Le 18 février, nous avons lancé notre série de webinaires intitulée « Assumption of Attack » illustrant la protection exhaustive et avancée qu'offre notre suite logicielle Smart Protection Suite, une solution particulièrement efficace face aux cybercriminels.
Le cinquième épisode de notre série de webinaires portera sur la sécurité du Cloud hybride.
Que vous souhaitiez mettre l'accent sur la sécurité des environnements physiques, virtuels ou cloud, vous découvrirez comment protéger vos données et éviter les interruptions d'activité tout en vous conformant aux réglementations.
Este es el último seminario de nuestra serie de seminarios Web titulados “Assumption of Attack” que lanzamos el 18 de febrero para demostrar cómo nuestra solución líder de mercado Smart Protection Suite proporciona una protección multicapa para su empresa.
Nuestro sexto y último seminario Web abrirá la puerta n.º 6 para hablar de la "Web y la colaboración". ¿Cómo puede lograr una colaboración en tiempo real segura y evitar a la vez que el contenido inapropiado tenga un impacto negativo en su negocio?
Why choose between your datacenter and the cloud? A hybrid cloud solution gives you both.
You have already invested in server products that are on premises. You believe that Cloud is the future and the power of the Cloud can open up countless opportunities for people to do more and achieve more. But how can you leverage the Cloud given your current infrastructure?
Join this webcast to learn Hybrid Cloud options as well as how to extract value from your existing investments by:
- Expanding your options without adding complexity
- Easily moving workloads from your datacenter
- Building hybrid applications that leverage both on-premises and cloud resources
- Taking advantage of storage, backup, and recovery options with increased efficiency and reduced cost.
If you can’t see what’s on your network, then you can’t control it.
As new technologies emerge each day, so do the associated security threats - are you confident that you can see them before they wreak havoc on your network? 86% of executives aren’t, believing there are gaps in their ability to see what’s really going on inside their network.
Join Julian Matossian, Senior Product Manager, and Nick Kelly, Director of Product Marketing, as they delve into the current state of network visibility: the challenges, blind spots, and most importantly, the solutions to help illuminate your network.
Having the right security measures in place is only half the battle – you need to know exactly what they’re protecting you from.
What were the overall trends in cyber breaches, and what does this mean for organizations and the third party vendors with whom they work?
In this webinar, Advisen, an insurance analytics firm, will analyze cyber breaches and identify ebbs and flows throughout 2015 and into 2016. Panelists will then take the unprecedented step of correlating the data Advisen and Bitsight possess to take an even deeper dive to find possible threats to an organization’s cybersecurity — giving all stakeholders greater visibility into the cyber posture of organizations as well as their third party vendors.
Jay Jacobs, Senior Data Scientist, BitSight
Aloysius Tan, Product Manager, Advisen
Chad Hemenway, Managing Editor, Advisen (moderator)
Starting in earnest after the "Snowden Revelations" 2013, more and more service providers such as Google, Yahoo and Amazon have been embracing SSL by default. Whether in search, cloud services or webmail access, these providers have been instrumental in their support of a more secure and obfuscated web. But what does that mean for the enterprise information security professional? While the providers have "seen the light", have we become blinded by it? To ensure the inspection and subsequent protection of data streams in and out of our organizations, we need the ability to inspect encrypted traffic for policy violations or other malicious activity while still ensuring multi- jurisdictional rights to privacy. Join Blue Coat and (ISC)2 on May 26, 2016 for a roundtable discussion exploring methods and mechanisms for addressing SSL inspections and the search for malicious activity.
Join us to hear from Microsoft Azure, Chef and Trend Micro experts on how to best develop a cloud automation strategy in your Azure environment, keeping the agility of the cloud while ensuring that your Azure workloads are protected.
You will learn how to:
• Automate your security posture within Azure
• Use Chef to build compliance and resiliency into your Azure workloads
• Take security automation to the next level
Threat actors have discovered that targeting organizations with ransomware can be far more lucrative than extorting small sums from home users. Ransomware is on the rise. But your organization does not have to become a victim. Automated prevention is certainly achievable.
Join us for this live webinar where you will learn:
• Which three steps you must take to successfully prevent an outbreak in your organization
• Why existing endpoint security solutions often fail to prevent ransomware infections
• Which organizations threat actors target most intently with ransomware
• What endpoint protection technology capabilities are necessary to automate ransomware prevention
• Which three delivery vectors attackers use in nearly all ransomware infections
Attackers today do not just use one channel to launch their targeted attacks – they use all of them. Emails, links posted to social media, and even apps in public app stores are all part of the modern cybercriminal’s arsenal, and many of these attacks are invisible to traditional security tools. Join this webinar and learn how to protect the cloud-enabled, mobile-friendly, and socially networked way users work today.
