Hi [[ session.user.profile.firstName ]]

Comprehensive network security through actionable threat intelligence

To protect their networks and critical data from being compromised, enterprises must be able to acquire and assess new information constantly, and take action to identify vulnerabilities, remediate and minimize the likelihood of attackers permeating through their network. HP TippingPoint Threat Protection System delivers comprehensive network security integrating vulnerability management to provide actionable threat intelligence with unparalleled visibility and analytics.
Recorded Sep 22 2015 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Satinder Khasriya, ESP Product Marketing Manager, TippingPoint
Presentation preview: Comprehensive network security through actionable threat intelligence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • ITIL and Digital Transformation Jul 19 2018 10:00 am UTC 45 mins
    Simon Dorst, Michelle Major-Goldsmith - Kinetic IT
    Simon Dorst and Michelle Major-Goldsmith of Kinetic IT address the past, present and the future of ITIL in the context of digital transformation.
  • [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program Jun 26 2018 5:00 pm UTC 75 mins
    Rebecca Herold, Moderator. Jake Olcott, VP of Strategic Partnerships, BitSight
    As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.

    Learning objectives:

    - Find out why traditional vendor risk management programs don’t work
    - Learn how to perform quantifiable vendor security analyses
    - Discover how to build a scalable VRM program
  • The Future of GDPR: Compliance beyond Deadline Day May 22 2018 3:00 pm UTC 60 mins
    Brian Rutledge (Spanning) | Kalani Enos | Others TBA
    May 25th 2018 is the deadline day for achieving General Data Protection Regulation (GDPR) compliance. It is also only the beginning of GDPR.

    Discover what GDPR means for your organization, how it affects US businesses and why it's important to be GDPR compliant.

    Join this interactive Q&A panel discussion with industry experts to learn more about:
    - The intersection of GDPR, privacy and cybersecurity
    - How GDPR affects data governance, breach disclosures and overall data protection
    - Recommendations for improving your organization's cyber resilience

    Speakers:
    - Brian Rutledge, Principal Security Engineer at Spanning
    - Kalani Enos
    - Others TBA
  • Metrics drive behaviours: How to avoid common IT metric mistakes May 17 2018 8:00 am UTC 60 mins
    Steve Morgan, Director, Syniad IT
    As organisations seek to improve the quality of IT services, perhaps through SIAM or cloud provisioning, the traditional SLA targets and performance measures we hold dear are no longer appropriate.

    This talk will look at the common pitfalls and make some recommendations as to measures which will drive the correct behaviours in your internal and external support teams.
  • From Cost Center to Profit Center May 16 2018 5:00 pm UTC 60 mins
    Phyllis Drucker - Consultant, Linium
    Cloud…outsourcing…Platform as a Service…all of these could make IT irrelevant, so how do you prevent this? By providing value every day and by running IT as a Business. Great catch-phrase, but what does it mean? In a nutshell: knowing the services IT is providing, what they cost to operate and whether they provide value, and by staying on the cutting edge of technology even with todays fast pace of change, so that the business you support remains competitive. This webinar addresses the basic building blocks you need to run like a business: defining services and offerings, layering in financial management and charge-backs/show-backs so you understand the costs of these offerings and how to pull it all together in a way that helps you run as a business does, even if it’s only on paper.
  • Running IT as a Business May 16 2018 3:00 pm UTC 60 mins
    Rob Akershoek, Solutions Architect at Shell
    Rob Akershoek, Solutions Architect at Shell and part of the IT4IT Forum, discuss the challenges and opportunities of running IT as a business. Running IT as a business is more than finances and cutting cost – it’s about IT quality.
  • Demonstrating business value from CSI May 16 2018 12:00 pm UTC 60 mins
    Ian McDonald
    Learn how to use CSI to demonstrate true business value with ITIL trainer and ITSM consultant Colin Rudd.
  • The hackers are winning: Deploy your secret weapon Apr 26 2018 10:00 am UTC 45 mins
    Rob Shapland, Principal Cyber Security Consultant, First Base Technologies
    How to make your staff your first and last line of defence.

