Patching and Compliance: A CISO's perspective to reducing risk
Join us on Tuesday, July 15th for a Webinar with Larry Whiteside, Chief Information Security Officer for LCRA, as he discusses Patching and Compliance: A CISO's perspective to reducing risk.
Over the past few years security has gotten caught up in the latest hype or trends related to threats. This has caused many security teams to lose focus of some basic things that can be done to mitigate new and old threats in their environment. In this Webinar we will discuss tride and true techniques to mitigate risk and help security organizations take care of some low hanging fruit.
RecordedJul 15 201448 mins
Your place is confirmed, we'll send you email reminders
Kelley Mak, Analyst, Forrester Research and Marcelo Pereira, Product Marketing Manager, Flexera Software
Vulnerability management is a necessary instrument for threat and risk reduction in enterprise environments. Yet, many organizations struggle to put a program in place that provides value to the enterprise beyond baseline compliance requirements. This is often due to challenges in three key areas of vulnerability management: discovery, prioritization, and remediation.
In this webinar, guest speaker, Forrester Research’s Kelley Mak, will provide insight on how enterprises can activate the full potential of their vulnerability management programs. Together with Flexera Software’s Marcelo Pereira, he will discuss how to combine principles of vulnerability management to other areas of operations management to efficiently improve security baseline.
John Pescatore, Director of Emerging Security Trends at SANS, Dylan Hudak and Marcelo Pereira from Flexera Software
Despite the awareness that patching plays an important role in every organizations security, we continue to see incidents in which software vulnerabilities are a root cause, or enabler of security breaches. We believe that a different perspective to patch management is the key to prioritize patching, reducing work load and improving the security baseline for organizations.
This webinar is for those in charge of scoping, supporting and executing patch management strategies. We talk about patch management in the context of security and will show how our solution, Corporate Software Inspector, can help organizations extend the scope of their Microsoft System Center implementation to prioritize patching of non-Microsoft applications.
One of the biggest challenges organizations face when trying to reduce the attack surface for cybercriminals and hackers is the lack of visibility and control over their IT environments, devices and applications. The ever growing number of software vulnerabilities makes it even more critical to leverage data from Software Asset Management (SAM) programs to help reduce security risk.
In this webinar, you will hear how to leverage existing SAM data sources such as discovery and inventory data, unlicensed and unauthorized software, along with vulnerability intelligence data, to drive mitigation of security risk through effective reduction of the attack surface.
Kasper Lindgaard – Director of Secunia Research at Flexera Software
Every year, Secunia Research at Flexera Software releases a review of the global vulnerability landscape, based on their large vulnerability database and data from the Personal Software Inspector user base.
The data in this research provides security professionals around the world with perspective on the impact and evolution of the threat landscape and what has trended throughout the year.
In this webinar, Director of Secunia Research at Flexera Software, Kasper Lindgaard will discuss the data presented in the Vulnerability Review 2016 and answer questions. The review itself is released on March 16.
-The number of vulnerabilities and zero-days detected in 2015
-How quick vendors are to respond to vulnerabilities
-Which programs have the most vulnerabilities
Amar Singh, Chair of ISACA's UK Security Advisory Group, Executive Board Member UK National MBA in Cyber Security
If you think pentesting is sexy, think again. Pentesting is mostly pointless if you have don't have the foundational backing of vulnerability information. Amar makes a bold claim and that is that Vulnerability scanning can be as important and sometimes more fun than running a pentest with some free tools. Yes, hacking maybe fun but if you really want to lower your risk exposure you need to get on top of vulnerabilities. Come and listen to Amar Singh as he shares the secrets of how to make your security assessments delivery maximum value within the shortest period of time.
Marcelo Pereira, Product Marketing Manager at Flexera Software
As we enter 2016, there is one certainty we all can have: we will continue to see costly breaches using well known vulnerabilities.
In this webinar, Marcelo Pereira will talk about the challenges that stop organizations implementing simple security best practices and suggest New Year’s resolutions related to Software Vulnerability Management that can help reduce the attack surface for cybercriminals and hackers.
