With the inevitability of BYOD and the consumerization of IT, wireless security is now more important than ever.
The increasing popularity of mobile devices and the need for cost reduction are driving Wireless LAN (WLAN) adoption. Analysts have forecast that spending on enterprise WLAN equipment will rise from $3.4 billion in 2011 to $7.9 billion in 2016, representing an 18.4% CAGR. This widespread adoption of WLANs has resulted in a more pronounced need for network application services, such as WLAN network management and security.
Neil Sundstrom, VP Wireless solutions at Fortinet, will look at the top 3 problems he sees customers facing with secure wireless access. He will demonstrate how the security of both wired and wireless networks can be managed from a single interface, including centralised policy enforcement; as well as user, device and application level visibility and control.
RecordedAug 14 201337 mins
Your place is confirmed, we'll send you email reminders
Nancy Bennis, Director of Alliances, Cleversafe an IBM Company, Alex McDonald, Chair, SNIA Cloud Storage Initiative, NetApp
Object storage is a secure, simple, scalable, and cost-effective means of embracing the explosive growth of unstructured data enterprises generate every day.
Many organizations, like large service providers, have already begun to leverage software-defined object storage to support new application development and DevOps projects. Meanwhile, legacy enterprise companies are in the early stages of exploring the benefits of object storage for their particular business and are searching for how they can use cloud object storage to modernize their IT strategies, store and protect data while dramatically reducing the costs associated with legacy storage sprawl.
This Webcast will highlight the market trends towards the adoption of object storage , the definition and benefits of object storage, and the use cases that are best suited to leverage an underlying object storage infrastructure.
In this webcast you will learn:
•How to accelerate the transition from legacy storage to a cloud object architecture
•Understand the benefits of object storage
•Primary use cases
•How an object storage can enable your private, public or hybrid cloud strategy without compromising security, privacy or data governance
Brandon Cook and Srini Gurrapu of Skyhigh Networks
Office 365 usage has tripled in the last 9 months as more and more companies enable anytime, anywhere access to Microsoft’s suite of cloud services. But security and compliance require a new level of granularity when users access cloud-based systems of record from a variety of networks, locations, and devices.
In today’s cloud-first, mobile-first world, IT Security teams are creating variable trust models based on user, device, activity, and data sensitivity. In this session, we’ll share the proven 4-layer trust model for security and compliance in O365.
Data breaches are on the rise. The constant threat of cyber attacks combined with the high cost and a shortage of skilled security engineers has put many companies at risk. There is a shift in cybersecurity investment and IT risk and security leaders must move from trying to prevent every threat and acknowledge that perfect protection is not achievable. PCI DSS 3.2 is out with an important update on data discovery and requirements to detect security control failures.
In this webinar, cybersecurity expert Ulf Mattsson will highlight current trends in the security landscape based on major industry report findings, and discuss how we should re-think our security approach.
Changed business practices, such as employees working on the move and the adoption of the cloud and cloud resources, should be mirrored by a change in security strategies. Organizations are commonly reluctant to adopt cloud technologies over concerns with security and control over enterprise data. However at the same time, many of these same organizations opened up access to applications for employees on the move, users on personal devices, external contractors, and other third parties that created a significantly larger attack surface than cloud services would have. To combat these threats, a number of cloud-friendly segmentation and application isolation techniques can be deployed to allow organizations to safely use the cloud whilst reducing their attack surface. Specifically, application segmentation via software-defined security represents a technique to accommodate borderless applications, adoption of the cloud, and modern user behaviours.
Paul German, VP in EMEA, will discuss how the challenges presented by the next generation of information security can be overcome with practical examples and best practice tips.
Sian John (Chief Strategist) & Zoltán Précsényi (Senior Manager Government Affairs) - Symantec
When a breach occurs the most damaged areas for the business are reputation, revenue and repeat business. Protecting these means having strong controls in place to prevent the breach, and clear communications if (when) it happens. The EU-GDPR requires a breach to be notified within 72 hours of discovery, strong protection process allows the business to control what/who needs to be notified, and limit potential damage.
