Browse communities
Browse communities
Presenting a webinar?

Strong Authentication: Transforming BYOD challenge to BYOD opportunity

Benjamin Wyrick, VASCO Data Security
Learn how today’s enterprises and SMBs can embrace BYOD as a means of improving access security and compliance.

Mobile security and BYOD practices are front and center on many IT agendas nowadays. Many CISOs and IT professionals look at the BYOD trend as a pure challenge. Certainly, figuring out how to inventory personal devices, secure the end-points, and enforce policies for data protection and compliance is not an easy task. But as challenging as the BYOD practice may seem, there is good news too. The BYOD movement is a perfect opportunity for enterprises and SMBs to enable or improve user access security with strong authentication, especially in situations where it was costly and impractical before. From home computers and laptops to cellphones and PDAs, each and every device your users bring to work can essentially turn into their strong authentication tool. Users are becoming more capable of making choices regarding how and when they work and enabling them to do so in a secure and convenient manner goes a long way.
Jul 12 2012
48 mins
Strong Authentication: Transforming BYOD challenge to BYOD opportunity
Join us for this summit:
  • Channel
  • Channel profile
  • How To Limit Breach Damage - Think Like a Hacker Apr 29 2015 5:00 pm UTC 45 mins
    Nat Kausik (CEO, Bitglass) | Rich Campagna (VP of Products & Marketing)
    Despite huge investments in breach prevention technology, data breaches have not slowed down. In just about every major breach, hackers exfiltrated data undetected over many months. Understanding the mindset and approach of cyber criminals can help you and your organization shrink the window between infection and discovery.

    In this webinar, Nat Kausik, CEO at Bitglass and Rich Campagna, VP Products at Bitglass will discuss the three major types of breaches, and the techniques used by today’s hackers to execute these breaches. You’ll learn how to identify the clues that they leave behind so that can help you identify a breach early, - limiting breach damage in the process.
  • The Hybrid WAN for Your Data Center Apr 29 2015 4:00 pm UTC 45 mins
    Mark Byers, Director of Product Marketing, Fortinet
    Almost every organization is challenged by the increasing need for more bandwidth. Cloud-based services, content-rich applications, and access to internet sites is putting more and more strain on the limited pipes coming in to your data centers. WAN Optimization had been the tool of choice to connect and manage branch office traffic. It's now more and more being used to bridge multiple Internet connections for organizations large and small to create more bandwidth in and out of their data centers. Traditional WAN Link Load Balancing has evolved from simple back up and VPN connectivity to a robust traffic management tool that seamlessly adds bandwidth using virtually any ISP technology. In this webinar you’ll learn the basics of Hybrid WANs, what they and Link Load Balancing can do for your organization, and discover more about Fortinet’s Hybrid WAN solutions.
  • SDN and NFV: Protecting the Next Wave of Infrastructure Apr 29 2015 3:00 pm UTC 45 mins
    Talbot Hack, Senior Product Manager, Arbor Networks
    As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictable, flexible, user- and service-friendly and lower cost to operate. These virtualized, software-controlled networking environments, however, do not yet benefit from the range and sophistication of DDoS protections and security available for traditional networks. This presentation focuses on how the delivery of traffic intelligence, threat detection and attack blocking is evolving, regardless of whether BGP and flow or future SDN/NFV-based techniques are in use.

    Attend this session to learn how Arbor Networks is adopting its DDoS solution suite to advance protections in SDN- and NFV-based networks.
  • Deploying Flowspec in a Service Provider Environment Apr 29 2015 2:00 pm UTC 45 mins
    Steve Walsh, Senior Security Engineer, AOL
    Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.

    In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.

    Join this session to learn:
    •Some of the different methods of deploying Flowspec
    •How Flowspec compares with alternative filtering methods
    •Best practices for secure traffic routing
  • Best Practices for DDoS Protection Apr 29 2015 1:00 pm UTC 45 mins
    Julio Arruda, Sales Engineering Manager, Arbor Networks
    DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconceptions about DDoS attacks and DDoS defense that leave too many organizations vulnerable today. One misconception is that a DDoS attack is all about size. While certainly true, modern DDoS attacks can enormous, DDoS today is more frequently targeting your applications and security infrastructure, such as your firewall and IPS. Another misconception is that DDoS defense is an either-or proposition. You handle it in the cloud through a provider, or you have DDoS defense on premise. In fact, one layer of protection is not protection at all.