    Learn how to:
    •Identify your enemy and their tactics
    •Discover why technological defences will lose to hackers
    •Learn how to make staff genuinely care about security

    About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies

    Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
    He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
    He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
  • [Panel] Building Effective Cyber Defense Apr 25 2018 12:00 pm UTC 60 mins
    Amar Singh (Cyber Management Alliance) | Simon Moor (FireEye) | Bob Honour (SonicWall)
    With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Why breach prevention matters
    - True costs of breaches
    - Technological solutions to consider for a more cyber resilient enterprise
    - How AI/machine learning and human talent can work together
    - Top threats to look out for in 2018

    Speakers:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Simon Moor, VP for Northern Europe, FireEye
    - Bob Honour, EMEA Marketing Director, SonicWall
  • [Webcam Panel] CISO Strategy & the Boardroom Apr 24 2018 3:00 pm UTC 60 mins
    Dr. Christopher Pierson (Binary Sun) | Ben Johnson (Obsidian) | Deidre Diamond (CyberSN)
    Having a strong buy-in from the highest level of executive leadership in your organization is a key factor for a successful implementation of your CISO strategy. With high-profile breaches on the rise and a company's reputation at stake, cybersecurity is a top-of-mind issue for CISOs.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Selling your security strategy to the Board
    - Why your Board should be up to date on cybersecurity
    - Top threats to look out for in 2018

    Speakers:
    - Ben Johnson, CTO of Obsidian Security
    - Deidre Diamond, Founder and CEO, CyberSN
    - Dr. Christopher Pierson, CEO of Binary Sun Cyber Risk Advisors
  • Using Behavioural Economics to Raise Digital Resilience Amongst Employees Recorded: Mar 22 2018 22 mins
    Robin Smith, Head of IT Security, South Yorks NHS
    This case study examines how a major NHS organisation used Richard Thaler’s Nudge strategies to redirect employee behaviour and create a culture of cyber vigilance.

    Join this webinar presentation to learn:
    - Key lessons on the value of micro-marketing
    - Lessons from cybernetics
    - The value of cyber resilience in healthcare

    About the Presenter:
    Robin Smith is a former cybersecurity lead analyst in UK Police Service. He has authored four books on cyber security and is currently working on a documentary feature examining the impact of cyber-crime on society for release in 2018. He has previously worked in UK health sector, telecommunications and was formerly a lecturer at Loughborough University in Information Risk Strategy.
  • GDPR and Security: De-Identifying Personal Data Recorded: Feb 22 2018 29 mins
    Ashwin Chaudhary, President of Accedere
    Anonymization and Pseudonymization are ways GDPR recommends to De-Identify personal data. By making it impossible or impractical to connect personal data to an identifiable person, data controllers and processors may be able to do the processing and storage of personal data outside the scope of the GDPR.

    Join this webinar to learn the GDPR requirements for managing personal information and digital identity.
  • Remote Testing and Monitoring to Boost Fronthaul and C-RAN Efficiencies Recorded: Feb 7 2018 21 mins
    Sophie Legault, Director of T&D Business Unit, EXFO
    Listen to Sophie Legault, Director of T&D Business Unit at EXFO as she talks about the 4G to 5G transition, the implication of highly dense networks, impact on the costs of maintenance on fronthaul networks and the challenges MNOs may face. She will also delve into best practices for addressing interference and PIM in mobile networks and improving the quality of fiber-based fronthaul and CRAN deployments.
  • Digital Workplace: Transforming the Employee Experience Recorded: Jan 23 2018 60 mins
    Presenter: Robin Gareiss, President, Nemertes Research; Moderator: Irwin Lazar, VP & Service Director, Nemertes Research
    Digital workplace initiatives broadly expand applications and customization available to employees. During this webinar, we will cover:
    • What is a digital workplace initiative, and the phases of deployment?
    • What technologies and capabilities are included? Which vendors are the most critical?
    • How soon will digital workplace initiatives incorporate artificial intelligence, human-to-machine interfaces, always-on collaboration, and other advanced technologies?
    • Who is leading these initiatives? How involved are the business units, and which ones?
    • What cultural or operational changes must be considered?