Join this webcast to find out the latest on the General Data Protection Regulation.
Mary Jane Kelly, Security Consultant - RMG at NCC Group
While social engineering is an age-old tactic employed by con artists and attackers alike, increasing interconnectedness of social media accounts has made it easier than ever to obtain enough information to launch successful attacks such as spear phishing.
In this talk, MJ Kelly explores the emerging dangers of information exposure through social media and its increasing attack surface. She presents practical strategies for protecting yourself and your company, including social media security awareness, identity verification, and recovery from hijacked online identity.
Dr. Srinivas Mukkamala, Co-founder and CEO, RiskSense Inc.
While organizations spend huge sums of money every year to maintain a security perimeter designed to fend off cyber and insider threats, reports about breaches at organizations such as Hyatt, DNC, Twitter, and SWIFT are raising doubts about the effectiveness of these investments. In turn, cyber security insurance has emerged as a stop-gap to protect stakeholders from the shortcomings of siloed risk management processes. However, insurance policies are not a replacement for improving a company’s cyber security posture.
In this session, renowned cyber security expert Dr. Srinivas Mukkamala will outline the challenges posed by today’s dynamic threat landscape. He will explain how organizations can operationalize cyber risk management and implement a pro-active, rather than reactive, approach to threat prevention, detection and response. Dr. Mukkamala will reveal best practices in how to identify, quantify, and remediate imminent cyber risk across a growing attack surface.
Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere.
In this webinar, we'll discuss how IT can limit risk of data leakage amid changing user habits. Learn how organizations across all industries are enabling secure mobility and productivity with a zero-touch, agentless solution.
Mark Weatherford, Chief Cybersecurity Strategist, vArmour
As the global cyber threat environment continues to evolve, organizations need to begin thinking differently about information security and the protection of their infrastructure. The evolution from perimeter-centric, hardware-based environments to virtualized data centers and the cloud is underway and many organizations are late to the game. As CIO’s and CISO’s are driven to transition their CapEx investments to OpEx spending, the economic efficiencies of the cloud provide a rational path to those goals. From a security perspective however, security models that don’t sufficiently address workload and application-aware segmentation, lateral traffic visibility, and network-based threat detection of on-premises data center and public cloud-based environments leave a huge gap in the overall security posture.
This talk will provide CIO's and CISO's struggling with decisions about migration to the cloud with some thoughts about how the cloud can be the catalyst that improves security while also reducing costs and technology footprint.
With the rise of the digital business, organizations see a clear value in automating infrastructure. While automation provides more agility and speed, it also introduces new security risks. Organizations are no longer simply worried about controlling human access; authorization and authentication must be managed for every job, container, VM, service, and user. In this talk, we’ll discuss the security challenges organizations face in this new environment, and some strategies to help organizations manage, curate, and constrain cloud system resources and people when these entities are too numerous or dynamic to be managed by hand.
Matthew Yeh, Delphix, Product Marketing & Olivia Zhu, Delphix, Business Technology Consultant
A new, data-centric approach to security is taking hold. Rather than establishing perimeter defenses in hopes of repelling breach attempts, security-minded organizations are investing in technologies that protect the interior--the data itself. In particular, the combination of virtual data and data masking is proving to be a powerful way for enterprises to safeguard sensitive data from both insider and outsider threats.
View this webinar to learn:
How data masking is superior to solutions based on encryption and firewalls
What virtualized data is, and how it forms the foundation for an effective security strategy
Why integrating data masking with virtual data reduces your surface area of risk by 90%
Ransomware is dominating the headlines, and with good reason - it is one of the biggest threats to business in 2016. It hase evolved into a self-replicating and network-aware criminal attack that can destroy smaller organisations and cause havoc in businesses of all sizes. Learn how ransomware is developing, the attack vectors and what you can do to minimise your exposure.