    Join us for a session that will cover:
    • An overview of the current attack landscape and implications
    • Best practice defense against modern DDoS attacks
    • Lessons learned by global enterprises struck by attacks
  • Managing the unmanageable: The network security perspective Apr 28 2015 5:00 pm UTC 60 mins
    Kurt Roemer, Chief Security Strategist, Citrix; Rick Davis, Senior Sales Engineer, Citrix
    This webinar will provide strategies and best practices to secure your network and apps against threats while optimizing availability and performance.

    Computing has extended beyond the exclusive domain of the IT department - a fact that has significantly complicated security, privacy and has put tremendous pressure on today’s networks. IT managers are tasked to automate networking polices, protect against an ever growing and changing number of attacks and keep users happy with the highest level of performance.

    Attend this webinar to learn:

    - How to protect web applications with an integrated Web Application Firewall solution
    - Defend against DDoS and specific application layer attacks
    - Simplify access with SSO and securely authenticate to external applications
    - Encrypt all traffic while ensuring compliance visibility
  • Managing Cyber Risk In Your Vendor Ecosystem Apr 28 2015 5:00 pm UTC 60 mins
    Stephen Boyer, Co-Founder and CTO , BitSight; Mike Rothman, President, Securosis
    Sharing network access and sensitive information with your business
    partners could be putting you at risk of third-party breach. These
    breaches can be very damaging and may account for major losses in
    data, time, and resources. If you’re looking for a better risk
    management method, you’re not alone.

    Watch this webinar to will learn more about:

    - Security risks that could be facing your corporation today.
    - How you can utilize selection criteria to build the best solution.
    - Methods you can use to assess partner security risk.
    - How to make better risk-based decisions by factoring in the security
    posture of your organization.
  • Beware the Botnets: Botnets as an Indicator of Breach Likelihood Apr 28 2015 4:00 pm UTC 45 mins
    Stephen Boyer, Co-Founder and CTO , BitSight
    A 2015 PwC survey found that 96% of CEO’s in the US have indicated rising concern about data breaches - and rightly so. With the record-breaking breaches of 2014 barely behind us, organizations want to take steps to avoid becoming the next victim and are looking for signs that can indicate troubling performance. BitSight Technologies may have found one such indicator. Using their Security Ratings data, recent research shows a solid correlation between a company’s botnet grade and their likelihood of experiencing a publicly disclosed breach, demonstrating that Security Ratings are a powerful metric for communicating cyber risk across the enterprise.

    Join BitSight CTO and Cofounder Stephen Boyer to discuss this research and to learn why continuous security performance monitoring should be an essential part of your enterprise risk management strategy.

    Attendees will learn:
    -What is the correlation between botnet grades and publicly disclosed breaches
    -Why botnet grades vary across key industries and what the top infections are by sector
    -How Security Ratings are generated and the impact botnets and other risk vectors have on these security performance metrics
  • CyberTECH Securing the Internet of Things Forum San Francisco - Part 1 Recorded: Apr 23 2015 83 mins
    Expert panel
    This panel of security experts will discuss the internet of things and what's keeping them up at night when they think about security in 2015. After an in-depth discussion, there will be live Q&A from the audience.

    This week's panelists include:
    Darin Andersen, Chairman and Founder, CyberTECH
    Mark Rasch, CyberLaw Editor, SecurityCurrent.com
    Grant Jordan, President, Somerset Recon
  • Using Machine-Readable Threat Intelligence to Block Unknown Threats Recorded: Apr 23 2015 51 mins
    Gartner Research Director Craig Lawson and Webroot Chief Technology Officer Hal Lonas
    Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an organization recognize these threats more quickly as they emerge? How does the organization ensure that information about the latest threats is available to drive fast response at the points of vulnerability? In this program, Gartner Research Director Craig Lawson and Webroot Chief Technology Officer Hal Lonas discuss how integrating machine-readable threat intelligence into your security infrastructure can help your organization block active attacks, and even predict where future attacks are likely to come from.
  • 451 Research: Creating a Scalable Data Protection Infrastructure Recorded: Apr 23 2015 52 mins
    Dave Simpson, Sr. Storage Analyst at 451 Research, Sean Derrington, Sr. Director of Product Management at Exablox
    Part 2 of 2: Join Dave Simpson, 451 Research Sr. Storage Analyst, and Sean Derrington, Exablox Sr. Director of Product Management in a follow-up session about:
    1) Data protection trends and pain points
    2) How virtualization changes the game
    3) Array-based snapshots and replication for data protection
    4) Backup targets shift
    5) Cloud-based backup and recovery
    6) Why object-based storage?

