Browse communities
Browse communities
Presenting a webinar?

Staying Compliant in the Cloud: Trends for HIPAA, PCI and FISMA

HyTrust/Coalfire/Fortinet
The evolution to virtualization and the cloud is inevitable. Companies simply have to be more nimble, reach more users and reduce cost as they migrate away from static security controls that are not flexible and cost effective. As amazing as it sounds, this cloud migration can be supported with dynamic security measures and compliance solutions that are more effective and less expensive over time. The cloud is poised to deliver both a more nimble and secure platform for future growth.

In this webinar, with security experts from Coalfire, Fortinet and HyTrust, you'll learn how to leverage the power of cloud computing and enhance security and compliance at the same time.

Topics for discussion include:

•An overview of evolving industry standards and regulations, focusing on HIPAA, FISMA, and the latest PCI DSS 3.0 updates
•The evolving security challenges and approaches with cloud computing
•What recent cyber-attack statistics reveal about the widening gap between the hackers vs. the “good guys”
•Software defined data center architectures, such as VMware NSX, for enabling agile security
•Best practices for assessing risk management, security and compliance

Featured speakers:

Rick Dakin, CEO of Coalfire
Hemma Prafullchandra, CTO/SVP Products at HyTrust
Warren Wu, Sr. Director of Product Marketing at Fortinet

We look forward to your attendance!
Jun 26 2014
60 mins
Staying Compliant in the Cloud: Trends for HIPAA, PCI and FISMA
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3357)
  • Upcoming (62)
  • Date
  • Rating
  • Views
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Web applications are a favourite target for hackers, so their safety must be a priority. Using an application firewall can enable active protection from known and zero-day threats. Join us to find out how Qualys Web Application Firewall combines scalability and simplicity delivered in the cloud to block attacks fast—without the substantial cost of traditional solutions.
  • Digital Identities have become the new perimeter in the fight against cybercriminals. Businesses need to come together to coordinate an effective defence and real time sharing of internet scale intelligence.

    * Explosive Cybercrime growth comes from criminals leveraging the internet – how can we use that same leverage to our advantage?
    * We can’t trust the endpoint and we can’t trust the user credentials – how do we operate in this new world?
    * How can real time sharing of anonymous Digital Identity behavior provide a new type of protection while offering improvements in end user experience?
  • ...contre les applications Web de manière rapide et rentable

    Les applications Web sont la cible privilégiée des pirates. Leur sécurité doit donc être une priorité. Un firewall applicatif assure une protection active contre les menaces connues et Zero Day. Rejoignez-nous afin de découvrir comment le service de firewall pour applications Web proposé par Qualys associe évolutivité et simplicité via le Cloud pour bloquer rapidement les attaques, sans les coûts importants liés aux solutions classiques.
  • Make sure that you have a full overview of the security posture of all of your IT assets. Join us to find out how Qualys helps you to scan remote complex networks—including everything and everybody from remote workers, point of sales, data centers and IAAS providers. Now you can you get a better picture of potential vulnerabilities—preventing breaches and reducing risk.
  • ...ou vos réseaux IP qui se chevauchent !

    Assurez-vous un aperçu complet de l’état de la sécurité de tous vos actifs IT. Rejoignez-nous pour savoir comment Qualys vous aide à analyser des réseaux distants complexes et notamment tous les intervenants et ressources, qu’il s’agisse de collaborateurs distants, de points de vente, de centres de données ou de fournisseurs IAAS. Vous pouvez désormais obtenir une meilleure image des vulnérabilités potentielles afin de prévenir les failles et de réduire les risques.
  • Earlier this year, Moka5 conducted a survey about how enterprises are currently using cloud-based services and how they would prefer to use them. The results are in and the findings are eye opening. Join Moka5 VP of Marketing Kris Bondi for an overview of the adoption and usage trends as well top-of-mind security concerns for IT decision makers.
  • Channel
  • Channel profile
  • Enabling Operational Excellence In Your Virtual And Cloud Environments Recorded: Feb 19 2015 43 mins
    Jeff Ennis, Principal Security Architect at HyTrust
    Organizations and agencies are taking full advantage of the flexibility, agility, and cost savings realized by virtualization. This webinar will focus on the operational challenges facing virtualization professionals and managers.