Marcelo Pereira, Product Marketing Manager & Peter Jancso, Product Manager
Flexera Software just released Vulnerability Intelligence Manager 2016 - the first of the former Secunia products to be released under the Flexera Software brand.
Join us for an introduction and demo of Vulnerability Intelligence Manager 2016 and learn how the intelligence from Secunia Research and the functionality of the product can help your organization effectively reduce the attack surface for cybercriminals and hackers!
There is a critical relationship between Software Asset Management (SAM) and cyber security. Both disciplines require at their foundation the accurate and continual discovery and inventory of software assets within an organization's environment. Today IT asset management and security teams (and projects) are usually siloed within organizations, increasing the likelihood that security threats will slip through the gap. For instance, discovery and inventory of software assets are critical to both asset management and security teams - but are currently undertaken separately in most organizations.
Organizations able to leverage asset management insights combined with vulnerability data to rapidly address the most relevant cybersecurity threats will be ahead of the game. They can more effectively reduce the attack surface for cybercriminals and hackers. That means they will be also better prepared to identify and respond to breaches.
Join Flexera Software’s VP and Chief Architect, Santeri Kangas to hear about how these two disciplines can help organizations be more efficient and more secure.
Marcelo Pereira, Product Marketing Manager at Flexera Software
This webinar is focused on a strategic view of risk mitigation:
Vulnerabilities in commercial software remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or the enabler of privileges escalation inside networks.
Despite awareness of the risk, and the fact that most software vulnerabilities have a fix the day they are made public, organizations continue to fail to execute mitigation actions. The consequence is that we continue to see costly breaches affecting businesses around the globe.
In this webinar, Marcelo will talk about how the use of vulnerability intelligence can be a game changer to help organizations become better at mitigating the risk of software vulnerabilities.
-Fresh data related to software vulnerabilities
-The challenge of prioritizing mitigation
-How the use of vulnerability intelligence can help support consistent risk reduction
Marcelo Pereira, Product Marketing Manager at Flexera Software
This webinar is for business leaders who wish to understand vulnerabilities on commercial software and how they can impact organizations:
Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or as the enabler of privileges escalation inside networks.
This webinar demystifies software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.
-What is a software vulnerability
-How a software vulnerability becomes a threat
-A glimpse of how threats multiply
-How closing vulnerabilities impacts risk reduction
Amar Singh, Chair of ISACA's UK Security Advisory Group, Exec. Board Member & Consultant to UK's National MBA in Cyber Sec.
Wishful thinking or a cursory security assessment may have worked in the past but dealing with persistent and advanced threats requires an equally sophisticated and mature approach.
While APT’s are on the rise and the use of zero-day vulnerabilities can be one of the weapons for such attacks, reality is that the large majority of incidents – advanced or not – occur using known vulnerabilities. Resolving these is, therefore, paramount to reducing the attack surface for cyber criminals.
Join Amar as he shares his tips on adopting a mature and continuing vulnerability management process that can help organizations reduce risk and be better prepared to respond to APT’s.
Kelley Mak, Researcher, Forrester Research & Santeri Kangas, CTO, Secunia
Cybersecurity incident disclosures and vulnerability warnings continue to be released at an alarming and fatiguing rate, and there aren’t any signs of breach activity slowing down. Vulnerability management is more important than ever, yet staying on top of vulnerabilities poses a major challenge for security and risk (S&R) professionals.
In this webinar, guest speaker, Forrester Research’s Kelley Mak, will provide insight on how S&R pros can repair their strained or broken vulnerability management processes and move past low impact checkbox scanning to proactive, risk-based assessments.
Following Kelley Mak’s presentation on the changes in vulnerability management, Secunia’s CTO Santeri Kangas will present Secunia’s take on the challenges of vulnerability management and how the Secunia VIM, our Vulnerability Intelligence Manager, helps organizations address those challenges.