    Did you miss Part 1: The Future of Enterprise Storage with Simon Robinson, VP of Storage at 451 Research? https://www.brighttalk.com/r/R5t
  • Overcoming the Barrier to Threat Intelligence Sharing Recorded: Apr 23 2015 46 mins
    Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group, Rich Reybok: CTO
    Your organization is constantly under cyber attack that could - if unchecked - damage your business, customers, employees and reputation. To date, the ad-hoc sharing of cyber-threat information across industries is not well defined nor well structured and in many instances, sharing threat information relevant to your organization is not allowed due to privacy, workload constraints, outdated policies or legal concerns.

    Join Jon Oltsik, Sr. Principal Analyst with Enterprise Strategy Group, and Rich Reybok, CTO Vorstack Corporation, to understand the challenges that organizations face today with sharing threat intelligence and how to navigate them both internally and externally. Come to understand what’s changed in the last few years and the historical negative stigma of information sharing. This webinar can help answer the question “What does sharing threat intelligence really mean?” Following the overview and strategy, a brief discussion on the different approaches to sharing threat information and how secure sharing within your “trusted circle” can create a simple Cyber neighborhood-watch environment. This event is designed to help you overcome the hurdles that organizations have today – that of being able to receive the available collective knowledge, validate impending cyber-threats and access remediation solutions – all within the framework of stringent data access and privacy controls.

    What you will learn:

    -Issues organizations face when sharing threat information.
    -What’s changed that has created this “need” to share threat intelligence.
    -Definition of what sharing Threat Intelligence means in today’s world of cyber crime and attacks.
    -The new approaches available for successful and secure collaboration.
    -How to participate in a Cyber Neighborhood watch with trusted industry peers.
    -The benefits organizations can recognize from collaboration.
  • Hand to Cloud Data Security Recorded: Apr 22 2015 43 mins
    Gary Watson
    Tech blogs are overflowing with examples of password hacks, data destruction, and data leakage. It’s time for a new approach. Imation’s recently-announced Secure Data Movement Architecture (SDMA) will safeguard your organization’s most valuable data against tampering, leakage, or loss - throughout its entire lifecycle including when it’s in the cloud or mobile devices, or anywhere in between. Join us as we give you a sneak peek into our new concept for painless data protection, and the rapidly evolving types of threats its meant to address.
  • Planning for anything: business continuity and disaster recovery Recorded: Apr 22 2015 51 mins
    Mike Kunz, VP of Sales, StorageCraft
    Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
  • Using Sequence Package Analysis to Detect Terrorism and Sedition Recorded: Apr 22 2015 32 mins
    Amy Neustein, Ph.D. CEO and Founder Linguistic Technology Systems
    This webinar will demonstrate how Sequence Package Analysis (SPA), a new natural language method that utilizes a corpus of annotated training data comprised of a unique set of feature extractions, may detect early signs of terrorism and sedition. Using an SPA-designed BNF table consisting of sequentially-implicative (as opposed to syntactic) parsing structures, this natural language tool searches social media content and recordings of conversations of suspected terrorists to identify (and measure) collusion, collaboration, affinity with other terror or sedition suspects. Whereas conventional text mining methods are hindered by the speech system’s failure to identify keywords (most suspects intentionally refrain from the use of keywords that pinpoint location, names, dates and time), SPA is designed to work around these obstacles in which users refrain from referring to named entities that are likely to flag their communications as suspicious.
  • Securing Wi-Fi Networks - A System Approach Recorded: Apr 22 2015 48 mins
    Kowshik Bhat, Director of Product Marketing, Xirrus
    Wi-Fi security attacks, hacking, stolen mobile devices – are these keeping you awake at nights? Are you surprised that Wi-Fi networks can be more secure than your wired networks? Wireless LAN has come a long way from the days of its inception with inadequate security.

    Contrary to common belief, security is not a single protocol or an appliance or an encryption. It is a system of different components working together to ensure your Wi-Fi network is secure and your confidential information is protected.

