Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • The Art of Preventing Ransomware The Art of Preventing Ransomware Bitdefender Recorded: Feb 23 2017 3 mins
    See how ransomware attacks and how Bitdefender is able to prevent those attacks.
  • SECOPS Automation on the Rise: Challenges, Directions, Futures SECOPS Automation on the Rise: Challenges, Directions, Futures Tom Gorup, Director of Security Operations at Rook Security Recorded: Feb 23 2017 33 mins
    With the growing number of newly-released, longtime-funded automation tools and platforms, it’s clear that network security operations automation has reached an inflection point. While automation promises to provide significant value to security and network operations teams, along with hopes and promises comes concerns about limitations, potential failures, and critical oversights—especially when it comes to automating incident response. These limitations don’t stem from a lack of APIs, compute power, or the advancement of machine learning or artificial intelligence, but rather from the tools that are doing the detection, notification, and remediation.

    Security operations expert Tom Gorup addresses short- and long-term automation challenges and provides analysis on why investments should be focused on arming people with more assistive technology, rather than attempting to remove humans from the equation entirely.

    About the Presenter:
    As Director of Security Operations for Rook Security, Tom Gorup oversees Managed Security Services and develops proprietary security operations management tools and services for organizations ranging from Fortune 100 firms to fast-growing startups. Prior to joining Rook, Tom served 6 years in the U.S. Army. As an Infantry Squad Leader, Tom served two tours in Iraq and Afghanistan, where he received a Purple Heart alongside several other awards for actions on the battlefield. Tom is GCIA certified, a participant in the GIAC mentor program and advisory board, Indiana Infragard Sector Specialist, and on the NexTech advisory board.
  • Put your IT Infrastructure First: Tips for Protecting & Securing your Networks Put your IT Infrastructure First: Tips for Protecting & Securing your Networks Alex Shteynberg, Technical Solutions Professional, Microsoft Recorded: Feb 23 2017 19 mins
    Secure your IT infrastructure on-premises and in the cloud through early detection via effective threat intelligence. Microsoft Azure dashboards/glass pane provides simple yet holistic views into what's happening, with the intent of detection-to-mitigation. We'll take you through ‘a born in the cloud approach’ to IT backend infrastructure security that has a high time-to-value, with best practices.

    Join this webcast to learn how to:
    - Collect threat intelligence with good examples such as Malicious IPs and drill down to specific machines to take action/mitigation
    - Leverage Baseline Assessments, a powerful method, that leverages 180 points of security configurations to harden your servers
    - Understand how to bring the power of analytics to configure alerts with a consolidated view
  • Cloud Security: From Strategy to Incident Response Cloud Security: From Strategy to Incident Response Ondrej Krehel, CEO/Founder, LIFARS and Michael Landewe, Co-Founder, Avanan Recorded: Feb 23 2017 49 mins
    Expert teams from Avanan and LIFARS will discuss what you must do to secure your cloud infrastructure.

    You might think your organization's cloud security posture is strong, but are there gaps you just don't know about? And if there were, how you would identify and remediate them? As companies continue to move to the cloud, it's becoming ever more important to have a multi-layered cybersecurity program in place.

    This webinar will address some of the most important trends in SaaS security, what it takes to be successful, and what you must do now to secure your cloud infrastructure and applications.

    Attendees will learn about:
    · The challenges in protecting users and data in the cloud.
    · How the cloud makes it difficult to identify and remediate security events.
    · What it takes to implement a successful SaaS security program.
    · How a multi-vendor, defense-in-depth approach can further secure their operations.
    · Why having an incident response plan for cloud security incidents is so important.
    · A new cloud security assessment solution to combat the SaaS security issues within their organization.
  • Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Mandy Sadowski and Rich Jerrido, Technical Product Marketing Managers, Red Hat Recorded: Feb 23 2017 53 mins
    The foundation of any IT deployment should be a sound infrastructure and standard lifecycle processes and procedures. At the forefront of every IT department this year is how to increase security, improve efficiency, and maintain compliance in an open source environment. With the ever-increasing influx of data, cloud and DevOps comes increased risk for cyber security attacks and data breaches. How can you continue down the path of digital transformation without compromising your network?

