Hi [[ session.user.profile.firstName ]]

Accudata's White-Hat Files | August 2018 Edition

Our fourth White-Hat File is once again from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.

In the July edition, Anton talked about his expertise with physical social engineering. In this 15-minute webinar, he’ll describe the most effective ways he uses online phishing techniques to break into corporate networks—and how you can ensure these remote attacks don’t work on your employees.

To register for the September edition of the White-Hat Files, copy and paste this link: https://www.brighttalk.com/webcast/16347/333750?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=333750
Recorded Aug 22 2018 16 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Anton Abaya, CISA, PCI QSA, Senior Consultant
Presentation preview: Accudata's White-Hat Files | August 2018 Edition

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Work Smarter with Citrix Intelligent Workspace Jul 31 2019 4:00 pm UTC 30 mins
    Blake Chandler, Senior Systems Engineering Manager
    The new Citrix Intelligent Workspace is out, and we’re here to give you the scoop! Join Citrix’s Senior Systems Engineering Manager Blake Chandler as he walks through the next generation of Citrix Workspace.

    Citrix Intelligent Workspace allows users to access all their resources—SaaS apps, web apps, Windows apps, Linux apps, desktops, and data—through a single pane of glass. Learn how Citrix has enhanced this tool with:

    • Machine-learning microapps and workflows to guide and enhance productivity
    • Universal search to quickly surface data no matter where it’s stored
    • Virtual assistance to guide you to information and interact with applications
  • Securing Privilege and Containing Attacks on Endpoints Recorded: Jul 11 2019 30 mins
    Todd Moseley, Endpoint Privilege Manager; Brance Spradlin, Sales Engineer
    Join CyberArk's Endpoint Privilege Manager (EPM) Business Lead Todd Moseley and Sales Engineer Brance Spradlin as they discuss CyberArk's Endpoint Privilege Manager - the endpoint security solution that effectively enables privilege management, credential theft protection, and application control. When all it takes is one email getting through your perimeter defenses, securing your endpoints is more crucial than ever. Learn how CyberArk can help you:

    - Reduce the attack surface and mitigate critical vulnerabilities
    - Contain attackers at the endpoint and limit lateral movement
    - Stay on top of the latest threats
    - Save time, stabilize configurations, and reduce helpdesk tickets
    - Automatically block malicious applications
  • ServiceNow A Day with an Expert Recorded: Jun 6 2019 10 mins
    Arnie Erazo
    ServiceNow is not a ticketing system; the Information Technology Service Management (ITSM) module is a true service and support force multiplier, enabling the automation of many tasks every service desk manager encounters on a daily basis. One common concern every organization encounters is leveraging the full capabilities of the ServiceNow platform. Watch as Arnie Erazo, Accudata Solutions Architect and ServiceNow Expert, walks you through the platform's dashboards and uses.
  • Cisco Enterprise Wireless | Critical Considerations Recorded: Jun 6 2019 16 mins
    Jason Fackrell, Practice Manager, Network
    Digital network technology is transforming the backbone of IT. Join Accudata Practice Manager Jason Fackrell as he discusses Cisco's Enterprise Campus Wireless. Over 15 minutes, Jason will define enterprise wireless, talk through the critical considerations when looking at enterprise wireless, and discuss DNA Spaces.
  • Micro-segmentation is achievable. What's stopping you? Recorded: Mar 20 2019 20 mins
    Joe Onisick, CTO, Xentaurs
    Yes, micro-segmentation (uSeg) is complex and seems expensive. But, the barriers are finally breaking down. True uSeg is now achievable, and we’ll tell you how. In 30 minutes, we’ll define:

    1. The scope of uSeg
    2. uSeg models that really work
    3. Requirements for successful implementation
    4. Why this approach is defining modern cybersecurity strategies

    Join us Wednesday, March 20, at 11 a.m. for our webinar, Micro-segmentation is achievable. What's stopping you?
  • Why IT Pros Want Digital Network Architecture Recorded: Feb 26 2019 16 mins
    Alejandro Rodriguez, Solutions Architect
    Learn the basics of Cisco's Digital Network Architecture (DNA) with Accudata Systems’ resident expert Alejandro Rodriguez. In 15 minutes we'll define Cisco's DNA, identify how your network can benefit, and we'll showcase some use cases to help validate DNA's business impact. Digital network technology is transforming the backbone of IT, so whether you're a CIO or Network Engineer, you will find value in this content.

    Join us February 26 at 11 a.m. for Why IT Pros Want Digital Network Architecture.
  • White-Hat Files | February Edition Recorded: Feb 14 2019 16 mins
    Russell Moore, Security Solutions Architect
    Welcome back to the White-Hat Files, Accudata’s monthly hacker-centric webinar series! For our first White-Hat File of 2019, we are looking into the Marriott breach.