Organisations of all sizes are being asked to deliver more with smaller budgets and limited resources. In order to manage board and stakeholder expectations, the security function needs to ensure that the elements of basic cyber hygiene which help organisations to protect their mission critical information are in place.
In this webinar, Steve Durbin, Managing Director of ISF, will provide guidance on how large and SME organisations can establish the fundamentals of cyber resilience while applying best practice solutions to maximise their budget and resources.
Healthcare has become criminals most lucrative target. Why? Because medical records are worth 10 times that of credit cards. The recent digitization of the healthcare industry has rapidly expanded the attack surface to include electronic healthcare records, patient portals, IoT-enabled medical devices and more.
Imagine losing access to all of your patient data—only to find out you are being extorted by criminals who require payment to get it back. This type of attack can disrupt life & death technologies that medical practitioners rely on to perform their jobs. Ransomware adds up to a significant threat to the healthcare industry.
But, there are steps you can take to actively reduce the number of ransomware infections across your organization. OpenDNS and Cisco are on the forefront of helping our healthcare customers against various versions of ransomware.
Hear from Barry Fisher, Sr. Product Manager at OpenDNS, to learn the simplest way for healthcare security practitioners to stay ahead of Ransomware attacks. You’ll learn how to:
-Reduce ransomware infections across your organization
-Identify the infrastructure used by attackers to connect, control and transfer the encryption keys
-Protect medical IoT endpoints, patients’ devices and even devices that don’t run agents, like heart monitors and infusion pumps
Register now to learn how to start covering your healthcare security gaps.
Istvan Rabai, Chief IT Security Officer (CISO) at Signalhorn
Signalhorn’s Chief IT Security Officer (CISO) Istvan Rabai presents an overview of present-day IT security.
The focus of this webinar will be on identifying specific vulnerabilities and measures to improve the security of a communication network.
Istvan will show - from his own first-hand experience, how an actual incident became the catalyst for the implementation of a state-of-the-art secure infrastructure that currently serves an impressive number of Government, NGO and security sensitive Corporate customers.
The webinar will cover several key aspects, but as there is no blueprint solution for all security issues, you will have the opportunity to address yours individually in the Q&A discussion at the end of the session.
This is what you will learn in this session:
- Main aspects of IT security
- Essential steps to guarantee IT security
- Typical preventive measures
- Typical redundant managed networks
- Case study: The Signalhorn IT security story
Francois Raynaud, ASOS; Greg Day, Palo Alto Networks; Steve Durbin, ISF & Lee Barney, M&S
BrightTALK caught up with some of the leading thinkers in the cyber security space to get their thoughts on how they thought a Brexit vote would influence the security industry for both the EU and the UK post referendum.
Over the last few years, there are a known 620 million user accounts that have been compromised across hundreds of sites. Organized cybercrime have figured out that this is the fastest, most reliable method to infiltrate organizations, as well as achieve financial gain. Since users share passwords across multiple sites, it is easier to find logins that work on a target site than try to bypass firewalls, find software flaws, or even run spearphishing campaigns.
These types of attacks are collectively coming to be known as “Account Takeover” (ATO). Some are simple, while others are sophisticated. Some can be stopped relatively easily, and others require much more effort.
ATO attacks (via stolen credentials) were cited as the #1 method of confirmed data breaches in both 2014 and 2015, for web applications, which itself was the #1 vector for data breaches.
Come learn what these ATO threats are, their impact to your business, how to detect them, and what you can do about it.
Ben Wilson, Senior Director, Product Management, Fortinet
During the past 15 years, access layer solutions have evolved, especially in terms wireless connectivity.
Today's wireless connectivity has multiple approaches, each better meeting the specific requirements of organisations through a choice of different architectures. Whether its a refresh, redeployment, change of application or a brand new site, there are a lot of options.
During this webinar we’ll examine different approaches and how to apply them to different verticals or deployment scenarios. As wireless connectivity continues to evolve, we will also look to the future and see how trends in new hardware can provide cutting edge solutions to meet the potential needs of tomorrow's organisations.
