Hi [[ session.user.profile.firstName ]]
Sort by:
    • Application Security at the Speed of DevOps
      Application Security at the Speed of DevOps James Rabon - Product Manager, Fortify Software Security Center and Tools Recorded: Oct 24 2017 6:00 pm UTC 60 mins
    • Faster time-to-market and business value driven application functionality are the biggest drivers for DevOps. With DevOps, more frequent releases require shorter development and test cycles creating a higher risk of breaches exploiting the application layer. The last couple of years have shown business value can take a significant hit with security breaches. Building security features at the speed of DevOps, and reducing risk with the right security architecture, processes, and collaboration is key to staying in business. This is the genesis of DevSecOps.

      In this Webinar, Derek Brink from Aberdeen Research describes how the shift towards rapid application delivery methods creates new opportunities for improving application security and reducing risk. MicroFocus’ James Rabon (Product Manager, Fortify Software Security Center and Tools) and Paladion's Vinod Vasudevan (Co-founder and CTO) discuss how MicroFocus and Paladion are helping customers integrate security and compliance into DevOps processes.

      Key Takeaways from the Webinar:

      - Trends in application delivery: from waterfall, to Agile and DevOps
      - How characteristics of Agile, DevOps provide a high-level blueprint for what application security in that environment should look like
      - Capabilities you should be looking for to improve application security at the speed of DevOps
      - How to adopt non-disruptive and continuous application security processes
      - Bringing in around-the-clock security monitoring for cloud assets

      Read more >
    • Security is NOT an Abstract Concept – Building Consensus in the Boardroom
      Security is NOT an Abstract Concept – Building Consensus in the Boardroom Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Apr 24 2018 9:00 am UTC 35 mins
    • Making the connection between “Cause and Effect” is difficult enough but when technology executives need to explain their strategy to a non-technical audience, all too often the key message is lost in technical jargon.

      When technology is embraced by business leaders, it’s because of the perceived business benefit the technology could bring to the organization. What is frequently not discussed, or even thought about at this level, are the security implications associated with technology. The challenge for the senior technology executives is to be able to associate technology with risk, and risk with business disruption, without resorting to a Fear, Uncertainty and Doubt strategy.

      This session will focus on how senior technology executives can better relate to a non-technical audience, using tangible and quantifiable examples, to both inform and persuade of the need of making security an essential component of any business plan.

      Read more >
    • To Outsource, or Not To Outsource: Best Practices for IT Security
      To Outsource, or Not To Outsource: Best Practices for IT Security Ryan LaSalle, Global Managing Director, Growth & Strategy - Accenture Security, Narayan Makaram - Arctic Wolf Upcoming: Sep 13 2018 6:00 pm UTC 60 mins
    • With the growing IT security skills shortage, many enterprises simply do not have the staff they need to handle new projects or ongoing threats. In addition, many businesses are increasingly relying on network and cloud service providers, taking key security functions out of their hands. How can enterprise security teams work with third-party contractors and service providers to improve overall security? In this Dark Reading & Arctic Wolf webinar, top experts discuss security outsourcing strategies, tools for measuring service provider security, and ways to use third-party services to supplement your in-house cybersecurity skills.

      By attending, you’ll:

      - Understand best practices for working most effectively with third party providers
      - Discover what security functions can be handled by third parties and what should be kept in-house
      - Recognize how to avoid common pitfalls of working with third parties
      - Get a peek into how the market is changing, what type of security functions third parties will be providing in the future, and how to prepare for it

      Save your seat now to learn more!

      Read more >
    • Cutting through the Cloud Security Noise: 5 Must-have Architectural Requirements
      Cutting through the Cloud Security Noise: 5 Must-have Architectural Requirements Steve House of Zscaler Recorded: Jan 11 2018 5:00 pm UTC 47 mins
    • The cloud and mobility have fundamentally changed the IT landscape. Both apps and users have left the network, however traditional security has struggled to keep pace. Developing a strong cloud security strategy is important to help restore visibility and reduce risk, but what is the best approach? While there are many opinions and perspectives, the best security strategy starts in the beginning with the proper architecture. Join this webcast to hear:

      - 5 key architectural requirements your cloud security strategy can’t live without.
      - What core building blocks you need to enable and secure your users and apps
      - Learn how leading enterprises are transforming their security to cloud

      Speaker Bio:
      Steve House is a seasoned Product Management leader with over 20 years of experience in the networking and security industries. During that time, he has worked for multiple market-leading organizations including Zscaler, Blue Coat Systems, Packeteer and CacheFlow where he has a consistent track record of helping them innovate and grow their market share.

      At Zscaler, Steve leads the Product Management team responsible for driving product strategy and execution. Steve’s goal is to help the company through its next phase of growth becoming the standard Internet security platform delivered as a service to any user on any device in any location. Steve holds a Bachelor of Science in Electrical Engineering from Duke University.

