Hi [[ session.user.profile.firstName ]]

Getting Started with Hadoop

Organizations continue to recognize the importance of data as the new currency and as a competitive differentiator. Data is being created and consumed at rates never before seen. This is not unique to a single industry; it is affecting all vertical markets. With organizations struggling to understand and adopt Big Data solutions, we want to offer an easy starting point to begin a complete Big Data solution.

We simplify the procurement and deployment offering an all-in-one comprehensive solution that allows organizations to start their Big Data Hadoop journey with a bundled solution that includes the hardware, software, including the Cloudera Basic Edition, and services needed to deliver a Hadoop cluster to start on a proof of concept to begin working with big data.

- Introduces a fully-supported Hadoop proof of concept into organizations to allow users to begin to develop expertise
- Incorporates full support from the experts to take the first steps with Hadoop
- Includes one week of professional services to help get started
- Ideal for proof of concept
- Delivers an entry-level system that is a stop in a solution that scales to a larger production system

This proof of concept solution features a Hadoop bundle built for fast deployment, ease-of-use and includes an aggressive starting price point.
Recorded Dec 3 2014 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Armando Acosta, Hadoop Product Manager, Dell
Presentation preview: Getting Started with Hadoop

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Hackers, Threats & Cyber Defence: Reporting from the front line Mar 14 2017 11:00 am UTC 45 mins
    Peter Wood
    Cyber attack trend reporting from the front line of cyber security
  • Blockchain For Identity Authentication Infrastructure Mar 14 2017 9:00 am UTC 45 mins
    Professor Michael Mainelli, FCCA FCSI FBCS (Z/Yen Group Limited)
    Mutual distributed ledger (MDL) identity schemes could empower people with personal data storage and management, permission frameworks for access by third parties such as banks insurers or governments, and even distributed reputation ratings.

    Such applications could reduce financial fraud, costs, and crime, and increase returns, confidence, and security. MDLs are uniquely supportive of controlled distribution and sharing of digitally-signed documentation and could form the backbone to identity and authentication systems worldwide. In fact, some claim that identity authentication infrastructure is the ‘killer app’ for MDLs rather than payments.

    While anti-money-laundering/know-your-customer/ultimate-beneficial-ownership processes are arduous for high-net-worth individuals, about 2.4 billion poor people worldwide lack official identification, about 1.5 billion over the age of 14.

    This webinar will examine how MDLs might aid both rich and poor.
  • The Evolving Perimeter - Where Are The New Boundaries? Mar 13 2017 4:00 pm UTC 60 mins
    Joseph Carson, Cyber Evangelist at Thycotic
    The traditional security perimeter is proving to no longer be an effective cyber security control and fast growing technologies, such as cloud, mobile and virtualization make the boundaries of an organization blurry.

    For many years, organizations have protected their valuable and sensitive information by building a fence around assets, and all of the data that flowed in and out was either via a single internet access point or on physical devices.

    This meant that a traditional perimeter was an effective measure as the boundaries were known. As long as the internet access was controlled by the data that flowed through it, it was possible to protect, monitor and control that data.

    Organizations protected internet access with firewalls, VPNs, access controls, IDS, IPS, SIEMs, email gateways, and so forth, building multiple levels of security on the so-called perimeter. On physical devices, systems management and antivirus protected those systems and kept them updated with the latest security patches.

    This is a traditional security approach, used for nearly 30 years. However, in today’s world it is no longer effective alone. The perimeter has moved and we need to move with it.

    During this session, attendees will learn about how identity and access management is evolving fast and becoming the new security perimeter, including:

    • Why the traditional perimeter is no longer effective
    • What hacker techniques are being used to compromise organizations
    • What some governments are doing to protect their citizens
    • Technologies that will help create the new cyber security perimeter
  • Vulnerability Management is NOT Dead (Despite Our Efforts To Kill It) Mar 10 2017 5:00 pm UTC 60 mins
    Nathan Wenzler, Principal Security Architect at AsTech Consulting
    It’s that time of year again: RSA Conference 2017 is upon us. The trends in the security industry are moving more quickly than ever, and the newest methods of preventing cyberattacks have quickly shifted away from solely building walls of defense and into analytics of the data gathered about your network and the way users and attackers use it.