The presentation will end with an overview of Fortinet's Secure Access Architecture and how it can meet today's and tomorrow's wireless requirements.
Sam Fineberg, Distinguished Technologist, HPE, Ben Swartzlander, OpenStack Architect, NetApp, Thomas Rivera, SNIA DPCO Chair
This Webcast will focus on the data protection capabilities of the OpenStack Mitaka release, which includes multiple resiliency features. Join Dr. Sam Fineberg, Distinguished Technologist (HPE), and Ben Swartzlander, Project Team Lead OpenStack Manila (NetApp), as they discuss:
- Storage-related features of Mitaka
- Data protection capabilities – Snapshots and Backup
- Manila share replication
- Live migration
- Rolling upgrades
- HA replication
Our experts will be on hand to answer your questions.
This Webcast is co-sponsored by two groups within the Storage Networking Industry Association (SNIA): the Cloud Storage Initiative (CSI), and the Data Protection & Capacity Optimization Committee (DPCO).
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
The Brexit decision is leaving many boards in disarray due to a lack in contingency planning and the uncertainty that comes with this transitional period.
There are steps boards can take to ensure they are making timely decisions and fulfilling requests and questions from shareholders and regulatory bodies.
Please join us as we tackle the topic of crisis management in the wake of the Brexit referendum result.
We will offer guidance on how to draft and implement a strong crisis management plan and improve board communications during this challenging time, including:
• Becoming better informed of the situation
• Getting all relevant parties on the same page
• Deciding on what measures to take
• Ensuring all communication are secure and confidential
• Taking steps to facilitate conversations between key decision makers during times of crisis and uncertainty
Il est possible d’offrir aux utilisateurs nomades un accès simple et rapide aux applications, données et ressources de l’entreprise, sans compromettre la sécurité.
Inscrivez-vous à ce webcast en direct pour découvrir comment :
•garantir aux seuls utilisateurs autorisés et appareils approuvés l’accès au réseau de votre entreprise ;
•fournir rapidement et aisément un accès mobile sécurisé et des privilèges basés sur des rôles.
•utiliser les principales fonctionnalités de la version de firmware SMA 11.4.
Detecting and investigating malicious or unintentional activity is a time consuming effort and an inefficient use of our limited resources. All too frequently, we discover something is amiss and realize that problem has existed for a long time, yet it's just come to your attention. How can an organization increase the speed of detection of malicious activity? Can detection and investigation processes benefit from "hitting the afterburners"? Join RSA Security and (ISC)2 on June 30, 2016 at 1:00PM Eastern for a discussion on detection and investigation visibility and what to leverage to make threat detection effective.
Data protection laws in Europe, until now, have been fragmented and inconsistent. With passage of the new European Union General Data Protection Regulation (GDPR) this year, 2018 will be the beginning of widespread unification and standardization of data privacy requirements across 28 nations that now comprise the EU. Organizations should start planning now, as they will have increased obligations related to data throughout its lifecycle. The growth of data use through Big Data, Cloud, Mobile, and Internet of Things (IoT) applications has heightened the challenges of managing, securing and governing information.
GDPR requirements go into effect over the next two years, what does it mean for your organization? How does the new technology landscape factor into GDPR? How do you get started with your compliance program? What kinds of tools and assistance are available? You are not alone in the desert. Join us for some roadmap ideas to help you navigate this significant data governance challenge.
This webinar does not provide legal advice; it is designed to highlight tools, techniques, and services that can help you with your compliance programs. For legal advice, IBM recommends you consult with your own legal counsel.
Chief architects and CIOs know that API-led connectivity drives business and IT agility. MuleSoft surveyed tech leaders among its customers and discovered not only the value of IT agility, but dramatic, measurable business outcomes for organizations that adopted our approach to integration. This webinar will provide a practical approach to understanding the value of API-led connectivity within your company.
