Hi [[ session.user.profile.firstName ]]

Rock the CASB Part 2: Real World Use-Cases for Cloud Access Security Brokers

Thousands of organizations across all verticals are leveraging CASBs to secure data in public cloud apps like Office 365, Google Apps, and Box. Join us for Part 2 of our Security Briefings Series April 7, 2016 at 1:00PM Eastern where we'll detail the use cases for complete control and visibility provided by CASBs across both managed and unmanaged devices. We'll also discuss how access control functionality is used in regulated industries for compliance. Learn how your peers are leveraging CASBs to secure data beyond the firewall.
Recorded Apr 7 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Salim Hafid, Product Marketing Manager, Bitglass Rich Campagna, VP Products, Bitglass
Presentation preview: Rock the CASB Part 2: Real World Use-Cases for Cloud Access Security Brokers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Organizational Dynamics of Information Security Jun 5 2018 5:00 pm UTC 60 mins
    Daniel Kennedy
    Positioning Information Security within the enterprise presents its own set of challenges. Our recent survey data from hundreds of senior security and IT leaders like you uncovered a number of systemic security challenges – from skills shortages to retention strategies; not to mention responding to new challenges around cloud and IoT, and other organizational and operational issues. Join 451 Research and (ISC)2 on June 5, 2018 at 1:00PM Eastern as Research Director and former CISO Daniel Kennedy discusses this survey data and takes questions from the audience.
  • The Key to Conquering Cloud – How Training & Certifications Help May 3 2018 6:00 pm UTC 60 mins
    John McCumber, Director of Cybersecurity Advocacy for (ISC)²
    Organizations of all types and sizes are migrating to the cloud. But any such journey is fraught with potential problems and the move to the cloud is no different. During this live webinar cybersecurity experts John McCumber, Director of Cybersecurity Advocacy for (ISC)², and Holger Schulze CEO and co-founder of Cybersecurity-Insiders will explore how a well trained and certified IT staff can address and mitigate these issues. They will delve into the results from a recent report completed by Cybersecurity Insiders and (ISC)² that investigated cloud security risks, threats, and vulnerabilities. Key discussions topics will include:

    - Cloud migration issues,
    - How training and certification benefits an organization, and
    - Why a well-trained security and IT staff can best enable a smooth and safe journey to the cloud.
  • Briefings Part 1: Using Inline Security Tools to Achieve Your Security Goals Apr 26 2018 5:00 pm UTC 75 mins
    Patrick Riley, Principle Product Manager, Gigamon; Brandon Dunlap, Moderator
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)2 on April 26, 2018 at 1:00PM Eastern for Part One of a Security Briefings series where we will examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Briefings Part 3 - Hybrid Cloud – What it is & How Do You Secure It? Recorded: Apr 5 2018 59 mins
    Speakers: Ajay Uggirala, Product Marketing, Imperva; Marty Jost, Sen Product Mktg Mgr; Brandon Dunlap, Brightfly (Moderator)
    The advantages offered by a cloud-based environment makes it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. Join Imperva and (ISC)2 on April 5, 2018 at 1:00PM Eastern as we define the hybrid cloud and talk about best practices to secure your company assets as you start managing and securing them both on-premises and in the cloud.
  • Briefings Part 3: The Rise of Bots: Top 5 Bot Driven Threats & How to Stop Them Recorded: Mar 29 2018 59 mins
    Brian McHenry, Senior Manager, Systems Engineering, F5; Brandon Dunlap, Moderator
    Bots are now teetering on the edge of being the majority of traffic on the internet. It’s not all bad news, as there are plenty of useful bots that make both our work and personal lives more productive. However, malicious bot and botnet creators have introduced more sophistication into their bots, making them harder to detect, and the resulting threats are becoming more common place. Join F5 and (ISC)2 on March 29, 2018 at 1:00PM Eastern as data gathered from internal threat research teams is presented that explains how bots are being created, the top application threats driven by bots, and how to detect and better protect to your business.
