Hi [[ session.user.profile.firstName ]]

Better Protect Your Web Apps by Knowing How They Will Be Attacked

Join our “Web App Security” presentation, which provides the audience with a global perspective of the current state of web application vulnerabilities. Attendees will:
• gain a better understanding of how reconnaissance is used by attackers to discover and pinpoint systems to compromise,
• learn about attack methodologies and how vulnerable web apps can be leveraged for attackers to gain privileged access, and
• hear remediation strategies to help protect their web apps from being attacked.

Speaker Information:
Paul Fletcher has over 20 years of experience in information technology and security. Prior to joining Alert Logic, Fletcher advised executive level leadership in the energy, retail, and financial sectors regarding emerging security threats and mitigation strategies. Additionally, he has worked with Fortune 50 organizations, the Department of Defense, and critical infrastructure organizations to implement risk management plans and security solution designs. His other specialties include network security, customer data integrity, application security, forensics investigation, threat intelligence, and incident response. Fletcher holds a Master of Arts and Bachelor of Science degree and is a Certified Information Systems Security Professional (CISSP).
Recorded Sep 7 2017 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Paul Fletcher, Alert Logic Cybersecurity Evangelist; Brian Anderson, TierPoint Director, Security Product Management
Presentation preview: Better Protect Your Web Apps by Knowing How They Will Be Attacked

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protect the Reality of “Anywhere”: Identity & Access Management Best Practices Sep 26 2019 7:00 pm UTC 60 mins
    Matt Tabor, Director of Product Management - TierPoint
    Today’s mobile workforce accesses data from a variety of devices and cloud applications, opening the door for cyber criminals to use compromised identities to damage your organization. IT security teams must now face the reality of being able to protect users and devices anywhere. Shifting focus from traditional security boundaries, the rapid adoption of cloud applications and BYOD has made identity the new perimeter. Solutions like Microsoft’s Office 365 with Enterprise Mobility + Security offer an expansive portfolio of security services to centralize and manage access and identities. Join us for a discussion focused on the core tools and best practices to help protect your users and your business, including how to:
    - Protect access to devices and applications with Azure Active Directory
    - Manage company-owned and bring your own (BYO) devices with Intune
    - Provide extra security with multi-factor authentication
    - Gain visibility into your cloud apps and services with Cloud Application Security

    The session will be led by Matt Tabor, Director of Product Management at TierPoint. Matt has 20 years of experience working with cloud and managed services organizations in various management, consulting, and engineering roles. He currently provides strategic direction around TierPoint’s Managed Services and Cloud Platform including a managed security offering for Office 365 using Enterprise Mobility and Security services from Microsoft.
  • Don’t be a Headline: Ransomware Basics and How to Achieve Good Security Hygiene Aug 29 2019 5:00 pm UTC 60 mins
    Darren Carroll, Director of Security Product Management
    Organization under attack. Users locked out. Systems taken offline. Data at risk.
    Ransomware attacks continue to make headlines and impact organizations of all types and sizes. A recent study found that business detections of ransomware attacks have skyrocketed 235 percent since early 2018. With this dramatic increase in attacks, it seems like a good time to talk to our resident security expert about ransomware. Why are these attacks increasing? Despite the visibility, risks, and costs of attacks, how are so many organizations still vulnerable? What can you do to defend your data from this threat? In this webinar, you’ll learn more about this hacker fan favorite including:
    - Ransomware fundamentals – what is it and how does it work?
    - Ransomware in the news.
    - How to prevent ransomware.
    - How to recover from ransomware attacks.
  • What's Hot in Software-defined Networking: Solutions for On-demand Connectivity Recorded: Jul 17 2019 58 mins
    Jay Turner - PCCW Global, Jonathan Rubin - PCCW Global and Dominic Romeo - TierPoint
    Key takeaways from this session include:
    • What is trending in software-defined networking
    • What are simple network tools that allow you to manage high traffic needs
    • How to improve the effectiveness and efficiency of your interconnects from your
    TierPoint data center
    • How to increase your network security and performance and remove friction for end
    users to set up dedicated connections
    • How to implement solutions for on-demand network redundancy
    • How to improve SaaS performance for end users with your network design
    • How to reduce latency between SaaS, clouds, your other sites and end users
    • What are dedicated cloud connectivity options
  • Avoid Migration Migraines: Move to the Cloud with the Right Tools and Team Recorded: Jun 19 2019 51 mins
    Matt Brickey – Vice President, Professional Services | TierPoint
    Cloud migration – to your first cloud, from one cloud to another, or to more cloud instances – can be incredibly complex. Beginning with assessments and sizing, to the move itself and then ultimately developing and leveraging a post-migration strategy, it’s critical that each element is carefully planned to ensure the availability of applications and to minimize the impact to productivity. In this webinar, you’ll see how the expertise of a cloud services provider like TierPoint, in combination with Zerto’s replication technologies ensures continuous data protection, non-disruptive testing, and support for diverse environments during a cloud migration.
  • Connecting Core to Edge: Investigating Two Multicloud Deployment Use Cases Recorded: May 21 2019 60 mins
    Dominic Romeo – Director Product Management | TierPoint and Will Pittman – Ecosystem Director | Megaport
    Analyst firm Gartner predicts that by 2022, more than 50% of enterprise-generated data will be created and processed outside of the data center or cloud, up from less than 10% in 2019.

