Social networking for most of us is becoming wrapped into our DNA. This is especially important for the next generation workforce. Additionally, the employees today and those of tomorrow will expect the capability to blog and social network with corporate assets and corporate bandwidth. Additionally, these technologies are being widely used for corporate marketing and communication. That is why it's important to look at all aspects of securing your infrastructure and more importantly, the people that drive your organization today. This involves educating people, corporate process and the right security technologies. The following session will cover the benefits and the security risks inherit with social networking across all business verticals. Additionally, the author will provide a use case analysis of information that is gathered via web beacons that harvest information unknowing to the user.
Joe Weiss, CISM, CRISC, ISA Fellow, IEEE Senior Member, Applied Control Solutions, LLC
ICSs (Industrial Control Systems) make up part of the “Internet of Things” and are used throughout the industrial infrastructures of electric power, water, pipelines, manufacturing, and transportation. ICSs are technically and operationally different than business IT systems. The policies, technologies, testing, and forensics used to secure IT may not be applicable to ICSs. For IT, Cyber security generally means malicious attacks using the Internet and targeting Windows systems. The same is not true for ICSs. There have already been more than 700 actual ICS cyber incidents causing impacts from trivial to significant environmental releases to equipment damage to deaths. However, very few of these incident have been identified as being cyber-related. This webinar will address what is ICS cyber security, why is ICS cyber security different than IT, what has actually been happening with ICS cyber security, and what should be done to help secure these critical systems.
Randy Jessee, Director Product Management & Mike Heberling, Solutions Director Voice | HEAT Software Inc. |
Managing IT services has rarely been as challenging as it is today. Many IT organizations are being called upon to improve service levels while being asked to control costs. In this webinar, you’ll learn about three approaches IT organizations can take to streamline incoming service inquiries to improve productivity, efficiency and agility to handle escalating demands without increasing costs. Join us to learn more about how to:
• Cut the incident backlog
• Increase first call resolution
• Reduce mis-assigned tickets
• Create more self-service opportunities
• Modernize the user experience
• Focus more on business issues and outcomes
Advanced Persistent Threats (APTs) are in every network. They rely on you being overwhelmed by alerts and unable to follow up and respond to attacks - it typically takes days, weeks, sometimes months to resolve a cyberattack (the Ponemon Institute found it takes 32 days, on average, to close out a cyberattack). This is time you don't have. Attend this webinar to see how to change this paradigm and mature your incident response so you can quickly uncover, contain and remediate attacks in your network.
See how other companies have used modern automation technologies to take their Incident Response to the next level:
· Investigating everything – no more prioritization or alerts going unhandled
· Quickly mitigating threats – including large scale cyber events – to close the window of opportunity for attackers
· Applying IR best practices – through codified logic and intelligent decision-making algorithms that take the complexity out of IR
This year over 85% of large organizations were targeted by advanced attackers according to Symantec’s 2015 Internet Security Threat Report. Was your organization one of them?
With targeted attacks on the rise, organizations need to leverage adversary and threat intelligence with advanced security analytics to accurately detect and respond to early indicators of compromise and avoid the risk of experiencing a high impact breach.
In this webinar, Security experts from LogRhythm and Symantec explain common ways networks are targeted and explore best practices for effectively prioritizing and responding to threats that have penetrated the network. They will also discuss how actionable adversary and threat intelligence generated by Symantec DeepSight can be automatically consumed by LogRhythm’s Security Intelligence Platform to correlate external threat data with other high risk events recognized across the IT environment to immediately expose highly concerning activity.
Key themes to be covered include:
•Emerging attack motives and strategies
•Maximizing prevention, detection, and incident response
•Corroborating external threat intelligence with behavioral changes on the network
•Prioritizing threats to prevent attack propagation
George J. Anderson, Product Marketing Director at Webroot Inc.
Web security is back on the IT Security agenda in a big way. With breaches caused by web usage at an all-time high security professionals are realizing that relying solely on endpoint security to protect their users is downright negligent.
