Comprenez ce qui s’est passé et rétablissez l’activité rapidement
Au cours des deux premiers webcasts, nous avons vu pourquoi les violations sont inévitables et comment détecter rapidement un menace avancée. Dans ce dernier épisode, nous allons voir comment Advanced Threat Protection peut efficacement résoudre le problème et supprimer les malwares de vos systèmes. Rétablir l’activité, cependant, ne suffit pas : il faut aussi améliorer sa préparation pour l’avenir. Nous y viendrons également
Webcast 1: Advanced Threat: que faire en cas de violation de sécurité inévitable? - https://www.brighttalk.com/webcast/5691/170167
Webcast 2 - Advanced Threat Protection : j’ai subi une violation de sécurité, que s’est-il passé ? - https://www.brighttalk.com/webcast/5691/170173
Na het bijwonen van dit webinar weet u hoe u een mobiele IT-omgeving kunt implementeren die door het dynamisch aanpassen van de security instellingen overal voldoet aan de geldende regelgeving. Medewerkers zijn op deze manier altijd en overal productief en in staat de juiste dienstverlening te verlenen. Zo kunnen medewerkers van een financiele instelling niet alleen op iedere werkplek binnen kantoor, maar ook bij klanten thuis volgens het beleid van hun organisatie werken. Medewerkers in een ziekenhuis zijn in staat om op hun eigen werkplek, als ook bij de patient aan het bed in hun eigen vertrouwde omgeving te werken, zonder dat de privacy van gegevens in gevaar komt. En ook thuiswerken kan op deze manier mogelijk worden gemaakt binnen ieder bedrijf dat waarde hecht aan flexibel werken voor hun medewerkers, zonder de beveiliging uit het oog te verliezen.
Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.
• HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
• Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
• Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
• Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
• The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
In this presentation, solution providers learn simple steps to help build and grow their IT security practice. Attendees learn about compliance regulations, cloud integration, how to weave security into each opportunity, adherence to best practices, and re-educating customers.
We are pleased to introduce Aperture, a unique approach to securing sanctioned SaaS applications.
Join us for a webinar where you’ll learn how Aperture’s detailed analysis and analytics on SaaS usage prevents data risk and compliance violations — and is helping companies, like yours, gain better control of their SaaS applications.
Aperture also delivers:
●True visibility into SaaS usage
●Granular control of SaaS access
●Data exposure control
●Threat protection extension
●Minimal impact to users and networks
Since 1999, Oracle has included a Java Virtual Machine (JVM) within the database. That makes it old enough to drive and well past time to get a real job. In today’s data-obsessed world, that job is fortifying Oracle’s database with a healthy dose of analytics to give your database the power to handle the data challenges of the 21st century.
There are numerous advantages to adopting a 100% Java code base for in-database analytics. Security is doubly enhanced by performing all analytics in the database. The code is highly portable as the identical java classes that run in the database will run on any client with any operating system. Plus the modern paradigm of taking the algorithms to the data is elegantly achieved with minimal effort.
Until now, a single Java solution with all these qualities wasn’t available. By using JMSL Numerical Libraries, you get a suite of algorithms with routines for predictive analytics, data mining, regression, forecasting, and data cleaning. JMSL is scalable and can be used in Hadoop MapReduce applications. Now, JMSL Numerical Libraries makes Java in the database more than useful -- it makes it unbeatable.
This webinar walks through the argument of why embedded analytics is better and provides examples using an Oracle database and JMSL. And if you’re not convinced, tell us so in the live, interactive Q&A!
By 2020, more than 7bn inhabitants of Earth will be using over 35bn devices to communicate, collaborate, negotiate and perform transactions.
To put it into perspective, there are only about 8.7bn connected devices now.
The surge will come quickly and organizations will scramble to take advantage of monetizing this digitally connected world. Identities are at the forefront as the digital passport to an online world of goods and services because a single view of an individual customer is the key to knowing that person better and building a deeper personal and business relationship with them. Join Oracle and (ISC)² on October 8, 2015 at 1:00PM Eastern to learn about the new identity economy.
Security teams are bombarded with information that could indicate a potential threat to the organization – but identifying the real dangers within the sea of digital noise is a constant challenge.
The ability to reduce noise and attain true visibility into actual threats facing your organization is often referred to as ‘security intelligence’. By achieving security intelligence, teams can reduce the time taken to detect and respond to cyber-attacks and properly assess risk.
Leveraging your security intelligence is a complex but incredibly valuable process. It’s worthwhile though – proper insight into the data traversing your network could be the difference between stopping a breach and falling victim to the next headline-grabbing attack.
In this webinar, a panel of experts will discuss what ‘security intelligence’ really means, and how security teams can apply it. Join the debate by asking your questions of the panel, as they explore:
*How to achieve visibility and deliverable intelligence into malicious network activity
*Applying contextual information to enhance the quality of security intelligence
*Achieving automation and efficiency
*The response lifecycle
This webinar explores the best practices for distributing policies, determining when and how to provide education and how to build awareness campaigns. We often think that once a policy has been formally issued the job is done, but that is far from the truth. Properly communicating the policy is only the start.
Attendees will learn the challenges, best practices, and benefits of a well thought out policy communication plan.