    Join this webinar to learn more about these increasing demands, and how Red Hat Satellite is spearheading these advancements.
  • A CTO's Perspective on Creating a Template for an Incident Response Plan A CTO's Perspective on Creating a Template for an Incident Response Plan Sam McLane, CTO/Head of Security Ops; Dave Martin, Head of Product Mgmt; Sridhar Karnam, Director of Product Mktg Recorded: Feb 23 2017 49 mins
    Join us for a panel discussion featuring our CTO, head of product management, and head of product strategy as they talk about executing an incident response plan. The discussion will cover how to create a template for IR as well as the critical elements of an IR plan and the testing frequency and methods to ensure you have a good IR plan in place. For those who don’t yet have a set plan but are looking to establish one, having a template to reference can be helpful. There are number of key pieces that should be incorporated into every incident response plan.

    When you have a security incident, do you have a documented incident response plan? If not, who makes the decisions? These incidents could result in a complicated and costly legal, regulatory, and/or security proceedings. The people, process, and technology responsible for responding to these incidents are collectively known as Incident Response.
  • Making your Data Come Together with IoT Intelligence Making your Data Come Together with IoT Intelligence Joshua Davis, MTC Cloud Solutions Architect Recorded: Feb 23 2017 51 mins
    The Internet of Things (IoT) starts with your things—the things that matter most to your business. IoT is about making your data come together in new ways. Tap into how data works for your business with IoT dashboards. Uncover actionable intelligence and modernize how you do business. See how IoT is revolutionizing businesses with field service organizations and driving business and digital transformation.

    Join this webcast to:
    - Learn why your business needs an IoT strategy
    - Understand how to connect and scale your IoT with efficiency
    - Analyze and act on untapped data
    - Integrate IoT with your business processes
    - Drive efficiency and scale in field services using IoT
  • How To Get More Clients Without Being A Pushy Salesperson How To Get More Clients Without Being A Pushy Salesperson Laura Posey Recorded: Feb 23 2017 48 mins
    Here is what you will learn:
    •The five-step master formula for attracting all the business you want
    •The secrets to building a sales machine that delivers quality prospects day in and day out
    •How having fewer prospects actually leads to more profit
    •And so much more...
  • Report: How Security Analytics Can Address Your SIEM Pain Points Report: How Security Analytics Can Address Your SIEM Pain Points Frank Jas, Chief Architect, Cyphort Recorded: Feb 23 2017 48 mins
    New research from Cyphort and the Ponemon Institute puts the spotlight on many significant pain points affecting the productivity and satisfaction of Security Operations Center (SOC) and incident response (IR) teams in large organizations. Clearly, there is growing dissatisfaction with the value these teams are getting from their getting from their SIEMs. New research reveals the negative impact this has on the security posture of these organizations.

    The solution may lie in the emerging category of Security Analytics. Join this session to learn:

    • Key findings from the research
    • How security analytics makes life easier for overworked security teams
    • What are the key functional requirements
  • Dynamic Column Masking & Row-Level Filtering in Hortonworks Data Platform Dynamic Column Masking & Row-Level Filtering in Hortonworks Data Platform Srikanth Venkat and Syed Mahmood, Hortonworks Recorded: Feb 23 2017 61 mins
    As enterprises around the world bring more of their sensitive data into Hadoop data lakes, balancing the need for democratization of access to data without sacrificing strong security principles becomes paramount. In this webinar, Srikanth Venkat, director of product management for security & governance will demonstrate two new data protection capabilities in Apache Ranger – dynamic column masking and row level filtering of data stored in Apache Hive. These features have been introduced as part of HDP 2.5 platform release.
  • How safe are your email-based communications? How safe are your email-based communications? Gus Maldonado Recorded: Feb 23 2017 35 mins
    Email-based communications are a fundamental cornerstone for effectively conducting business. For that reason, however, email continues to be a popular vector for business sabotage. Email is frequently used to propagate malware – including ransomware and zero-day threats - across your network.

