Hi [[ session.user.profile.firstName ]]
Sort by:
    • The Forgotten Link: Identifying the Weak Point in Your Network
      The Forgotten Link: Identifying the Weak Point in Your Network Jim Frey, Director of Marketing Recorded: Feb 23 2017 4:00 pm UTC 50 mins
    • There is a transition happening in our industry right before our eyes. Essentially, 1Gbps drops to the wall outlets are being replaced by 10Gbps drops to the ceiling. This is because, as 802.11ac technology advances and A/V applications like HDBaseT come onto the scene, enterprises are requiring more and more Category 6A connections to handle bandwidth demand to devices. But what happens beyond the devices? Your network, like a chain, it is only as strong as its weakest link.

      This webinar will:
      - Show you how this transition from 1Gbps to 10Gbps is creating a problem you may not know you have.
      - Explain the “Forgotten Link” and how this 10X transition is already starting to overwhelm it.
      - Introduce an engineered solution from Berk-Tek that will solve this emerging problem.

      Read more >
    • LPWAN Networks for Smart Communities and the Industrial Internet
      LPWAN Networks for Smart Communities and the Industrial Internet Yann Gabay - CONNIT; Brian Ray - Link Labs, Tiana McNeil - Ingenu, Jeff Siegel - nwave, Limor Schafman - TIA Recorded: Feb 15 2017 4:00 pm UTC 62 mins
    • LPWAN (low power wide area network) technologies service a specific and necessary role in the growth of Internet of Things (IoT) connectivity. Not all applications need bandwidth and speed. Sometimes long distance, low energy usage, and long latency is the perfect confluence of service that an IoT application needs. Some examples are city lighting, energy grid and meter management, parking space monitoring, precision irrigation, crop yield management, and many more.

      This webcast will present different LPWAN technologies and discuss a number of questions regarding technology and value assessment, deployment, usage of such networks, and return on investment evaluations.

      - An explanation of LPWAN technology and how it works
      - When to use (and not use) LPWAN technology
      - What issues such networks solve
      - The difference between U.S. and European bands and when this will matter to a company deploying an LPWAN network
      - Key information that cities and companies need to both ask and be ready to answer when planning to deploy an LPWAN network, in order to assess the right fit and to maximize efficiencies such connectivity can bring
      - How LPWAN networks integrate with other network infrastructure in smart community deployments, for example
      - Sample use cases
      - Business models that use LPWAN networks for energy management, asset management, and others
      - How to make money as both a user and deployer of LPWAN networks
      - What returns on investment can be expected and suggested metrics for measurement

      Speakers:
      Yann Gabay, Co-founder and Board Member, CONNIT
      Tiana McNeil, Sr. Business Development Manager, Iot Smart Cities, Ingenu
      Brian Ray, CTO and Founder, Link Labs
      Jeffrey Siegel, CMO, nwave

      This webcast is NOT BICSI accredited.

      Read more >
    • Own the Link to Maximize Your Power Budget
      Own the Link to Maximize Your Power Budget Berk-Tek Recorded: Jun 2 2016 8:20 pm UTC 3 mins
    • Ever-increasing bandwidth demand is driving changes to your network and data center. Rest assured that in the coming years, you will need more servers, more switches, and more storage capacity connected at higher data rates. Using Berk-Tek’s 40Gbps transceivers paired with our GIGAlite™-10XB glass, we guarantee enough power budget to support a link distance of up to 500 meters. Watch this video learn more about how Berk-Tek can help you maximize your power budget.

      Read more >
    • Own the Link: Simplify Your Layer 1 Specification
      Own the Link: Simplify Your Layer 1 Specification Mike Connaughton Recorded: Mar 17 2016 3:00 pm UTC 56 mins
    • Data communication speeds are constantly increasing to keep up with the growing demand for bandwidth. Ethernet speeds of 100 Gb/s are being deployed, and 400 Gb/s or more are being considered. As speeds increase, the reach of multimode fiber gets shorter. One way to mitigate the shrinking distance is to the use the highest bandwidth fiber. But what if we told you there’s a more complete way to specify the performance of the link – a way that will allow you to take control of Layer 1 performance?

      From this presentation, you will learn how:
      • Improved link performance allows simpler upgrades
      • Better operational management of critical components leads to more efficient deployments

      * Attend this webinar live for a chance to win an Apple Watch! *

      Read more >
    • Humans - the weakest link or your greatest asset?
      Humans - the weakest link or your greatest asset? Jeffrey Rogers, VP, Customer Success, PhishMe Recorded: Oct 27 2015 1:00 pm UTC 45 mins
    • 91% of breaches can be traced back to a phishing message that deceives a user into unleashing the attacker’s payload. Having infiltrated the network, it then takes an average 205 days for the threat group’s presence to be detected. For organisations to stand a chance of protecting their data assets, they need to get better at preventing threat actors from accessing their infrastructure and reduce the time it takes to identify their presence. But how?