  • Part 2 – Time’s Up! Ready or Not, Here Comes GDPR Recorded: Mar 27 2018 59 mins
    Speakers - Chuck Gaughf, Sen Mgr, Infosec, (ISC)2; Graham Jackson, General Counsel, (ISC)2; Bruce Beam, Dir of Infrastructure
    In Part 1, we examined what GDPR is, what the requirements are and how organizations will be impacted. In Part 2, our panel will discuss more on the potential impacts of GDPR across a typical organization (including assessments, encryption, audit & controls and the impact to each department, from finance to marketing) and what the organization should be doing to plan for GDPR. Join (ISC)² on March 27, 2018 at 1:00PM Eastern, as (ISC)² discusses these topics and answers questions from the audience about this important and looming regulation.
  • Part 1 - Time’s Up! Ready or Not, Here Comes GDPR Recorded: Mar 13 2018 60 mins
    Speakers - Chuck Gaughf, Sen Mgr, Infosec, (ISC)2; Graham Jackson, General Counsel, (ISC)2; Bruce Beam, Dir of Infrastructure
    May 25, 2018 is coming like a freight train. The General Data Protection Regulation (GDPR) goes into effect on that date, and organizations of all sizes (that collect data from EU residents) need to be ready for this new regulation. With the new regulation, the definition of personal data has been expanded and it applies to wherever data is sent, processed or stored. On March 13, 2018 at 1:00PM Eastern, (ISC)² kicks off the 1st part of the 2-part webcast where we will focus on what is GDPR, what the requirements are and how organizations will be impacted. Part 2 will expand on potential impacts and examine what organizations should be putting into their planning for GDPR.
  • Briefings Part 2: Top Three Ways To Tackle API Security Recorded: Mar 8 2018 59 mins
    Speaker: Ryan Potter, Director of Cloud Strategy and Alliances, Imperva; Brandon Dunlap, Moderator
    Security is an essential element of any application and increasingly critical for API-driven architectures in hybrid and public cloud environments. New threats and vulnerabilities emerge constantly, and enterprises find themselves struggling to protect these APIs from attacks. Join Imperva and (ISC)2 for Part 2 of our Security Briefings series on March 8, 2018 at 1:00PM Eastern where we will discuss proven approaches to making API security a priority through understanding how common types of attacks such as distributed denial of service (DDoS) can target APIs, what are the steps to proactively secure development frameworks, and how to enforce identity across enterprise environments.
  • Briefings 2- Make Faster, Smarter Decisions about Insider Threats Recorded: Mar 2 2018 59 mins
    Laurene Hummer, Offering Mgmt, IBM Security; Rohan Ramesh, Offering Mgmt, QRader UBA; Brandon Dunlap, Moderator
    Every second counts in the fight to prevent, detect and respond to an Insider Threat. You need to be able to make smarter, faster decisions when it comes to detecting suspicious behavior and preventing further damage. Join this webinar to learn about how you can properly secure access to your critical crown jewel data, automate the process of identifying risky users through user behavior analytics, and shutting down their access with identity governance. See how integration between security analytics and identity and access management tools provide automated, user-centric threat mitigation.
  • Security > Convenience? What 4,000 Users Taught Us about the Future of Identity Recorded: Mar 2 2018 59 mins
    Brian Mulligan, Product Manager, IBM Security; Lane Billings, Product Marketing Mgr, Access & Authentication, IBM;
    In a world powered by consumer choice, our authentication programs are only as effective as their adoption rates – by real, living-breathing, error-prone human beings. IBM recently conducted a research study of 4,000 adults called The Future of Identity, designed to examine what people around the world really think about various old and new methods of signing on (passwords/biometrics/multifactor authentication), what they’re using today, and what they plan to use in the future. Insights from the Future of Identity report have been covered around the world by publications like Politico, TechRepublic, and Engadget, and even featured on NBC's Today Show. Join IBM Security's authentication experts as we cover some never-before-seen data on the 'authentication adoption curve' and discuss practical guidance to put those insights into action.