    We look forward to sharing this information with you!
  • Ep. 4 Performance Engineering Personnel Mining: Q&T SIG Talk Recorded: Jan 9 2018 27 mins
    Petar Puskarich
    Performance Engineering Personnel Mining

    How frustrating is it to find qualified and reliable performance engineering talent in today’s hiring market? This talk will cover some challenges and success strategies in hiring that basic scripter all the way up to the rare full stack performance engineering unicorn. What to look for, what to avoid, how to handle technology interview fraud.

    Join us for the next Quality & Testing SIG Talk on Tuesday, February 13, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1057043&group=.
  • 6 Key Tech Disruptions and Our Point of View Recorded: Aug 16 2017 63 mins
    Chris Hsu
    HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View

    As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.

    And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.

    During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.

    “When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
  • The Future belongs to the Fast, Transform your Business with IT Management Recorded: Jan 31 2017 30 mins
    Genefa Murphy, Roy Ritthaler, HPE
    Join Roy Ritthaler, VP of Product Marketing IT Operations Management and Genefa Murphy, VP of Partner and Product Marketing, Application Delivery Management at Hewlett Packard Enterprise Software, as they discuss the challenges and opportunities of digital transformation in organizations today. They will also discuss how IT management can accelerate your transition to the digital enterprise. Transformation is driven by business needs, and innovations in application delivery and testing, hybrid cloud, machine learning, collaboration and mobility. By leveraging these innovations you can manage risk while also realizing rapid time to value and to market.
  • IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare Recorded: Jan 12 2017 49 mins
    John Smith, Principle Solutions Architect from ExtraHop, Darren Carr, Sr. Technology Architect, from Cerner
    Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.

    Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.
  • Get self-service of passwords with HPE Service Anywhere – FREE Version! Recorded: Nov 10 2016 46 mins
    Finn Jensen, FastPassCorp
    Service Desk Institute has just published a new report on corporate self-service of passwords. The report reveals significant difficulties for a majority of large companies when introducing self-service of passwords for end-users. At least 5 major problems cause users to reject self-service.
    This Webinar will highlight the results, and present the successful best practices from FastPassCorp, which enables customers to reach 75-90% adoption.
    The FastPassCloud solution can be delivered together with HPE Service Anywhere and Service Manager.
  • Data Security & Protection with the New Windows 10 Recorded: Oct 27 2016 36 mins
    Stephen Jeffries, Technical Architect, Microsoft
    Get significant security protection with Windows 10! As the most secure Windows ever, Windows 10 offers significant security protection.

    With more than 250 million threats online in any given day, security for your business has never been more critical. These threats can cause loss of data and personal information with increased risk of identity theft. Windows 10 includes built-in protection to help keep you more secure with all new features in the Anniversary update.

    Join this webcast to learn more about the two major new security features that launched with the Anniversary update:
    •Windows Defender Advanced Threat Protection (WDATP) detects, investigates, and responds to advanced malicious attacks on networks by providing a more comprehensive threat intelligence and attack detection
    •Windows Information Protection enables businesses to separate personal and organizational data and helps protect corporate data from accidental data leaks.
Technical Webinars on Enterprise Technology
The IT Specialist Network is one of the leading online networks with over 500,000 members and growing. Our speakers are leading IT professionals and executives with a wealth of knowledge and experience in the selection, evaluation and implementation of information technology.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Comprehensive network security through actionable threat intelligence
  • Live at: Sep 22 2015 5:30 pm
  • Presented by: Satinder Khasriya, ESP Product Marketing Manager, TippingPoint
  • From:
Your email has been sent.
or close