Hi [[ session.user.profile.firstName ]]

How post-mortems can close the loop on IT metrics

In today’s modern infrastructure, it’s imperative to have situational knowledge about what’s going on...the good, the bad, everything. The DevOps movement has taught us that monitoring is a key component of adopting the best practices of highly efficient software delivery teams. These metrics are not only useful as context during incident management but also to analyze once an outage has been resolved.
Recorded Aug 19 2015 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Hand, DevOps evangelist at VictorOps
Presentation preview: How post-mortems can close the loop on IT metrics

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Nov 21 2017 3:00 pm UTC 60 mins
    Jeffrey Ritter
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
  • The 2018 Threatscape: Cyber clairvoyance and divination Nov 14 2017 11:00 am UTC 45 mins
    Peter Wood
    What have we learned from 2017's biggest breaches and how will we deal with 2018's emerging threats? Attempting to look both backward and forward over the cyber landscape, Peter Wood will review lessons learned and apply them to the evolving threatscape.
  • Achieving Digital Trust: Turning New Threats into Customer Loyalty Oct 26 2017 2:00 pm UTC 45 mins
    Jeffrey Ritter
    Dynamic, volatile, innovative. Cloud security is all of these and more. How can cloud service vendors turn the constant parade of new threats into a continuing opportunity to increase customer loyalty? How can customers gain trust in their service vendors despite the parade? Learn how in this webcast.
  • Seeing through the Clouds: How Visibility Reduces Security Failures Oct 25 2017 3:00 pm UTC 45 mins
    Dominic Vogel, Chief Security Strategist, Cyber.SC
    As organizations continue to ramp-up their migration to cloud-based environments, they will need to account for the associated security and control risks. There are hidden dangers and blind spots that arise through the use of virtualization technology in the data center. These hidden dangers and blind spots become more prevalent as business-critical applications are increasingly deployed on the public cloud. This is a problem considering that an organization’s operations are dependent on a cloud environment that inherently has a huge visibility gap.

    Many are now making the necessary changes to keep data secure in the cloud. This talk will focus on how to pragmatically accomplish cloud security through increased emphasis on cloud network visibility and cloud access security brokers. Enterprises that can properly implement appropriate cloud network visibility and cloud access security brokers will experience a third fewer security failures. Learn about practical steps and tools that you can use for accomplishing cloud security in your organization.
  • The Future of Cloud Security: Next Generation Threat-based Testing Oct 24 2017 10:00 am UTC 45 mins
    Peter Wood
    If your processing and data is in the cloud, how can you deliver assurance, compliance and governance? How do you find the flaws and soft spots that criminals will exploit? From browser to database, through human factors and end points, this presentation will take a threat-based approach to securing the cloud.
  • Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR Aug 17 2017 12:00 pm UTC 60 mins
    Paolo Balboni, Founding Partner of ICT Legal Consulting
    Paolo Balboni will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Balboni will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Aug 17 2017 10:00 am UTC 60 mins
    Josh Downs, BrightTALK & TBC
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • When thermostats become critical infrastructure, what will you do? Recorded: Jun 21 2017 57 mins
    Wieland Alge - GM EMEA - Barracuda Networks, Mark Harrison - Consultant - Pen Test Partners
    Would a hack on one Internet connected thermostat stop a nation? Maybe not, but imagine hundreds of connected devices being meddled with in order to cause havoc?

    Join our IOT experts to discuss the real impact of an IOT device hack. Wieland Alge, GM EMEA at Barracuda Networks and Mark Harrison, Consultant at Pen Test Partners, will look into why cyber criminals are interested in hacking IOT devices and the true impact of such an attack to organisations. Join this webinar to learn:

    • The true impact of an IOT hack
    • Methods used by hackers
    • Demos of IOT devices being hacked
    • Major challenges in protecting smart cities
    • How to mitigate these threats
  • [VIDEO] The Influence of AI & Machine Learning on the Security Industry Recorded: Jun 21 2017 13 mins
    Josh Downs, BrightTALK & Giovanni Vigna, Professor & CTO, University of Santa Barbara & Lastline
    BrightTALK caught up with Giovanni Vigna from University of Santa Barbara & Lastline for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The difference between traditional AI & Machine Learning and the tools when applied to cyber security