  • Briefings Part 2: The Hunt for IoT and it’s Threat to Modern Life Recorded: Mar 1 2018 59 mins
    Sara Boddy, Director of F5 Labs Threat Research, F5; Brandon Dunlap, Brightfly (Moderator)
    Our modern world depends on healthy, functioning, IoT devices. Unfortunately many of them are terribly insecure. Cyber attackers know this and have been aggressively compromising IoT devices for years. For the past two years, F5 Labs has been tracking cyber attackers as they hunt, infect, and build “Thingbots” - botnets made from IoT devices. This hunt has developed sizable thingbots like the infamous Mirai, and many others that have the capability to launch globally destructive attacks. These attacks can significantly impact modern life because of IoT’s presence within power systems, transportation systems, airport monitors, emergency warning systems, and security cameras. Join F5 and (ISC)2 on March 1, 2018 at 1:00PM Eastern for the 2nd Part of our three part Security Briefings series where we’ll explore the threat actors behind these attacks, the geographical targets of their attacks, how they are evolving their attack methods, and the types of devices impacted. We’ll include tips on how to start protecting yourself personally, and what you should be doing to protect your businesses.
  • Briefings Part 1: Demystifying Decentralized Identity Recorded: Feb 23 2018 61 mins
    Sridhar Muppidi, VP and CTO, IBM Security, Brandon Dunlap, Moderator
    Today, the average internet user has lost control over their personal information, the result of endless requests to create accounts validated with personal data like SSN/home address/date of birth; and the persistence of hackers and ne’er-do-wells to compromise that data. Users are demanding simpler and more portable ways to manage their identities online, and organizations are joining the charge, as they look to reduce the cost, risk and liability of managing their own identity stores in siloes. A leader in blockchain and cybersecurity, IBM is one of many technology providers leading the movement toward Decentralized Identity systems that aim to put people back in control of their data. Join tech luminary and IBM CTO Dr. Sridhar Muppidi as we move past the buzzwords, exploring the basic terminology and adoption patterns of Decentralized Identity. Listeners will gain a deeper understanding of what it will take to make this vision a reality, and walk away with best practices to get started.
  • March of the Bots: How to Deal with the Onslaught Recorded: Feb 8 2018 60 mins
    Dvir Shapira, Dir. Prod mgmt, Imperva; Robert Hamilton, Dir, prod mktg, Imperva; Brandon Dunlap (Moderator)
    Bots. They generate over half of the internet traffic and over half of the bots are malicious (or of questionable value). Bots can make your systems vulnerable to scraping bots, account takeover bots, impersonators, spammers and hackers. On February 8, 2018 at 1:00PM Eastern, Impreva will share data gathered from their security research team about the most recent bot trends, how bot traffic is changing, where it’s coming from, and the top actions you should be taking to mitigate the effects of bad bots on your websites. Join us for Part 1 of a 3 Part Security Briefings series and understand how commercial services take a multi-layer approach to bot mitigation and management and whether one of these services may be appropriate for you.
  • Don't Get Stung! Examining the OWASP Top 10 & Getting the Most from Advanced WAF Recorded: Feb 1 2018 59 mins
    Nathan McKay, Solutions Marketing Manager, F5; Brandon Dunlap (Moderator)
    Web application security is complex, difficult, and costly. These issues are well known, but remain prevalent out in the real world. Most development teams do not have the time or resources to sufficiently protect against the myriad of attacks that are relevant to each vector, while the level of expertise required to address these issues are difficult to come by even if your project has the time and budget for it. The good news is that advanced WAF technology is more accessible and affordable than ever before. With the right tools, comprehensive WAF coverage can not only reduce your exposures and give you better control over your applications but also help optimize your resources and reduce overall operating costs. Join F5 and (ISC)2 for Part 1 of a 3 part Security Briefings Series on February 1, 2018 at 1PM Eastern where we’ll discuss the OWASP Top 10, defenses for everything it addresses and how to use WAF to optimize and filter unwanted traffic to cut costs in the cloud.
  • CA Briefings Part 2: How to Control Risk & Enable Trust in the Digital Economy Recorded: Jan 11 2018 61 mins
    Speakers - David Duncan, VP, Security, CA Technologies; Brandon Dunlap, Moderator
    The application economy is altering the way we live, work, and interact. As a result, organizations are transforming the way they provide services to customers, employees, and partners. But no matter how these services are accessed, a fundamental concern remains: How does an organization protect sensitive data, while still allowing a frictionless and enjoyable user experience?Join David Duncan, VP, Security of CA Technologies and (ISC)2 on Thursday, January 11, 2018 at 1:00PM Eastern for examination of the cybersecurity risks that can result from application development and what it takes to future-proof business trust.