    But what about the tried and true methods for thwarting hackers like traditional Vulnerability Management programs? Many organizations have allowed their VM programs to languish and become ineffective because it’s often seen as too old of a technology and too difficult to make successful.

    But that’s only because they’ve really never done it right.

    Join Nathan Wenzler, Principal Security Architect at AsTech Consulting, to learn why Vulnerability Management is still a critically key component to a successful security program.

    This discussion will highlight:
    - The issues that lead companies to ignore their VM programs
    - Real-world examples and case studies of solutions you can use to resurrect one of the best tools in your security arsenal

    About the Presenter:
    Nathan Wenzler is the Principal Security Architect at AsTech Consulting, a leading information security consulting firm. Wenzler has nearly two decades of experience designing, implementing and managing both technical and non-technical solutions for IT and Information Security organizations.
  • Cloudbleed: The Good News & Bad News for Users, Companies and Society Mar 9 2017 9:00 pm UTC 60 mins
    Kaushik Narayan (Skyhigh Networks), Tom Gorup (Rook Security)
    What do you need to know about Cloudbleed, the latest security flaw from Cloudflare, to protect yourself and your company's data?

    The company was transparent about disclosing the bug in late February, but users should still play it safe and change their passwords across many websites.

    Join this interactive session with industry experts and learn the facts, good and bad, on how Cloudbleed may affect you. We'll also cover the broader trends on how user information can be used by cyber criminals, and the security steps users should have in mind before and after a data leak.

    Speakers:
    Kaushik Narayan, CTO of Skyhigh Networks
    Tom Gorup, Director of Security Operations at Rook Security
  • Roll of the Dice: The Dangers of Third Party Code on Your Websites Mar 9 2017 2:00 pm UTC 45 mins
    Fabian Libeau, EMEA Technical Director, RiskIQ
    Third-party website resources and code play an integral role in the online economy. They enable interactive sites that allow people to transact with their banks; shop online, watch movies or television, share photos, videos, documents and much more. Unfortunately, these resources also represent exploitable infrastructure that sits outside the control of an organisation's IT security team. As a result third party web components have become fertile ground for launching attacks and distributing malware. Addressing this challenge requires looking at security from a new perspective.

    In this webinar we will explore the different kinds of third party code that organisations host on their sites along with their security implications. We’ll show how an outside-in approach to security can provide the controls organisations require while at the same time protecting their customers and employees.
  • Fallout from Cloudbleed: Protecting Yourself and Your Organization Mar 8 2017 7:00 pm UTC 60 mins
    Kaushik Narayan, CTO at Skyhigh Networks
    Cloudbleed shocked the world as one of the most widespread vulnerabilities to affect cloud services. 99.7 percent of companies have at least one employee who used a CloudBleed vulnerable cloud application, meaning hackers could have stolen user passwords and potentially corporate data.

    Attend this webinar to find out the extent of Cloudbleed’s impact and how to limit the risk to yourself and your organization. The session will cover the following topics:

    · How did the vulnerability function and what is the risk to organizations?
    · What cloud services were affected and how did enterprise applications fare?
    · How can IT security teams put together an action plan to respond to Cloudbleed?
    · How can organizations proactively protect themselves from future cloud vulnerabilities?

    About the Presenter:
    Kaushik Narayan is the CTO at Skyhigh Networks, where he is responsible for Skyhigh’s technology vision and software architecture. He brings over 18 years of experience driving technology and architecture strategy for enterprise-class products.
  • How to scout the dark web and why Mar 8 2017 1:00 pm UTC 60 mins
    Aurélie Perez, Senior Security Consultant at Orange Cyberdefense
    Are cybercriminals using the dark web to buy and sell your customer and employee data, intellectual property and malware? Highly specialist expertise, big data tools and Artificial Intelligence are essential to detect and mitigate the threats to your enterprise.

