Hi [[ session.user.profile.firstName ]]
Sort by:
    • The Basics of Open Source Security
      The Basics of Open Source Security Mike Pittenger, VP of Security Strategy, Black Duck Upcoming: Oct 31 2017 3:00 pm UTC 60 mins
    • Recent news stories have attributed a major security breach to an exploit of a vulnerability in an open source framework widely used by Fortune 100 companies in education, government, financial services, retail and media.

      The incident shines a light on the need for organizations to carefully manage the open source they use to protect themselves—and their customers—from the consequences of catastrophic security breaches.

      “The Basics of Open Source Security” will arm you with the information and statistics needed to:

      -Explain the importance of open source security to your organization
      -Define a clear roadmap for identifying, managing, and securing the open source you have in use
      -Take the steps to help your company avoid becoming the next security breach media story

      Read more >
    • Better Protect Your Web Apps by Knowing How They Will Be Attacked
      Better Protect Your Web Apps by Knowing How They Will Be Attacked Paul Fletcher, Alert Logic Cybersecurity Evangelist; Brian Anderson, TierPoint Director, Security Product Management Recorded: Sep 7 2017 6:00 pm UTC 64 mins
    • Join our “Web App Security” presentation, which provides the audience with a global perspective of the current state of web application vulnerabilities. Attendees will:
      • gain a better understanding of how reconnaissance is used by attackers to discover and pinpoint systems to compromise,
      • learn about attack methodologies and how vulnerable web apps can be leveraged for attackers to gain privileged access, and
      • hear remediation strategies to help protect their web apps from being attacked.

      Speaker Information:
      Paul Fletcher has over 20 years of experience in information technology and security. Prior to joining Alert Logic, Fletcher advised executive level leadership in the energy, retail, and financial sectors regarding emerging security threats and mitigation strategies. Additionally, he has worked with Fortune 50 organizations, the Department of Defense, and critical infrastructure organizations to implement risk management plans and security solution designs. His other specialties include network security, customer data integrity, application security, forensics investigation, threat intelligence, and incident response. Fletcher holds a Master of Arts and Bachelor of Science degree and is a Certified Information Systems Security Professional (CISSP).

      Read more >
    • Why Layered Security Strategies Don’t Work, and What You Can Do About It
      Why Layered Security Strategies Don’t Work, and What You Can Do About It Ramon de Boer, Team Lead, EMEA ISE Recorded: Jun 2 2016 9:00 am UTC 31 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

       How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.

       How the architecture enables unique and specific security scenarios.

       How the architecture supports a prevention-oriented approach.

      Read more >
    • Why Layered Security Strategies Don’t Work
      Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Mar 16 2016 2:00 am UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • Why Layered Security Strategies Don’t Work
      Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Mar 16 2016 9:00 am UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • Breach Prevention Week: Why Layered Security Strategies Don’t Work
      Breach Prevention Week: Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Jan 20 2016 7:00 pm UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • Threat Hunting is Not a Hobby – Do It Right or Go Home
      Threat Hunting is Not a Hobby – Do It Right or Go Home Anthony Di Bello, Director of Strategic Partnerships, Guidance Software Recorded: Jun 10 2014 5:00 pm UTC 57 mins
    • The security posture that companies have adopted has been typically focused on the prevention of known attacks. This approach has failed to actually secure enterprises! In this world, “proactive security” means erecting more and more security “walls” on the enterprise’s perimeter and waiting for an attack to happen. The numerous breaches that enterprises of all sizes report on a regular basis are the evidence of such failure. Billions of dollars of investments in old-style, perimeter-focused security have failed to stop cyber attackers from successfully stealing valuable information from organizations globally. Enterprises need to realize that they should change their ways. They need to go hunting – threat hunting. This threat hunting cannot be an ancillary or optional function that the Security team conducts. Instead, cyber threat hunting needs to be conducted systematically and programmatically. In this webinar we will review the steps that an enterprise needs to take to become an effective threat hunter including processes, skills, and technology.

      Read more >
    • Data Protection in the Cloud – Whose problem is it really?
      Data Protection in the Cloud – Whose problem is it really? Richard Moulds, Vice President Product Management and Strategy – Thales e-Security Recorded: Dec 12 2012 7:00 pm UTC 45 mins
    • Using cloud computing is like climbing a mountain – the higher you go the harder it is to climb. Moving mundane tasks to the cloud is easy, but for security centric applications the move is harder to make and for those involving regulated data the day may never come. That’s a shame because it’s in just these areas where the strongest economic incentives for moving to the cloud lie. The question is, who is best placed to establish the appropriate security in order to make this particular mountain easier to climb? Should cloud users plan on a “Bring Your Own Security” approach where they assume that the cloud is essentially an untrusted environment where they must wrap their own security around their applications and data, or should cloud providers be responsible for providing appropriate protection as part of a trusted cloud platform where users can feel safe and do what they do best – build applications? This presentation will address the tradeoffs as well as provide practical guidance regarding data protection approaches in a cloud environment.

      Read more >
    • Beyond the Code – Holistic Application Security
      Beyond the Code – Holistic Application Security Kris Philipsen, Director of Application Security Programs, Verizon Recorded: Apr 17 2013 8:00 am UTC 45 mins
    • Synopsis:
      The growing nature of online business and transactions has resulted in an exponential need for integrated and distributed application architectures. The paradigm of application security over many years has focused on much-needed fixing of common vulnerabilities in application code, without actually understanding their impact on the application’s overall security posture.

      In “Beyond the Code – Holistic Application Security”, we will run through several scenarios, based on real-world case studies, where security was compromised by not looking at application security in a holistic way. The goal of this session is to understand a number of factors to be taken into account when securing the application architecture as a whole, understanding the impact integrated solutions, cloud based Content Delivery Networks and other design choices can have on the application’s overall security. The key takeaway from this talk should be increased awareness, allowing you to cast a wider net and look at the security of an application architecture in a broader and more holistic manner.

      About the speaker:
      Kris Philipsen is Global Director of Application Security Programs at Verizon. He manages teams responsible for Application and Enterprise Security Programs through which they provide customers with a repeatable holistic lifecycle of essential controls and assessments for managing, monitoring and improving their application’s security posture. Prior to his current role, Kris worked as Principal Consultant, specializing in security audits, for Fortune 50 and governmental organizations.

      Over the last 15 years, Kris Philipsen has been actively involved in security research. He is the author of several papers on application security and has worked with multiple product vendors on identifying and mitigating critical security vulnerabilities. Kris appeared as speaker at various seminars and events on Application and Information Security.

      Read more >