    Join us on February 14 at 11 a.m. as Accudata Security Solutions Architect Russell Moore discusses how Marriott’s security was breached, how to reduce attacker dwell time, and the best practices that can keep your company’s name out of the news.
  • White-Hat Files | 2018 Recap Edition Recorded: Nov 1 2018 24 mins
    Accudata Systems Risk and Compliance Team
    For 2018’s last White-Hat File, we’re focusing on the future. With the new year on the horizon, there’s never been a better time to update and fine-tune your security strategy.

    In this 30-minute webinar, Accudata’s Risk and Compliance Professional Services Manager Ismael Alfaro will focus on how to monitor, implement, and iterate on IT security best practices.
  • Expert Panel: Managing Risk and Compliance in a Secure Cloud Recorded: Oct 26 2018 37 mins
    Bruce Beam (ISC)², Dimitri McKay (Splunk), and Tim Sills (Accudata)
    Securing cloud infrastructure is no simple task, and when lines of business adopt cloud applications for daily administration, the layers of complexity are compounded. In this 45-minute webcam panel, (ISC)², Splunk, and Accudata Systems will tackle some of the toughest questions on managing risk and compliance in the cloud, including:

    - How organizations are fighting cloud sprawl
    - Best practices for securing data in the cloud
    - Cloud data-loss prevention
    - How to apply a risk-based approach to reduce exposure in the cloud

    Panel:
    - Bruce Beam, Director of Infrastructure and Security, (ISC)²
    - Dimitri McKay, Security Architect, Splunk
    - Tim Sills, Senior Risk Consultant, Accudata Systems
  • Residual Cloud Benefits: A New Way To License Recorded: Oct 18 2018 16 mins
    Cindy Burns, Cloud Specialist
    Cloud infrastructure’s residual benefits are significant! Namely, anyone who buys corporate IT knows licensing is a nightmare. Different pricing structures, unclear benefits, and complex licensing server setups are all too common. That’s why F5 is changing the game.

    Join us on October 18 for a 15-minute webinar led by F5’s Cindy Burns to learn why licensing isn’t what it used to be!
  • Why Accudata Relies on Citrix Cloud Recorded: Oct 16 2018 24 mins
    Vid Sista, Director of Technology Solutions
    Accudata Systems isn’t just a Citrix Platinum Partner—we rely on Citrix Cloud internally to provide the agility and depth of service we need to compete in today’s business landscape. Join Accudata’s director of technology, Vid Sista, for a 30-minute webinar on October 16 at 11 a.m. CST to learn how Accudata uses Citrix Cloud to:

    •Protect sensitive data outside our corporate network.
    •Leverage Citrix’s Virtual Apps and Desktop environments to reduce resource needs.
    •Provide a consistent experience for all Accudata team members, regardless of location.
  • [Webcam Panel] Perspectives on the Digital Transformation Recorded: Sep 19 2018 47 mins
    Patrick Vardeman, CEO; Rick Snyder, Sr. VP; Anoj Willy, CEO; Vid Sista, Director of Technology Solutions
    Join moderator Patrick Vardeman, CEO of Accudata Systems, for a dynamic digital-first webcam panel discussion with Rick Snyder, Senior Vice President of Cisco’s Partner America’s Organization; Anoj Willy, CEO of Xentaurs, a leading Digital Transformation Systems Integrator; and Vid Sista, Director of Technology Solutions at Accudata Systems.

    They’ll cover it all—from what to consider in your DevOps strategy to hybrid cloud solutions and industry-leading technologies to build an effective data intelligence program. The digital business is far more complex than ever imagined, and we’ll do our part to help you understand where your investment can have the greatest payoff.
  • Accudata's White-Hat Files | September 2018 Edition Recorded: Sep 13 2018 15 mins
    John Sharp, Senior Consultant
    September’s White-Hat File comes from licensed attorney and Risk and Compliance Senior Consultant John Sharp.

    In this 15-minute webinar, you’ll learn how cybersecurity compliance regulations aren’t the catchall you need to make sure your network is secure—as well as the most common pitfalls organizations face when trying to stay compliant.
  • Secure Web Apps from Attacks with Advanced WAF Recorded: Sep 11 2018 15 mins
    Byron McNaught, F5 Product Marketing
    Organizations use an average of 765 web applications. Based on research from F5 Labs, these web apps were the initial target in 53% of data breaches. Bad actors commonly target web apps to steal credentials or use previously stolen credentials to gain widespread access to user accounts. Often these attacks leverage automation and/or bots for the heavy lifting.

