Hi [[ session.user.profile.firstName ]]
Sort by:
    • 451 Group and Gemalto Present "The Keys to Multi-Cloud Security"
      451 Group and Gemalto Present "The Keys to Multi-Cloud Security" John Ray, Senior Product Strategist and EricHanselman, Chief Analyst at 451 Group Recorded: Dec 13 2016 4:00 pm UTC 63 mins
    • The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.

      Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.

      Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
      • Recent findings on enterprise cloud usage from 451 Group
      • How to analyze the security risks of your cloud platforms
      • Security practices for different cloud platforms and business processes
      • Future-proofing your Cloud security and data protection compliance
      • How security can work in the multi-cloud universe
      • Implementing a key management system that you own

      Read more >
    • Why Layered Security Strategies Don’t Work, and What You Can Do About It
      Why Layered Security Strategies Don’t Work, and What You Can Do About It Ramon de Boer, Team Lead, EMEA ISE Recorded: Jun 2 2016 9:00 am UTC 31 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

       How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.

       How the architecture enables unique and specific security scenarios.

       How the architecture supports a prevention-oriented approach.

      Read more >
    • Why Layered Security Strategies Don’t Work
      Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Mar 16 2016 2:00 am UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • Why Layered Security Strategies Don’t Work
      Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Mar 16 2016 9:00 am UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • Breach Prevention Week: Why Layered Security Strategies Don’t Work
      Breach Prevention Week: Why Layered Security Strategies Don’t Work Glenn Dasmalchi, Director at Palo Alto Networks Recorded: Jan 20 2016 7:00 pm UTC 45 mins
    • Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.

      It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.

      In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:

      - How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
      - How the architecture enables unique and specific security scenarios.
      - How the architecture supports a prevention-oriented approach.

      Read more >
    • Threat Hunting is Not a Hobby – Do It Right or Go Home
      Threat Hunting is Not a Hobby – Do It Right or Go Home Anthony Di Bello, Director of Strategic Partnerships, Guidance Software Recorded: Jun 10 2014 5:00 pm UTC 57 mins
    • The security posture that companies have adopted has been typically focused on the prevention of known attacks. This approach has failed to actually secure enterprises! In this world, “proactive security” means erecting more and more security “walls” on the enterprise’s perimeter and waiting for an attack to happen. The numerous breaches that enterprises of all sizes report on a regular basis are the evidence of such failure. Billions of dollars of investments in old-style, perimeter-focused security have failed to stop cyber attackers from successfully stealing valuable information from organizations globally. Enterprises need to realize that they should change their ways. They need to go hunting – threat hunting. This threat hunting cannot be an ancillary or optional function that the Security team conducts. Instead, cyber threat hunting needs to be conducted systematically and programmatically. In this webinar we will review the steps that an enterprise needs to take to become an effective threat hunter including processes, skills, and technology.

      Read more >
    • Data Protection in the Cloud – Whose problem is it really?
      Data Protection in the Cloud – Whose problem is it really? Richard Moulds, Vice President Product Management and Strategy – Thales e-Security Recorded: Dec 12 2012 7:00 pm UTC 45 mins
    • Using cloud computing is like climbing a mountain – the higher you go the harder it is to climb. Moving mundane tasks to the cloud is easy, but for security centric applications the move is harder to make and for those involving regulated data the day may never come. That’s a shame because it’s in just these areas where the strongest economic incentives for moving to the cloud lie. The question is, who is best placed to establish the appropriate security in order to make this particular mountain easier to climb? Should cloud users plan on a “Bring Your Own Security” approach where they assume that the cloud is essentially an untrusted environment where they must wrap their own security around their applications and data, or should cloud providers be responsible for providing appropriate protection as part of a trusted cloud platform where users can feel safe and do what they do best – build applications? This presentation will address the tradeoffs as well as provide practical guidance regarding data protection approaches in a cloud environment.

      Read more >
    • Beyond the Code – Holistic Application Security
      Beyond the Code – Holistic Application Security Kris Philipsen, Director of Application Security Programs, Verizon Recorded: Apr 17 2013 8:00 am UTC 45 mins
    • Synopsis:
      The growing nature of online business and transactions has resulted in an exponential need for integrated and distributed application architectures. The paradigm of application security over many years has focused on much-needed fixing of common vulnerabilities in application code, without actually understanding their impact on the application’s overall security posture.

      In “Beyond the Code – Holistic Application Security”, we will run through several scenarios, based on real-world case studies, where security was compromised by not looking at application security in a holistic way. The goal of this session is to understand a number of factors to be taken into account when securing the application architecture as a whole, understanding the impact integrated solutions, cloud based Content Delivery Networks and other design choices can have on the application’s overall security. The key takeaway from this talk should be increased awareness, allowing you to cast a wider net and look at the security of an application architecture in a broader and more holistic manner.

      About the speaker:
      Kris Philipsen is Global Director of Application Security Programs at Verizon. He manages teams responsible for Application and Enterprise Security Programs through which they provide customers with a repeatable holistic lifecycle of essential controls and assessments for managing, monitoring and improving their application’s security posture. Prior to his current role, Kris worked as Principal Consultant, specializing in security audits, for Fortune 50 and governmental organizations.

      Over the last 15 years, Kris Philipsen has been actively involved in security research. He is the author of several papers on application security and has worked with multiple product vendors on identifying and mitigating critical security vulnerabilities. Kris appeared as speaker at various seminars and events on Application and Information Security.

      Read more >