    This webinar examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
    Learn how this comprehensive, flexible and scalable solution can:

    •Scan a broad range of email attachment types to detect advanced threats
    •Analyze them in a multi-engine sandbox
    •Block them prior to a security verdict
    •Rapidly deploy remediation signatures
  • Under The Hoodie: Actionable Research from Penetration Testing Engagements Under The Hoodie: Actionable Research from Penetration Testing Engagements Tod Beardsley and Andrew Whitaker Recorded: Feb 23 2017 43 mins
    Join Andrew Whitaker and Tod Beardsley in a webcast overview of Rapid7's recently published paper, "Under the Hoodie: Actionable Research from Penetration Testing Engagements." In this webcast, Andrew and Tod will cover the major findings from our latest research, including the vulnerabilities and misconfigurations most often found on our engagements, the effects of account lockouts and two-factor authentication on pen testers, and the most effective countermeasures you can take to detect and prevent criminal hackers from breaking into your network.
  • Engagement and Performance Management of Caregivers in Assisted Living- What Wor Engagement and Performance Management of Caregivers in Assisted Living- What Wor Malou Van Eijk, HR at Applewood Our House Recorded: Feb 23 2017 28 mins
    Healthcare workers in assisted living facilities and nursing homes are a valuable asset. With a growing aging population, it is more important than ever to actively engage and develop high performing healthcare workers and caregivers. Malou Van Eijk with Applewood Our House will talk about some of the innovative approaches she has taken to accomplish just that.
  • Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automatio Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automatio Paul Morris, Acting CISO/Acting Director, Cybersecurity Division, TSA and Pamela Warren, Director, Palo Alto Networks Recorded: Feb 23 2017 62 mins
    Cyber security is front and center like never before, and cyber leaders are working to speed cyber response times for threat prevention, detection, and mitigation for known, and more importantly, unknown threats.

    A recent study shows Feds are losing the race against hackers– with 85% of security operations professionals taking hours, even days, to create protections against newly discovered cyber threats.

    View the on-demand “Pedal to the Metal” webinar and hear from Federal and industry cyber experts as they discuss MeriTalk’s newest cyber study findings, including:
    •How much time and manpower is expended analyzing threat intelligence?
    •What advanced automatic capabilities can Feds utilize to act rapidly and decisively against advanced threats?
    •Is threat intelligence is helping Feds prevent attacks – from never-before-seen threat actors and tactics – faster?

    Featured Speakers Include:
    •Paul Morris, Acting CISO/Acting Director, Information Assurance and Cybersecurity Division, TSA
    •Pamela Warren, Director, Government and Industry Initiatives, Palo Alto Networks
  • Measuring Content Value and Determining ROI Measuring Content Value and Determining ROI James Goldman, Sr. Manager of Content Strategy at Equinix Recorded: Feb 23 2017 59 mins
    Return on investment (ROI) is a mathematical equation. Determining the value of investments in content can be a tricky proposition. If you can't place a value on your content, you can't do the math.

    Determining ROI not only requires we understand the value of our content—and what it costs to create, manage, and deliver—but it also requires consistency. To make the calculation meaningful, you'll need to ensure you're comparing apples to apples and oranges to oranges.

    Join Scott Abel, The Content Wrangler, and his special guest, James Goldman, Content Strategy Program Lead at Equinix, for this free one-hour webinar. James will examine the need for normalizing measurements, making sense of key performance indicators, and communicating the value of digital content production improvements in ways that are meaningful to management.
  • Solving Issues with Microsoft Windows File Server Bloat Solving Issues with Microsoft Windows File Server Bloat Tony Barbagallo, VP of Product Recorded: Feb 23 2017 36 mins
    Organizations no longer need to waste budget by expanding or upgrading Windows Storage Servers or waste resources evaluating what data is or isn’t useful. They can now maintain their existing servers and seamlessly add intelligent data transfer to a limitless tier of scale-out secondary storage at a quarter of the cost. In addition, primary storage is optimized, disk I/O is reduced and storage silos are consolidated. Join Caringo VP of Product Tony Barbagallo as he introduces the new FileFly Secondary Storage Platform--a complete hardware, software, and services solution that is ideal for remote office consolidation, enabling collaboration and significantly simplifying data protection.
  • Contextual Email Makeover Webinar Contextual Email Makeover Webinar The Movable Ink team Recorded: Feb 23 2017 20 mins
    We asked brands to submit their email campaigns to win a complimentary email makeover… and now we’re doing a live webinar to walk through the results!