The concept of the Connected Hospital offers full integration with Electronic Health Record (EHR) systems, streamlined operations, and enhanced patient safety. Secure implementation of the capabilities that enable a connected hospital is a challenge given the diverse nature of the components involved. Hospitals, integrators and developers must work together to ensure that security is considered at each stage of a product and system life cycle. Device manufacturers and Solution Providers must ensure that their offerings have been securely engineered and have undergone sufficient testing, while health providers must work to apply defense-in-depth strategies to mitigate the threats to their systems and patients.
Join us for a panel discussion that examines the challenges associated with building a connected hospital and some of the measures taken to do so securely. We’ll hear from medical device developers, service providers, health care providers and security engineers in an attempt to make sense of the complex health environment being shaped by the IoT. Topics will include:
- Hospital concerns and approaches for enabling connected infrastructures and services
- Integrator concerns related to creation of connected systems
- Developer concerns related to smart, connected healthcare devices
- Thoughts on best practices for mitigating threats
- Chris Frenz, Director-Infrastructure, Interfaith Medical Center
- Jennifer Cathcart, Manager Cyber Security at Clinicomp
- Yogi Shaw, Medtronic
- Gib Sorebo, Cyber Security Technologist at Leidos
New breeds of malware are emerging every day. These network threats can run the gamut from minor bugs, to ransomware programs used to extort money and subject victims to the mercy of their data kidnapper. All malware is unwanted, but which types of malware are the most deadly to the health of your network?
Join Corey Nachreiner, CTO, and Marc Laliberte, information security analyst, as they discuss their Top 5 Least Wanted Malware: what they are, and more importantly, how to avoid them.
Join Martin Sugden, CEO of Boldon James and Martin Whitworth, ex-CISO and Senior Analyst at Forrester Research Inc. as they discuss the challenges faced by today’s CISO and senior security professionals, and the practical measures they can adopt to protect sensitive data assets and safeguard their reputation.
The latest data classification solutions can help protect data, reinforce good security behaviour and transform security culture. It can even optimise and enhance existing technologies such as DLP.
Using this best practice approach can help you protect your most sensitive data, ensure you stay compliant and help identify risky user behaviour – before it impacts your business.
Register now and find out more in this live, interactive webinar.
There's no such thing as infallible security, and preventing every single security breach is impossible.
But when a breach does happen, the steps an organization takes next will largely determine the damage they suffer, and how the business recovers. A security team's first reaction is often to move to eject the attackers. But is that always the right strategy? Especially when it comes to advanced threats, there is a case for biding your time, and gathering intelligence.
In this webinar, we will look at the key considerations for deciding how and when to expel attackers from the network, including:
•Why acting too quickly might cause more disruption
•Key points to consider when choosing an expulsion approach
•Critical areas to focus on when expelling attackers from the network ends
Viel zu häufig werden einfach neue Technologien gekauft, um „die Mauern zu erhöhen“ und damit das Sicherheitsniveau zu verbessern. Es ist jedoch erwiesen, dass diese Art von Investitionen nicht den gewünschten Effekt bei der Vermeidung von Datenlecks haben. Eine aktuelle Studie von Mandiant zeigt, dass 97% der befragten Unternehmen bereits Opfer von Datenschutzverletzungen waren. Was sollten Organisationen also tun?
In diesem Webinar erläutert Frank Koelmel, VP Central and Eastern Europe
bei FireEye, folgende Fragen:
- Mit welchen Methoden können Sie die Risiken für Ihr Unternehmen bewerten und diese ins Verhältnis zu den Security-Ausgaben setzen?
- Was sind die wichtigsten Schritte hin zu einer risikobasierten Sicherheitsstrategie?
- Wie und wo haben Ihre Investitionen in IT-Sicherheit den größten Effekt?
- Welche Arten von Managed Services helfen Ihnen, einen großen Teil der Herausforderungen zu lösen? Was kann outgesourced werden,
was muss intern gemacht werden?
- Welche Risikomanagement-Modelle können Sie anwenden, um
den Nutzen und die Total Cost of Ownership (TCO) der Security-Investitionen gegenüber Ihrem CIO zu demonstrieren?