Right Time Experiences – The Future of Big Data, Analytics, and Mobile

Manage webcast
Maribel Lopez, Founder, Lopez Research; Benjamin Robbins, Co-Founder, Palador
The rise of mobile, social and cloud has changed customer and employee expectations. Customers expect companies to respond to issues and opportunities in real-time. Employees expect the business to provide access to meaningful information on the go and at the time of decision. Transforming business processes is about delivering valuable insights from data in real time. Mobile processes must be coupled with big data tools and real time analytics to store, analyze and convert company and external data sources into context related to the customer, the market or situation.

Come join us August 8th to hear how the future will see a combining of mobile, big data and analytics (with help from the cloud) to deliver Right Time Experiences.
Aug 8 2012
46 mins
Right Time Experiences – The Future of Big Data, Analytics, and Mobile
Join us for this summit:
  • Channel
  • Channel profile
  • Security Transformation: The Current Evolution and How to Manage It Aug 12 2015 4:00 pm UTC 45 mins
    Justin Somaini, CTO, BOX
    The need for a Security Transformation in the enterprise has been clear to our industry for quite some time and the struggle to protect our data in today’s business environment has been a main focus. At the same time, in an increasingly mobile-centric workforce, organizations are dealing with the shift from analog to digital and require more compliance and policy to protect against breaches, lack of transparency and accountability. To keep up with these changing demands, IT decision makers and their organizations must be more agile, manageable and responsive to a different set of challenges that arise. Join this session to hear Justin Somaini, Chief Trust Officer at Box, detail what security transformation will look like in the coming year and how it will redefine the responsibilities of vendors, cloud providers, and security practitioners to resolve one of the most significant security problems of the past 40 years.
  • Why Security Starts with Identity in Today’s Mobile Enterprise Aug 12 2015 3:00 pm UTC 45 mins
    Richard Walters, GM and VP, IAM & Alex Smith, Director, IAM Products, both Intermedia
    With users expecting 24x7 access to web applications and data from all types of mobile devices and from any location, it’s not a surprise that data security is still a key focus for most enterprises. How do you reduce risk by bringing contextual information into the authentication process?

    Join us and learn how to:

    •Address the authentication and authorization management challenges in today’s mobile enterprise

    •Limit access to applications to approved or trusted devices

    •Automate changing of passwords to ensure they are complex and unique across all accounts

    Register now!
  • DNS Firewall: Securing Networks In a Rapidly Changing Landscape Aug 12 2015 2:00 pm UTC 45 mins
    Michael Kaczmarek Sr. Director, Product Management, Verisign
    Cyber threats are at an all-time high, presenting numerous challenges to organizations and end users. Additionally, with the increasing importance of mobile devices and Bring Your Own Device (BYOD) initiatives, endpoint management and security is becoming more critical. In light of these trends, proactively protecting against threats is a constant and ever-changing battle. Verisign DNS Firewall is a cloud-based network security and threat intelligence service built upon our global recursive DNS platform that offers robust protection from unwanted content and malware as well as customizable filtering down to the individual DNS level. Verisign DNS Firewall provides organizations with the opportunity to secure the rapidly growing landscape of devices on their networks with a single, simple modification – an update of the recursive DNS settings.
  • Going Mobile? The Shifting Native SSO Landscape Aug 12 2015 1:00 pm UTC 45 mins
    Paul Madsen, Principal Technical Architect, Ping Identity
    Delivering a Single SignOn (SSO) experience to users of native applications is becoming more and more critical as the number of such applications grows. We'll cover the best practice for native applications authenticating to restful APIs, the different models for enabling SSO across such applications, and how recent enhancements to the mobile OSs promise to offer to a nice balance between usability, security, and deployment ease.
  • Top 10 Android Application Vulnerabilities Aug 12 2015 9:00 am UTC 45 mins
    Erez Metula, Founder & CEO of AppSec Labs
    Android apps handle our most sensitive data – private conversations, financial information, phone calls, SMS, geographic locations. You name it… the question is – can we really tell whether they’re secure? Who can assure us they are not spying on us? Can they be abused? Erez will answer those questions, focusing on Android mobile apps and their common vulnerabilities.