    As a result, businesses are increasingly leveraging both hyperscale data centers and cloud deployments closer to the edge to support their IT strategies and digital transformation initiatives.

    Rapid growth in multicloud IT deployments is driving an increased need to consider options for connectivity. Dedicated, fast, and globally-reaching connectivity is key to bringing the cloud closer to the edge where businesses reside and need services.

    Join TierPoint and Megaport for an in-depth look at two multicloud use cases. Our experts will give their insights into how the demand for both hyperscale and edge computing can be combined with cloud connectivity to make cloud strategies a reality.
  • Managing Colo to Cloud and Beyond in the TierPoint Portal Recorded: Apr 25 2019 50 mins
    Dale Levesque, Director – Product Management | TierPoint
    More organizations are adopting a hybrid approach to IT and are seeking a partner to help integrate both outsourced and in-house IT services, ideally managed through a single interface.

    Designed to meet the needs of our customers, the TierPoint Portal is a streamlined console that provides a comprehensive user-friendly dashboard of critical information immediately upon logging in.

    From data center and managed services performance dashboards to trouble ticketing support, the TierPoint Portal is your dependable, always-on visibility tool to help manage your TierPoint IT infrastructure environment.

    Join us to learn how the TierPoint Portal makes it easy to view, protect and access management tools for all facets of your environment.
  • You’re Perfect, You’re Doomed. A psychological examination into cybersecurity. Recorded: Apr 11 2019 45 mins
    Paul Mazzucco, Chief Security Officer | TierPoint
    TierPoint’s Chief Security Officer, Paul Mazzucco, is an expert in the field of human behavior and cybersecurity, and in this presentation, Mr. Mazzucco examines the natural human tendency to fear the unknown and how this has consequences on today’s IT leaders, namely for the data and people they attempt to protect. Mr. Mazzucco will also highlight how attackers leverage these psychological vulnerabilities for attacks in Phishing, Internet of Things (IoT), and Artificial Intelligence (AI).

    Attendees will learn about the latest tactics attackers are using to exploit cybersecurity efforts, and they will also understand how to address the tension between the unknown of what an attacker is capable of doing versus what an IT leader can proactively do to avoid organizational complacency and security vulnerabilities.

    In addition to Paul’s security duties at TierPoint, Paul Mazzucco is a Certified Information Systems Security Professional (CISSP), Microsoft Certified Systems Engineer (MCSE), and Certified Ethical Hacker (CEH) answering to the FBI, the United States Secret Service, Pennsylvania Electronic Crimes Task Force (PAECT) and the United States Computer Emergency Readiness Team (U.S. CERT).
  • Data Protection Considerations for Multi-Cloud Environments Recorded: Mar 28 2019 48 mins
    David Hill, Product Technology Strategist, Veeam
    The benefits of turning to the cloud are numerous; scalability, control, flexibility, and power to name a few. While transitioning to the cloud has many strong points, there are still the challenges of data and application protection. In this webinar, you’ll learn:
    • How to leverage multi-cloud as an addition to your traditional data center
    • What applications and services require the most protection in hybrid mode—and how to protect them
    • The importance of portability and how to avoid lock-in
    • How to get better compliance and data protection by moving data between on-prem and the cloud.
  • MultiCloud, Hybrid Cloud Architecting a Secure Framework for Transformation Recorded: Mar 14 2019 48 mins
    Jeanne Morain, Jo Peterson, Chuck Price, and Alvaro Gonzalez
    Cloud architecture, strategy, and implementation are all impacted by security and compliance guidelines and postures. What are the best practices for Cloud approach? How does it impact your security, cost, and other frameworks within IT?