    Join this webinar to learn about

    - Advances in Wi-Fi security
    - Multi-layers approach to holistic protection
    - Controlling user and device access
    - Controlling applications
    -Xirrus security solutions
  • SIEM Detection & Response Cases - 3 Minute Video Recorded: Apr 21 2015 5 mins
    Tom Clare, Director, Arctic Wolf
    Briefly hear about SIEM Detection and Response Cases. For more information, watch the 30 minute webinar.
  • Leveraging the Hybrid Cloud for Complete Data Protection Recorded: Apr 21 2015 43 mins
    Jayme Williams, Senior Systems Engineer, TenCate
    Jayme Williams, Senior Systems Engineer at TenCate is protecting eight environments across the US and Canada – and each site has different storage. All sites require disaster recovery and backup across the application set. Having one solution would be ideal, but not possible – until they came across Zerto.
    Zerto Virtual Replication is storage agnostic and made it easy to integrate a new site into their disaster recovery plan. Their original business continuity and disaster recovery (BC/DR) plan, affectionately named the “Hit by the bus” book due to its volume, has been greatly simplified and the service levels they are seeing are outstanding – single digit seconds for their recovery point objectives (RPO).

    Finally, they are incorporating public cloud into their IT plans by backing up their applications from their DR site to AWS. With one solution, they can achieve their BC/DR and backup SLA, while reducing costs and introducing public cloud into their IT strategy at a pace that supports changing business requirements.

    With Zerto Virtual Replication:
    •Manage all sites in one pane of glass with one tool for replication and automation of failover, failback and testing processes as well as backup
    •Increase efficiencies with the ability to track and manage consumption across the hybrid cloud
    •Hardware agnostic solution does not require a change in the infrastructure reducing costs
    •Consistency in the BC/DR solution dramatically reduces operational costs
    •Replicates between different types of storage and versions of VMware vSphere making it easy to add new sites to the process
    •Point-in-time recovery enables failover to a previous point to recover from any issue – logical corruption, datacenter outage, etc.
    •Leveraging a public cloud strategy with backups stored in Amazon
  • DDoS Attacks: More Dangerous to You; Never Easier to Launch Recorded: Apr 21 2015 58 mins
    Christina Richmond, Program Director, IDC and Joe Loveless, Product Marketing, Neustar
    If your organization cannot afford downtime from DDoS attacks, join this timely discussion from Neustar, with special guest perspective from IDC’s Christina Richmond. Explore the complexity and purpose behind today’s attacks and what you can do to defend your Internet presence. You will learn:

    · What the DDoS threat environment looks like today
    · Why “smokescreening” is a particular danger
    · Where attacks can have impact across your organization
    · How you can take steps to thwart DDoS threats
  • Leveraging Risk, Physical and Cyber Security and Continuity Planning Recorded: Apr 21 2015 46 mins
    Eric Kretz, Director, Continuity of Operations (COOP) Division, National Continuity Programs (NCP)
    Generally, risks associated with continuity planning, from physical to cyber-security, are part of an ever-evolving threat to our systems and technologies. Continuity planning is simply the good business practice of ensuring the execution of essential functions through all circumstances, and it is a fundamental responsibility of public institutions and private entities responsible to their stakeholders. What are some of the risks associated with continuity planning? Why is managing risk important for continuity? What are some of the methods used to mitigate risks in continuity planning?

    The COOP presentation will provide an understanding of Continuity and Continuity of Operations, explain the importance of a viable Continuity capability, and emphasize the need for a viable Continuity capability in all organizations, to demonstrate some of the linkages between continuity programs and:

    • Risk Management
    • Physical Security
    • Emergency Management
    • Cyber Security/ Information Technology

    Join us on April 21 as NCP’s senior continuity practitioner shares resilient continuity programs and outreach efforts. Hear from Eric Kretz, NCP, as he talks about Information Integration: Leveraging Risk, Physical and Cyber Security and Continuity Planning.
Your Resource for Information Security Trends & Education
With over 200,000 members, the Information Security Community is the largest community of infosec professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Strong Authentication: Transforming BYOD challenge to BYOD opportunity
  • Live at: Jul 12 2012 5:00 pm
  • Presented by: Benjamin Wyrick, VASCO Data Security
  • From:
Your email has been sent.
or close
You must be logged in to email this