Valter Santos, Threat Intelligence Researcher, AnubisNetworks
Threat intelligence could mean different things to different people, but for AnubisNetworks it is defined as stopping cyber threats by providing actionable threat intelligence from the moment a breach is detected until it is solved.
By combining Cyberfeed technology, the excellence and expertise of AnubisNetworks security team, this webinar will help you understand the roadmap your organization needs to follow to keep safe against cyber threats.
In this webcast we will describe how to use Cyberfeed capabilities to leverage incident response inside an organization. With real-time alerting we will drive you on tracking a malware infection with network and host based indicators of compromise, traveling along the way with memory forensic analysis.
John Haren, Head of Information Security Governance, Risk & Compliance, Diageo
Since 2013 we have created a Security Champions network in Diageo across our 21 markets globally.Given limited resources, we had a clear vision of what we wanted to achieve and we took a top-down approach to gain support for the initiative. We developed SMART objectives with a view to slowly and demonstrably driving value for Diageo employees and management over time. This is the story of how we achieved mutual benefit both for us in the central Security team and for the market Security Champions & their colleagues. Key takeaways will include;
1: Aim for a Win-Win situation;
2: Gain support from senior management first;
3: Empower your champions;
4: Build the program into champions’ annual targets or development plans;
5: Actively drive network continuous improvement.
Peter Wood has analysed the results of all the network penetration tests conducted by the First Base team over the past year. This annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business.
Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
Martin McKeay, Security Advocate, Akamai Technologies
They say old protocols never die. Okay, no one really says that, but it’s what happens in reality. If you look around a little, you can still find organisations with token ring networks while dial-up modems still account for a small, but significant part of Internet usage worldwide. And then there are the current protocols that simply never get updated. DNS and NTP are staples of the Internet that are absolutely necessary.
Martin McKeay, Akamai’s Security Advocate for EMEA, will explore the dangers of some of the outdated and unpatched protocols on the Internet today. These antiquated communication methods are being used and abused by malicious actors to send traffic and attacks against your network. Explore how to protect yourself, and learn good network hygiene practices to make sure your organisation is not part of the problem.
Traditionally, Unified Threat Management was a network appliance with additional security functions layered on top of it- giving smaller organizations or locations a single, plug and play device that made layered security affordable, quick to deploy and simple to manage. While that value proposition is just as valuable today as it was 5 years ago, it is increasingly being extended to include additional security and networking components such as endpoint protection, wired switching, wireless access points and more.
With a recent survey reminding us that the most critical priorities of SMB owners today are top line revenue growth and increase in bottom line profitability, with an overwhelming desire for trusted IT/Security partners to manage the entirety of security and IT for them, it makes perfect sense to demand more of today’s UTM.
In this webcast we will explore:
•The results of the recent SMB owner survey
•Ways the simplicity of the traditional UTM can be extended more broadly
•Key questions to ask your trusted IT/Security provider
There is a reason Gartner views Fortinet as “Fortinet as setting the cadence in the UTM market.” Join this webcast to understand why. And why it’s important for today’s growing business.
Organisations worldwide continue to struggle to attract and retain skilled information and cybersecurity professionals. Overcoming this challenge requires a more imaginative, business and people-centric approach to the recruitment of security professionals. However, once you have the right people in place, it is imperative to retain them and use their skills to embed positive-information security behaviours throughout the organisation.
So in an era where cyber security is a C-suite business challenge, how can board colleagues work with security professionals and others within the enterprise to address these issues?
Join Steve Durbin, Managing Director of ISF Ltd, for a 45 minute webcast, where he will discuss how organisations can develop and implement an information security awareness culture that will engage with employees at all levels.
Alvaro Vitta, Principal Security Consultant, Dell Software
In this webcast, you’ll gain insights into the state of insider threats and security solutions to detect and prevent them. We’ll review the results of a comprehensive crowd-based survey on insider threats in cooperation with the 260,000+ members of the Security Community on LinkedIn. We’ll also discuss the critical importance of protecting Active Directory and its resources from insider threats and provide best practices toward that goal.
Holger Schulze, founder of the Information Security Community on LinkedIn, will review 5 key trends for insider threats, as well as the results of the 21-question survey of your IT security, compliance and admin peers, covering four main themes:
1. Insider threats and vulnerabilities
2. Threat detection
3. Security tools and processes
4. Recovery and remediation
Then, Alvaro Vitta, principal security consultant, Dell Software, will provide his take on best practices for securing Active Directory and the resources it grants access to, as well as a brief overview of Dell solutions for governance, risk and compliance (GRC).
Grady Boggs, Principal Security Specialist, Microsoft
The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
Cloud Access Security Brokers (CASBs) are one of the hottest new security technologies on the market. Recommended by Gartner, they provide visibility and control in a new IT world now based in public cloud applications and corporate data being accessed by employee BYOD devices.
Debbie Umbach, Director of Product Marketing at BitSight
As mitigating third party risk becomes an essential business function across many industries, business relationships will be tested. Organizations must now subscribe to a “trust, but verify” philosophy to ensure their third parties are secure. To verify vendor security, organizations now use BitSight Security Ratings, which are gathered externally and don’t rely on any vendor input.