    Join us on Thursday, February 23 at 1pm ET for a contextual email makeover. You’ll see the email campaign before and after adding contextual elements. We’ll walk you through the steps we took to add context and give you plenty of ideas for adding contextual elements to any email campaign.

    Seats will go fast for this exclusive event. Register now! And, if you'd like to submit your campaign for consideration, please fill out this form:

    https://go.movableink.com/Email-Makeover-Webinar-Submit-Campaign.html
  • Shifting From Sentiment to Opportunity Shifting From Sentiment to Opportunity Liz Miller - CMO Council, Alan Gellman - Esurance, David Berkowitz - Sysomos Recorded: Feb 23 2017 61 mins
    As social data streamed into systems, the voice of the customer became distinct and immediate. But as sentiment became the table stakes of today’s intelligence, marketers started to look for more out of their social engagement and listening programs. This shift has brought about a call to identify points of opportunity in social data that drive the business forward.

    This new mandate reveals new challenges: social media data can be messy, filled with lots of noise and few signals that point to definitive action. The mass of unstructured data that floods into systems is often incomplete and constantly in flux. One minute, a customer is “liking” a brand, and the next minute, that customer is telling the world about negative experiences and defection intentions. Wires get crossed. Sentiments can shift without warning. And slowly but surely, a marketer’s trust in social data can begin to erode.

    The conversation around social needs to evolve—breaking away from the endless opportunities to chat, mix and mingle with the customer and turning toward an intentional strategy of leveraging social data to reveal business-driving opportunity. These signals must point to where a business can make money or where a business may be missing the mark…or it must deliver real-time alerts to problems that can lead to customer defection and discord.
  • The State of Cybersecurity in 2017 The State of Cybersecurity in 2017 Alex Holden, Founder and CISO of Hold Security Recorded: Feb 23 2017 60 mins
    Join us in discussing the state of cyber security in 2017. What are current threats, pitfalls, and the myths hindering our defenses. Learn advanced techniques of defending your enterprise security and making it an undesirable target.

    This presentation will focus on the following:

    Overview of 2016 breaches
    • Mega Breaches – what happened to LinkedIn, MySpace, Dropbox and other major breaches from years ago
    • Yahoo Breach – why is it a game changer
    • Political hacking
    • DDoS impact
    • Ransomware Rampage
    • The year of the hacker

    State of Cyber Security in 2017
    • Will the Mega Breach revelations continue? And how we should react?
    • Would DDoS take the front seat again?
    • How to deal with Ransomware evolution?
    • What trends are feasible for hackers? Which trends are on their way to obscurity?
    • Defending your infrastructure in 2017
  • Selling for Introverts - how to stay true to who you are and grow your sales Selling for Introverts - how to stay true to who you are and grow your sales Alen Mayer Recorded: Feb 23 2017 47 mins
    Register for this webinar and discover 5 powerful strategies to help you excel and shine as an introvert in sales, without losing yourself in the process:
    •How to promote yourself without being obnoxious
    •What strategies to use for networking and social functions
    •How to know and meet your client's REAL needs (and make them happy)
    •How to persuade your clients without being manipulative
  • 2017 Webroot Threat Brief 2017 Webroot Threat Brief Tyler Moffitt | Senior Threat Research Analyst Recorded: Feb 23 2017 36 mins
    Get insights into the threat landscape.

    Presented by Tyler Moffitt, senior threat research analyst at Webroot, this webinar is based on data derived from the Webroot Threat Intelligence Platform, Webroot’s machine learning and contextual analysis engine.