    Join special guests - Jo Peterson, Chuck Price, and Alvaro Gonzalez for a lively discussion on "Cloud" approach and identifying underlying implications to consider..
  • The End is Near! Preparing for SQL Server 2008 & Windows Server 2008 End of Life Recorded: Feb 26 2019 59 mins
    Jacob Wilkins, Database Administrator - TierPoint; Allen Rogerson, Windows Engineer - TierPoint
    Don't let the end of support for Windows Server and SQL Server 2008 sneak up on you—the impacts to security and costs are too important. Avoid business disruptions and use this as an opportunity to adopt the most current security and innovation technologies. Join us as we discuss how to prepare for Windows Server and SQL Server 2008 and 2008 R2 End of Support. In this session you will learn:

    -when mainstream and extended support ends for Windows Server and SQL Server 2008 and what the impact is on your organization
    -what are some key features of Windows Server 2016 and SQL Server 2017
    -how to make the move to upgrade
    -what tools and expertise are available from a managed services partner like TierPoint to help you make the transition
  • The Software-Defined Data Center: A Foundation for Digital Transformation Recorded: Jan 22 2019 47 mins
    David Hines, Vice President of Architecture and Engineering - TierPoint
    As reported in Forbes last year, 73% of companies are planning to move to a fully software-defined data center within two years.

    A software-defined data center is based on a virtualized environment of compute, storage, networking and security in conjunction with policy-based management and automation. The evolution from a traditional data center architecture to one that is software-defined can take months if not years but can yield immense benefits for the business.

    Join us for a discussion on the progress toward the fully software-defined data center, including benefits of infrastructure as code and overcoming challenges associated with traditional workflows.
  • The Power of Hybrid: Your Data Center’s Untapped Potential w/ Cloud Connectivity Recorded: Dec 18 2018 56 mins
    Dominic Romeo – Senior Product Manager, TierPoint & Christopher Smith – Director of Product Management for CloudLink by Zayo
    As businesses embark on IT transformation initiatives, they must ensure their cloud connectivity is secure, reliable and high performing. Low latency from the data center to the edge is crucial. With the rapid growth in IT deployments leveraging public cloud services as well as legacy systems and hosted private clouds, direct cloud connectivity is a key success factor for hybrid and multi-cloud strategies.

    Join TierPoint’s Dominic Romeo and Zayo’s Christopher Smith, for a discussion on cloud connectivity to learn how these solutions can effectively and efficiently bring public cloud capabilities to the edge.
  • Harnessing Artificial Intelligence & Emerging Technologies for Data Security Recorded: Dec 12 2018 49 mins
    Paul Mazzucco, Chief Security Officer | TierPoint
    TierPoint's Paul Mazzucco will discuss the double-edged sword of artificial intelligence, which is aiding the efforts of hackers and protectors alike. Join us as we explore the world of the Darknet, how bad actors are using machine learning and AI to create better attack vectors, and how IT professionals are also using these tools to defend their vital infrastructure. Powered by behavioral modeling, these technologies are the next frontiers in attack mitigation.
  • Crawl, Walk, Run: Transforming the Legacy Enterprise with Microsoft Azure Recorded: Dec 4 2018 56 mins
    David McKenney, Director Product Management | TierPoint
    Digital transformation doesn’t happen overnight. Whatever your strategy, you’ve likely had to research, assess, trial, or even migrate workloads to a public cloud.

    Platforms like Microsoft Azure offer an expansive portfolio of solutions but also create many opportunities for quick wins in the traditional IaaS space and, for many, are a step in the journey to transform the legacy enterprise.

    Join us for a discussion focused on the core set of services needed to build out a virtual private cloud in Azure, addressing many of the decision points that professionals are confronted with during this process. Additionally, we will review several PaaS offerings that might complement your IaaS environment.
  • Best Practices when Deploying Next Gen Firewalls: Enabling Next Gen Goodness Recorded: Nov 1 2018 61 mins
    Darren Carroll, TierPoint; Bob Pruett, SHI; Vincent Delbar, Fortinet
    With the ever-changing cyber threat landscape, you need to be sure the security measures you put in place are performing as expected.

    There were over 53,000 reported security breaches with 2,216 confirmed data breaches reported in the 2018 Verizon Data Breach Investigation Report. IT executives consider network security a critical priority, but they also want to reduce the complexity associated with supporting an array of disparate security products.

    Enter the next generation firewall. Join our panel of experts for a discussion on:
    - best practices around next-generation firewall deployments
    - to learn more about the state of the firewall market, threat detection capabilities, and reputation protection, and
    - how the right partner can help strengthen your security posture.
  • BraveIT 2018 Recorded: Sep 13 2018 251 mins
    Tierpoint - BraveIT
    BraveIT is an interactive, thought leadership event designed for the modern IT professional who is tasked with navigating opportunity and risk in a mission-critical world. The live event is taking place in Chicago on 9/13, we hope you'll join us for the live stream if you are unable to attend in person.

