Retain Archiving & Office 365: Ensure Your Data Archive is Complete & Compliant
Microsoft Office 365 offers customers a wide range of products and services with one monthly subscription fee. However, their one size fits all approach to digital archiving and compliance might not be suitable for everyone.
Join this webinar to learn:
• How Micro Focus Retain Unified Archiving and eDiscovery can augment governance across all your digital communications
• Provide coverage across more internal, mobile, and social communication platforms
• Decrease costs and improve usability and performance for multiple user bases
RecordedJun 9 202050 mins
Your place is confirmed, we'll send you email reminders
The upcoming “2021 State of Security Operations Report” from CyberRes, with insights collected from over 500 SecOps decision-makers (CISOs, SOC Directors, etc.) from across the globe, will offer a timely perspective into how security operations has changed in the past year and what these changes mean for security operations teams moving forward.
Join us for this webinar with CyberRes Chief Technology Officer, Mark Fernandes, where we’ll discuss the results of the report and their implications, with a focus on people, processes, business perspective, and technology.
Topics will include:
• Cloud migration
• Threat intelligence
• Cognitive technologies
• Threat modelling frameworks (MITRE ATT&CK, etc.)
• How COVID-19 has changed SecOps policy and administration
• And more…
Michael Echols, Senior Cybersecurity Executive and Critical Infrastructure Protection Strategist
Federal agencies are now moving rapidly to plan and implement programs to meet the aggressive schedule required by the Executive Order on Improving the Nation's Cybersecurity. The recent software supply chain attacks and multiple, large entity ransomware attacks have highlighted that Federal agencies are as exposed as commercial organizations—although Federal agencies’ technology complexities are unique and very challenging to rapidly evolve.
Join us for this fireside chat on Tuesday, July 27 to hear from experts who have helped Civilian and Defense agencies work through complex cybersecurity implementations. We’ll discuss how agencies can most efficiently and effectively implement near-term and longer-term answers to the new requirements on:
• Real-time Adaptive Access Management
• Critical Data Pseudonymization
• AI-driven Detect, Respond, Recover, and Protect
• User and Entity Risk Based Incident Detection
• Threat Information Sharing
• Software Supply Chain Security
About the presenter:
Mike Echols is a senior cybersecurity executive and critical infrastructure protection strategist working with corporate leaders and government officials to make the nation more resilient. He is leading a revolution to stand up and support Information Sharing and Analysis Organizations (ISAOs). As such, Mike leads a global effort to harmonize cyberthreat information sharing. While serving in the government, Mike managed cyber resiliency programs for the US Department of Homeland Security while assisting in the advancement of risk reduction. And as the point person for the rollout of President Obama's EO 13691, Mike developed a national program for ISAOs. In 2020, he released the book Secure Cyber Life: The Government Is Not Coming to Save You.
Alistair Rigg, Sr Global Product Manager, Voltage, Micro Focus and Vikas Jain, Product Manager, Security, Snowflake
The CyberRes team from Micro Focus invites you to join our upcoming webinar to learn how the integration between Snowflake, the Data Cloud, and Voltage SecureData enables a complete cloud-native solution for high-scale secure cloud analytics.
During this session, we will discuss our partnership with Snowflake and how the integration adds to Voltage SecureData’s deep capabilities in secure analytics across data warehouses, databases, and data lakes. By the end of the session, you will understand how this integration benefits existing SecureData customers by permitting the use of data protected by Voltage in Snowflake. Similarly, Snowflake customers can take advantage of Voltage format-preserving data protection to enable data privacy and secure analytics.
Rick Wagner, Director, Product Management and Patrick Gookin, Sr. Product Manager, Micro Focus
Identity and Access Management today is too hard. There are too many manual processes, too many poorly equipped decision makers, and too many resources required to create and maintain roles and policies. There has to be a better way.