    Comprised of millions of connected sensors and endpoints, in 2016 the Webroot Threat Intelligence Platform observed:

    •94% of malware and PUAs were seen only once
    •Approximately 1/3 of URLs were high risk
    •Zero-day phishing URLs doubled
    •And more…

    Get the insights you need to stay ahead of the malware curve in 2017.

    We hope you can join us for this live, educational session!
  • How Smartsheet operationalized Apache Spark with Databricks How Smartsheet operationalized Apache Spark with Databricks Francis Lau, Senior Director, Product Intelligence at Smartsheet Recorded: Feb 23 2017 61 mins
    Apache Spark is red hot, but without the compulsory skillsets, it can be a challenge to operationalize — making it difficult to build a robust production data pipeline that business users and data scientists across your company can use to unearth insights.

    Smartsheet is the world’s leading SaaS platform for managing and automating collaborative work. With over 90,000 companies and millions of users, it helps teams get work done ranging from managing simple task lists to orchestrating the largest sporting events and construction projects.

    In this webinar, you will learn how Smartsheet uses Databricks to overcome the complexities of Spark to build their own analysis platform that enables self-service insights at will, scale, and speed to better understand their customers’ diverse use cases. They will share valuable patterns and lessons learned in both technical and adoption areas to show how they achieved this, including:

    How to build a robust metadata-driven data pipeline that processes application and business systems data to provide a 360 view of customers and to drive smarter business systems integrations.
    How to provide an intuitive and valuable “pyramid” of datasets usable by both technical and business users.
    Their roll-out approach and materials used for company-wide adoption allowing users to go from zero to insights with Spark and Databricks in minutes.
  • How to make money off of Facebook Messenger How to make money off of Facebook Messenger Stewart Rogers, Dir. of Marketing Technology, VentureBeat Recorded: Feb 23 2017 60 mins
    With over 1 billion monthly active users, Facebook Messenger is beginning to change the world for companies looking for ways to connect with, engage, and retain an unprecedented number of customers. And we’re guessing that’s probably you.

    It’s all because of Messenger’s developer tools, which have leapt on the promise of bots for customer service and native payments without ever leaving the platform--and have thoroughly delivered on it. Users stay cozily inside the Messenger platform to play games, search, shop, pay, and more, meaning they’re fully engaged with your brand in multiple ways in a single brand context.

    Facebook’s long-term plan: make Messenger the center of users’ lives. Your short-term plan: start positioning yourself to take advantage of this revolution in messenger tech innovation. Register for this free VB Live event now and learn how you can monetize Messenger.

    In this webinar, you’ll:

    * Understand the broader digital wallet strategy to connect with customers through chatbots
    * Get valuable tips to spin chatbots into gold
    * Learn the biggest mistake organizations are making with payments through Messenger

    Speakers:
    * Laura Knapp, Managing Director, SRAX Social, Social Reality
    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
  • Lightboard Series: Networking and Security for Virtual Desktops & Mobile Devices Lightboard Series: Networking and Security for Virtual Desktops & Mobile Devices Hadar Freehling, Staff Security Strategist, Networking & Security, VMware Recorded: Feb 23 2017 11 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 3/3
    Title: Networking and Security for Virtual Desktops and Mobile Devices
    Abstract: Learn how to deploy intelligent networking and micro-segmentation for VDI and extend these capabilities to secure mobile apps and devices. We’ll demonstrate how VMware NSX can help you manage virtual desktop user access, and how to limit users from jumping off one server to another. You’ll also learn how to apply a few easily managed rules in your data center that can reduce your attack surface with policies that dynamically follow virtual desktops. In the second part of the session, we’ll explore how the integration of AirWatch and NSX allows you to extend security from your mobile devices and applications to their data center resources.