    - Whether the buzz surrounding the tools is legitimate

    - How the human still needs to fit into the picture when using machine learning based security techniques

    - How AI & Machine learning can be used for threat hunting purposes

    - The WannaCry virus and what it means for the ransomware landscape and how we protect ourselves from attacks

    - The value of security culture in an organisation

    - Trends in the techniques used in cyber warfare

    - The exponential growth of the IoT and what it means for securing the connected devices
  • Sharing the Data of IoT Security Incidents: 5 Keys to Improved Security Recorded: Jun 20 2017 40 mins
    Jeffrey Ritter
    Bad things happen, but the potential of IoT will be limited if those in any connected system of devices cannot share data of adverse incidents more effectively. This webcast introduces 5 keys to doing so successfully, all toward improving security across those systems.
  • Securing the Internet of Everything: The war of the coffee machines Recorded: Jun 20 2017 47 mins
    Peter Wood
    The Internet of Everything affects everyone from multi-nationals to private citizens. The universal adoption of machine to machine communications in every aspect of our lives offers criminals a hugely expanded attack surface. How do we defend ourselves without undermining the benefits of the IoE?
  • [VIDEO] Dr Jessica Barker on the Human Side of Cyber Security Recorded: Jun 20 2017 9 mins
    Josh Downs, BrightTALK & Dr Jessica Barker
    BrightTALK caught up with Dr Jessica Barker for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The WannaCry ransomware, what it means for the cyber threatscape and how to protect against similar attacks in the future

    - Improving security culture in the workplace for all your staff

    - AI & Machine Learning in the cyber security realm

    - The explosion of the IoT and how to protect all the devices on the network

    - Hacking back - the ethical standpoint
  • How to Fight Massive IoT DDoS Attacks with Multi-Layered Defense Recorded: Jun 20 2017 48 mins
    Daniel Keidar, AVP of International Pre-Sales at Allot
    The rapid growth of the Internet of Things (IoT) has led to a major increase in threats to network security. The proliferation of weakly secured connected devices has enabled recent DDoS attacks to become some of the largest and most destructive on record. They have significantly compromised network services, disrupted the quality of experience for millions of users, and threatened data security.
    Existing network security solutions have not proved effective enough to mitigate such large and aggressive attacks. Operators need to fight this phenomenon with a new, comprehensive, multi-layered solution. So join us to learn:
    •The impact of massive IoT-driven attacks
    •How service providers can protect their assets and their users
    •How multi-layered solutions provide networks with the strongest defense
    •The opportunities for operators to sell security as a services to customers
  • Understanding Latest Data Breaches: Risk & Cost Analysis Recorded: Jun 20 2017 63 mins
    John Pironti, president of IP Architects, and Michael Dalgleish, director of sales engineering at LogRhythm
    The perils of security breaches are widely publicised, but do you know exactly how an attack or breach would affect your business?

    In this webinar John Pironti, president of IP Architects, and Michael Dalgleish, director of sales engineering at LogRhythm, will discuss the costs of recent data breaches and illustrate the best ways to determine your organisation’s cyber risk profile. The duo will also teach you about the security tools and processes you can implement to strengthen your security operations.