This presentation explores why with this reappraisal is happening and why so many companies are opting for SaaS cloud-based Secure Web Gateway solutions. It also looks at how Webroot, using its BrightCloud Threat Intelligence platform, have completely updated their existing cloud-based web security service to provide a new logical first line of security defense for web users.
1.Why web security should be the primary user security defense layer?
2.The advantages of cloud-based web security over traditional on-premise solutions.
3.The benefits your organization will see as a result of cloud-based web security.
TJ Alldridge, Product Marketing Manager, HP TippingPoint
Advanced threats and targeted attacks are wreaking havoc in our networks and desktop machines. High-profile attacks seem to make headlines every few weeks. While no security solution is 100% effective, join us to discuss best practices that could bring your security effectiveness closer to that goal.
Kevin Peterson, Director of Security & Network Transformation, Zscaler & Mark Stafford, Senior Cyber Consultant, BT Security
Cyber security is now a topic of discussion at the majority of board meetings, according to a recent NYSE/Veracode survey*. It is no longer just an IT issue, a policy or compliance issue – it is a corporate risk issue. Forrester Inc., states that CEOs are now mainly held responsible for data breaches – a shift from it solely being the responsibility of the CISO. According to them, any lapses will cost executives their job**. The stakes are very high and getting it wrong has significant consequences, including:
- Brand damage due to customer loss
- Loss of competitive advantage due to corporate espionage
- High cost of responding to a breach
How prepared is your organization to handle a security breach and discuss this in the boardroom?
This webcast will address cyber security priorities being discussed at the boardroom level, including:
- Managing security risk in today’s digital world
- Securely leveraging key technologies such as cloud, mobile and analytics
- Addressing security gaps across the ecosystem of customers and suppliers
- Effectively engaging at the boardroom level, reviewing key metrics and aligning strategy with business priorities
*NYSE/Veracode 2015 Survey: Cybersecurity in the Boardroom
**Forrester Inc., Report: Security Leaders, Earn Your Seat At The Table
Managing cyber risk isn’t just about protecting your own house. As we’ve learned from Target and other major breaches, organizations must also be diligent in overseeing risks to vendors, business associates, and other third parties that have access to sensitive data or provide important services. For credit unions, regulatory pressure and cost concerns can make this a daunting task.
Fortunately, there are several cost-effective, proactive measures organizations immediately take to mitigate third party cyber risk. Join Jacob Olcott, VP of Business Development at BitSight Technologies as he discusses ways to get started on a vendor risk management program. Viewers will learn:
Five steps you can take immediately to mitigate third party cyber risk
The types of businesses in your supply chain that may pose risks
How BitSight Security Ratings streamline the process of vendor risk management
Jeanne Morain, Business Technology Specialist; Alex Ryales - IOT Strategist Avnet
The Internet of Things is an ideal concept for the digital connected world that we live in. Many technology organizations disagree because of the security risks. What are the top security risks? How do you address them before it becomes an epidemic? Join Jeanne Morain with special guests Alex Ryals & TBD to learn more about the best practices when planning your IOT strategy.
Terence Spies, Chief Technologist, HP Security Voltage
Consumer-facing organizations of all types face increasing IT complexity and a future where more applications will have PANs, tokens, and payment tokens flowing in the system. Understanding tokenization is critical to the security of applications, and to having solid justification for reducing audit scope in a tokenized environment.
With newer methods of tokenization such as Apple Pay gaining ground in the marketplace, there is a need to develop deeper technical and architectural understanding of the available methods of protecting PAN data, and how security tokenization fits from the perspective of the end-to-end architecture of payments ecosystems.
In this session our experts will explain how the tokenization system is secured within the network and how it maps tokens into PANs. Attendees will learn:
The latest on PCI 3.0 and updates related to SSL and TLS encryption protocols and vulnerabilities that can put payment data at risk,
Security and PCI-related aspects of payment vs. security tokenization in user networks, and
Gain a deeper understanding of standards and options for protecting PAN data in multi-platform enterprise environments.
