss prevention of stored data typically involves a Data Security Software installed on your computer to prevent unauthorized access to the data stored on your hard drive and USB/External drives. These systems identify, monitor, and protect confidential data while in use (e.g. endpoint actions), in motion (e.g. network actions), and at rest (e.g. data storage) through deep content inspection, contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination and so on) and with a centralized management framework.

      The purpose of this talk is to provide an overview of DLP tools/software and why it is generally ineffective in preventing data loss. Organizations need to establish best practices in addition to (possibly?) deploying DLP to reduce risk of data loss. This talk will include a discussion of these best practices.

      Read more >
    • Delivering Advanced Security Capabilities to Any Organization: APAC Perspective
      Delivering Advanced Security Capabilities to Any Organization: APAC Perspective Claudio Scarabello, Director, Product Marketing, APJ Upcoming: Oct 25 2017 1:00 am UTC 60 mins
    • Today’s security operations are frequently disjointed and plagued by limited visibility and false alerts. As a result, organizations are unable to quickly and cost-effectively prioritize and respond to threats. FireEye can help deliver advanced security operations to any organization while disrupting the economics of security. Capabilities typically seen only in Fortune 50 companies will become available any FireEye solution. In this live webinar:

      - Learn about how a centralized security operations platform:
      o Improves visibility across your entire cyber security infrastructure
      o Surfaces and provides context for the most critical alerts
      o Empowers decision making to decrease the time from detection to response
      -See a demo of how Helix identifies and responds to an alert
      -Have the opportunity to ask questions in a live Q&A session

      Read more >
    • Let the Data do the Work for You with Operational Intelligence
      Let the Data do the Work for You with Operational Intelligence David Myers, Sr. Principal Product Manager Upcoming: Nov 2 2017 3:00 pm UTC 60 mins
    • Is your IT ops team suffering from alert fatigue? Are your mainframe experts spending too much time in war rooms fighting fires? Discover how incorporates machine learning to help you proactively prevent production issues and dramatically reduce the noise and false alarms coming into your IT ops centers. It’s all about working smarter not harder and letting the data do the work for you. Discover how CA Mainframe Operational Intelligence allows you to automatically correlate data from many sources to surface alert patterns and actionable insights that will help your novice IT operators quickly triage and accurately identify root cause of problems. Protect your mainframe experts from being pulled into every fire drill and free them up to provide more strategic value to your business.

      Read more >
    • Top Five Limitations of IT Discovery Tools
      Top Five Limitations of IT Discovery Tools Dan Ortega - Vice President of Marketing Recorded: Apr 2 2017 12:05 pm UTC 3 mins
    • IT discovery tools a promise to uncover all hardware, software, servers, databases, applications, dependencies and more. Unfortunately, discovery tools have some significant limitations.
      Below are the Top 5 limitations users face:
      5. Complexity: Discovery tools usually depend on complex Unix or Linux package manager or windows registry data that is complex and hard to decipher. For discovery to be useful, you need undiscoverable data. Finding out who owns a software license on a server and why is it deployed it is difficult if not impossible to obtain that from automated discovery for example.

      4. Inaccuracy: Software installers can fail to update fingerprints to reflect the true owner of the license creating a false positive. Dependencies can cause false negatives. For example, if a given process only runs sporadically, then the discovery process may have to be running at just the right time to catch it.

      3. Currency: The discovery tool usually runs as a batch process. It caches the data, which can then become outdated almost immediately, until the next run of the discovery, when it becomes outdated again almost immediately. Continuous discovery is rare because of the overhead it generates.

      2. Reach: It is rare for an organization to have a network that is not segmented. Discovery has to be given access to every segment to be complete.

      1. It’s just one source. Your business architecture, services, products, and applications must still be mapped. Who owns what? Who is called? How do escalation paths work? What about chargebacks? Who is accountable for compliance exceptions? None of this can be discovered. Discovery has to be augmented with data from many sources to be validated and complete.

      Blazent has been working with some of the largest and most complex IT infrastructures in the world helping customers overcome the limitations of their discovery tools. Learn more at www.blazent.com

      Read more >
    • Defending Your Workloads with a Distributed Web Application Firewall (WAF)
      Defending Your Workloads with a Distributed Web Application Firewall (WAF) Guru Chahal Recorded: Oct 19 2017 5:10 pm UTC 57 mins
    • Avi Networks has launched a new intelligent web application firewall (iWAF) that performs 50X faster than legacy appliances, processing hundreds of Gbps of throughput and over a million transactions per second. As a software-only solution, iWAF operates as a centrally managed fabric across data centers, private clouds, and public clouds. Register for this webinar to learn about the unique capabilities of Avi Networks’ iWAF include:

      Highest-performance web application security
      ● Elastic, automatic scale-out across data centers and clouds
      ● Scalable per-application deployments allow each mission-critical app to get its own WAF

      Analytics-driven, accurate security policies
      ● Real-time security insights eliminate false positives
      ● Visual policy checks prior to enforcement

      Central, simplified policy management
      ● Central management and automation of all distributed iWAF instances
      ● Point-and-click policy configurations, with pre-defined templates for OWASP Core Rule Set

      Read more >
    • Get Laser-Focused Visibility into the Risk Posture of your Web Applications
      Get Laser-Focused Visibility into the Risk Posture of your Web Applications Nathan Michalov, CA Veracode Solution Architect Upcoming: Oct 25 2017 4:00 pm UTC 30 mins
    • Expand your static analysis capabilities and begin scanning earlier in the software testing phase.