    This session will be all about the security of such applications, how they can be hacked, the common mistakes developers do, and how to avoid such mistakes.
  • Twelve Recommendations for Your Security Program in 2015 Aug 11 2015 7:00 pm UTC 45 mins
    Rick Holland - Principal Analyst, Forrester Research and David Dufour - Sr. Director of Security Architecture, Webroot
    In 2014, Forrester Research saw a significant shift in customers’ awareness of cybersecurity risks. In response, Forrester has developed strategic and tactical recommendations for enterprise security programs in a March 2015 report entitled “Twelve Recommendations For Your Security Program In 2015.” In this webcast, guest speaker Rick Holland from Forrester and Webroot’s David Dufour will review and discuss those recommendations, with a particular focus on the use of big data and threat intelligence, and the impact of IoT.
  • The Trustworthy Cloud Aug 11 2015 5:00 pm UTC 15 mins
    Michael Quinn, General Manager, Cybersecurity & Data Protection, Microsoft
    Decades of experience in fighting cybercrimes has greatly informed how Microsoft develops products. Michael Quinn (General Manager, Cybersecurity & Data Protection, Microsoft) discusses the features, policies, and practices that make the Microsoft Cloud so secure and set it apart from other options on the market.
  • Quantum Random Number on a Smart Phone Aug 11 2015 3:00 pm UTC 45 mins
    Yuri Andersson, Tech Startup Entrepreneur, CryptaLabs
    Today's problem is that all MOBILE DEVICES use Pseudo Random Number Generators, which is true of any brand or type. This exposes devices to potential mobile attacks. However, tomorrow's problems are that societal shifts will manage more of our personal data on mobile devices and this will become acute with the Internet of Things set to increase the number of devices that are connected.
  • Best Practices for Securing the Mobile Employee Aug 11 2015 3:00 pm UTC 45 mins
    Himanshu Verma, Director, Authentication-as-a-Service, Gemalto
    Join us on August 11th to gain expert advice on enterprise application and mobile security. Here you will learn market dynamics, possible risks and effective solutions you can use while working within your budget.
  • Challenges to Stay Secure in the Era of Digital Business Aug 11 2015 2:00 pm UTC 45 mins
    Marcelo Pereira, Product Marketing Manager, Secunia
    The era of digital business is bringing a lot of opportunities for organizations. At the same time, it is bringing new challenges for those in charge of securing companies’ assets: customer data, intellectual property, and infrastructure.

    The digital business environment requires a new approach to security. An approach that focuses on supporting the business to achieve its desired outcomes while ensuring that what really matters is protected from the reach of hackers and criminals.

    In this webinar we will look into two distinct areas of IT: Enterprise Application and Mobility and the vulnerability landscape around those to discuss some of the challenges security professionals are facing today.
  • An Offensive Strategy for Today's Cyber Warzone: Winning With Cyber Campaigns Aug 3 2015 8:00 pm UTC 60 mins
    Chris Inglis, former Deputy Director of the NSA and Al Corchuelo, President, Recruit Leaders LLC
    In this webinar, Chris Inglis, former Deputy Director of the NSA will share research and actionable insights on:

    -What it takes to build a winning cyber security strategy

    -Why cyber campaigns are much more effective than reactive cyber tactics

    -How to enhance your organization's cyber security profile and maintain a sustainable security posture

    About Chris Inglis:

    Mr. Inglis retired from the Department of Defense in January 2014 following over 41 years of federal service, including 28 years at NSA and seven and a half years as its senior civilian and Deputy Director. Mr. Inglis began his career at NSA as a computer scientist within the National Computer Security Center followed by tours in information assurance, policy, time-sensitive operations, and signals intelligence organizations. Promoted to NSA's Senior Executive Service in 1997, he held a variety of senior leadership assignments and twice served away from NSA Headquarters, first as a visiting professor of computer science at the U.S. Military Academy (1991-1992) and later as the U.S. Special Liaison to the United Kingdom (2003-2006).
  • How the United States Postal Service secured their email channel against fraud Jul 30 2015 6:00 pm UTC 30 mins
    Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service
    Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.
  • Hunting Hackers in the Carding Underground Jul 30 2015 5:00 pm UTC 45 mins
    Grayson Lenik, Director of Digital Forensics and Incident Response at Nuix
    The rise in e-commerce data breaches over the past year raises important questions: Why is cardholder data such a big target, how do the bad guys get in and why are we seemingly powerless to stop them?

    This session will examine the black market for card data, the three most common attack vectors, and the wrong way to encrypt databases.

    You will see real-world examples of malware discovered during investigations and gain insights into the skill sets of each attacker.
  • Contextual Analytics: A Deep Dive into the Contextualization of Threat Data Jul 30 2015 4:00 pm UTC 45 mins
    David Dufour, Senior Director of Security Architecture, Webroot
    This presentation will provide an overview of contextualization and how contextualized data can be used to prevent both known and unknown threats. It will dive deep into the technologies used in the collation and analysis process across both single and multiple threat types. It will conclude with real world use cases where contextualized data can help identified and prevent threats.
  • Internet Security Best Practices From The Global 1000 Jul 30 2015 4:00 pm UTC 60 mins
    Daniel Druker, Chief Marketing Officer at Zscaler
    The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down.