Attend this webinar to learn how autonomous IAM will radically change how we do IAM. Autonomous IAM combines advanced analytics (including artificial intelligence and machine learning) with modern automation. You'll hear about the different stages in the autonomous IAM journey, including:
• AI-based recommendations
• Continuous access review and certification
• Anomaly detection and automated remediation
• Augmented identity lifecycle management
• Intelligent IAM roles and access policies
• Access discovery
Brent Jenkins, Director of Product Marketing and Dylan Thomas, Director of Product Management, Fortify
The CyberRes Fortify on Premises 21.1 release provides a continued march towards the key strategic initiatives of the product suite. It features accelerated language support, known vulnerability detection, dynamic automation, and enterprise scale and stability. These initiatives and updates underscore why Fortify continues to be a leader in the application security industry.
In this webinar, we will cover the newest features and capabilities of our on premises products: Fortify Software Security Center, Fortify Static Code Analyzer, and Fortify WebInspect.
Register now to discover how Fortify helps build secure software fast.
Ali ElKortobi, Director of Product Management and Eric Popiel, Chief Technologist for Cybersecurity, Micro Focus
Data privacy laws have changed the landscape of test data generation and management. Companies using production data with personal and sensitive structured data in test/dev environments are NOT compliant with the GDPR , CCPA, KVKK, and other global data privacy regulations.
Learn how Micro Focus Voltage provides a comprehensive solution to address your privacy governance needs with sensitive structured data. It automates data privacy and protection of sensitive, regulated production data for use in test development pipelines for functional app testing, training, QA, and related use cases. Voltage portfolio puts data at the center with continuous processes from data discovery to disposition.
Please join Ali ElKortobi, Director of Product Management, and Eric Popiel, Chief Technologist for Cybersecurity from our Voltage portfolio, who will discuss these important features from the customer point of view:
• Discover private data in databases
• Ensure data privacy in non-production environments
• Anonymize data for secure use whether for analytics, test, or other use cases
• Shield real data sources with a protected Test Data Repository containing real fake data
• Ensure that the real sensitive data is secure
Steve Maxwell, Solutions Enablement Specialist and Gamze Bingöl, Product Marketing Manager – SecOps, Micro Focus
There’s a perfect storm brewing around cybersecurity. The amount of incoming data was already increasing, but now it is expected to grow 5 times over by 2025. With the volume of data overflowing, organizations must take additional proactive measures to protect themselves from known and unknown vulnerabilities.
Using centralized, automated, intuitive dashboards for security log management is a SecOps best practice and is integral to achieving company-wide security event visibility and maintaining compliance. We understand your needs and have developed cloud-based security log management to bring simplicity and flexibility for company-wide monitoring, event visibility, and reporting.
In this session, you’ll see ArcSight Recon in action and discover how your organization can leverage ArcSight Recon for continuous log management and ease the burden of compliance requirements from a security-specific perspective.
Michael Mychalczuk, Product Management Director, Security Operations, Micro Focus
Cloud-native and SaaS deployments of SIEM software are more important than ever if you want to reduce your hardware footprint. ArcSight 2021.1 delivers key components to help your organization achieve this outcome and become “security operations SaaS enabled.” With this new offering, ArcSight provides organizations with more complete and resilient security coverage.
Join Michael Mychalczuk as he presents the key features and benefits of ArcSight 2021.1, including the importance of SaaS in your security toolkit. He will also provide insights into the evolution of ArcSight as it is being transformed, containerized, and SaaS-enabled to better serve your security operations needs.
Anmol Rastogi, Product Management and Anandyita Sinha, Developer, Micro Focus
Join us to learn how NetIQ Change Guardian from Micro Focus can help you monitor critical files, systems, and applications in real time across hybrid environments to detect unauthorized privileged activity.
In this webcast you will learn the latest features available in NetIQ Change Guardian v6.1 that can enhance your ability to identify and thwart malicious activity faster. The latest version capabilities in NetIQ Change Guardian, include:
• The ability to investigate security events using improved parameter details
• The ability to centralize SSL-based LDAP connections from a central console
• The ability to report agent information from multiple servers
• The benefits of support for Hyper-V 2016 and 2019 virtual machine environments
In any annual trend list, there are almost always a few surprises. After all, most trends are a continuation of what was important just a month or so ago. In addition to the latest trends, we on the Fortify team continue to focus on our holistic AppSec vision of delivering excellence on foundational elements as well. This includes broad and accurate language coverage, an integration ecosystem that creates as little friction as possible fitting AppSec into the tools our customers already use, and end-to-end application security that supports SaaS and on-premises deployments.
