Achieving harmony in a chaotic SOC environment is notoriously difficult. But harmony is critical to effective threat detection and mitigation within your SOC.
Join this webinar to see how success on the dancefloor is surprisingly similar to success in a SOC… you should start slow, then build over time (in the correct order) to achieve harmony. If you define the known threats and write rules to catch them, you’ll be left with a smaller subset of unknown threats. Hunt those down, and they’ll become known. Then, repeat the process.
The MITRE ATT&CK Framework can be an extremely useful tool to accomplishing these goals. We’ll show you how, and will give you the insights you need to start building a self-defending enterprise.
Is there really going to be a live-DJ’ing experience?
Yes. Mr Alpa will start the show with a minimalistic melody and slowly build up to reach a groovy tune in about 30 seconds from start to finish.
Why learn about the MITRE ATT&CK Framework?
A SOC is not just a set of tools or perfectly tuned rules and algorithms. Time and people are your most important assets. Train your SOC team using a common language. Then, measure your defense posture, and your SOC maturity, using that same language.
MITRE ATT&CK Framework is the common language unifying ALL InfoSec and Ops teams worldwide. It is an encyclopedia that can be used by all your security teams, enabling your organization to write prescriptive/actionable steps against all cyber threats.
Who is Emrah Alpa?
Mr. Alpa is a diehard cyber warrior. In his own words, he defends castles and builds defenses. As a recognized Thought Leader & Evangelist with 20 years of InfoSec experience, he brings forward something you can't put on paper: a passion for what he does, and a burning sense of mission.
So please join us for this webinar to discuss “DJ MITRE” and the untold secrets of its real-world SOC implementations.
RecordedMar 26 202062 mins
Your place is confirmed, we'll send you email reminders
In an ever changing IT world with new pressure to digitize corporate IT, developers need new ways of understanding and modernizing established COBOL systems. Visual COBOL 6.0 introduces new code slicing capabilities enabling developers to visually extract, refactor and build re-usable COBOL APIs for rapid deployment across the enterprise.
This latest release also features new container orchestration support using Docker and Kubernetes to intelligently manage your COBOL applications within a container architecture.
Join us on June 24 for a closer look at the next generation of COBOL technology supporting today’s modern developer—Visual COBOL 6.0. Don’t miss your opportunity to hear from the Micro Focus team, experience a live demo and pose your questions to our panel of COBOL experts!
Eveline Oehrlich, VP and Research Director, Research In Action and Michael Pott, Product Marketing Manager, Micro Focus
Services, applications and processes are more connected than ever through digital transformation. IT teams have mastered the delivery and management of services, and other enterprise functions such as HR, finance, legal, marketing are ready for a service automation revolution now. Yet, business innovation and operational excellence compete for resources with the continuous improvements around employee and customer experience, all in light of a growing skill gap. Your ability to automate IT services qualifies your team to offer and manage digital services for your business teams.
Join Eveline Oehrlich, VP and Research Director at Research In Action and Michael Pott, Product Marketing Manager at Micro Focus for a one-hour session to explore the convergence of IT, Enterprise and Operational Service Management touching on the human, process and technology requirements for such a digital service transformation journey.
Learn how to go about managing any service efficiently and effectively and get ready for intelligent service automation and intelligent services through tactical and strategic steps to your service management convergence.
Brent Jenkins, Jimmy Rabon and Dylan Thomas, Micro Focus
The Micro Focus Fortify 20.1 release, available now, provides a continued march towards the key strategic initiatives of the product suite with accelerated language support, providing end users with actionable results, continuing to expand our open source solution with Sonatype, hybrid delivery methods and shifting application security left. These initiatives and updates to the products support why Fortify was not only named a leader in the Gartner Magic Quadrant for Application Security Testing for the 7th consecutive year, but also named #1 for Enterprise organizations in Gartner’s Critical Capabilities report.
In this webinar we will cover the newest and best features of Fortify Software Security Center, Fortify Static Code Analyzer, Fortify WebInspect, and Fortify WebInspect Enterprise. These added features, along with the current capabilities, prove why Micro Focus Fortify leads the market for Application Security.
Kris Lall, Scott Vitkus, Mike Mackes, Donovan Deakin and Que Mangus, Micro Focus
As organizations look to increase business efficiencies and improve service to their customers, they’re turning to Robotic Process Automation (RPA) technology to provide businesses the ability to accomplish these objectives. But what about data that’s locked up in mainframe applications? Can enterprises leverage this data in their RPA initiatives? The answer is an emphatic yes.
Micro Focus provides a range of options for enabling the integration of host data into these RPA initiatives. Whether RPA developers prefer to integrate via web services or more traditional application programming interfaces, like HLLAPI or .NET, Micro Focus supports a programmatic interface that will optimally support the developer’s integration project.
Join us for this webinar to see how developers are leveraging host data in their RPA initiatives.
Gil Kedem, Product Manager, Performance Engineering, Micro Focus
With the change in software development practices from waterfall to Agile to DevOps, the definition of “shift-left” testing needs to expand and evolve just as the entire development lifecycle has evolved. Performance testing is becoming a team sport/effort. Everyone, including RnD, is responsible for end-to-end quality. To avoid having performance testing be a bottleneck, teams must shift-left performance testing and get the developers and devtesters invested in quality earlier.
