How do you reveal unknown risks on your network and enforce your security and compliance policies? What’s required to reduce your attack surface, detect and block advanced threats and rapidly respond to security breaches? Good Questions!
Join us and learn the answers to these real-world problems and discover how ForeScout and FireEye’s joint solution reduces the threat landscape and automates security management and response, allowing you to:
· Identify devices—including Internet of Things endpoints—the instant they connect to your network
· Quickly detect advanced threats
· Scan for indicators of compromise (IOCs)
· Contain infected endpoints and automate threat response
· Limit malware propagation and break the cyber kill chain
Register today and learn to improve your company’s defenses against advanced threats and automate threat response!
Michael Resong, FireEye Director, Technology Alliances
Michael has been with FireEye since April 2013. Before joining Technology Alliances, he led various systems engineering and architect teams at FireEye. Prior to FireEye, Micheal performed numerous systems engineering and management functions at McAfee, Secure Computing, Network Appliance and other leading technology companies.
Amy De Salvatore, ForeScout Senior Director, Strategic Alliances
Amy currently manages a team focused on a discreet portfolio of technology and go-to-market partners. As one of ForeScout’s top strategic partner liaisons, Amy manages the FireEye alliance, and is responsible for all development, marketing, engagement and delivery aspects of the relationship.
SentinelOne CEO and Co-Founder, Tomer Weingarten, discusses the challenges organizations face when trying to protect their endpoints, and why today's common defense systems are not working. Learn how SentinelOne's approach protects against all types of attacks, including exploits, without hogging valuable system resources.
Rejoignez ce webcast pour découvrir comment anticiper les nouveautés de l’accès mobile et les défis de sécurité avec le nouveau firmware Secure Mobile Access 11.3.
Nouvelles fonctions :
•Intégration Dell EMM/DMM : SSO avec conteneur Dell Mobile Workspace (iOS et Android pris en charge)
•Nouvelle console CMS (Console Management System)
•Délégation Kerberos contrainte (délégation KCD)
•Accès sans client à SharePoint
•Prise en charge de Chrome OS
•Plus de clients HTML 5 pris en charge
•Contrôle amélioré des protocoles SSL et Ciphers
BYOD poses a curious challenge for security teams – how can you secure enterprise data on a device that you don’t own? And how can you provide the necessary security while still respecting the user’s expectations for privacy? These issues aren’t easily addressed with traditional technology, leading many organizations to a frustrating problem for securing BYOD.
Join Palo Alto Networks and VMware AirWatch in this special webinar to learn:
· The security challenges with BYOD
· The issues and limitations with traditional security architectures in a mobile world
· Advice on delivering the appropriate security measures to make BYOD safe
The Pentagon reports 10 million cyberattacks daily. Federal, state and local government agencies need to safeguard information and maintain control when addressing internal mandates for cloud migration. Do you know how many attacks you are experiencing on a daily basis? Do you know where those attacks are coming from? How long they have been in your environment?
While there is no silver bullet to combating either external or internal cyberattacks, there are steps you can take to build a defense strategy to protect your agency. Beyond just detecting attacks, you need to build up your defenses and take the necessary steps to protect your data and applications.
In this session, we will discuss how you can leverage the Microsoft Enterprise Mobility Suite to help:
1. Monitor behavior on your internal network and detect abnormal behavior
2. Identify authentication irregularities from your users
3. Protect applications using two-factor authentication
4. Restrict access to confidential data
This year marked the Seventh Annual SINET IT Security Entrepreneurs' Forum (ITSEF) at Stanford University. The Forum's theme, Inspire - Innovate - Engage, resonated strongly throughout the day in a collegial setting that fostered robust, high level and energetic dialogue. View highlights from industry thought leaders on this year's forum and the value of SINET.