On August 27 at 1:00 pm EST join Debbie Umbach, Director of Product Marketing at BitSight as she discusses the best practices for implementing vendor security ratings. Viewers will learn:
- different approaches for incorporating BitSight Security Ratings into vendor risk management (VRM) programs, whether your program is just getting started or is well underway
- how companies have used BitSight Security Ratings to notify key vendors of security incidents
- how vendor ratings can allow for more effective communication and thus greater transparency
Wade Woolwine, Manager of Strategic Services at Rapid7 | Mike Scutt, Senior Consultant, Strategic Services at Rapid7
Non-targeted, opportunistic, targeted, and insider are 4 threat types, or groupings, that have been understood by the security community at large for years. These groupings of threats are largely based on motivation, prevention, detectability, cost, and impact to those affected. On the defensive side, the concept of defense in depth where you secure the outer perimeter to prevent threats, monitor the interior perimeter for anomalous behavior, and apply tight restrictions to the most sensitive data and system has also been a proven approach to minimizing the impact of threats.
Join Wade Woolwine and Mike Scutt from Rapid7’s threat detection and incident response team to discuss how making threat groupings, the attack lifecycle, and defense in depth part of your overall security program planning can help you apply your resources in a way to maximize prevention, detection, and response for a more effective ROI.
When did we forget that old saying, “prevention is the best medicine”, when it comes to cybersecurity? The current focus on mitigating real-time attacks and creating stronger defensive networks has overshadowed the many ways to prevent attacks right at the source – where security management has the biggest impact. Source code is where it all begins and where attack mitigation is the most effective.
In this webinar we’ll discuss methods of proactive threat assessment and mitigation that organizations use to advance cybersecurity goals today. From using static analysis to detect vulnerabilities as early as possible, to managing supply chain security through standards compliance, to scanning for and understanding potential risks in open source, these methods shift attack mitigation efforts left to simplify fixes and enable more cost-effective solutions.
John Meegan, Mike Edwards & Claude Baudoin from the Cloud Standards Customer Council
When considering a move to cloud computing, customers must have a clear understanding of potential security benefits and risks associated with cloud computing, and set realistic expectations with their cloud provider. "The Security for Cloud Computing: 10 Steps to Ensure Success" webinar provides a practical reference to help enterprise IT and business decision makers analyze the security implications of cloud computing on their business. The presentation will provide guidance and strategies designed to help these decision makers evaluate and compare security offerings from different cloud providers in key areas
Tony Themelis, VP of Product Strategy, Digital Guardian
Are you ready for your next security audit from one of your most important customers? This webinar will help you gauge your readiness and identify areas you need to improve.
Sophisticated cybercriminals have identified third party suppliers and service providers as a lucrative back door to steal sensitive corporate information. Consequently, many companies are facing increasing pressure to meet stringent data protection audits from their largest clients.
Based on our experience with a range of customers who have had to meet stringent partner data protection security audits, we’ve identified the most common data protection audit questions.
– The 12 most common questions in a client data protection audit
– What the client is really looking for with each question
– Guidance on your “audit readiness”
Mike Saurbaugh, IANS Faculty Member and Rakesh Shah Senior Director of Product Marketing and Strategy, Arbor Networks
Availability is one of the core principles in the security CIA triad and one which business leaders tend to grasp more so than other technical risks associated with security. Customers want and expect access to their finances anytime and from anywhere. How is the financial industry grappling with distributed denial of service (DDoS)? What is the financial impact to an institution under DDoS attack? Are financial services firms witnessing an increase in DDoS attacks and duration? If so, what countermeasures are in place to ensure availability does not suffer?
Lastly, what is the financial services industry relying on as sources of intelligence?
Join us to hear answers to these questions and more as IANS Research and Arbor Networks present poll results from financial services’ security executive management surveyed.
Patrick Foxhoven, VP & CTO of Emerging Technologies at Zscaler and Frank Gillett, VP Principal Analyst at Forrester Research
A recent report by Forrester Research identified security as being the "top concern" for enterprise technology and business decision-makers for IoT*. While the Internet of Things offers great potential for businesses to create new services and improve operational efficiencies, it offers a greater potential for security breaches.
Join us for a compelling webcast that will walk you through the latest security insights for combating IoT risks.
We will also discuss:
- Key trends driving IoT
- Vulnerabilities within your organization that you need to be aware of
- The latest strategies and techniques cyber-criminals are using today
- What your organization can do to address these security risks
Gautam Aggarwal, Chief Marketing Officer, Bay Dynamics
Organizations spend billions on data security solutions and tools. Yet, high profile data breaches continue unabated. Join our live webinar on Tuesday, August 25, 2015 at 10:00 am PT/1:00 pm ET to find out how to identify and tackle these blind spots that put your business at risk.
Rajneesh Chopra, VP of Product Management, Netskope and Todd Partridge, Director of Product Marketing, Intralinks
Be honest: you don’t know how your employees are sharing sensitive information outside the company.
You’re not alone. Half of respondents to a recent Ponemon Research survey acknowledged they don’t have visibility into how employees are using file sharing applications. Cloud collaboration solutions make your business more productive, but without proper controls they can quickly lead to data loss, security breaches, and regulatory failures.
Join Intralinks, a leader in secure content collaboration solutions, and Netskope, a pioneer and leader in safe cloud enablement, as they discuss:
· How to uncover and secure file sharing applications being used in the organization
· Ways of enforcing regulatory compliance and governance across the enterprise, to ensure that information is always within your control
· Approaches that will help support pending data privacy legislation
Microsoft Office 365 is quickly establishing itself as the go-to productivity suite used in organizations today. However, even Microsoft maintains that Office 365 security is a shared responsibility between itself and the customer. Office 365 provides some capabilities natively, but at the end of the day, Microsoft does not take responsibility for managing mobile access, enforcing access policies, and meeting compliance requirements. Join us for an informative webinar where you’ll learn how to define, develop, and execute an Office 365 security plan while meeting all of your compliance obligations.
Your Resource for Information Security Trends & Education
With over 200,000 members, the Information Security Community is the largest community of infosec professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.