Hi [[ session.user.profile.firstName ]]

GDPR: What you need to know now

In May 2018, the General Data Protection Regulation (GDPR) takes effect. Are you ready? In a recent Ponemon study, 67% of respondents were aware of the GDPR, but only 50% of the organisations had allocated budget and started to prepare for these new regulations. GDPR will impose new rules on businesses, government agencies, and other organisations that offer goods and services to people in the European Union.

In this webinar you will learn:

• More about GDPR and how it will impact you
• How you can work towards GDPR compliance
Recorded May 8 2018 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Florin Lazurca, Technical Security Strategist, Citrix and Stephen Twynam ,Senior Sales Engineer, Citrix
Presentation preview: GDPR: What you need to know now

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Reduce Exposure to Internal and External App and Network Attacks Jun 5 2019 6:00 pm UTC 46 mins
    Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat Citrix
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This on-demand webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
  • Scared of data security in SaaS applications? Don’t worry, we have your back May 30 2019 6:00 pm UTC 38 mins
    Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Hybrid multi-cloud infrastructure for modern app delivery Recorded: Jan 24 2019 58 mins
    Dave Potter, Senior Solutions Architect at Citrix, and Robin Manke-Cassidy, Director of Networking and Security Product Marke
    IT transformation, cloud, and new application development methods are changing the face of application delivery infrastructure. These new infrastructures require flexibility, security, and operational efficiency to uncover the true value to the business. We will discuss the changes driving infrastructure architects to evaluate the application delivery networking and provide a clear strategy on successfully migrating your business to a modern app delivery for hybrid multi-cloud and Cloud Native environments.
  • Taking Charge of GDPR Recorded: Jan 9 2019 59 mins
    Larry Dietz, General Counsel, TAL Global and Stephen Twynam, Senior Sales Engineer, Citrix
    The EU General Data Protection Regulation (GDPR) deadline was 25 May, 2018. If you think you’re immune from its impact, think again. In a Ponemon study, 65% of businesses are concerned about potential fines and 74% say complying with the GDPR will negatively impact their organisation. Whether you’ve prepared or not, attend this webinar to find out best practices, pitfalls, and how companies like yours can achieve some quick wins in their long-term compliance strategy.

    In this webinar, you will learn:

    •What’s different with the current regulations
    •How secure digital workspaces can help
    •Scenarios organisations may encounter
  • GDPR: What You Need to Know Now Recorded: Dec 20 2018 55 mins
    Florin Lazurca, Technical Security Strategist, Citrix and Stephen Twynam ,Senior Sales Engineer, Citrix
    In May 2018, the General Data Protection Regulation (GDPR) takes effect. Are you ready? In a recent Ponemon study, 67% of respondents were aware of the GDPR, but only 50% of the organisations had allocated budget and started to prepare for these new regulations. GDPR will impose new rules on businesses, government agencies, and other organisations that offer goods and services to people in the European Union.

    In this webinar you will learn:

    • More about GDPR and how it will impact you
    • How you can work towards GDPR compliance
  • Ransomware in 2018 – Brace yourself Recorded: Nov 13 2018 61 mins
    Florin Lazurca, Sr. Technical Marketing Manager, Citrix; Andrei Florescu, Sr. Solutions Architect, Bitdefender
    Ransomware, zero day exploits, and phishing attacks, they're among the biggest nightmares facing IT today. The time between exploit, discovery and weaponization is getting shorter and shorter and it’s going to be harder and harder to protect yourself. Last year, 63% of organizations experienced an attempted ransomware attack, with 22% reporting these incidents occurred on a weekly basis.* Attend this webinar and learn four ways you can reduce your exposure to ransomware threats, recover encrypted data more quickly and get employees back to work.

    You’ll learn the basics of data protection that Citrix customers are using today, including:
    • Publish virtualized, sandboxed and hardened browsers and email clients
    • Utilize Hypervisor Introspection (HVI) to detect ransomware techniques
    • Protect mobile devices against attacks with containerization
    • Provide a secure and robust enterprise data sync and sharing service
  • Arming IT security teams with U.S. Secret Service tactics Recorded: Oct 10 2018 53 mins
    Martin Zugec, Senior Architect, Security and Automation, Citrix; Eric Beiers, Lead Security Architect, Citrix
    The U.S. Secret Service has been protecting the leaders of the United States, their families and visiting VIPs for over 100 years with an extraordinary record of success. Attend this webinar to learn about the secret behind their success, the methodology they are using, how you can design your IT environment to achieve the same level of protection and why Citrix is the right partner for this task.