Nick Shevelyov, Rich Baich, Gary McAlum, Joe Sullivan
Mobile, Social, Cloud and Big Data are creating tectonic shifts within industry and government markets that are changing the way we interact with technology. But is the very technology that is empowering also imperiling us? When you think about all the data being generated by the sharing of personal information through the use of social networking and cloud services, as well as the user tracking features on mobile devices, there are tremendous opportunities for organizations to tailor their offerings for customer profiling. What potential abuses of this data do we see today? If you look to the future, what emerging technology trends will magnify the existing risks to individuals’ privacy? This panel will discuss the security and privacy concern by-products that come hand-in-hand with this technology revolution.
Jason Kaufman, Don More, Greg Oslan, Alberto Yepez
The pending Presidential Executive Order relative to Cybersecurity legislation, disruptive technologies, record cash, aggressive new buyers, and attractive valuations are stimulating entrepreneurs in this domain to consider selling their companies in 2013. Many entrepreneurs are taking advantage of this moment--but are you ready? What are the trends and lessons one needs to know? Should you contemplate an IPO or conduct an auction? What actions should be considered when selling to a strategic buyer versus a private equity firm? What is the process to achieve an optimal outcome? Hear from Chad Sweet, Co-Founder and CEO of The Chertoff Group, as he leads a panel of both advisors and entrepreneurs who have successfully navigated the sale process and can share with you their secrets to success.
Terremark and ArcSight had two of the largest acquisitions of recent times:
Terremark went public in March 2007 and was acquired by Verizon for $1.4 Billion in early 2011.
ArcSight went public in February 2008 and was acquired by HP for $1.5 Billion in September 2010.
Join this Fireside chat where these very successful CEOs will discuss and share how they entered the Federal Government market, the lessons learned, understand how to overcome barriers to entry, how to create the appropriate eco-system to successfully deploy solutions, how to best qualify opportunities and how to deal with the Federal Government procurement and acquisition processes. At the end, how they use these experiences to achieve success on the global market.
Robert Rodriguez, SINET; James Beeson, GE; Jason Hoffman, Autonomy; Leslie Lambert, Juniper Networks; Mike Siegal, Mocana
It took an acronym, BYOD, to focus the market’s attention on the impact mobile had on security and productivity as employees at every level began to Bring Their Own Device to the workplace. Now, both industry and government network security professionals face an onslaught of mobile devices permeating the enterprise and creating havoc.
This panel will discuss the ramifications of this trend and explore the role of technology and policy to contain the threats to security posed by mobility.
Robert Rodriguez, Chairman and Managing Principal, Security Innovation Network (moderator);
James Beeson, Chief Information Security Officer, GE Capital Americas;
Jason Hoffman, Head of Group Security, Chief Information Security Officer, Autonomy;
Leslie K. Lambert, VP and Chief Information Security Officer, Juniper Networks;
Mike Siegal, VP of Products, Services and Operations, Mocana
Joe Gottlieb, Sensage; Douglas Maughan, DHS; Nicko van Someren, Good; Sergio Thompson-Flores, CEO, Modulo
Bob Bragdon, Publisher, CSO Magazine;
Joe Gottlieb, President and CEO, Sensage;
Matt Greorgy, CEO, Endgame Systems;
Douglas Maughan, Division Director, Cyber Security Division, Department of Homeland Security
Ted Schlein, Managing Partner, KPCB;
Nicko van Someren, CTO, Good Technology
Sergio Thompson-Flores, CEO, Modulo;
as they discuss the top cybersecurity challenges of 2012 - from new threat vectors to perennial issues of people and process.
Bob Bragdon, CSO Magazine; Matt Greorgy, Endgame Systems; Rob Mancini, District of Columbia; Robert Rodriguez, SINET
Join a star studded cast as they cover the value of public - private collaboration in the cybersecurity field.
Bob Bragdon, Publisher, CSO Magazine
Matt Greorgy, CTO, Endgame Systems;
Rob Mancini, CTO, District of Columbia
Richard Schaeffer, Principal, SINET;
Ted Schlein, Partner, KPCB;
Sergio-Thompson Flores, CEO, Modulo
Robert Rodriguez, Chairman, SINET