    In this session, we will discuss:
    •Using intelligent networking and micro-segmentation to make VDI environments more secure
    •Minimizing your attack surface with rules and policies for dynamic virtual desktops
    Extending security from mobile devices and applications to the data center
  • DataON™ MUST™ Provides Infrastructure Visibility and Management for your Windows DataON™ MUST™ Provides Infrastructure Visibility and Management for your Windows Howard Lo, DataON Storage; Cosmos Darwin, Microsoft; Peter Plamondon, Western Digital Recorded: Feb 23 2017 58 mins
    With the launch of Window Server 2016, new storage enhancements bring revolutionary new features within reach of every organization with its software-defined feature setup. With Microsoft Storage Spaces Direct (S2D) and using Microsoft certified and turnkey platforms, customers now have the ability to deploy highly available and scalable software-defined storage deploy converged or hyper-converged cluster storage architecture. DataON’s new MUST infrastructure visibility and management tool provides SAN-like storage monitoring features for customers deploying Windows Server 2016 SDS. The ability to easily view real-time dashboard level metrics for IOPS, latency, throughput on cluster, nodes and volume levels in a single pane of glass, helping you keep your hyper-converged system up and running.

    Join speakers from DataON, Microsoft and Western Digital as they show you how to deploy a Windows Server 2016 S2D hyper-converged solution with DataON MUST.

    The webcast will explore the following topics:

    • How DataON MUST visibility and monitoring tool helps you manage your Windows Server 2016 software-defined storage

    • How Storage Spaces Direct in Windows Server 2016 allows you to build software-defined storage using Microsoft-certified industry-standard servers with local storage

    • How Western Digital storage solutions support Windows Server 2016

    Presented by:
    Howard Lo, VP of Sales and Marketing, DataON Storage
    Cosmos Darwin, Program Manager II, Microsoft
    Peter Plamondon, Director, Strategic Partner Ecosystems (Microsoft), Western Digital
  • IT Analytics: How a Data Company uses Analytics to Improve IT IT Analytics: How a Data Company uses Analytics to Improve IT Brian Smith - VP, Technical Operations, Tableau Feb 24 2017 10:00 am UTC 45 mins
    Today’s IT departments can’t simply provide IT solutions to other departments. Passively processing other departments’ requests is no longer sufficient to meet modern business needs, power company growth, and excel in a constantly changing marketplace. Instead, IT must strive to be the leading force and early adopters for information technology themselves.

    Join this live webinar to see how Tableau’s IT department uses analytics on a daily basis to analyse their own performance and improve their own efficiency.
  • Comment protéger et surveiller vos données sensibles en tous lieux Comment protéger et surveiller vos données sensibles en tous lieux Hervé Doreau, Directeur Technique - Symantec France Feb 24 2017 10:00 am UTC 60 mins
    À l’heure où 5 grandes entreprises sur 6 sont la cible d’attaques avancées, la protection des données est votre meilleure stratégie pour éviter de faire la une des journaux. En quoi consiste la protection des données ?
    Lors de ce webcast, nos experts vous montreront les atouts des technologies Symantec pour mettre en œuvre une approche intégrée en : 
    - Limitant et contrôlant l’accès aux données aux seuls utilisateurs légitimes grâce à une authentification multifacteurs renforcée, quel que soit le périphérique utilisé, même un appareil personnel.
    - Surveillant le flux des données où qu'elles se trouvent : dans le cloud, sur site, sur des appareils mobiles, ou sur un stockage à long terme.- Évitant les pertes de données par l'adoption de politiques de chiffrement ou de blocage des informations critiques avant qu’elles ne quittent le périmètre de protection.
  • Cómo recuperar el control de sus datos móviles Cómo recuperar el control de sus datos móviles David Sanz - EMEA Endpoint & Mobile Competency Lead Feb 24 2017 11:30 am UTC 60 mins
    Los puestos de trabajo y los dispositivos móviles son habitualmente los aspectos más olvidados en la estrategia de gestión de datos empresarial. Sin embargo, la información presente en ordenadores portátiles, de escritorio y dispositivos móviles es uno de los activos de mayor valor para la organización, pese a que potencialmente se encuentra en máximo riesgo. De acuerdo con IDC hay alrededor de 1.300 millones de trabajadores móviles hoy en día, pero tan solo la mitad de las empresas utiliza algún tipo de backup para puestos de trabajo.