  • CA Briefings Part I: Privileged Access Management in a DevOps environment Recorded: Dec 7 2017 59 mins
    Steven McCullar, Advisor, Solution Strategy, CA; Scott Willson, Product Marketing Dir, Release Automation, CA; B. Dunlap,
    Access to and within DevOps environments have proliferated over the past few years, with both users and scripts (with embedded credentials). This privileged identity sprawl poses significant risks that need to be addressed.Join CA Technologies and (ISC)2 on December 7, 2017 at 1:00PM Eastern. In this session, we'll look at the technology and approach that CA takes to secure such environments.
  • Briefings Part 2: Email at the root of problems? Cyber Resilience is the answer Recorded: Dec 1 2017 56 mins
    Bob Adams; Brandon Dunlap (Moderator)
    Do you have a minute? 1 minute 40 seconds to be exact? That’s the median time-to-first-click in most phishing expeditions. While we celebrate all that humans can accomplish with the help of technology, we must also be cognizant of the dangers affiliated with humans and technology. How can you as a leader educate your people? How can you encourage them to take a minute to THINK before clicking? Join Mimecast and (ISC)2 as we explore how email is being used as entry point for multiple types of attacks, the negative impact these attacks have on organizations and how to enhance your email security and overall cyber resilience.
  • Briefings Part 2: Effectively Exposing Hidden Threats and Malware Recorded: Nov 28 2017 54 mins
    Tom Clavel, Senior Manager, Security Product Marketing, Gigamon; Brandon Dunlap, Moderator
    As the volume and variety of network data increases, security tools in high-speed networks are unable to keep pace with the explosion of encrypted threats, from malware incursion to data exfiltration. The standard approach of decryption of traffic by each security tool no longer works. Additionally, this approach can result in performance degradation, massive inefficiencies and unnecessary expenditures by security teams. In this webcast, we’ll examine how to eliminate tool overload and high latency as well as how a “decrypt once and inspect many” approach to managing SSL traffic effectively detects hidden threats and provides greater security infrastructure resiliency.
  • Briefings Part 1 Using Metadata Generation to Supercharge your Incident Response Recorded: Nov 27 2017 48 mins
    Greg Mayfield, Senior Director, Product Marketing, Gigamon; Brandon Dunlap, Moderator
    Managing the increasing volumes of network data across expanding physical, virtual and cloud networks is a growing challenge for Enterprise IT organizations. Likewise, the increase in malware, data breaches and ransomware challenges SecOps teams to build a stronger, scalable security posture while mitigating risk. This effort overloads network security, monitoring and analysis tools, as well as the Infosecurity staff. How can an organization access and utilize critical network information and use the metadata generated to turbo charge incident detection and response? In this webcast, we’ll examine how to reduce time-to-threat detection by analyzing metadata traffic, using proactive, real-time traffic monitoring vs. reactive forensics, to protect increasingly complex networks.
  • Briefings Part 3: Extending Your Security Posture to the Public Cloud Recorded: Nov 21 2017 47 mins
    Diana Shtil, Senior Manager, Cloud Security Product Marketing, Gigamon; Brandon Dunlap, Moderator
    Organizations continue to move to the public cloud in large numbers, but they often do not understand the implications of the shared responsibility model. The question is: “who is responsible for security of the cloud versus security in the cloud”? This webcast will address this question, look at SLAs for mission-critical workflows to the cloud, as well as how to assure compliance and accelerate the on-boarding of critical applications.
(ISC)2 Security Briefings - In-depth examination of infosec topics.
(ISC)2 Security Briefings brings attendees multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Rock the CASB Part 2: Real World Use-Cases for Cloud Access Security Brokers
  • Live at: Apr 7 2016 5:00 pm
  • Presented by: Salim Hafid, Product Marketing Manager, Bitglass Rich Campagna, VP Products, Bitglass
  • From:
Your email has been sent.
or close