    In this session, Jeff Ennis, Principal Security Architect at HyTrust, will examine the cost of downtime, the impact of downtime in a virtual environment, share real-world incidents, and highlight mitigation techniques. Attendees will benefit by gaining a better understanding of why operational integrity in the virtualized environment is critical, and the recommended approaches to mitigate the risk of extended outages.
  • What’s New in PCI 3.0 and How it Affects You - for Organizations in EMEA Recorded: Feb 12 2015 63 mins
    HyTrust/Coalfire
    PCI 3.0 came into effect in January, and it brought big changes to PCI compliance requirements and control implementation. The changes highlight the need to maintain compliance continuously to defend against today’s sophisticated threats, rather than focusing on the annual audit. Furthermore, these changes need to be considered against the backdrop of increasing efficiency through mixed-mode architectures and the audit of the virtualization plane.

    Attend this webinar to learn:

    • What are the most important new requirements in PCI 3.0?
    • How does the “Business As Usual” guideline translate into QSA positions on continuous controls and monitoring?
    • How best to implement PCI controls on the vSphere/ESX management plane, including in mixed-mode configurations.

    Feature Speakers:
    Brian Pennington
    Regional Director, Europe at Coalfire

    Jonathan Gohstand
    Cloud Security Architect at HyTrust
  • Planning for PCI Compliance in the Cloud Recorded: Feb 5 2015 59 mins
    Sponsored by HyTrust
    In this webinar featuring Forrester Research VP, principal analyst John Kindervag, and Matt Springfield, Founder and President of 12Feet, Inc., you'll get a fresh perspective on what you need to know about securing the virtualized data center, and the key requirements for PCI that are especially relevant.

    You will leave with a solid understanding of what it takes to securely virtualize your PCI applications and data, and ensure your assessments go smoothly.
  • Adding Critical Data Security to AWS Instances Recorded: Dec 11 2014 39 mins
    Steve Pate, Chief Architect at HyTrust
    The public cloud can offload IT requirements and offer better business agility, but recent IT surveys show more than 50% of IT managers withhold sensitive data from the cloud because of security concerns. Most organizations feel that data in the cloud is data out of their control. But now it’s possible to leverage AWS while still maintaining data privacy and security.

    In this webinar, Steve Pate, Chief Architect at HyTrust, presents HyTrust’s latest breakthrough in cloud encryption and key management - HyTrust DataControl for AWS. With DataControl, you can add security and control in seconds into existing and new Amazon EC2 instances by encrypting both Windows and Linux virtual machines. Learn how HyTrust DataControl has been helping organizations secure data in both hybrid and public cloud instances, with several key advantages:

    •Strong encryption that is operationally transparent to secure data at rest in the public cloud
    •Engineered for the cloud, so security stays with your virtual machines, even if they are replicated or copied
    •Zero-downtime encryption and re-keying for maximum uptime
    •Easy, integrated key management
  • PCI Compliance for Canadian Organizations Recorded: Dec 10 2014 60 mins
    HyTrust/VMware/Coalfire
    PCI 3.0 comes into effect in just a couple of months, and it brings big changes to PCI compliance requirements and control implementation. The changes highlight the need to maintain compliance continuously to defend against today's sophisticated threats, rather than focus on the annual audit. Furthermore, these changes need to be considered against the backdrop of increasing efficiency through mix-mode architectures and the audit of the virtualization plane.

    Attend this webinar to learn:

    •What are the most important new requirements in PCI 3.0?
    •How does the "Business As Usual" guideline translate into QSA positions on continuous controls and monitoring?
    •VMware's PCI Compliance Framework
    •How best to implement PCI controls on the vSphere/ESX management plane, including in mixed-mode configurations.

    Featured speakers:

    Noah Weisberger
    Director, Cloud & Virtualization Practice at Coalfire

    Mr. Weisberger leads the Cloud & Virtualization Practice at Coalfire. He is the primary author of a number of whitepapers describing the use of industry leading virtualization & security management technologies for secure and regulated environments, has presented at conferences both domestically and abroad on topics relating to security,compliance, and operational efficiency with cloud-based technologies.