Join this session to learn how the LoadRunner family enables shift-left performance testing with tools specifically designed for developers and performance engineers to work together seamlessly, while reusing assets, sharing comprehensive, real-time analytics, and without leaving their usual developer ecosystem. See how easy it is to plan, run, and scale performance testing leveraging existing investments in testing infrastructure.
Michael Procopio, Product Marketing Manager, Operations Bridge, Micro Focus
What are the top performing organizations doing differently to almost double their proactive detection of performance issues and to improve MTTR by 4X? Join us for this webinar on June 4th, 2020 to learn how IT Ops teams are implementing AIOps to improve their outcomes based on a study of more than 800 companies.
Join this interactive webinar if you’re interested in understanding how your organization can leverage AIOps with machine learning and big data analytics to improve root cause analysis and automate remediation across your hybrid IT environment. And, get a first-hand look at how Micro Focus extends AIOps with extensive monitoring automation and IT process orchestration. You’ll walk away with a refined perspective on the most impactful developments in the industry and receive free access to the insightful research presented in this webinar.
Andras Cser, VP, Principal Analyst, Forrester, Kent Purdy, Product Marketing & Troy Drewry, Sr Product Mgr, Micro Focus
As an organization's hybrid-cloud environment continues to expand far and wide beyond their control, the need for a zero-trust model is becoming mandatory. This higher level of digital security morphs identity verification from onetime event to a model where nothing consuming protected information is trusted by default.
In this webinar, Andras Cser, VP, Principal Analyst with Forrester, and Kent Purdy and Troy Drewry of Micro Focus discuss how the zero-trust security model has forced a new paradigm onto authentication implementations as well as best-practices to secure all of your environment.
Of course, criminals and other malicious actors are taking advantage of COVID-19. Of course. Anything is fair game to this crowd of bad actors. On top of dealing with unprecedented numbers working from home, Security Operations now must deal with the most unscrupulous group who are ramping up their attacks and targeting some of the most vulnerable amid the chaos.
When a change of this magnitude happens, you hope you’re set up to adjust, and fast. If you don’t, either your workforce is caught flat-footed, or you’re vulnerable.
These are both bad outcomes.
That’s why speed and agility are not just for Olympians (who will sadly miss the 2020 games - here’s hoping it’s just a one-year delay!). If you have the right technology setup, where it requires minimal overhead and gives the most flexibility, you give yourself a fighting chance to adjust quickly and safely, keeping folks working remotely where possible, and minimizing business slowdown.
Join Jeremy Lahners and Mario Daigle as they talk about the current Security Operations climate, new attack methods that are emerging, maybe do a little venting, and share ideas from successful customers that have managed to stay safe and productive.
Travis Greene, Director of Product Marketing, Micro Focus and David Gehringer, Principal, Dimensional Research
Micro Focus recently surveyed business and technology professionals around the globe about their experiences adopting and scaling RPA. By automating a range of processes—from HR and IT to sales, customer service, finance, compliance, and auditing—more than half of them have saved 30+ hours per week.
But how should you start RPA? What scalability challenges will you face? And—are the business benefits real? Micro Focus recently asked RPA practitioners these very questions. Join our interactive Q&A webinar to hear their answers. We’ll cover:
• Benefits to be gained—today and tomorrow—from RPA.
• Key lessons learned by early adopters.
• Critical capabilities needed to implement RPA.
• Challenges companies face when scaling RPA.
• How needs and challenges change as RPA experience grows.
Protecting resources and ensuring reliable and secure remote access to continue the delivery of vital services are of top priority for us all.
With this in mind, we are keen to proceed with our regular Educations Forums in a digital format to explore the latest industry trending topics, and how we can continue to help you accelerate and secure your journey to digital transformation.
Across the interactive sessions, you will have the opportunity to gain an enhanced understanding of how Micro Focus can help:
Secure your applications
Discover, manage, secure and govern your data
Improve identity and access management in Education
David Grant, Software Solutions Manager, Academia
Scott Leetch, Head of Fortify Sales UK&I, Micro Focus
James McCann, Secure Content Mangement Pre-sales, Micro Focus
Mick Rutherford, IAM Pre-sales, Micro Focus
Jon Taylor, Frans van Buul, Michael Coleman and Harley Adams, Micro Focus Fortify
Getting an Application Security program started takes a cultural shift, process changes, and a set of tools that don’t disrupt the speed and innovation of your software team. While many organizations have begun their AppSec journey, scaling those efforts from just a few applications to possibly thousands of applications per day come with a completely new set of challenges and issues. How can your organization make this transition from few to many with the current security resources, tools and expertise you have?
Join Micro Focus Fortify in this webinar, “Keys to Scaling an AppSec Program” to learn:
• The challenges in Scaling AppSec
• Common mistakes made by organizations today
• The keys to success in scaling
• How Fortify assists organizations grow and mature their AppSec programs
Jeremy Brown, Seniour Business Consultant, Micro Focus
Ensuring business continuity with higher quality and lower costs
•Discover and understand the user journeys of your employees.