      Join this 20 minute webinar to see how Veracode can help you unlock the capabilities of DynamicDS and Virtual Scan Appliance (VSA). With these deeper scanning abilities, your organization can identify and remediate application vulnerabilities before cyber criminals can find and exploit them.

      These technologies can help you ensure ongoing security assessments as an automated cloud-based service — backed by Veracode’s world-class application security experts. Enable your teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle (SDLC). Specifically you’ll see how you can:

      •Start Scanning Immediately: Easy to deploy: cloud-based and no hardware to purchase
      •Integrate with Central Cloud Platform: Uploads all test results to our cloud platform that can be aggregated and evaluated using a single set of centralized policies and reports
      •Generate Verified and Actionable Results: Our security experts examine results to distinguish real problems from false positives and helps you deliver complete threat information to help development and QA teams remediate flaws

      Read more >
    • Aflac Protects You. See Who Protects Them
      Aflac Protects You. See Who Protects Them DJ Goldsworthy, Director of Security Operations and Threat Management at Aflac Upcoming: Oct 25 2017 4:00 pm UTC 60 mins
    • In 2016, Aflac, a Fortune 500 company providing financial protection to more than 50 million people worldwide, embarked on a mission to build a custom threat intelligence system in response to the rapid increase in security threats targeting its network of 15,000 worldwide employees.

      Join this webinar to hear from DJ Goldsworthy, director of Security Operations and Threat Management at Aflac, about how Aflac deployed Splunk Enterprise Security at the heart of its internal Threat Intelligence System and augmented it with Splunk User Behavior Analytics to:

      • Automate threat hunting and 90 percent of its security metrics process in just two months
      • Replace a legacy SIEM and determine risk for automated remediation
      • Identify insider threats and rapidly investigate threats
      • Block more than 2 million connections with less than 12 false positives

      Girish Bhat, director of Security Product Marketing at Splunk, will share examples of Splunk customers that are to solving a wide range of security analytics use cases: Rapid Incident Detection and Investigation, Ransomware, External Attacks, Cyber Command Center and more.

      Read more >
    • Fighting Brand Impersonation and Noncompliance in Social Media
      Fighting Brand Impersonation and Noncompliance in Social Media Kyle Sale, VP Product Management; Zac Wolf, Product Marketing Manager, MarkMonitor Recorded: Jul 25 2017 4:00 pm UTC 54 mins
    • With social media consumption at an all-time high, companies must be vigilant against burgeoning cases of brand impersonation, false association and improper partner compliance in the social channel. Customers expect an authentic and seamless brand experience, and even one negative experience can have a damaging impact on your social reputation – and your bottom line.

      Please join MarkMonitor® Brand Protection experts Kyle Sale and Zachary Wolf as they discuss the most common types of brand abuse found in social channels and best practices for protecting your brand across social and other digital channels.

      During this webinar, you'll learn:
      -How to detect unauthorized branding on social pages, user names and posts
      -Existing social site enforcement policies – and gaps you should be aware of
      -What unauthorized use of copyrighted content, images, and trademarks looks like on social media

      Read more >
    • Designing with DFS Channels
      Designing with DFS Channels Devin Akin, CEO, Divergent Dynamics Recorded: Sep 28 2017 6:00 pm UTC 60 mins
    • One of the most common questions that Wi-Fi expert Devin Akin hears from Wi-Fi professionals is, “Should I use DFS (UNII-2 and UNII-2e) channels in my Wi-Fi design?” There are many moving parts to DFS, and the regulatory rules differ depending on where the Wi-Fi network implementation is located.

      This webinar sheds light on regulatory requirements and new advancements in DFS channel scanning. Devin will cover:

      · Expected vs. common client device behavior

      · Troubleshooting real and false positive events

      · How Dual 5GHz can impact designing with DFS

      · Designing by area, and for high density and capacity

      · New 802.11 amendments impact client behavior

      If you design medium and large Wi-Fi networks, this is a must-attend webinar.

      Devin Akin is the founder of Divergent Dynamics, a Wi-Fi Systems Integrator, Value-Added Reseller (VAR), and Training organization. Akin has over 20 years in IT, with 15 years in WLAN specifically, and was recently named to the TWW Top 100 Wireless Technology Experts list for 2014.

