Hi [[ session.user.profile.firstName ]]
Sort by:
    • Security Anthropology: How Do Organizations Differ?
      Security Anthropology: How Do Organizations Differ? Wendy Nather with Duo Security Recorded: Nov 16 2017 5:00 pm UTC 33 mins
    • When planning a go-to-market strategy, it’s common practice to build detailed marketing and sales personas for key security individuals such as the CISO, the IT administrator, the developer, and the end user. Each of these roles has different needs and priorities when considering a security tool, and sales strategy recognizes the need to address each of them. Organizations have different types of business drivers, priorities, constraints, and capabilities as well: for example, an 80-year-old manufacturing company may not care what cute new IoT ideas you might have.

      These organizational personas must be considered when searching out peers for benchmarking. Security decisions made only by looking at other companies in the same industry doesn’t provide enough data, because there are many other variables that come into play. Building a security anthropology model for comparing organizations provides more context to better design products and services to align with their needs, while helping the security community speak the language of the users it’s serving. Join us for a discussion on how we can excavate a better approach with Wendy Nather, Principal Security Strategist at Duo Security.

      SPEAKER INFO:
      Wendy Nather is a former CISO in the public and private sectors, and past Research Director at the Retail ISAC (R-CISC) as well as at the analyst firm 451 Research. She enjoys extreme weather changes while shuttling between Austin and Ann Arbor.

      Read more >
    • What's New on the Phishing Threat Landscape
      What's New on the Phishing Threat Landscape Erich Kron CISSP, Security Awareness Advocate Recorded: Mar 14 2018 5:00 pm UTC 45 mins
    • The most persistent security challenge you face today is bad guys social engineering your users. Phishing campaigns continue to be hacker’s No. 1 preferred attack vector to get your unsuspecting users to download and install their malicious software.

      Join security advocate, Erich Kron, for this live webinar. Erich will discuss brand-new research based on what your users are clicking and how you compare to your peers with new phishing benchmarks by industry.

      Key topics covered in this webinar:
      - New phishing benchmark data by industry
      - Understanding the current phishing landscape
      - Most clicked simulated phishing attacks
      - Top 10 “In the Wild” reported phishing emails
      - Actionable tips to create your “human firewall”

      Read more >
    • Cybersecurity Benchmarking For CIOs
      Cybersecurity Benchmarking For CIOs Jake Olcott, Tom Stumpek Recorded: Nov 29 2016 5:00 pm UTC 60 mins
    • In order for a business to be competitive, it must be continuously improving. This is something the modern chief information officer (CIO) knows all too well. Further, technological advances and greater outsourcing in business have made cyber risk a key area that requires a great deal of thought from the CIO. So, how can CIOs know how their security programs are performing in order to make decisions on allocating funding, headcount, and policies?

      Join Jake Olcott. VP of Business Development at BitSight and Tom Stumpek, a Technology Advisor and former CIO for GE. Attendees will learn:

      - Why cybersecurity benchmarking is difficult for the modern CIO.
      - Different methods of benchmarking you may be involved in (or want to consider).
      - How Security Ratings may solve many benchmarking challenges.

      Read more >
    • Security Lessons from Cybercriminals
      Security Lessons from Cybercriminals Paul Brettle, EMEA HP Security Specialist Manager, HP Enterprise Security Recorded: Jun 12 2013 10:00 am UTC 43 mins
    • Cybercriminals are increasingly banding together, organizing more sophisticated attacks that are more predatory in nature. Cybercrooks’ rapid adoption of new technologies and efficacy in information sharing has trumped traditional static enterprise defenses. In order for organizations to stay protected, they must learn from their adversaries.

      What lessons can we learn from cybercriminals that can be applied to boost an organization’s overall security strategy?

      Paul Brettle, HP’s EMEA Security Specialist Manager, will examine the means and motivations driving cybercriminal behavior and how improvements such as benchmarking can persuade criminals to look elsewhere for targets while helping security professionals develop stronger defenses.

      Read more >
    • Storage Performance Benchmarking: Workloads
      Storage Performance Benchmarking: Workloads Mark Rogov, Dell EMC, Chris Conniff, Dell EMC, Tim Lustig, Mellanox Recorded: Feb 14 2018 6:00 pm UTC 57 mins
    • Benchmarking storage performance is both an art and a science. In this 5th installment of the SNIA Ethernet Storage Forum’s “Storage Performance Benchmarking” series, our experts take on optimizing performance for various workloads. Attendees will gain an understanding of workload profiles and their characteristics for common Independent Software Vendor (ISV) applications and learn how to identify application workloads based on I/O profiles to better understand the implications on storage architectures and design patterns. This webcast will cover:
      •An introduction to benchmarking storage performance of workloads
      •Workload characteristics
      •Common Workloads (OLTP, OLAP, VMware, etc.)
      •Graph fun!

      After you watch the webcast, check out the Q&A blog http://bit.ly/2GME6OR

      Read more >
    • Transforming IT Risk Management With Security Ratings
      Transforming IT Risk Management With Security Ratings Stephen Boyer, BitSight Technologies | Jon Oltsik, Enterprise Strategy Group (ESG) Recorded: Aug 14 2014 5:00 pm UTC 48 mins
    • If organizations have learned anything from the high volume of recent breaches, it’s that boards are paying attention to cyber security now more than ever, and they want to know one thing - are we more or less secure than the latest victim?

      Join Jon Oltsik of the Enterprise Strategy Group and Stephen Boyer of BitSight Technologies to learn how businesses are using security ratings to mitigate internal and external security risks while driving better communication of performance metrics with their boards. By allowing executives to measure and compare security performance over time, organizations are improving situational awareness and are able to make risk-based decisions about preparedness, resources, and overall security strategy.

      Attendees of this webinar will learn how:

      - Boards are challenged to understand security performance and why benchmarking key metrics can lead to better communication and transparency
      - Teams are using security metrics to show improvements across their business ecosystem
      - BitSight Security Ratings are generated and are being used by customers today

      Read more >