    Allen Shortnacy
    Staff Partner Architect and CTO Ambassador at VMware

    Mr. Shortnacy focuses on improving automation of infrastructure partner solutions with the VMware product portfolio and broader go to market strategies. In addition, Allen is a subject matter expert in VMware’s Compliance Reference Architecture program where he supports validations of VMware and partner ecosystem configurations.

    Jonathan Gohstand
    Cloud Security Architect at HyTrust

    Mr. Gohstand is a former member of the PCI Council Network Segmentation Special Interest Group, and has six years of product management experience in implementing PCI, including pioneering virtual segmentation strategies.
  • As You Virtualize Your Data Center, Don't Forget to Secure It: Top 3 HIPAA Tips Recorded: Nov 20 2014 55 mins
    HyTrust/VMware/Auxilio
    Healthcare is experiencing a surge in needing advanced processing and functionality from clinical applications, but has limited capacity to add additional physical servers to accomplish this goal.

    The answer has been to move to virtualizing your environment, both locally and in the cloud. At the same time, as this has been occurring, HIPAA security requirements for securing virtual environments have also been expending, alongside with the approach taken by the OCR auditors when reviewing these environments for HIPAA compliance.

    Due to the ease of stealing data in non-secured environments, and auditors increasing scrutiny, organizations are at risk of unforeseen side effects along the path to meeting their virtualization goals. But this does not have to be the case.

    In this webinar, you will learn the top 3 tips for ensuring you get your needed virtualization capacity, while at the same time maintaining HIPAA compliance along the way.

    Feature Speakers:
    Mike Gentile
    Executive Vice President of Innovation & Security at Auxilio

    Craig Edwards
    Senior Healthcare Strategist at VMware

    Bill Hackenberger
    Vice President of Data Security at HyTrust
  • What’s New in PCI 3.0 and How it Affects You Recorded: Nov 6 2014 62 mins
    HyTrust and Coalfire
    PCI 3.0 comes into effect in just a couple months, and it brings big changes to PCI compliance requirements and control implementation. The changes highlight the need to maintain compliance continuously to defend against today’s sophisticated threats, rather than focusing on the annual audit. Furthermore, these changes need to be considered against the backdrop of increasing efficiency through mixed-mode architectures and the audit of the virtualization plane.

    Attend this webinar to learn:
    •What are the most important new requirements in PCI 3.0?
    •How does the “Business As Usual” guideline translate into QSA positions on continuous controls and monitoring?
    •How best to implement PCI controls on the vSphere/ESX management plane, including in mixed-mode configurations.

    Featured speakers:

    Noah Weisberger
    Director, Cloud & Virtualization Practice at Coalfire

    Mr. Weisberger leads the Cloud & Virtualization Practice at Coalfire. He is the primary author of a number of whitepapers describing the use of industry leading virtualization & security management technologies for secure and regulated environments, has presented at conferences both domestically and abroad on topics relating to security,compliance, and operational efficiency with cloud-based technologies.

    Jonathan Gohstand
    Cloud Security Architect at HyTrust

    Mr. Gohstand is a former member of the PCI Council Network Segmentation Special Interest Group, and has six years of product management experience in implementing PCI, including pioneering virtual segmentation strategies.
  • Gaining control over virtual workloads: do you know where your data is? Recorded: Oct 9 2014 41 mins
    HyTrust and Intel
    Introducing HyTrust Boundary Controls

    Virtualization and the cloud make data security more complicated. Specifically, customers have struggled to implement required controls to meet policies and compliance mandates. A common example, administrators have noted that there has been no automated way to ensure that workloads can only be instantiated on specific, designated, or trusted server, in a trusted location. Until Now.

    HyTrust, through its technology collaboration with Intel, has extended its virtualization security portfolio with new capabilities to better secure the most important elements in virtualized datacenters and the cloud - applications and data.

    Attend this webinar, featuring Eric Chiu, President and Founder of HyTrust and James Greene, Senior Security Engineer for Intel, to gain a better understanding of how HyTrust Boundary Controls work with common server infrastructures to provide mechanisms to define and enforce tighter geographic restrictions to ease compliance, deter data theft and prevent data center downtime.
  • Your Cloud Security Checklist Recorded: Sep 18 2014 47 mins
    HyTrust / Intel
    What you must know when evaluating cloud encryption

    Virtualized environments have unique data security challenges,
    especially if you¹re running your infrastructure in the public cloud.