    Learn about the techniques used to:
    • Conduct undercover surveillance on the dark web to discover mentions of your industry, brand, and data
    • Find data from a security breach at your enterprise
    • Stop stolen user account credentials from being used to breach trusted systems
    • Track emerging exploit kits and vulnerabilities

    Mainstream search engines are unable to penetrate and index these hidden parts of the Internet. Access to sites is often restricted to cybercriminals who are recommended by a current member. Meanwhile, the cost of cybercrime is forecast to hit $6 trillion annually by 2021 according to Cybersecurity Ventures. It’s an issue that can’t be ignored.
  • Defeating Advanced Threats Across Your Network and Applications with Splunk Mar 7 2017 6:00 pm UTC 45 mins
    Jennifer Zientek, Federal Systems Engineer, Palo Alto Networks & David Page, Sr. Sales Engineer, Splunk
    Palo Alto Networks + Splunk - Defeat Advanced Threats While Maximizing Visibility, Control and Security of the Network and Applications in the Public Sector.

    As cyber attacks become more sophisticated, it becomes increasingly hard for legacy systems to detect threats early enough to prevent loss or damage to sensitive data. With valuable data at risk, organizations need a security platform that correlates data and automatically implements protections. Learn how by combining next-generation solutions, Palo Alto Networks and Splunk can provide the visibility and insight necessary to prevent attacks and keep your organization from becoming the next victim.
  • [VIDEO] The Crucial Steps to Prepare for GDPR in 2018 Mar 7 2017 2:00 pm UTC 45 mins
    Josh Downs, Community Manager, BrightTALK & John Elliott, Payments & Privacy Expert
    BrightTALK will be broadcasting its in-depth interview with easyJet Head of Payment Security John Elliott in conversation with BrightTALK Information Security Community Manager.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Cloudbleed: Facts, Implications & Next Steps Mar 6 2017 7:00 pm UTC 60 mins
    Chris Roberts (Acalvio), Andrew Hoog (NowSecure), Nathan Wenzler (AsTech), RJ Gazarek (Thycotic)
    Cloudbleed - a major security breach from the web services and security company Cloudflare, may have leaked user passwords and other information to thousands of websites over a period of six months. Join this Q&A session with trusted experts and discover how Cloudbleed may affect you, your organization and the industry as a whole.

    Moderator:
    - Chris Roberts, Chief Security Architect at Acalvio Technologies

    Speakers:
    - Andrew Hoog, Co-Founder & CEO of NowSecure
    - Nathan Wenzler, Chief Security Strategist at AsTech Consulting
    - RJ Gazarek, Product Manager at Thycotic
  • What Does the Cloudbleed Leak Mean for Your Company? Mar 3 2017 7:00 pm UTC 60 mins
    John Bambenek (Fidelis Cybersecurity), Jeffrey Goldberg (Agilebits), Jay Beale (InGuardians)
    Cloudflare revealed a serious bug in its software in February, which caused sensitive data like passwords, cookies, authentication tokens to spill in plaintext from websites using Cloudflare Content Delivery Network (CDN).

    Join this panel of experts and learn:
    - Who is affected by Cloudbleed
    - What this means for your organization
    - What should you do right away
    - How to better protect your data

    Speakers:
    - John Bambenek, Threat Systems Manager at Fidelis Cybersecurity
    - Jeffrey Goldberg, Chief Defender Against the Dark Arts at Agilebits
    - Jay Beale, COO of InGuardians
  • Securing IoT: What Did We Learn From RSA 2017? Mar 3 2017 4:00 pm UTC 60 mins
    Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor, Inc
    As the largest cybersecurity show on the earth, the RSA Conference always offers new products, insights and approaches to securing the latest connected devices. So with more Internet of Things (IoT) devices than ever before hitting the markets, what can be done to secure your corner of cyberspace. Let’s explore what we learned at the RSA Conference in San Francisco this year.

    About the Presenter:
    During his distinguished career, Dan Lohrmann has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan. Lohrmann joined Security Mentor, Inc. in August, 2014, and he currently serves as the Chief Security Officer (CSO) and Chief Strategist for this award-winning training company. He is leading the development and implementation of Security Mentor’s industry-leading cyber training, consulting and workshops for end users, managers and executives in the public and private sectors.
  • [VIDEO] Cyber Opportunities for the New US Political Administration in 2017 Mar 2 2017 4:00 pm UTC 45 mins
    Josh Downs, Community Manager, BrightTALK & Simon Crosby, Co-Founder & CTO, Bromium
    BrightTALK will be broadcasting its in-depth interview with Bromium's Co-Founder and CTO Simon Crosby in conversation with Josh Downs, Community Manager, BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • [Video Interview] Threat Management and the Keys to Avoiding a Major Data Breach Mar 2 2017 3:00 pm UTC 30 mins
    Ross Brewer, VP & MD, LogRhythm & Josh Downs, Community Manager, BrightTALK
    Research shows that 76% of companies suffered a data breach in 2016, so it’s now almost inevitable that hackers will gain access to your company and your sensitive data.