The era of digital business is bringing a lot of opportunities for organizations. At the same time, it is bringing new challenges for those in charge of securing companies’ assets: customer data, intellectual property, and infrastructure.
The digital business environment requires a new approach to security. An approach that focuses on supporting the business to achieve its desired outcomes while ensuring that what really matters is protected from the reach of hackers and criminals.
In this webinar we will look into two distinct areas of IT: Enterprise Application and Mobility and the vulnerability landscape around those to discuss some of the challenges security professionals are facing today.
Globally, we are seeing an increase in Advanced Persistent Threats (APT) and targeted attacks. And while the strategy applied to choosing which organizations and assets to target is increasingly sophisticated, the methods are the same as always: exploiting well-known vulnerabilities that could have been mitigated with simple and fundamental controls.
In this webinar, Secunia’s new CTO Santeri Kangas will use real-life examples to demonstrate how hackers actually exploit vulnerabilities, and illustrate the risk organizations are effectively accepting, when they neglect the fundamentals of IT security. Kangas also discusses how organizations can strengthen their resilience to attacks that exploit publicly known vulnerabilities, and explain why business leaders are central players in saving the company bacon: they need to get behind the efforts to get security fundamentals right.
You have System Center 2012 Configuration Manager implemented in your environment, and you are realizing great results with it. However, can you take it a bit further to gain even more benefits? You sure can, and Cireson can help. In this session, Wally will introduce you to the Cireson Remote Manage app, which can assist your help desk in supporting their clients, as well as Cireson Asset Management, which can provide full asset management capabilities that leverage your Configuration Manager investment.
Attend this session and learn:
· How the Cireson Remote Manage app can assist your help desk analyst in supporting their customers
· How to enhance asset management capabilities of Configuration Manager with Cireson’s Asset Management capabilities to provide financial and business data tied into your software and hardware assets
· How to manage 3rd party software with ConfigMgr and how Secunia can enhance that process
Andrei Vilcan, Head of Information Security, Banca Transilvania
In this webinar, Andrei Vilcan will present his approach to Information Security and how he and his team work to mitigate the risk of Advanced Persistent Threat attacks at Banca Transilvania.
He will introduce the aspects of the multi-layered approach to the Information Security strategy he is in charge of implementing, the challenges he faces and his achievements so far.
As a Secunia CSI user, he will share how the solution helps him in one of the key areas of his strategy: security patch management.
About Andrei: Andrei is Head of Information Security at Banca Transilvania. He has 23 years of experience in IT Management, the past 6 of which is in IT Security. He works to protect his organization’s assets, including customer data, to ensure that the business can operate without disruptions.
Marcelo Pereira, Business Development and Analyst Relations, Secunia
Managing risk must start with reducing the cracks and holes through which unwelcome visitors can gain access to any valuables you want to protect.
Software vulnerabilities are often the entry points used by cybercriminals to get into organizations and escalate attacks. For that reason, having a comprehensive overview and accurate information on software vulnerabilities is one of the critical factors to assess risk and prioritize the actions that will have a strong and consistent impact on reducing the attack surface.
The immediate result of managing software vulnerabilities is the proactive reduction of risk, but there is another, often overlooked, benefit for organizations. Less cracks and holes means less noise for those who monitor environments for incidents and are responsible for responding to them. The outcome is improved accuracy, faster responses and lower cost.
In this webinar we explain the intelligence that goes into managing software vulnerabilities, how it differs from basic information about vulnerabilities and how organizations can benefit from intelligence to become more secure.
Fundamentals to reduce risk through vulnerability and asset management
Managing and securing software assets through the entire asset lifecycle is key to the overall security of organizations across the globe. In this channel, Flexera Software shares knowledge, research and experience about software licensing, compliance and vulnerability management to help you overcome the challenges you face in managing and securing your assets.
Speakers include in-house technical and process specialists, customers and industry thought leaders who will talk about a variety of topics and present timely information and data on software vulnerabilities and software asset management.