Join us for this webinar where we’ll review the trends, features, and capabilities our customers are asking us to focus on and deliver this year and beyond.
Kent Purdy, Access Product Marketing Manager and Richard Cabana, Senior Solutions Architect, Micro Focus
APIs are often used to act on behalf of users by inheriting their permissions for a variety of software tasks. To understand why APIs today present such unprecedented risk, in this webinar we’ll review historical and present-day practices that organizations use to implement them.
• Growing trends of where and how APIs are being consumed—both today and in the future.
• The top five breach hazards that APIs are exposing within organizations.
Because APIs provide discrete access to backend data that is often sensitive, the need to ensure the right level of security is as imperative as any other type of online access. In this context, we’ll discuss the latest access management technologies available to ensure reliable delivery of API services while protecting the organization from outsider threats and making them more cyber resilient.
Carole Murphy, Micro Focus Voltage; Juan Asenjo and Jeff Kerpics, Entrust nCipher
Market research indicates that the majority of enterprises have a multi-cloud and/or hybrid cloud strategy. Due to COVID, over half of enterprises now expect cloud usage to exceed prior plans. Recognizing the pressures of data breaches and regulatory compliance, cloud service providers have started to offer their own data security solutions—each with a different approach and a potentially confusing array of capabilities.
Watch this webcast to discover:
• Why multi-cloud and hybrid deployments present challenges for data protection and privacy
• What solutions are available to ensure data privacy, no matter the deployment scenario
• How to safely migrate to large-scale, cloud-based data analytics and other services
We’ll also show you how to leverage Voltage SecureData enterprise-grade cryptographic services and stateless key management together with Entrust nShield hardware security models to establish a root of trust to support data privacy in enterprise hybrid, multi-cloud and cloud agnostic models.
Tim Sedlack, Director of product Management and Charles Davis, VP of Engineering, Micro Focus
Configuration drift for user policies happens when user entitlements and access to resources change gradually over time. Within deeper levels of an organization’s applications and infrastructure, maintaining consistent security policy enforcement is critical.
Attend this webcast if you're in charge of systems such as Microsoft Active Directory (AD) to learn how NetIQ Universal Policy Administration from Micro Focus can help you more easily manage Group Policy Objects in both on-prem and cloud-based environments.
Steve Lipner, SAFECode, John Pescatore, SANS Institute, Rob Aragao and Stan Wisseman, Micro Focus
The need to ensure a secure software supply chain is nothing new, although recent events have shined a spotlight on the topic. Organizations are now looking to better understand what they should be doing to drive better security into their development pipelines.
SAFECode and SANS have guidance intended to help developers achieve supply chain security, and to help customers gain confidence in the security of their supply chains.
Hear about some of the work being done across the industry to support both suppliers looking to improve their supply chain security practices and customers seeking to evaluate and manage their own risks.
We will cover:
• Components of a software supply chain
• Approaches to consider
• Cultural changes needed
• Open source impact
Rob MacDonald, Director of Solutions Marketing, Micro Focus and Mike Raggio, CISSP, Cloud Security Expert, CloudKnox Security
The COVID-19 pandemic has caused an extreme shift in the way organizations and their employees work. With many moving to a hybrid or fully remote workforce, identity and access management must be a key part of the security strategy—ensuring governance no matter where employees are located or what devices they’re using.
In this panel webinar, we’ll take a closer look at what the pandemic has meant for IAM adoption, and will identify trends around IAM as technologies, such as IoT, single sign-on and biometrics, move deeper into the IT environment.
Stephan Jou – CTO, Security Analytics, Micro Focus
Did you know that what happens in your development environment can tell you a lot about how safe your intellectual property is? For example, engineers accessing source code is a normal activity. However, there might be abnormalities in terms of who accesses what, when it happens, how often it happens, etc. Spotting anomalies quickly is critical to mitigating threats to your assets. Given the tsunami of data, it hasn’t been easy until now. Find out how AI-powered behavioral analytics can help stop bad actors in their tracks.