    Security professionals are now looking to deal with breaches faster, to keep their company off the front page and with heavy GDPR fines on the horizon, they’re wise to do so.

    Organisations are fearful of damaging data breaches but unsure of the best course of action to protect themselves from major cyber incidents. Whilst a large per cent of businesses focus on building up perimeter defences, not enough are concentrating on monitoring their own network to detect threats and mitigate them before significant damage is done.

    Tune into this in-depth one-on-one interview to discover:

    •More about the current threat landscape and the dangers to your organisation.

    •How you can reduce the time to detect and respond to threats without adding staff to accomplish the job.

    •More about how cutting edge technology can be used such as:
    oAdvanced machine analytics, which are key to discovering potential threats quickly.
    oSecurity automation and orchestration capabilities, which increase the efficiency of the threat lifecycle management process.

    •The influence that GDPR will have and steps you need to take.
  • How to Enable Zero Trust Security for Your Data Center Mar 2 2017 2:00 pm UTC 60 mins
    John Kindervag, Vice President and Principal Analyst at Forrester
    The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

    Topics covered in this webinar will include:

    - 5 Steps to achieving Zero Trust enabled data centers.
    - Extending Zero Trust design principles across hybrid cloud deployments
    - Security policy considerations and guidelines for implementing Zero Trust enabled data centers.
  • [VIDEO] The Rise of the Underground Darknet Criminal Economy Recorded: Mar 1 2017 11 mins
    Josh Downs, Community Manager, BrightTALK & Rob Wainwright, Director, Europol
    BrightTALK will be broadcasting its in-depth interview with Europol Director Rob Wainwright and Josh Downs, Information Security Community Manager at BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Swimming in the Sea of Compliance: Become NCUA Compliant with Gemalto Recorded: Feb 28 2017 42 mins
    Alex Hanway, Encryption Marketing at Gemalto
    The National Credit Union Administration (NCUA) requires every credit union to protect their members’ personal, private data. But with a host of mandates and a range of technology options, where should credit union IT administrators begin? Encryption and key management can address a number of the requirements set out in these guidelines. Together they can help credit unions become compliant and can keep customer data safe.
    Join our live webinar "Navigating the National Credit Union Administration (NCUA) Privacy Guidelines:
    Securing Customer Records with Encryption and Key Management" on February 7th to learn about:
    •Which specific guidelines concern customer information at rest and in transit
    •How encryption and key management addresses these requirements
    •The benefits of a centralized encryption management
  • Key Steps to Implement & Maintain PCI DSS Compliance in 2017 Recorded: Feb 28 2017 60 mins
    Dr. Branden Williams; Smrithi Konanur, HPE Security; Kevin Eberman, Mineraltree; Asma Zubair, WhiteHat Security
    In today’s digital landscape, it’s much easier for criminals to access sensitive payment card data, not only gaining direct access to a consumer’s available funds, but also their personal identity. With cyber attacks becoming much more advanced, the PCI DSS standard has been forced to adapt to address these new threats.

    However, PCI compliance is something that any organization can successfully achieve. The requirements of PCI DSS are clear, but it takes work to accomplish compliance across an organization. On this webinar our panel will discuss some best practices, and solutions that provides your business with an easy, cost effective and highly automated way to achieve compliance with PCI DSS in 2017.
  • [VIDEO] The Influence of Machine Learning and AI on Cyber Security Recorded: Feb 28 2017 9 mins
    Josh Downs, Community Manager, BrightTALK & Troels Oerting, CISO, Barclays
    BrightTALK will be broadcasting its in-depth interview with Troels Oerting, CISO of Barclays and Josh Downs, Community Manager of the BrightTALK Information Security Community.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Getting Started with Hadoop
  • Live at: Dec 3 2014 5:00 pm
  • Presented by: Armando Acosta, Hadoop Product Manager, Dell
  • From:
Your email has been sent.
or close