      The reason phishing has such a high success rate is that it targets people. Can you turn than your weakest link into a human force field that protects the network and provides actionable intelligence?

      During this webinar, Jeffrey Rogers, VP of Customer Success at PhishMe, will reveal statistics about the phishing threat, detail how phishing has evolved, and explore how to engage users to develop better security habits and become human sensors.

      Read more >
    • POS Systems Are The Weakest Link In PCI Security and What To Do About I
      POS Systems Are The Weakest Link In PCI Security and What To Do About I Jeff Man, Information Security Expert Recorded: Jun 5 2017 6:15 pm UTC 54 mins
    • How mobile and distributed POS systems are making PCI security harder than ever.

      Reports of data breaches against merchants targeting Point of Sale (POS) systems at retail locations has become a regular occurrence for the past several years, and there seems to be no slowing down.

      The growing popularity of alternative payment methods using various mobile applications and mobile POS solutions are also intended to reduce data theft, but does using these payment methods introduce other avenues of potential compromise?


      What We're Going to Cover

      - How do I maintain PCI security while adopting new payment systems
      - How do you achieve this with minimal IT staff and on premise head count
      - Why being PCI COMPLIANT is not enough anymore. You need to be PCI SECURE and we'll show you how

      About Jeff Man:

      Jeff Man is a respected Information Security expert, adviser, and evangelist. He has over 33 years of experience working in all aspects of computer, network, and information security, including risk management, vulnerability analysis, compliance assessment, forensic analysis and penetration testing.

      Earlier in his career, Jeff held security research, management and product development roles with NSA, the DoD and private-sector enterprises. Jeff served as a QSA for nearly 10 years, first with TrustWave, then with VeriSign and finally AT&T Consulting. In this role he has provided PCI consulting and advisory services to many of the nation's best known brands.

      Read more >
    • Wireless Networks & Devices - the Glaring Weak Link in Security
      Wireless Networks & Devices - the Glaring Weak Link in Security Larry Pesce Recorded: Jun 12 2017 4:10 pm UTC 57 mins
    • Wireless is the defacto standard for network access today. With the explosion of BYOD and IoT, there is no question that in 2017 wireless security is going to be more important than ever. Join us for exciting webinar with Wireless Security Expert Larry Pesce as he walks through just how easy it is to gain access to a company's network, systems and data via wireless.

      What Larry will cover:

      - How to address the most common wireless implementation failures that leave organizations exposed and vulnerable

      - Real life case studies of successful wireless penetrations tests from the Fortune 500 including companies in Healthcare, Financial Services and Retail.

      - Why understanding what devices are in your environment, both on and around your network, is critical for incident response

      - How easy it is to get around NAC and WIPS/WIDS when doing wireless or wired penetration testing


      Larry Pesce:

      Larry Pesce is the Director of Research at InGuardians leading up research efforts, concentrating especially on IoT. His history with hardware hacking began with the family TV when he was a kid, rebuilding it after it caught on fire. Both times.

      His core specialties include hardware and wireless hacking, architectural review, and traditional pentesting, often in the financial, energy and healthcare industries.

      Larry holds GAWN, GCISP, GCIH, GCFA, and ITIL certifications, and has been a certified instructor with SANS for 5 years, where he trains the industry in advanced wireless and Industrial Control Systems (ICS) hacking.

      He’s also the co-author of multiple papers and books, including Linksys WRT54G Ultimate Hacking, Using Wireshark and Ethereal, and How to Cheat at Configuring Open Source Security Tools, and the technical editor of Wireless Reconnaissance for Penetration Testing and The Blue Team Handbook: Incident Response Edition. He also regularly gives talks at DEF CON, ShmooCon, DerbyCon, and various BSides.

      Read more >
    • Social Engineering - Are you the weakest link?
      Social Engineering - Are you the weakest link? Greg Iddon, Technologist, Sophos Recorded: Oct 27 2016 10:00 am UTC 60 mins
    • Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

      A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

      Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.

      Read more >
    • Social Engineering - Are you the weakest link?
      Social Engineering - Are you the weakest link? Greg Iddon, Technologist, Sophos Recorded: Aug 30 2016 1:00 pm UTC 57 mins
    • Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

      A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

      Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.

      Read more >