    Watch now to learn how to take your security operations to the next level.
  • [VIDEO] Ransomware Lessons and Preparing for GDPR Recorded: Jun 19 2017 4 mins
    Chris Hodson, EMEA CISO, Zscaler Inc
    BrightTALK caught up with Zscaler's Chris Hodson for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The WannaCry malware and the lessons to be learned from the outbreak

    - Steps that cyber security and data protection professionals need to take to be ready for GDPR in 2018

    - The development of cyber warfare and what it means for the security industry
  • [VIDEO] WannaCry, GDPR and Protecting the Growing IoT Recorded: Jun 15 2017 10 mins
    Josh Downs, Senior Community Manager, BrightTALK & Paul Edon, International Services Director, Tripwire
    BrightTALK caught up with Tripwire's Paul Edon for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The WannaCry virus and what it means to the Ransomware landscape

    - The importance of a thorough backup

    - GDPR and the important steps that need to be taken

    - The explosive growth of the IoT and how to ensure that networks don't become vulnerable and get compromised

    - The ethical debate of hacking back
  • Panel: Real-Time Cyber Threat Remediation Using Network Analysis Recorded: Jun 14 2017 59 mins
    Josh Downs, BrightTALK [moderator]; John Smith, ExtraHop Networks & Tim Sadler, CheckRecipient
    According to the latest Verizon Data Breach Investigations Report, 93% of compromises occur within minutes. Traditional security tools do not have the "shutter speed" to detect and remediate these threats fast enough. By analyzing network behavior on the wire as it happens, correlating it with threat intelligence, and then orchestrating remediation actions, organisations gain the capabilities needed to conduct "hand-to-hand" combat against cyber adversaries.
  • [Video Panel] Fighting Ransomware: Lessons from WannaCry Recorded: Jun 8 2017 50 mins
    Josh Downs, BrightTALK, Darren Thomson, Symantec; Chris Ross, Barracuda Networks
    - BrightTALK at Infosecurity Europe 2017 -

    One month on from the WannaCry attacks, we'll be discussing their influence on the cyber security industry; whether it was a success for the cyber criminals and what organisations could've done to be better protected.

    This expert panel will cover how the ransomware spread, why there's been an explosion over the last few years, why businesses are especially vulnerable and how the malware is more and more intertwined with crypto currencies.

    Fighting Ransomware was a top priority on security professionals' minds in 2016 and that will only continue into 2017. Tune into this live panel to get insights and takeaways to protect your business from the threat of ransomware.
  • [Video Panel] Protecting the IoT: Threats, Vulnerabilities & Solutions Recorded: Jun 7 2017 48 mins
    Josh Downs, BrightTALK, Patrick Grillo, Fortinet, Danielle Cattedu, CSA & Marc Laliberte, WatchGuard
    - BrightTALK at Infosecurity Europe 2017 -

    IoT networks grow by the day - prompting sleepless nights from security professionals the world over. As more and more devices join the network, how can we ensure that they're not becoming the latest weak link in the network?

    This expert panel will look at vulnerabilities in the IoT, those that are more obvious and those that perhaps aren't. It'll also cover the latest threats targeting IoT networks; the mechanisms and techniques that are being used and how to stop them.

    The IoT will be critical to business and consumer life from hospitals to connected cars to factory floors. Security and privacy remain key concerns and this panel will break down what the explosion of IoT networks will mean for security professionals.
  • Splunk and Gartner: Use an Analytics-Driven SIEM for Targeted Attack Detection Recorded: Jun 7 2017 62 mins
    Girish Bhat, Splunk Director of Security Product Marketing; Kelly Kavanaugh, Research Analyst,Info Security & Privacy,Gartner
    Description : It's no longer a question whether an organization will be breached -- it's a matter of when. According to Gartner, organizations are failing at early breach detection, with fewer than 20% of breaches detected internally.* The time to detect a compromise can takes days, or even months.

    Join this webinar to hear Splunk and Gartner discuss the strategic role of SIEM as a centralized solution and why organizations need to move from prevention only solutions to detection, response and remediation.

    In this session, Gartner research analyst Kelly Kavanagh will address:
    - Challenges facing organizations when it comes to advanced threats
    - The resources and technologies needed
    - Best practices on how organizations can leverage SIEM and lean-forward technologies like user and entity behavior analytics
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How post-mortems can close the loop on IT metrics
  • Live at: Aug 19 2015 3:00 pm
  • Presented by: Jason Hand, DevOps evangelist at VictorOps
  • From:
Your email has been sent.
or close