Browse communities
Browse communities
Presenting a webinar?

Five Steps for Utilities to Reduce Risk Management Framework Fatigue

Patrick Miller, Security Expert
Utilities fear the specter of the NERC auditor, new security legislation on the horizon, and cyber attacks that could shut down systems and services. But risk management framework fatigue has set in, and with so many approaches they don’t know where to begin addressing risk. In this webcast, security expert Patrick Miller describes five concrete steps common to all frameworks that offer a leg up on security and compliance.
Aug 28 2012
58 mins
Five Steps for Utilities to Reduce Risk Management Framework Fatigue
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5381)
  • Upcoming (116)
  • Date
  • Rating
  • Views
  • In this webcast we will look at how to effectively manage Macs in the enterprise as well as mobile devices leveraging your existing IT infrastructure.

    The growth of Mac in the enterprise is undeniable. Apple’s success with the iPhone and iPad is bleeding over into end user preference for laptops. Where Macs used to account for only low single digit percentages of devices deployed and were therefore largely ignored, they are now growing across all verticals and industries and represent a significant challenge for IT.
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Practice Makes Perfect When Defending Against DDoS Attacks

    DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.

    In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
    • Take a deep dive into multi-vector DoS attack strategies
    • Learn how to attack yourself in a controlled, safe environment
    • Create a DDoS Range to test your network defenses, personnel, and incident playbook

    Register now to reserve your spot.
  • Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.

    Drawing on the findings of the Infosecurity Europe Industry Survey, this panel of industry experts will discuss the challenges for information security practitioners and how to prioritise and balance risk. The speakers will share insight into how to develop an information security strategy that protects the organisation’s information assets, whilst ensuring it is resilient and capable of responding robustly to incidents.
  • Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:

    1) Executive mandate to "Do more with less"
    - Free-up your time to do what you do best
    - Vendor consolidation
    - Outsource, focus Internal resources on strategic tasks

    2) Lack of IT Expertise at remote sites
    - Consistency of deployment, Office in a box
    - How to make sure all locations have the same technology
    - Preplanned for growth and new services

    3) Sometimes lack of ownership of remote sites (Franchises)

    4) Security compliance/PCI DSS

    5) High availability
    - Network is down, business has stopped (can't take payments)
  • Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • Channel
  • Channel profile
  • Retail Security – Closing The Threat Gap Recorded: Jun 12 2014 58 mins
    Charles Kolodgy & Dwayne Melancon
    Attendees will learn:
    •How they can detect key indicators of a threat earlier in the threat kill chain to avoid or limit the financial damage as well as the damage to their reputation.
    •The importance of end point security across your business critical systems, including your POS systems.
    •How implementing critical security controls can make you an unattractive target.
  • How the 20 Controls Address Real Threats Recorded: Jun 11 2014 60 mins
    Tony Sager and Dwayne Melancon
    In this webcast, we will:

    •Discuss how to translate security information into specific and scalable action
    •Describe the remediation plan for the controls, starting with the Top 5
    •Discuss how the Council on CyberSecurity uses a community approach to this translation problem to create and sustain the Critical Security Controls.
    •Discuss how the community will help advise and support your risk management efforts with a formalized framework
  • Heartbleed Outpatient Care: Steps for Secure Recovery Recorded: May 15 2014 48 mins
    Joel Barnes
    In this webcast we will show:

    The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    How you can identify your business exposure and what systems are vulnerable
    How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
  • Insider Threat Kill Chain: Detecting Human Indicators of Compromise Recorded: May 8 2014 34 mins
    Ken Westin
    In this webinar we will:

    • Discuss how human resources, legal and IT can work together to help prevent insider threats before they become a problem.
    • Identify risk indicators with employee attitudes and behavior and how it correlates to their patterns of activity on your network.
    • Show how you can use log intelligence and security analytics to automate actions and alerts and rapid reporting and forensics.
  • Heartbleed Outpatient Care: Steps for Secure Business Recovery Recorded: Apr 17 2014 57 mins
    Ken Westin
    In this webcast we will show:
    1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    2. How you can identify your business exposure and what systems are vulnerable
    3. How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
  • AAA: Getting Roadside Assistance from Tripwire Recorded: Apr 2 2014 56 mins
    Tim Masey
    Tim Masey, Director of Enterprise Information Security at AAA, will share his company’s PCI journey.
    In this Q&A-style webcast you will learn:
    •How to move your PCI efforts from a small tactical implementation to a key critical component of your security posture.
    •How to align your compliance efforts with the needs of the business, which will allow you to gain more resources—financial, human and technical.
    •How to utilize security and policy driven dashboards to get your management’s support.
  • How to Restore Trust After a Breach – Middle East Recorded: Mar 13 2014 39 mins
    Jason Clark
    Jason Clark, CISSP, Tripwire Technical Manager (Middle East), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:
    •Which systems can be trusted?
    •What is the extent of the compromise?
    •How quickly can you attain situational awareness?
    Jason will also provide participants with a practical, five-step approach to restore trust in your critical systems after a data breach. Register today to join us for this informative webcast.
  • How to Restore Trust After a Breach – DACH Recorded: Mar 5 2014 52 mins
    Michael Rohse
    Tripwire’s Senior Pre-Sales Consultant, Michael Rohse (DACH), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:
    •Which systems can be trusted?
    •What is the extent of the compromise?
    •How quickly can you attain situational awareness?
    Michael will also provide participants with a practical, five-step approach to restore trust in your critical systems after a data breach. Register today to join us for this informative webcast.
  • How to Restore Trust After a Breach - UK Recorded: Mar 4 2014 57 mins
    Joel Barnes
    In this webcast, Joel Barnes, UK Senior Systems Engineer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How quickly can you attain situational awareness? He will also provide participants with an approach to restore trust in your critical systems after a data breach, following five steps:
    1.Know what you have and prioritize by risk levels
    2.Define what “good” looks like
    3.Harvest system state information from your production systems
    4.Perform a reference node variance analysis to identify compromised systems
    5.Remove suspect systems from the environment and return to a trustworthy state
    Join us for this informative webcast!
  • How to Restore Trust After a Breach Recorded: Feb 12 2014 56 mins
    Dwayne Melancon
    In this webcast, Dwayne Melancon, Tripwire’s Chief Technology Officer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How quickly can you attain situational awareness? He will also provide participants with an approach to restore trust in your critical systems after a data breach, following five steps:
    1.Know what you have and prioritize by risk levels
    2.Define what “good” looks like
    3.Harvest system state information from your production systems
    4.Perform a reference node variance analysis to identify compromised systems
    5.Remove suspect systems from the environment and return to a trustworthy state
    Join us for this informative webcast!
  • Preparing for PCI DSS v3.0: Advice from the QSA Recorded: Jan 22 2014 57 mins
    Adrian Sanabria
    As a former QSA and currently a security analyst at The 451 Research, Adrian Sanabria will share a frank viewpoint of how the new version of Payment Card Industry standard will affect your organization.

    Join us for this webcast and you will:

    •Obtain the point of view from the QSA
    •Learn how PCI DSS 3.0 may affect your Report on Compliance
    •Understand the job of a QSA and the qualities of a good QSA
    •Learn how Tripwire solutions can make the job of the QSA and the PCI audit process easier
  • Vulnerability Voodoo: The Convergence of Foundational Security Controls Recorded: Dec 17 2013 60 mins
    Charles Kolodgy and Edward Smith
    Charles Kolodgy, Research Vice President for IDC's Security Products service, and Edward Smith, Product Marketing Manager at Tripwire, will discuss:

    •Integrating Vulnerability Management with other security controls to improve compliance and security posture
    •Leveraging Vulnerability Management beyond the server room to reduce risk across the entire enterprise
    •Combining business intelligence from Vulnerability Management with other security controls to make better business decisions
  • PCI DSS 3.0: Don't Shortchange Your PCI Readiness Recorded: Dec 16 2013 60 mins
    Jeff Hall and Steve Hall
    Join Jeff Hall, CISSP, CISM, CGEIT, PCI-QSA, PCIP and Senior Security Consultant at FishNet Security and Steve Hall, Director of PCI Solutions at Tripwire, to learn how PCI DSS 3.0 will impact your organization and what you need to do:
    • Understanding key themes for PCI DSS 3.0
    • Making sense of the new requirements, guidance, and clarifications
    • What’s changed, what hasn’t, and what will affect merchants and services providers the most
    • Key considerations to ensure you don’t shortchange your audit preparations
  • Reducing Risk Through Effective Vulnerability Management Recorded: Dec 16 2013 33 mins
    Gavin Millard
    Gavin Millard, Tripwire's EMEA Technical Director, will discuss why effective vulnerability management is critical to measuring, managing and reducing your attack surface and how to gain insight from the information Tripwire can provide.
    Topics covered will include
    • Why asset discovery is fundamental to understanding the size and scope of your extended infrastructure
    • How to gain full visibility into where the most vulnerable areas of the infrastructure reside through Tripwire’s market leading scoring approach
    • How to prioritise the hosts within the infrastructure to quickly reduce the risk and gain control of your attack surface
    • What reporting works with management to connect the value of vulnerability management to the business goals of the organisation
  • 2014 IT Security Budget Mistakes to Avoid Recorded: Nov 6 2013 56 mins
    Katherine Brocklehurst
    Often during budget cycles, we’re handed a number – no choice or negotiation – this is just all you get. This year however, there are some positive trends in security budget research from Gartner, IDC, Ponemon, and CEB.