•Identify RPA use cases and implementation requirements.
Maximising your existing Micro Focus investments
•Leverage Micro Focus test automation IP to ignite enterprise productivity.
•Use Micro Focus RPA to build your long-term digital footprint.
•What is a business process and why are people adopting RPA
•What are challenges – using ‘customer stories’ – what are the challenges for those starting RPA journey and those who have RPA – but looking to scale and identify where they can do more?
David Gehringer, Principal, Dimensional Research and Justin Vanderwerff, Product Marketing Manager, Micro Focus
Taking a Proactive “OpsSec” Approach to Enterprise Security
Effective IT Operations teams don’t just rely on their Security peers to provide guidance around enterprise security. Building off the old adage of “an ounce of prevention is worth a pound of cure”, join us as we discuss our new research detailing how businesses can identify and respond to threats quicker by employing an “Operational Security” or “OpsSec” approach to enterprise security.
David Gehringer from Dimensional Research will discuss the findings from a global survey of Operations professionals that provide valuable insights into how ITOM teams can improve their processes to ensure better security. And, learn how Micro Focus takes a proactive view on OpsSec to deliver better outcomes around risk management in the data center.
Nick Nikols, Vice President, Strategy, Micro Focus
Almost every security breach includes users as a target, source, or associated party. Organizations need to come to an understanding (quickly) that there cannot be, under any circumstances, an interruption or degradation of the user experience for internal users or customers. This is a critical element to the organization’s success. To do so, security teams will need to make security invisible and assume that everyone or every thing is not trusted until proven otherwise.
As a result, Zero Trust security is the new benchmark that organizations are setting their sights on. However, depending on who is talking about it, there is a significant difference in what constitutes a Zero Trust architecture. In turn, this creates a level of confusion in the market. Zero Trust workforce initiatives need to begin by focusing on identity, access, and data.
In this discussion, we will cover where Zero Trust is today and what we believe Zero Trust will become in the future—Adaptive Trust.
Test Automation is considered one of the key aspects to deliver the speed and reliability of any continuous delivery pipeline and yet organizations recognize that on average 20-30% of their testing is fully automated.
When asked about their major challenges to increasing automation coverage, the lack of proper skillsets combined with the cost of building and maintaining automation assets are at the top of the priority list.
In this webinar, learn how Micro Focus is using Artificial Intelligence to deliver revolutionary advances in functional testing that will enable testers to easily keep up with the speed of application changes across multiple devices and platforms while reducing the cost of building and maintaining automation assets.
Adapting for today...:
•Understanding your business challenges - interactive whiteboard discussion on how AIOps can help.
•How to build and use dashboards to monitor remote workers.
Planning for the future...
•How AIops can help improve your digital user experiences.
Paul Reid, Interset Technology Strategist, Micro Focus and Scott Taschler, Director of Product Marketing, CrowdStrike
How can you swiftly uncover and respond to elusive threats such as advanced attacks and insider threats? With the combination of Interset user and entity behavioral analytics (UEBA) and rich CrowdStrike endpoint data, enterprises like yours can now identify critical threats by learning the normal, unique behavior of every entity and detecting the most unusual or suspicious behaviors using endpoint logs.
Join us for this webinar on Tuesday, April 28 to find out more:
• Learn how Interset can leverage CrowdStrike Falcon sensor data to detect and respond to threats in your organization.
• Get an inside look into our cloud-to-cloud integration. We’ll show you real-world examples of UEBA and EDR working together to give security teams the context they need to detect signs of credential access, discovery, lateral movement, or data exfiltration quickly and effectively.
• Learn how Interset and CrowdStrike help protect businesses from threats in the time of COVID-19 and changing landscapes.
Brent Jenkins, Micro Focus Fortify and Curtis Yanko, Sonatype
It's really no secret that organizations are developing faster, doing more builds and releasing more frequently. In order to keep up with this business demand, most applications aren't built completely from scratch. Developers utilize third party, or open source components as building blocks, so they can focus their time and energy on the parts of the application that are specific to their business logic or competitive features. With an average growth of 75% over the last two years, open source component usage continues to increase at a rapid pace.
Over the past 15 years, thousands of companies such as Apple, JP Morgan Chase, and most notably, Equifax, have suffered breaches because of these open source components. This makes Software Composition Analysis (SCA) a “must-have” AppSec capability.
Join Micro Focus Fortify and Sonatype in this webinar, “Why Open Source Use is Common and Problematic” to learn:
• The State of Open Source Consumption
• The Risk Involved
• Why Software Composition Analysis is a “must-have”
• How Micro Focus Fortify and Sonatype are solving the problem
Micro Focus brings together an integrated portfolio of software, services, hardware and partner technologies to create IT management solutions, Information Management solutions, Business Intelligence solutions and Security Intelligence and Risk Management solutions that uniquely empower CIOs to leverage the new realities of a cloud-enabled world, manage business threats and risk, and deliver competitive differentiation.