Register now to join IT GRC industry expert, Michael Rasmussen as he discusses best practices in policy awareness and communication.
- Define the key parts of a policy communication plan
- Identify methods for tracking and delivering training and attestations
- Determine ways to enable employee access to policies and related materials
- The role of training and education
- The policy portal – delivering an interactive employee experience for policy management
- Getting employee questions answered
- Attestations, read and understood, certifications
- How technology enables employee engagement on policy
We caught up with F-Secure's Mikko Hyppoen to get his thoughts on the ever-relevant Privacy vs. Security debate.
Mikko discussed the sensitive equilibrium required to protect data and ensure it's privacy; the influence that the EU's Safe Harbour ruling will have and how security should be the responsibility of all, not just the government.
He also gave his one key piece of advice for keeping your data private and secure.
This year marked the Seventh Annual SINET IT Security Entrepreneurs' Forum (ITSEF) at Stanford University. The Forum's theme, Inspire - Innovate - Engage, resonated strongly throughout the day in a collegial setting that fostered robust, high level and energetic dialogue. View highlights from industry thought leaders on this year's forum and the value of SINET.
Nick Shevelyov, Rich Baich, Gary McAlum, Joe Sullivan
Mobile, Social, Cloud and Big Data are creating tectonic shifts within industry and government markets that are changing the way we interact with technology. But is the very technology that is empowering also imperiling us? When you think about all the data being generated by the sharing of personal information through the use of social networking and cloud services, as well as the user tracking features on mobile devices, there are tremendous opportunities for organizations to tailor their offerings for customer profiling. What potential abuses of this data do we see today? If you look to the future, what emerging technology trends will magnify the existing risks to individuals’ privacy? This panel will discuss the security and privacy concern by-products that come hand-in-hand with this technology revolution.
Jason Kaufman, Don More, Greg Oslan, Alberto Yepez
The pending Presidential Executive Order relative to Cybersecurity legislation, disruptive technologies, record cash, aggressive new buyers, and attractive valuations are stimulating entrepreneurs in this domain to consider selling their companies in 2013. Many entrepreneurs are taking advantage of this moment--but are you ready? What are the trends and lessons one needs to know? Should you contemplate an IPO or conduct an auction? What actions should be considered when selling to a strategic buyer versus a private equity firm? What is the process to achieve an optimal outcome? Hear from Chad Sweet, Co-Founder and CEO of The Chertoff Group, as he leads a panel of both advisors and entrepreneurs who have successfully navigated the sale process and can share with you their secrets to success.
Terremark and ArcSight had two of the largest acquisitions of recent times:
Terremark went public in March 2007 and was acquired by Verizon for $1.4 Billion in early 2011.
ArcSight went public in February 2008 and was acquired by HP for $1.5 Billion in September 2010.
Join this Fireside chat where these very successful CEOs will discuss and share how they entered the Federal Government market, the lessons learned, understand how to overcome barriers to entry, how to create the appropriate eco-system to successfully deploy solutions, how to best qualify opportunities and how to deal with the Federal Government procurement and acquisition processes. At the end, how they use these experiences to achieve success on the global market.
Robert Rodriguez, SINET; James Beeson, GE; Jason Hoffman, Autonomy; Leslie Lambert, Juniper Networks; Mike Siegal, Mocana
It took an acronym, BYOD, to focus the market’s attention on the impact mobile had on security and productivity as employees at every level began to Bring Their Own Device to the workplace. Now, both industry and government network security professionals face an onslaught of mobile devices permeating the enterprise and creating havoc.
This panel will discuss the ramifications of this trend and explore the role of technology and policy to contain the threats to security posed by mobility.
Robert Rodriguez, Chairman and Managing Principal, Security Innovation Network (moderator);
James Beeson, Chief Information Security Officer, GE Capital Americas;
Jason Hoffman, Head of Group Security, Chief Information Security Officer, Autonomy;
Leslie K. Lambert, VP and Chief Information Security Officer, Juniper Networks;
Mike Siegal, VP of Products, Services and Operations, Mocana
Joe Gottlieb, Sensage; Douglas Maughan, DHS; Nicko van Someren, Good; Sergio Thompson-Flores, CEO, Modulo
Bob Bragdon, Publisher, CSO Magazine;
Joe Gottlieb, President and CEO, Sensage;
Matt Greorgy, CEO, Endgame Systems;
Douglas Maughan, Division Director, Cyber Security Division, Department of Homeland Security
Ted Schlein, Managing Partner, KPCB;
Nicko van Someren, CTO, Good Technology
Sergio Thompson-Flores, CEO, Modulo;
as they discuss the top cybersecurity challenges of 2012 - from new threat vectors to perennial issues of people and process.
Bob Bragdon, CSO Magazine; Matt Greorgy, Endgame Systems; Rob Mancini, District of Columbia; Robert Rodriguez, SINET
Join a star studded cast as they cover the value of public - private collaboration in the cybersecurity field.
Bob Bragdon, Publisher, CSO Magazine
Matt Greorgy, CTO, Endgame Systems;
Rob Mancini, CTO, District of Columbia
Richard Schaeffer, Principal, SINET;
Ted Schlein, Partner, KPCB;
Sergio-Thompson Flores, CEO, Modulo
Robert Rodriguez, Chairman, SINET