You will learn about:
• How the SolarWinds event reminds us that protecting our build, deploy, and engineering infrastructure is critical
• Real-world case studies in the use of AI to detect these classes of attacks
• The underlying techniques, data science and mathematics used in those use cases
• Pragmatic next steps to help harden your source code and other intellectual property repositories
Craig Robinson, Program Dir, Security Services, IDC and Stan Wisseman, Head of NA CyberSecurity Strategist Team, Micro Focus
Traditional Security Operations Centers have also focused on protecting the business but have not had a clear goal to enable the business. In today’s world enterprise resiliency is paramount for organizations to “Pivot to Prosper”. To drive accelerated growth during times of adversities, the goal of the modern CISO is to pivot the cyber resiliency capability to support business growth, transformation, and overall enterprise resiliency. Intelligent (Business Oriented) Threat Operations is the next-generation evolution of the traditional Security Operations Centre.
During this session, Stan Wisseman (Head of North American CyberSecurity Strategist Team, Micro Focus) will have a discussion with Craig Robinson (Program Director, Security Services, IDC) on how SOCs need to evolve to support the business and how operations can be more business-centered to play a role in driving enterprise and cyber resiliency.
Curtis Price, Program VP, IDC and Satyavathi Divadari, Micro Focus
As hyper scale digital transformation takes stage, organizations are exploring new and exciting ways to drive market growth and leadership by being more innovative. Covid-19 has moved most of the public and consumers over the digital fault line, where traditional physical channels are rapidly moving to digital channels.
During this session, Satyavathi Divadari (Chief Cyber Security Architect, Micro Focus) will have a discussion with Curtis Price (Program Vice President, Infrastructure Services, IDC) on how organizations can secure their value chain and build trust in enabling technologies such as Cloud, Artificial Intelligence and Block Chain.
Tom Burt, Senior Product Manager and Lara Bender, Product Marketing Manager, Micro Focus
We’ve modernized Identity Manager for the cloud, improved performance and usability, and added new license entitlements that give you more value for your investment.
Come see what you may have missed! Join our product management team to learn about:
• Performance and scalability improvements that make it easier to configure, use, and manage Identity Manager
• A modernized interface for building forms to automate provisioning, resulting in reduced complexity and faster time to value
• A new licensing entitlement to NetIQ Identity Governance to help you detect inappropriate access, orphaned accounts, and separation of duties violations
• Enhanced support for cloud environments, including new drivers for Workday and SCIM applications, containerization for Identity Manager, and a new Identity Governance as a Service offering
Ted Ernst, Director of Product Management, Rajesh Nagella, Product Architect and Amie Johnson, Product Marketing, Micro Focus
Improperly managed and controlled identity privileges are common security vulnerabilities. That's why your organization trusts Micro Focus to provide the latest privileged access controls for your risk management program.
This Micro Focus webcast is geared for customers that use NetIQ Privileged Account Manager, and/or other security solutions from Micro Focus. Attend this event, to learn about the latest updates enhancements to NetIQ Privileged Account Manager and why these improvements are important to your risk management strategy.
This event will include a Q&A session so you can ask about this latest update, and provide Micro Focus valuable feedback.
CyberRes is a Micro Focus line of business. We bring the expertise of one of the world’s largest security portfolios to help our customers navigate the changing threat landscape by building both cyber and business resiliency within their teams and organizations. We are here to help enterprises accelerate trust, reliability, and survivability through times of adversity, crisis, and business volatility.
We are a part of a larger set of digital transformation solutions that fight adverse conditions so businesses can continue to run today, keep the lights on, and transform to grow and take advantage of tomorrow’s opportunities. Visit CyberRes at: https://www.cybrerres.com.
Retain Archiving & Office 365: Ensure Your Data Archive is Complete & CompliantStephen Cohen, Senior Systems Engineer, Micro Focus[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]49 mins