      Read more >
    • SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection
      SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Oct 17 2017 5:00 pm UTC 61 mins
    • SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.

      AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:

      Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
      Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
      Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
      The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365

      Read more >
    • Don’t Let Your Legacy SIEM Be Your Kryptonite
      Don’t Let Your Legacy SIEM Be Your Kryptonite Girish Bhat, Director of Security Product Marketing at Splunk ; Risi Avila, Security Professional Services Consultant at Splu Recorded: Sep 5 2017 4:00 pm UTC 59 mins
    • It’s a bird, it’s a plane, no it’s just your legacy SIEM. Did you know your SIEM might be weakening your security powers? Your legacy SIEM could be:

      • Limiting your ability to collect, store and use security-relevant unstructured and structured data
      • Making it difficult to maintain your SIEM and requiring skilled staff to work around the clock just to keep the lights on
      • Burdening your security operations team by forcing them to chase false alarms while missing critical alerts
      • Failing to detect modern threats and putting your entire business at risk

      But have no fear, Splunk’s security experts are here to make you a security super hero again. Put on your cape and join us for this webinar to learn how Splunk can be used as a modern SIEM to solve a range of security use cases and more.

      Splunk’s security experts will share common SIEM replacement and migration scenarios and discuss how a department store, a financial services firm and a luxury retailer successfully migrated from their legacy SIEM to Splunk.

      Read more >
    • Data Wars: A New Hope for IT & Security Insights
      Data Wars: A New Hope for IT & Security Insights Jade Catalano, Senior Product Marketing Manager, Security, Splunk Rob Christian, Senior Sales Engineer, Splunk Upcoming: Feb 14 2018 6:00 am UTC 30 mins
    • Ever wonder what insights you’re missing out on? What if you could expand the view of your data while reducing noise so you can focus on what is most critical? Many times you look at data through the lens of your own challenges, but what happens when you can multiply what you know? Often, the same data you are using to help solve security problems also provides valuable insight into IT issues, and vice versa. IT staff often lose too much time to troubleshooting and investigating events, causing them to miss important alerts, while security teams are lost chasing false positives. In this session you will learn to reduce alert fatigue and cut down the noise by correlating across IT and security. Gain different perspectives around authentication, firewall traffic and performance data, whether you’re an IT or security practitioner. Leverage, visualize and correlate data from across your infrastructure to improve your reaction time, determine root cause and accelerate remediation.

      Read more >
    • Securing Wi-Fi Environments
      Securing Wi-Fi Environments Greg Rayburn, System Design Engineer, NETSCOUT and Skip Bayro, Chief Solutions Architect, NETSCOUT Recorded: Aug 23 2017 5:00 pm UTC 59 mins
    • Government agencies, like their private sector counterparts, are providing Wi-Fi access to employees, contractors and the residents they serve to provide fast and secure anytime, anywhere access to the network and critical applications. However, the number of threats against government networks has steadily risen in part due to the ease at which attacks against wireless networks can be launched. From plugging in cheap unauthorized/rogue Access Points (“AP”) in the network, to downloading attack tools from the internet, to buying RF jammers that make the entire wireless spectrum unusable, Network and Security Operation teams are fighting a multi-front Wi-Fi security battle.

      This webinar will address key Wi-Fi security issues and ways to improve protection. You will learn about:

      • The latest wireless attacks and hacks, including Rogue device, DoS and Penetration attacks against client devices and the AP infrastructure
      • Misconceptions users have on the false security offered by the AP infrastructure to monitor itself
      • How to deploy a “no-wireless” zone in sensitive areas of the campus/building
      • Mitigation techniques to prevent the security threats from impacting operations and compromising data
      • Importance of being on the leading edge of detecting the latest wireless threats
      • 24 X 7 WIDS/WIPS solutions from NETSCOUT that helps organizations meet security, performance and compliance demands of today’s mobile workforce

      Read more >
    • Discover Hidden Threats with User Behaviour Analytics (UBA)
      Discover Hidden Threats with User Behaviour Analytics (UBA) Tom Salmon, Sales Engineer, LogRhythm Recorded: Jun 28 2017 12:00 am UTC 61 mins
    • As a cyber security professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage - and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Behaviour Analytics (UBA), which can help you detect and respond to user threats, such as when:
      - An insider turns against your organisation
      - A cyber attacker steals a user’s credentials
      - An administrator abuses account privileges

      If you’re focused on addressing user threats, UBA can be a powerful tool in your kit.

      Join Tom Salmon from LogRhythm, as he discusses the elements of an effective user threat detection program. You’ll learn:
      - Why detecting user threats is so important—and so difficult
      - Different approaches to UBA
      - The value of data from across your business
      - How to maximise the efficiency of your security analysts

      Watch this on-demand webinar to learn how UBA can help you discover hidden user threats, reduce false-positives and prioritise the most concerning threats.

      Read more >