ITG Debates presents a debate between FireEye and Eko Devices on the topic "Is data security just as important as cutting-edge healthcare technology." FireEye manufactures top of the line network security products, and regularly produces research on the modern cyber threat landscape. Eko Devices is a startup on the cutting edge, producing the world's smartest stethoscopes which generate data that is stored on the network. This debate will be hosted by ITG, and will explore the impacts of cyber threats and modern medicine technology on quality of care, patient data, privacy, and hospital brand. This debate will have relevant information for anyone in the IT and infosec sectors, as well as hospital, healthcare, and other health related industry professionals. Attendees will have an opportunity to win a GoPro Hero3!Read more >
Recent controversies such as Apple vs FBI have highlighted that often strong security is a prerequisite for privacy, and that upholding privacy can ensure stronger security is built into software. As consumers become more aware of privacy issues, can the argument still be made that security must be sacrificed in place of privacy? How do new technologies confirm or deny this notion?Read more >
When it comes to managing cyber risk, what is the best approach? Fixing application vulnerabilities with strong security process before going into production? Or mitigating vulnerabilities through some other technology in production?
Security breaches are on the rise, many of which occur due to vulnerabilities in the application layer. New vulnerabilities are discovered daily and the frantic pace of software development shows no signs of slowing down. What chances do we have to turn the tables on Web Application security breaches?
Join the debate on Remediation vs. Mitigation to learn:
•How both approaches work to protect your web applications
•How you can improve your development process
•How to improve security of applications deployed in production
Network security is changing.
Learn why leading organizations are rapidly adopting a Software-Defined Perimeter instead of a traditional Network Access Control security model.
This webinar discusses:
Similarities and differences between Software-Defined Perimeter and Network Access Control models
Visibility and security – What’s the difference? Why does it matter?
Implementation and maintenance considerations
On-premises vs. cloud infrastructure considerations
Jason Garbis: Leads the Cloud Security Alliance’s Software-Defined Perimeter working group.
Randy Rowland: An executive who lead the effort to transform VMware into a cloud provider through the vCloud Hybrid Service (vCHS) and Cloud Foundry initiatives.
In this interview with Dark Reading at Blackhat 2016, Brian Gillooly and Roger Thorton discuss AlienVault's take on the detection vs prevention debate that often occurs within the security community.Read more >
Join us for this timely discussion with privacy and data security experts. With ever looming environmental threats such as of ransomware, data theft, denial-of- service attacks, every organization and every industry must be focused on IT security. However, there is a delicate balance and frequent conflicts between the idea of information privacy and security.
How much individual privacy can be expected in an inter-connected world? How much should be sacrificed for the sake of maximizing corporate security? And where (if anywhere) can the lines between personal and corporate be drawn? How do these issue impact policies, training and security surrounding even the most simple of business communication tools: email.
This presentation will provide an overview of the privacy vs. security challenges and explore specifically how these issues are impacting the issue of user email credentials and email vulnerabilities. This is especially critical given that emails are the number one contributor to data breaches. In fact, 63% of breaches in the US last year were the result of a compromised email credential.
We will then a) discuss common misperceptions and security holes that can lead to ransomware and other malware vulnerabilities, b) compare the various alternatives for proactively addressing these vulnerabilities, and c) discuss strategies for preventing and responding to cyberattacks.
Cost vs. quality: It’s a perennial issue in technical service and support. Drive your costs too low, and you risk sacrificing the quality of service. Conversely, if you push quality too high (yes, that’s possible!), then you drive your costs through the roof. Understanding the cost/quality tradeoff is the most critical step toward optimizing your support model.
Using data from more than 300 benchmarks worldwide, Jeff Rumburg will illustrate how top-performing service and support organizations strike an appropriate balance between the cost of service delivery and the quality of support provided. He’ll share simple yet powerful techniques that will enable organizations to pinpoint their position on the cost vs. quality curve, determine if higher (or lower) quality is justified, reduce costs without sacrificing quality, and improve quality without increasing costs.
Finally, he’ll share an interactive scorecard that organizations can use to determine whether service and support has been optimized, and, if it hasn’t, to identify the tangible steps needed to achieve an optimized support model.
Check out our 2-minute video on “VoIP vs. VoLTE."
Learn more about VoIP at Cradlepoint.com
Watch more Cradlepoint Whiteboard Videos:
Is Regtech the new Fintech? The definition of Regtech differs depending on who you speak with. New fintech companies are now finding themselves having to comply with regulations for the first time. How will these affect them and how does this differ from incumbent organisations?
In this panel session, we will discuss:
-what are the existing regulated entities?
-how do new regulations affect banks vs. fintech start-ups
-how should fintech start-ups prepare for these regulations?
-the difference between new regtech companies and existing tech companies providing regulation services
-do regulators have the scope to accommodate Fintech companies?
- RSA 2016 -
BrightTALK spoke to EJ Hilbert to get his thoughts on cyber techniques being used in conflicts in the middle east, the Apple vs FBI unlock case and the constant threat to critical infrastructure of ransomware.
Does your storage system scale as you grow?
Should you go with scale-up or scale-out architecture?
Which hybrid scale-out NAS is right for you?
Netapp, EMC Isilon, Panasas, Lustre - which one is the best fit for you?
In this on-demand webinar, Panasas's Andre Franklin, Sr. Product Marketing Manager presents on:
- Scale and Scalability
- Scale-up vs. Scale-out
- Measuring Scalability
Gain competitive advantage with scalability.
- RSA 2016 -
BrightTALK got the chance to catch up with Virus Bulletin's Martijn Grooten to hear his thoughts on the Apple vs FBI case; how to best protect healthcare institutions from cyber attacks and his reasons to be optimistic in the cyber security space in 2016.
Containers are one of the hottest topics in the IT world today and much conversation is around the perceived advantages of using containers. This webinar will discuss the benefits and challenges with containers vs VMs and how both containers and virtualization technology have a place in IT. We will also show how Stratoscale's platform allows IT teams to manage them both with a unified infrastructure and pane of glass.Read more >