    In the session, you will learn how to:

    • Architect security for a workforce on the move
    • Implement defense-in-depth
    • Deploy best practices for securing your infrastructure, apps, and data
  • Scared of data security in SaaS applications? Don’t worry, we have your back Recorded: Aug 23 2018 39 mins
    Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Scared of data security in SaaS applications? Don’t worry, we have your back Recorded: Aug 23 2018 39 mins
    Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • Search and destroy hard to detect security risks Recorded: Jun 5 2018 46 mins
    Blake Connell, Dir. Product Marketing, Citrix; Martin Zugec, Sr. Architect, Technical Marketing, Citrix
    Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.

    Learn the benefits of advanced analytics, including:
    • Building a digital fingerprint for individual users that lets you know when they are doing something unusual
    • Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
    • Creating custom rules with conditions and actions to remediate problems
    • Halting ransomware and data loss prevention (DLP)

    * Verizon Data Breach Investigations Report (DBIR) 2017
  • Search and destroy hard to detect security risks Recorded: Jun 5 2018 46 mins
    Blake Connell, Dir. Product Marketing, Citrix; Martin Zugec, Sr. Architect, Technical Marketing, Citrix
    Like a trojan horse, they’re already inside your fortress wall. Weak or compromised credentials allow bad actors to pose as internal users exacerbating the problem. Far and away compromised credentials is the biggest security challenge faced by IT, a full 81% of hacking-related breaches used either stolen and/or weak passwords.* Attend this webinar and learn how Citrix Analytics uses machine learning to ferret-out these bad actors and importantly, stop their malicious behavior.

    Learn the benefits of advanced analytics, including:
    • Building a digital fingerprint for individual users that lets you know when they are doing something unusual
    • Predictive and prescriptive analytics beyond descriptive and diagnostic analytics
    • Creating custom rules with conditions and actions to remediate problems
    • Halting ransomware and data loss prevention (DLP)

    * Verizon Data Breach Investigations Report (DBIR) 2017
  • Evolving security strategies: It’s time for a people-centric approach Recorded: May 30 2018 59 mins
    Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Akhilesh Dhawan, Principal Product Marketing Manager, Citrix
    Attackers aren’t storming the walls of your DMZ or planning a full-scale assault on your firewall. They’re stealing information by targeting your employees and sneaking in under the radar. How do you combat that? By evolving your strategy from an attack-centric to a people-centric approach. Use a secure digital perimeter to surround users, apps and data with defenses to securely deliver digital workspaces that are centered around the people that use them—whether those resources are virtual, SaaS, hybrid or cloud.

    Attend this webinar and we’ll show you how you can:
    • Get visibility to mitigate growing security threats resulting from multi-cloud environments
    • Protect apps, data and network resources while maximizing user experience
    • Get insights into user behavior with rich analytics
  • Evolving security strategies: It’s time for a people-centric approach Recorded: May 30 2018 58 mins
    Robin Manke-Cassidy, Dir. Product Marketing, Citrix; Akhilesh Dhawan, Principal Product Marketing Manager, Citrix
    Attackers aren’t storming the walls of your DMZ or planning a full-scale assault on your firewall. They’re stealing information by targeting your employees and sneaking in under the radar. How do you combat that? By evolving your strategy from an attack-centric to a people-centric approach. Use a secure digital perimeter to surround users, apps and data with defenses to securely deliver digital workspaces that are centered around the people that use them—whether those resources are virtual, SaaS, hybrid or cloud.

    Attend this webinar and we’ll show you how you can:
    • Get visibility to mitigate growing security threats resulting from multi-cloud environments
    • Protect apps, data and network resources while maximizing user experience
    • Get insights into user behavior with rich analytics
  • GDPR: What you need to know now Recorded: May 8 2018 55 mins
    Florin Lazurca, Technical Security Strategist, Citrix and Stephen Twynam ,Senior Sales Engineer, Citrix
    In May 2018, the General Data Protection Regulation (GDPR) takes effect. Are you ready? In a recent Ponemon study, 67% of respondents were aware of the GDPR, but only 50% of the organisations had allocated budget and started to prepare for these new regulations. GDPR will impose new rules on businesses, government agencies, and other organisations that offer goods and services to people in the European Union.

    In this webinar you will learn:

    • More about GDPR and how it will impact you
    • How you can work towards GDPR compliance
Secure your digital business. Safeguard your apps and data.
Address cybersecurity threats while proactively protecting information, managing risk, and achieving compliance. Take a people-centric security approach with a unified, contextual and secure digital workspace from Citrix. Learn more at https://www.citrix.com/secure

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: GDPR: What you need to know now
  • Live at: May 8 2018 3:00 pm
  • Presented by: Florin Lazurca, Technical Security Strategist, Citrix and Stephen Twynam ,Senior Sales Engineer, Citrix
  • From:
Your email has been sent.
or close