    When you consider using Infrastructure as a Service (IaaS) from a
    cloud service provider, traditional security measures like full drive
    encryption don¹t always translate. Virtual machines are dynamic and
    mobile, and are often replicated by your CSP for backup and availability. Putting your data in the cloud gives you agility, but are you
    sacrificing security?

    This webinar, hosted by Steve Pate, Chief Architect at HyTrust, will
    review your options and provide you with checklist of capabilities you
    should consider when evaluating encryption for private, hybrid or
    public clouds. We¹ll address questions like "How should I manage my
    encryption keys?" and "How can I securely decommission from a CSP?"

    If you are concerned about data privacy and the security of your
    virtual machines running in the public cloud, this webinar is for you.

    We look forward to your attendance!
  • Staying Compliant in the Cloud: Trends for HIPAA, PCI and FISMA Recorded: Jun 26 2014 60 mins
    HyTrust/Coalfire/Fortinet
    The evolution to virtualization and the cloud is inevitable. Companies simply have to be more nimble, reach more users and reduce cost as they migrate away from static security controls that are not flexible and cost effective. As amazing as it sounds, this cloud migration can be supported with dynamic security measures and compliance solutions that are more effective and less expensive over time. The cloud is poised to deliver both a more nimble and secure platform for future growth.

    In this webinar, with security experts from Coalfire, Fortinet and HyTrust, you'll learn how to leverage the power of cloud computing and enhance security and compliance at the same time.

    Topics for discussion include:

    •An overview of evolving industry standards and regulations, focusing on HIPAA, FISMA, and the latest PCI DSS 3.0 updates
    •The evolving security challenges and approaches with cloud computing
    •What recent cyber-attack statistics reveal about the widening gap between the hackers vs. the “good guys”
    •Software defined data center architectures, such as VMware NSX, for enabling agile security
    •Best practices for assessing risk management, security and compliance

    Featured speakers:

    Rick Dakin, CEO of Coalfire
    Hemma Prafullchandra, CTO/SVP Products at HyTrust
    Warren Wu, Sr. Director of Product Marketing at Fortinet

    We look forward to your attendance!
  • Security by Design Recorded: Jun 3 2014 54 mins
    HyTrust
    Building a secure, compliant and available cloud faster with converged infrastructure.

    Organizations continue to expand datacenter virtualization at a rapid pace to take advantage of its agility and cost savings. Next generation private clouds offer even more flexibility, bringing self service and better IT responsiveness. In this webinar, with infrastructure and security experts from Forrester, VCE and HyTrust, you’ll learn how converged infrastructure can get you to your cloud faster, and more securely.

    This webinar will cover:

    o The role of converged infrastructure in data center transformation
    o How converged infrastructure is the fastest path to private cloud
    o Overcoming private cloud concerns with secure, policy-driven automation
    o Where your peers are in their consolidation and cloud transformation

    Featured speakers:

    Dave Bartoletti, Principal Analyst, Serving Infrastructure & Operations Professionals at Forrester Research
    Eric Chiu, Founder & President at HyTrust
    Geoffrey Coulter, Security Product Manager at VCE
Cloud control, visibility, data security, management and compliance
HyTrust is the Cloud Security Automation company. Its virtual appliances provide the essential foundation for cloud control, visibility, data security, management and compliance. HyTrust mitigates the risk of breach or catastrophic failure— especially in light of the concentration of risk that occurs within virtualization and cloud environments. Organizations can now confidently take full advantage of the cloud, and even broaden deployment to mission-critical applications.

The Company is backed by top tier investors VMware, Cisco, Intel, In-Q-Tel, Fortinet, Granite Ventures, Trident Capital and Epic Ventures; its partners include VMware, VCE, Symantec, CA, McAfee, Splunk; HP Arcsight, Accuvant, RSA and Intel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Staying Compliant in the Cloud: Trends for HIPAA, PCI and FISMA
  • Live at: Jun 26 2014 6:00 pm
  • Presented by: HyTrust/Coalfire/Fortinet
  • From:
Your email has been sent.
or close
You must be logged in to email this