Jonathan Smith, Application Security Specialist, WhiteHat Security
This presentation will demonstrate the value of manual business logic assessments and provide an example of a vulnerability that scanners cannot find because the problem isn’t in the code or framework.
We will provide a real life instance of a business logic flaw at a major high-end clothing retailer. The flaw allowed malicious users to purchase negative amounts of expensive merchandise, and credit thousands of dollars to their accounts.
Watch a cyber-attack unfold live to show you how your vendors can unwittingly leave the door open to your network and understand how to prevent these by managing, controlling and auditing all vendor access This webcast will offer best practice recommendations on how to secure vendor access to your organization. Hear top tips on how to protect your company and customer data, infrastructure and assets from cyber-attacks by securing vendor access while improving productivity.
This webinar will offer best practice recommendations on how to secure vendor access to your organisation. Hear top tips to protect your company and customer data, infrastructure and assets from cyber-attacks by securing vendor access whilst improving productivity.
Sunil Choudrie and Laurence Pitt – Security Solution Specialists
Understand what happened, and get back on track fast
Identifying and neutering a breach is only half of the work that needs to be done – now the business needs to know what systems were impacted, clean up the damage and get things back to normal. Advanced threat technology has visibility from the cloud into network and onto endpoints. This means unparalleled visibility into not only what happened, but also what was affected and how best to clean up after a breach. A complex attack will not be simple, and it will have spread fast, but being able to understand the route taken into the network makes it simpler, and faster, to deploy a security response, and use what has been learned to ensure better preparation for the future.
Missed the first 2 webcasts?
Webcast 1: If a breach is inevitable, what should I do? How best to prevent attack, and keep bad stuff out - https://www.brighttalk.com/webcast/5691/170123
Webcast 2 - I’ve been breached, what happened? What happens when bad stuff gets in, how to react fast - https://www.brighttalk.com/webcast/5691/170133
We live in a world where technological change is rapid. There is a race against time to be faster and better than the competition. Businesses will need to change as a result of technology disruption or risk becoming irrelevant to their customers. It is during these times of tumultuous change and uncertainty when the unexpected - new attack opportunities and tools - are presented to cybercriminals to steal, harm or destroy the digital assets of organisations in an unprecedented way and scale.
In this presentation, Rik will identify the top disruptive technologies to government and business today and examine the impact of such innovations on the cybersecurity of corporate networks. He will also provide recommendations to assist organisations to prepare for the unexpected threats and challenges that will arise from technology disruption in the future.
Many security vendors claim to have access to the security intelligence and analytical capabilities needed to identify the trace elements of malware activity before cyber-attacks take place.
They claim the ability to identify threats and data breaches at the earliest possible stage. Even accepting that the average time to detect a breach has halved over the last eighteen months, a discovery and remediation timeline that is still close to 200 days is by any standards far too long.
This presentation looks at what can be done to improve things and what businesses should be demanding from there security service providers.
Patrick Grillo, Senior Director, Security Solutions, Fortinet
Advanced Threat Protection is built on the principle of Prevention, Detection and Mitigation. However, if the different technologies within each of these areas operate independently, there will be gaps between the different elements, gaps that can and will be exploited during an attack.
This session will focus the concept of bringing together all of the elements of Advanced Threat Protection to form a holistic, collaborative solution that encompasses all of the network.
Barry Fisher, Sr. Product Marketing Manager OpenDNS, now part of Cisco
Next-generation firewalls and sandboxes stop attacks at various steps, but they only react to malicious communications and code after attacks have launched.
There’s another way—observing where attacks are ‘staged’.
We’re going to demonstrate how we can visualize Internet infrastructures for visibility into where attacks will emerge. Then, we’ll know where advanced malware will be downloaded and where compromised systems will callback—before attacks launch.
In this live session, you’ll learn:
7 steps of an attack and how you can use this data to get ahead of new security events.
3 ways to uncover malicious activity by looking at domain names, IP addresses, and autonomous system numbers (ASNs).
How to apply this intelligence to your current defenses.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.