    This webcast will show you how to maximize your leverage of increased security spending, list the top three security budget mistakes and offer ideas that may help connect security to your organization’s bottom line.

    Tune in to hear:
    • Positive security budget trends and how to use them to increase your 2014 budget
    • Technology trends and their impact on your security budget
    • Budget presentation ideas for the C-Suite
  • Avoiding Vulnerability Info Overload: How to Prioritize and Respond to Risk Recorded: Oct 16 2013 32 mins
    Lamar Bailey
    Lamar Bailey, Tripwire's Director of the Vulnerability & Exposure Research team will provide you with a better understanding of:
    - Why is the Tripwire Vulnerability scoring so granular?
    - How do we arrive at those scores and why not just use CVSS?
    - What do you mean by business context of measuring risk?
    - How will it help us be more efficient managing risk?
  • Using the SANS Top 4 Controls to Measure and Reduce your Attack Surface Recorded: Oct 4 2013 36 mins
    Gavin Millard
    Please accept our apologies for the technical difficulties encountered with this webinar on Monday. This is now due to take place on Friday 4th October.

    This hour-long webinar, hosted by Gavin Millard, Tripwire's EMEA Technical Director, will discuss:
    • Using the SANS critical controls to understand and reduce your infrastructures attack surface
    • Profiles of the current ‘threat actors’ and how the 20 CSC can help thwart the most common threats
    • How to measure the effectiveness of controls through metrics to ensure success and investment from the business
  • Strategic Vulnerability Management: Go Beyond Scanning Recorded: Sep 23 2013 55 mins
    Rick Holland, Forrester Senior Analyst
    Join Rick Holland, Forrester Senior Analyst, and Edward Smith, Product Marketing Manager at Tripwire, to learn how to go beyond scanning to a strategic vulnerability management program.
    In this webcast you’ll learn how a strategic VM program can help you:
    • Go from counting vulnerabilities to accurately measuring, managing, and communicating risk.
    • Understand and classify the assets and vulnerabilities in your environment
    • Triage remediation efforts for more efficient operations

    We hope you will join us.
  • CyberSecurity Awareness and the SANS 20 CSCs Recorded: Sep 12 2013 62 mins
    Jane Holl Lute and Rod Murchison
    Join us for this conversational webinar featuring Jane Holl Lute, the new CEO of the Council on Cybersecurity, as she shares her thoughts on the rapidly evolving world of cybersecurity.

    In this webinar, you will learn:
    * How the Council on CyberSecurity will be influencing cybersecurity, the SANS 20 CSC, and how it may affect your organization
    *Suggestions from Jane's experience on threat actors
    *Value your organization may gain from upcoming activities and events involving Council on CyberSecurity
  • TLC 7.0: Creating Confidence through Improved Log Intelligence Recorded: Aug 26 2013 40 mins
    Steve Hall
    As Security Management solutions evolve to address today’s environment of complex security threats, the need for a log intelligence layer has emerged to provide high speed analysis and filtering of log and event data.

    In this webcast, Steve Hall, Director, Product & Solution Marketing at Tripwire, discusses what’s new with Tripwire Log Center: including the new Advanced Log Collector VIA Agent and the integration of iP360, which intelligently protects critical infrastructure with the correlation of SANS top four security controls.
Leading Provider of IT Security and Compliance Automation Solutions
Tripwire’s powerful IT security and compliance automation solutions help businesses and government agencies take control of their IT infrastructure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Five Steps for Utilities to Reduce Risk Management Framework Fatigue
  • Live at: Aug 28 2012 5:00 pm
  • Presented by: Patrick Miller, Security Expert
  • From:
Your email has been sent.
or close
You must be logged in to email this