    La fuerza de trabajo móvil es cada vez mayor. Dichos usuarios manejan información fuera del dominio tradicional del departamento de TI y emplean soluciones de colaboración no corporativas. El coste potencial y el riesgo asociados al cumplimiento de la normativa y al eDiscovery, la necesidad de proteger el puesto de trabajo y de aportar soluciones de colaboración corporativas están claros y se encuentran en un punto de inflexión crucial.

    Acompáñenos en este webinar, donde analizaremos:
    - Cómo recuperar el control sobre lo que ocurre en los dispositivos móviles de los trabajadores
    - Cómo mitigar los riesgos asociados con los ataques cada vez más frecuentes de ransomware
    - Cómo aumentar la productividad con una plataforma segura para la compartición de archivos
  • [VIDEO] Cyber Security Lessons for the Financial Sector [VIDEO] Cyber Security Lessons for the Financial Sector Josh Downs, Community Manager, BrightTALK & Ian Glover, President, CREST Feb 24 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • 2017 Cybersecurity Threat Insights Report for Leaders 2017 Cybersecurity Threat Insights Report for Leaders Chris Yule, Senior Researcher, Counter Threat Unit Feb 24 2017 2:00 pm UTC 60 mins
    In our “Cybersecurity Threat Insights Report for Leaders”, we shared several key findings and observations from our client engagements and about the security industry. This webcast will cover our findings and observations but will also provide you with clear direction on where you need to focus your resources to evoke positive action in your security program.

    During this webcast one of our lead Counter Threat Unit™ researchers, Chris Yule, who helped develop the report, will give his perspective, observations and guidance through responses to a series of questions led by our EMEA Marketing Manager, Andy Patton.
  • How Content Marketing on LinkedIn can Boost your Bottom Line How Content Marketing on LinkedIn can Boost your Bottom Line Viveka von Rosen Feb 24 2017 4:00 pm UTC 45 mins
    LinkedIn Publisher is like a hidden treasure for content marketing. If you have the right “map” to find the gold within! My session will be your roadmap to LinkedIn Content Marketing Success. As one of Linkedin Learning’s authors, we get special access to what LinkedIn is looking for in Publisher Posts- and I’ll share that information with you!
  • Biz Dev Done Right Biz Dev Done Right Caryn Kopp, Chief Door Opener Feb 24 2017 5:00 pm UTC 45 mins
    When Business Development is done right, there is no limit to what can be accomplished! Caryn answers the top 4 sales questions she is asked most about sales including, “How do I get more sales? How do I meet more prospects? How do I close sooner? And, how do I find time for business development?”
  • Machine Learning Can Address the Most Pressing Security Challenge Machine Learning Can Address the Most Pressing Security Challenge Jason Matlof, EVP at LightCyber Feb 24 2017 5:00 pm UTC 60 mins
    Noise is the enemy of breach detection and response. After a major data breach it is often the case that signs of an attacker existed, but were buried in thousands of other security alerts that were mainly false positives.

    With machine learning, meaningful signs of an attack are more easily detected and isolated, so a security operator can focus on precisely the right issue.