    In this era of accelerating opportunity and risk, IT decision-making evolves constantly. And while the propagation of possibilities fuels innovation and growth, it also makes it increasingly difficult to keep pace; to continuously optimize mission-critical strategies in the face of new threats and persistent change. Although your master plan may be established and stable, you know it can’t be static. Fine tuning it regularly is a required exercise in business optimization, product differentiation, and risk mitigation. That’s why BraveIT is an essential part of your yearly planning cycle. It keeps you current with industry best practices and best-in-class implementations, pressure tests your operating assumptions and enriches your plans for a broad range of potential events and opportunities—all while connecting you with peers and partners who are facing similar challenges.

    As IT professionals face daunting challenges to combat the likes of hackers and shrinking budgets, we recognize your heroics in changing the dialogue from “no” to “how.”

    All times are CDT:
    - 12:30 PM: Opening Remarks
    - 12:45 PM: It's a Brave New BC/DR World
    - 1:25 PM: Workshop: What Organizations Need to Know to Achieve True IT Resilience
    - 2:20 PM: What IT Nightmares Keep You Up at Night? Peer Perspectives on Real-World BC/DR
    - 3:10 PM: Bravery in the Midst of Digital Transformation: Success Stories
    - 4:10 PM: Data Center of the Future
    - 4:40 PM: BraveIT Award presentation

    Visit https://web.tierpoint.com/braveit/2018-agenda for full details.
  • Unlock New Opportunities with Digital Transformation Recorded: Sep 6 2018 25 mins
    Andy Stewart
    IT leaders and their teams are under great pressure to keep pace with escalating and often conflicting business demands, putting them in a state of perpetual transformation.  As traditional solutions are replaced by more agile but also more complex models, even the strongest teams are challenged to design the right mix of workloads, environments, and security measures. This session will review the shifting IT landscape, the factors contributing to digital transformation, and the opportunities created for today’s IT professionals.  
  • In Our Customers' Words - Vince Abernathy, Donald Danforth Plant Science Center Recorded: Aug 23 2018 4 mins
    Vince Abernathy, IT Director, Donald Danforth Plant Science Center
    The Donald Danforth Plant Science Center, a TierPoint client, is the world’s largest not-for-profit plant science research institute, with a mission of improving the human condition and helping the planet feed a growing population. IT Director Vince Abernathy discusses his team’s role in supporting the Center’s mission, how they select vendors, and why they chose TierPoint for disaster recovery as a service (DRaaS).
  • From Hurricanes to Hackers: The Expanding Horizons for Disaster Recovery Recorded: Aug 22 2018 52 mins
    David Hines, TierPoint - Vice President of Architecture and Engineering
    Business disruptions are not just inconvenient but can significantly damage a company’s reputation and bottom line. Many businesses are turning to Disaster Recovery-as-a-Service (DRaaS) solutions as they have effectively solved for downtime and data loss due to weather, system failures and human error. Moreover, DRaaS solutions are effective against cyber threats. Indeed, it’s not just the weather we should be worried about when it comes to disasters.

    One of the fastest growing types of attacks in recent years is ransomware. When infected, files and data are locked down and held hostage until a ransom is paid to the anonymous attacker. Due to the nature of DRaaS solutions, your organization is protected against ransomware thanks to available, continuous copies (or snapshots) of your data as well as processes to help fail back to regular operations.

    In this session, David Hines, Vice President of Architecture and Engineering at TierPoint will review the latest in ransomware tactics, and how to best prevent malware from entering the network in the first place. Sometimes, however, this is unavoidable and having a plan to mitigate the damage is a necessity.

    Register Today!
  • Digital Transformation: Opportunity, Threat, or Hype? Recorded: Jul 19 2018 39 mins
    Karyn Price, Frost & Sullivan; Dan Gallivan, VMware; David McKenny, TierPoint
    You're hearing all about "digital transformation," but is it real? What does your business really need to compete? As IT leaders, digital transformation puts more pressure on your cloud strategy – expectations to achieve more, faster. Is the public cloud the answer to all your needs? How could a hosted private cloud help advance your cloud strategy? Is your hybrid cloud implementation falling short of expectations?

    Join Frost & Sullivan, TierPoint, and VMware for straight talk about digital transformation. We will discuss the challenges and opportunities of the digital era, and offer tips on how your business can succeed.
Helping IT leaders get more from their IT investments
Live and on-demand webinars for IT professionals focused on hybrid IT solutions encompassing cloud, colocation, managed services, DRaaS, IT security, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Better Protect Your Web Apps by Knowing How They Will Be Attacked
  • Live at: Sep 7 2017 6:00 pm
  • Presented by: Paul Fletcher, Alert Logic Cybersecurity Evangelist; Brian Anderson, TierPoint Director, Security Product Management
  • From:
Your email has been sent.
or close