Do you run a mix of virtualized and diverse workloads, including block storage? Are you looking to increase density and maintain blazingly fast speeds? If so, this webinar is for you!
In this webinar, speakers from DataCore and SanDisk® will discuss the performance and economic advantages of combining software-defined-storage with all-flash storage. We’ll also share two customer stories on how they were able to:
- Achieve effortless and non-disruptive data migration from magnetic to flash storage.
- Prevent storage-related downtime
- Dynamically control the movement of data from flash to high-capacity storage
- Strike the right economic balance between fast performance and low cost
Don’t let data growth and complex workloads slow you down. Attend this webinar and learn about new possibilities.
Kubernetes is fast maturing as an open source container orchestrator for automating deployment, scaling, and operating complex containerized applications. Containerizing the OpenStack control plane and running on top of Kubernetes (which acts as an underlay) makes OpenStack easier to scale, upgrade, and manage. Just as Kubernetes and containerization bring benefit to rapid application development and delivery, bringing OpenStack and Kubernetes together can increase the resilience and scale of the OpenStack control plane and enable faster delivery of infrastructure innovation.
Join Mirantis' Nathan Trueblood and Intel's Das Kamhout to learn about how you can benefit from the work the OpenStack and Kubernetes communities are doing to provide a single platform for running bare metal, VMs and container workloads so that companies can rapidly deliver applications and business value to their customers.
In this webinar, Adam Dennison, SVP/Publisher, reviews insights from the new State of the CIO 2016 survey, and discusses top trends in investments, innovation and operational efficiencies that CIOs are prioritizing for the year.
Join Steven Thomas, Senior Consultant at Microsoft, specializing in Desktop and Application Virtualization as he talks with Flexera Software about best practices and developments with App V, as well as the future of application virtualization.
In this one hour webinar, we'll introduce the latest product enhancements to App Portal, including the new App Broker for ServiceNow that provides automation and governance over the software request process.
Watch this webinar to learn 10 tips and tricks to simplify your Windows 10 migration including reducing the number of applications to migrate, knowing which applications have compatibility issues, and empowering users to migrate when they are ready.
For those operating shared storage with VMware vSphere®, but want to increase performance while continuing to benefit from your existing storage investment, this webinar is for you!
Whether looking to solve an IT problem or achieve a business goal, performance usually plays a critical part. Flash storage has been known to improve storage performance and data center efficiency, but the question remains…’where do you put it, and how do you use it? And what happens when legacy systems don’t allow you to add flash?
Join Jason Pederson as he takes you through the different options for deploying flash in virtual environments, and introduces a new deployment model from Western Digital that gives you the least disruptive way to introduce flash acceleration into existing SAN environments and across different VM clusters.
Life is filled with decisions. We’re here to make them easier for you.
Bpm'online invites you to a free webinar “How to win the battle for customers in the age of new banking with smart tech tools and refined processes”.
Recent studies reveal that the average cost per customer interaction in a traditional banking branch is almost 8 times higher than in a respective digital channel.
During the webinar, Michael Rooney will shine a light on the gaps in traditional banking that limit their abilities to attract and retain next-generation customers. He will demonstrate how an agile CRM platform can help banks and financial services companies outperform their competition and set them up for success in the age of new banking.
Join the webinar to learn:
• What success factors can be drawn from a neobanking model?
• Key ingredients of an optimal customer journey with your bank.
• How to smoothly integrate digital innovations with traditional branch system?
• How smart tech tools minimize service time in branches and contact-centers?
• Steps to deliver a superior customer experience and boost sales results in banks.
Don’t miss out on learning how bpm’online can help banks and financial services organizations exceed client expectations and win leadership in the market.
There's new legislation in place, that's expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across testing and development environments. It's the General Data Protection Regulation (GDPR). Are you ready for it?
In this session, we’ll demonstrate how CA Test Data Manager helps to both mask your production data and to generate synthetic test data; a powerful combination to help you meet compliance needs and deliver quality applications. There will be a short section on the future of the tester self-service model that will enable testers to efficiently get access to the right test data.