    This session will examine:
    - The problem of noise
    - The role of machine learning in sifting through vast amounts of data to get to the fidelity needed to detect an attacker
    - Best practices for including machine learning in your security operations
  • Trends in Optical Communications Trends in Optical Communications Vladimir Kozlov PhD, Founder & CEO of LightCounting and Larry Tarof PhD, Jabil Chief Photonics Scientist Feb 24 2017 5:00 pm UTC 75 mins
    By 2020, more than 20 billion devices will connect to the internet. To carry the load created by our passion for connected living, much of the digital infrastructure we rely on is turning to high-speed fiber optics. Join Vladimir Kozlov PhD, Founder & CEO of LightCounting, and Jabil Chief Photonics Scientist Larry Tarof PhD, in this one-hour webcast as we explore the technological advancements and market trends shaping the optical communications industry.
  • The economics of using Cloud Storage to replace LTO tape backup The economics of using Cloud Storage to replace LTO tape backup Andrew Klein Feb 24 2017 6:00 pm UTC 30 mins
    If you’ve considered replacing your LTO tape system, you’ve learned that using cloud storage for backup and archiving can be expensive and nearly impossible to predict your cost when you had to recover your data. Until now. Backblaze B2 provides cloud storage for just $0.005/GB per month. Join us as we show you how companies have saved time, improved their ability to quickly recover data, and saved money by replacing their LTO set-up with B2 Cloud Storage. Never buy another tape again…
  • Do You Really Mean ‘I Need a SOC’? Do You Really Mean ‘I Need a SOC’? Andy Herrington, , Fujitsu Services UK Ltd, Paul McEvatt, Fujitsu Services UK Ltd, Adrian Davis, (ISC)² EMEA Feb 27 2017 12:00 pm UTC 60 mins
    Enterprises have generally responded to the security challenge, recognising that they cannot simply cross their fingers and hope to avoid a major cyber incident. Many have reached for the ‘big security technology catalogue’ and in the past couple of years we have seen increasing numbers of organisations setting out with the intention of deploying some form of SOC. While there is no getting away from the fact effectively deployed technologies and the integration of a well organised SOC can be part of the solution, very few organisations can actually set up and operate a form of SOC that will make a material difference. In this webinar, experts from Fujitsu will discuss the considerations that go into an effective SOC, identify common mistakes and recommend a SOC Strategy which is more likely to yield an improved security posture than blowing a massive budget on a ‘home-grown’ SOC.
  • Be your own Nostradamus – why every business needs to see into the future! Be your own Nostradamus – why every business needs to see into the future! John Joe McGinley and Hannah Hutcheon Feb 27 2017 1:00 pm UTC 45 mins
    How often do you look to the future? Now, I am not saying we should all become seers and peer into the unknown, but when it comes to planning for the evolution of your business, knowledge is certainly power.

    When you step back and look at how our world will evolve, then all sorts of possibilities will arise. It is then up to you to decide which you wish to pursue and those you choose to ignore.

    John Joe McGinley from Glassagh Consulting and Panacea Adviser will highlight how you and your business can:

    - Understand how your world is evolving and you can adapt
    - Look at the opportunities and threats the future will bring
    - Document a plan to meet and exploit these profitably.

    This 30 minute webinar will highlight some simple tools and techniques we can all use to prepare for a profitable and less stressful future. Make sure you book your place here.
  • SUSE Container as a Service Platform - Grow your Technical knowledge SUSE Container as a Service Platform - Grow your Technical knowledge Rob Knight Feb 27 2017 3:00 pm UTC 30 mins
    Get some excellent technical details on Container as a Service in only 15 minutes!
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Feb 28 2017 2:00 am UTC 60 mins
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.
  • Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Public, Private, Hybrid: Embrace Any Cloud, Securely [Breach Prevention] Sai Balabhadrapatruni, Sr. Product Marketing Manager, Palo Alto Networks Feb 28 2017 8:00 am UTC 60 mins
    The demand for business to be more agile and stay competitive is driving a change in the way applications are developed, deployed and adopted. The challenge has become balancing the agility needs of the business with improving the security of the applications and, more importantly, securing the data as it moves between the various clouds. Gaining visibility and preventing attacks attempting to gain access to the data, whether from an external location or through a lateral attack, becomes imperative in all locations where the applications and data reside, without adding additional cost or complexity. Organizations require visibility, control and prevention capabilities across any cloud environment, enabling consistent security policies and protection no matter where it is deployed.
     
    This webinar will cover:
     
    • Visibility:  Consistent visibility across clouds is one of the most common issues with multi-cloud deployments.
    • Threat prevention: Block known and unknown threats is a critical requirement to protect applications and data no matter where they reside.
    • Automation: The ability to natively integrate into a variety of environments to match the dynamic and on demand nature of cloud services.
    • Centralized management:  Manage your virtualized and physical firewalls from a single management console, delivering consistent policy and features across all clouds.