Today’s IT departments can’t simply provide IT solutions to other departments. Passively processing other departments’ requests is no longer sufficient to meet modern business needs, power company growth, and excel in a constantly changing marketplace. Instead, IT must strive to be the leading force and early adopters for information technology themselves.
Join this live webinar to see how Tableau’s IT department uses analytics on a daily basis to analyse their own performance and improve their own efficiency.
Noise is the enemy of breach detection and response. After a major data breach it is often the case that signs of an attacker existed, but were buried in thousands of other security alerts that were mainly false positives.
With machine learning, meaningful signs of an attack are more easily detected and isolated, so a security operator can focus on precisely the right issue.
This session will examine:
- The problem of noise
- The role of machine learning in sifting through vast amounts of data to get to the fidelity needed to detect an attacker
- Best practices for including machine learning in your security operations
BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.
Topics up for discussion will include:
- The new political climate and it's effect on Cyber Security and global cyber warfare
- The supposed Russian hack on the 2016 US election
- GDPR and what companies need to be doing to prepare for 2018
- Equal opportunities in the information security industry
- The rise of AI & Machine learning and how it'll influence the cyber world
- IoT and how to keep connected devices all safe and secure
- Incident response and steps to take if you've been breached!
- The 2017 threatscape and what you shoud be concentrating on
All this and much more - join us for the broadcast.
As self-service business intelligence becomes a necessity within government organizations, IT departments are looking to empower business users with clean, governed data for faster, more effective analysis. Industry leading enterprise cloud data management and visualization platforms, Informatica and Tableau, work seamlessly together to enable IT and the business to deploy self-service analytics with ease and efficiency across governmentRead more >
Cyber security is front and center like never before, and cyber leaders are working to speed cyber response times for threat prevention, detection, and mitigation for known, and more importantly, unknown threats.
A recent study shows Feds are losing the race against hackers– with 85% of security operations professionals taking hours, even days, to create protections against newly discovered cyber threats.
View the on-demand “Pedal to the Metal” webinar and hear from Federal and industry cyber experts as they discuss MeriTalk’s newest cyber study findings, including:
•How much time and manpower is expended analyzing threat intelligence?
•What advanced automatic capabilities can Feds utilize to act rapidly and decisively against advanced threats?
•Is threat intelligence is helping Feds prevent attacks – from never-before-seen threat actors and tactics – faster?
Featured Speakers Include:
•Paul Morris, Acting CISO/Acting Director, Information Assurance and Cybersecurity Division, TSA
•Pamela Warren, Director, Government and Industry Initiatives, Palo Alto Networks
Flash is a key enabler for IT Transformation. Learn how it can help you improve your business outcomes and achieve more agility while lowering your operating costs. The webcast will highlight different architectures designed and optimized for specific workload groups and the tradeoffs between them. We will also provide a review of the products within the performance optimized segment of the storage market.Read more >
With a unique approach to adaptive layered security and years of experience with machine learning, no other endpoint security can offer the defense provided by Bitdefender GravityZone.Read more >
How Technology can Enable Public ProcurementRead more >
Series Title: Illustrating the Value of Network Virtualization
Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.
Title: Networking and Security for Virtual Desktops and Mobile Devices
Abstract: Learn how to deploy intelligent networking and micro-segmentation for VDI and extend these capabilities to secure mobile apps and devices. We’ll demonstrate how VMware NSX can help you manage virtual desktop user access, and how to limit users from jumping off one server to another. You’ll also learn how to apply a few easily managed rules in your data center that can reduce your attack surface with policies that dynamically follow virtual desktops. In the second part of the session, we’ll explore how the integration of AirWatch and NSX allows you to extend security from your mobile devices and applications to their data center resources.
In this session, we will discuss:
•Using intelligent networking and micro-segmentation to make VDI environments more secure
•Minimizing your attack surface with rules and policies for dynamic virtual desktops
Extending security from mobile devices and applications to the data center
A live online panel discussion focused on the debate around AI and machine learning and how they can automate cyber security; catch more threats and malicious attacks and prove a useful weapon against cyber crime.
- Josh Downs, Community Manager - Information Security, BrightTALK (moderator)
- John Laliberte, VP, Endpoint and ICE, FireEye
- Natalino Busa, Head of Applied Data, TeraData
- Neil Gernon, MD, Atrovate & Founder, Dublin.AI
What is your first line of defense against cyberattacks? Secure endpoints! Endpoints are everywhere in the IIoT landscape. Without proper security, Industrial Internet of Things (IIoT) systems are not trustworthy, putting organizations, their missions and the greater public at increased risk. The viability of the IIoT depends on proper implementation of security to counter the growing and ever changing threats that are emerging.
On February 22, 2017, editors of the IISF and security experts from the Industrial Internet Consortium will discuss the endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document and present a real-world customer use case for an approach taken to secure an industrial system.
Businesses and work as we know it will change significantly over the next few years, so what will happen and how can we future proof our businesses and our careers?
•What trends are playing out
•What they mean for companies
•What they mean for people
Russell Beck is Head of Consulting for Impellam, Guidant Group’s parent company. He is a regular contributor to our events calendar, delivering thought-provoking webinars and seminars on the very latest issues affecting the recruitment sector directly to Guidant Group customers.
Russell brings an unrivalled level of passion and insight to everything he does. Highly qualified and with an unrivalled depth of experience across industries and geographies, Russell thinks differently, challenges norms and envisages better ways of working.
Don't miss his latest webinar on the future of work!
In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?
Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.
Key Learning Objectives:
•What is the state of the industry for Endpoint Protection technology
•Why machine learning is not enough
•Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more
Contracts are the backbone of an enterprise. Blockchain technology will have important implications when it comes to contract management. Blockchain is becoming a new area of interest, from governments creating secure databases of land titles to consortiums of leading financial institutions working together to design new distributed ledger technologies.
It is a brave new world and a lot of conversations are going on. Where will it go? What will the impact be? What will blockchain bring to contract management?
In this webcast, we’ll answer these questions and more with two of the industry’s leading experts: Gartner Research Director, Nigel Montgomery, and Monish Darda, CTO and co-founder of Icertis.
In the webcast, Nigel and Monish discuss:
- The opportunity seen by enterprises, working together, to design new distributed ledger technologies
- What will be the impact of blockhain related technologies?
- What will blockchain bring to contract management?
- What can you do now to prepare?
By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.
AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
How AlienVault USM detects communications with the command and control server
How the behavior is correlated with other signs of trouble to alert you of the threat
Immediate steps you need to take to stop the threat and limit the damage
Infectious Media runs on data. But, as an ad-tech company that records hundreds of thousands of web events per second, they have to deal with data at a scale not seen by most companies. You can not make decisions with data when people need to write manual SQL only for queries take 10-20 minutes to return. Infectious Media made the switch to Google BigQuery and Looker and now every member of every team can get the data they need in seconds.
Infectious Media will share:
- Why they chose their current stack
- Why faster data means happier customers
- Advantages and practical implications of storing and processing that much data