      For more questions about Zscaler, go to www.zscaler.com

      Read more >
    • Security Anthropology: How Do Organizations Differ?
      Security Anthropology: How Do Organizations Differ? Wendy Nather with Duo Security Recorded: Nov 16 2017 5:00 pm UTC 33 mins
    • When planning a go-to-market strategy, it’s common practice to build detailed marketing and sales personas for key security individuals such as the CISO, the IT administrator, the developer, and the end user. Each of these roles has different needs and priorities when considering a security tool, and sales strategy recognizes the need to address each of them. Organizations have different types of business drivers, priorities, constraints, and capabilities as well: for example, an 80-year-old manufacturing company may not care what cute new IoT ideas you might have.

      These organizational personas must be considered when searching out peers for benchmarking. Security decisions made only by looking at other companies in the same industry doesn’t provide enough data, because there are many other variables that come into play. Building a security anthropology model for comparing organizations provides more context to better design products and services to align with their needs, while helping the security community speak the language of the users it’s serving. Join us for a discussion on how we can excavate a better approach with Wendy Nather, Principal Security Strategist at Duo Security.

      SPEAKER INFO:
      Wendy Nather is a former CISO in the public and private sectors, and past Research Director at the Retail ISAC (R-CISC) as well as at the analyst firm 451 Research. She enjoys extreme weather changes while shuttling between Austin and Ann Arbor.

      Read more >
    • Application Security Testing for an Agile & DevOps World
      Application Security Testing for an Agile & DevOps World Omer Winker, Principal, Products at Contrast Security Recorded: Jun 7 2018 4:00 pm UTC 44 mins
    • Security teams have a hard time keeping pace with software development in Agile / DevOps environments, and the result of rapidly rolling out software is increased risk. With the majority of cybersecurity attacks focused on applications, automatically detecting vulnerabilities and protecting your applications from attack is critical to your business.

      It’s easy to get tangled into the numerous approaches and technologies in application security testing, let alone selecting one that’s right for Agile and DevOps. As a result, it becomes challenging to even start developing an application security testing strategy for your business.

      In this presentation, you will learn:

      - SAST, DAST And IAST approaches used in Application Security Testing
      - Strengths and weaknesses of each approach
      - Best practices in securing your software code
      - How to start developing a winning application security testing strategy

      Remember, applications are the primary target for cyber criminals, so don’t let your most prized customer and corporate assets be exposed to potential attacks!

      Read more >
    • Forrester Total Economic Impact Study on Security Operating Platform
      Forrester Total Economic Impact Study on Security Operating Platform Scott Simkin, director of threat intelligence from Palo Alto Networks and Henry Huang, principal consultant from Forrester Recorded: Aug 2 2018 4:00 pm UTC 57 mins
    • Our customers tell us that in addition to minimizing their risk, our Security Operating Platform – made up of integrated network, cloud and endpoint security technologies – actually decreases their incident response time while increasing the reach and efficiency of their security teams.

      Intrigued, we commissioned Forrester® Consulting to examine the overall benefits, including ROI, that enterprise customers would likely realize after deploying the Security Operating Platform.

      The study, generated after extensive interviews with longstanding Palo Alto Networks® customers, focuses on the quantifiable savings of both time and money that a hypothetical organization would realize. The study found that, over a three-year period, this organization would:

      •Realize security operation efficiencies of $4.75M
      •Avoid alternative security purchases of $3.5M
      •Generate an ROI of 65%


      Join Palo Alto Networks and guest speaker Henry Huang, principal consultant from Forrester, as we discuss the study’s findings. We encourage you to use this research to help guide your cybersecurity investment strategy and make the right security choices.

      ***The Total Economic Impact™ Of Palo Alto Networks, a March 2018 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks

      Read more >
    • How to Make Endpoint Security Easy
      How to Make Endpoint Security Easy Ryan Manni, Manager, Security Operations, Hologic Recorded: Jun 27 2018 4:00 pm UTC 45 mins
    • Traditional antivirus can’t keep up with the pace of emerging threats. What if you could prevent attacks before they occur and spend less time managing multiple agents?

      Join us for a live webinar with Ryan Manni, Manager, Security Operations, Hologic, as we discuss their evaluation of cloud-based endpoint security and why they chose Cb Defense. Hologic is an innovative medical technology company focused on improving women’s health. Their security challenges included preventing non-malware attacks, gaining visibility into remote employees, and managing complex infrastructure with a small IT staff.

      Join this webinar and learn:

      - Learn why Hologic replaced its traditional AV solution with Cb Defense
      - Discover how Cb Defense can help you get ahead of emerging attacks and simplify your security stack
      - Get practical advice on replacing traditional AV with a cloud-based security platform

      Read more >