This year marked the Seventh Annual SINET IT Security Entrepreneurs' Forum (ITSEF) at Stanford University. The Forum's theme, Inspire - Innovate - Engage, resonated strongly throughout the day in a collegial setting that fostered robust, high level and energetic dialogue. View highlights from industry thought leaders on this year's forum and the value of SINET.
Nick Shevelyov, Rich Baich, Gary McAlum, Joe Sullivan
Mobile, Social, Cloud and Big Data are creating tectonic shifts within industry and government markets that are changing the way we interact with technology. But is the very technology that is empowering also imperiling us? When you think about all the data being generated by the sharing of personal information through the use of social networking and cloud services, as well as the user tracking features on mobile devices, there are tremendous opportunities for organizations to tailor their offerings for customer profiling. What potential abuses of this data do we see today? If you look to the future, what emerging technology trends will magnify the existing risks to individuals’ privacy? This panel will discuss the security and privacy concern by-products that come hand-in-hand with this technology revolution.
Jason Kaufman, Don More, Greg Oslan, Alberto Yepez
The pending Presidential Executive Order relative to Cybersecurity legislation, disruptive technologies, record cash, aggressive new buyers, and attractive valuations are stimulating entrepreneurs in this domain to consider selling their companies in 2013. Many entrepreneurs are taking advantage of this moment--but are you ready? What are the trends and lessons one needs to know? Should you contemplate an IPO or conduct an auction? What actions should be considered when selling to a strategic buyer versus a private equity firm? What is the process to achieve an optimal outcome? Hear from Chad Sweet, Co-Founder and CEO of The Chertoff Group, as he leads a panel of both advisors and entrepreneurs who have successfully navigated the sale process and can share with you their secrets to success.
Terremark and ArcSight had two of the largest acquisitions of recent times:
Terremark went public in March 2007 and was acquired by Verizon for $1.4 Billion in early 2011.
ArcSight went public in February 2008 and was acquired by HP for $1.5 Billion in September 2010.
Join this Fireside chat where these very successful CEOs will discuss and share how they entered the Federal Government market, the lessons learned, understand how to overcome barriers to entry, how to create the appropriate eco-system to successfully deploy solutions, how to best qualify opportunities and how to deal with the Federal Government procurement and acquisition processes. At the end, how they use these experiences to achieve success on the global market.
Robert Rodriguez, SINET; James Beeson, GE; Jason Hoffman, Autonomy; Leslie Lambert, Juniper Networks; Mike Siegal, Mocana
It took an acronym, BYOD, to focus the market’s attention on the impact mobile had on security and productivity as employees at every level began to Bring Their Own Device to the workplace. Now, both industry and government network security professionals face an onslaught of mobile devices permeating the enterprise and creating havoc.
This panel will discuss the ramifications of this trend and explore the role of technology and policy to contain the threats to security posed by mobility.
Robert Rodriguez, Chairman and Managing Principal, Security Innovation Network (moderator);
James Beeson, Chief Information Security Officer, GE Capital Americas;
Jason Hoffman, Head of Group Security, Chief Information Security Officer, Autonomy;
Leslie K. Lambert, VP and Chief Information Security Officer, Juniper Networks;
Mike Siegal, VP of Products, Services and Operations, Mocana
Joe Gottlieb, Sensage; Douglas Maughan, DHS; Nicko van Someren, Good; Sergio Thompson-Flores, CEO, Modulo
Bob Bragdon, Publisher, CSO Magazine;
Joe Gottlieb, President and CEO, Sensage;
Matt Greorgy, CEO, Endgame Systems;
Douglas Maughan, Division Director, Cyber Security Division, Department of Homeland Security
Ted Schlein, Managing Partner, KPCB;
Nicko van Someren, CTO, Good Technology
Sergio Thompson-Flores, CEO, Modulo;
as they discuss the top cybersecurity challenges of 2012 - from new threat vectors to perennial issues of people and process.
Bob Bragdon, CSO Magazine; Matt Greorgy, Endgame Systems; Rob Mancini, District of Columbia; Robert Rodriguez, SINET
Join a star studded cast as they cover the value of public - private collaboration in the cybersecurity field.
Bob Bragdon, Publisher, CSO Magazine
Matt Greorgy, CTO, Endgame Systems;
Rob Mancini, CTO, District of Columbia
Richard Schaeffer, Principal, SINET;
Ted Schlein, Partner, KPCB;
Sergio-Thompson Flores, CEO, Modulo
Robert Rodriguez, Chairman, SINET