    Learn how F5 and Accudata can help secure your web apps from attack with the new capabilities in F5's Advanced Web Application Firewall (WAF):

    - Detect and mitigate automated attacks and bots that target web and mobile apps.
    - Secure credentials from theft and protect apps from credential abuse.
    - Protect against sophisticated application Denial of Service (DoS) attacks.
  • Why ServiceNow Makes IT the Hero Recorded: Sep 6 2018 13 mins
    Vid Sista, Director of Technology Solutions
    Imagine a world where IT swoops in and saves the day. ServiceNow is making that a reality while obliterating the notion that IT is a cost center. In fact, we'll prove it in this webinar. ServiceNow is a catalyst for the digital transformation of your business, giving your entire organization, IT included, the ability to move faster, drive efficiency, improve end-user experience, and outpace the competition.

    In this 15-minute presentation, we’ll dive into the business case for ServiceNow and how it drives digital transformation in your own organization.
  • A Guide to Modern Business Continuity Recorded: Aug 28 2018 27 mins
    Bryan Halda, Solutions Architect
    Disasters can take down your IT environment in a variety of ways, and if you’re not prepared you could lose thousands of dollars or more. Hurricanes, tornadoes, and fires can destroy your ability to work—and so can cyber-attacks. Take one example: if you were locked out of your network due to a security breach, do you know how you would pay your employees?

    Join Accudata Systems Solutions Architect Bryan Halda for this 30-minute webinar and learn why you should consider cyber attacks as disasters and how to recover from them.
  • Accudata's White-Hat Files | August 2018 Edition Recorded: Aug 22 2018 16 mins
    Anton Abaya, CISA, PCI QSA, Senior Consultant
    Our fourth White-Hat File is once again from Anton Abaya, CISA, PCI QSA, Senior Consultant in Accudata’s Risk and Compliance practice.

    In the July edition, Anton talked about his expertise with physical social engineering. In this 15-minute webinar, he’ll describe the most effective ways he uses online phishing techniques to break into corporate networks—and how you can ensure these remote attacks don’t work on your employees.

    To register for the September edition of the White-Hat Files, copy and paste this link: https://www.brighttalk.com/webcast/16347/333750?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=333750
  • Business Trends and the Need for Secure SD-WAN Recorded: Aug 15 2018 14 mins
    Dutch Schwartz
    Cybersecurity solutions often sacrifice speed for performance, which is why Forcepoint takes a different approach. Their software-first network security platform is a fundamentally different architecture from any other vendor.

    Learn why organizations that need unparalleled management and scalability select Forcepoint more than any other solution. Join us for our webinar on August 15 at 11:00 am CST.
  • Drive Out the Complexity of Hybrid Cloud Recorded: Aug 14 2018 16 mins
    Thanh Nguyen, Data Center & Cloud Practice Manager
    As the use of hybrid cloud increases, so does the struggle for enterprises to balance the opportunities against the challenges.

    Join Accudata Systems and F5 for a 15-minute webinar that will teach you how to Drive Out the Complexity of Hybrid Cloud and deliver any app, anywhere, with confidence.

    •Simpler operations: Reduce complexity across hybrid and multi-cloud environments
    •Faster deployments: Scale deployments with increased agility
    •Safer security: Reduce risk with a consistent policy to maintain compliance and control
    •Consistent application services: Deploy any application, anywhere, with consistent application services and security with F5
  • Why Integration Matters: How to Strengthen Your Security Posture Recorded: Aug 7 2018 28 mins
    Alex Vasquez, Security Practice Manager
    The best way to secure your organization from today’s most complex threats is integration. It’s key to building a security infrastructure that deters seasoned attackers. Yet, it can be a challenging, time-consuming initiative to take disparate technologies and build an interoperable, world-class cyber security program.

    Join Accudata Systems Security Practice Manager Alex Vasquez on August 7 in our 30-minute webinar, Why Integration Matters: How to Strengthen Your Security Posture. He’ll address complicated IT challenges and security automation strategies, and you’ll learn about the following:

    •Integrating vendors into one environment
    •Preventing unauthorized access to VPN services with multifactor authentication
    •Optimizing your security strategy with automated support workflows
Secure. Modernize. Grow.
Accudata Systems is a leader in IT consulting and systems integration. For more than 35 years, we have helped strengthen organizations by solving their toughest IT challenges with a commitment to partnership, flexibility, and guaranteed results. The vastness of our expertise, paired with our proven methodology, enables a true partnership as we help our clients secure, modernize, and grow.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Accudata's White-Hat Files | August 2018 Edition
  • Live at: Aug 22 2018 4:00 pm
  • Presented by: Anton Abaya, CISA, PCI QSA, Senior Consultant
  • From:
Your email has been sent.
or close