    So what can you do today to keep your security ahead of these trends?

    This webcast will discuss actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO.

    We will also talk about:

    - The latest strategies and techniques cyber-criminals are using today
    - Concrete steps you can take to keep your organization safe
    - What to do about Internet security in today's cloud and mobile first IT landscape
  • Insider Threats: Out of Sight, Out of Mind? Jul 30 2015 3:00 pm UTC 60 mins
    Matt Zanderigo
    Insider Threats represent a major security blind-spot where an increasing number of today’s security incidents occur. Highly publicized insider data theft, such as the recent Morgan Stanley breach or AT&T call center incident, highlight the increasing need for better security practices and solutions to reduce the risks posed by insider threats.

    Detecting insider threats has become increasingly difficult with the large volume of data generated through normal user activities and lack of visibility into actual user behavior. Most organizations rely on system logs from applications and devices that typically contain hundreds or thousands of discrete events in obscure technical language, making it nearly impossible to determine what a user actually did.

    Join our upcoming webinar “Insider Threats: Out of Sight, Out of Mind?” to learn about the most popular tactics to combat insider threats and how to identify indicators of insiders becoming threats. This webinar will share best practices and how to adopt an early warning system to reduce your risk and strengthen your security posture.

    When: Thursday, July 30th @ 11am EDT

    • Insight into the state of insider threats
    • Most popular tactics to combat insider threats
    • Reduce the risks posed by insider threats
  • Surviving the incident response surge: Detecting and Investigating Incidents Jul 29 2015 6:00 pm UTC 60 mins
    Christian Kirsch, Principal Product Marketing Manager, Rapid7
    As security incidents grow in frequency and complexity businesses struggle to be prepared to respond and mitigate the threat. Incident detection and response is expected to take up the majority of security budgets by 2020 but solutions are siloed and specialized staff is hard to hire and retain. How can security professionals who may not be experts in incident response detect and assess the scope of potential incidents or breaches effectively? This case study will explore this question leveraging real-world examples that illustrate how to confidently detect and respond to security incidents 10x faster.

    Participants will learn:
    · Methods for simplified discovery of anomalous user behavior

    · Strategies for enabling fast incident response decisions

    · How to cope when bombarded with false positive alerts

    · Common attacker methods (and why they’re so often successful)

    · Why you need to monitor privileged and risky accounts
  • Constrained or Unleashed:Is your Identity Mgt Ready for Consumer-scale Business? Jul 29 2015 5:00 pm UTC 60 mins
    John Hawley, Vice President of Security Strategy at CA Technologies
    Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.

    As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.
  • Sophisticated Incident Response Requires Sophisticated Activity Monitoring Live 60 mins
    Mike Sanders, Principal SE and Team Lead, Imperva and Bryan Orme, Principal, GuidePoint Security
    Are you prepared for a data breach? Are you confident you will find a breach in a timely manner? Facts are over 70% of businesses report a security breach and 75% of breaches are undetected for days or even months. Once discovered, incident response teams are under extreme pressure to close the breach, figure out what happened, what was lost, and calculate the risk. Organizations need a sophisticated incident response plan.

    Attend this webinar and learn how to:
    · Discover sensitive data, risk, and vulnerabilities
    · Detect and block active attacks
    · Investigate incidents and automate remediation
    · Demonstrate consistent policy application across all sensitive data
  • Data Security in 2015: Is it getting better? Recorded: Jul 29 2015 49 mins
    Graham Cluley
    Join data security expert Graham Cluley as he presents a mid-year review of the information security stories that have made news so far in 2015, and how the predictions he made in our January webinar have fared.

    With over 300,000 new pieces of malware created every day, company data has never been at greater risk. Hear from Graham about the vulnerabilities and risks that remain, and what organizations can do to address them.

    All webinar registrants will receive a copy of Graham’s report “Information Security in 2015: Just how much worse can things get?” on 2015 threats and keeping your data safe.
Your Resource for Information Security Trends & Education
With over 200,000 members, the Information Security Community is the largest community of infosec professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Right Time Experiences – The Future of Big Data, Analytics, and Mobile
  • Live at: Aug 8 2012 4:00 pm
  • Presented by: Maribel Lopez, Founder, Lopez Research; Benjamin Robbins, Co-Founder, Palador
  • From:
Your email has been sent.
or close
You must be logged in to email this