SANS' 2016 survey of incident response (IR) capabilities indicated that the IR landscape was ever changing. Advanced industries were able to maintain effective IR teams, but it identified hurdles responders face to increase the efficiency of their IR teams.
In this SANS Incident Response Survey webcast, James Carder, LogRhythm CISO & VP of LogRhythm Labs, joins industry experts to explore the results of the fourth annual SANS survey on incident response. Together they'll provide insight into the maturity of IR processes and functions spanning a variety of environments.
• Types of attacks experienced and nature of the breaches
• Time needed to detect, contain, and remediate breaches
• Maturity of network visibility infrastructures and security operations centers' response capabilities
Watch now to learn more about the incident response capabilities of your peers and how IR can help you protect your network.
Thanks to supportive macro and political conditions and the spate of reforms introduced in recent years, the Indian economy has been gathering momentum and is set to reach its medium to long term growth potential. Join Gordon Rodrigues and Geoff Lunt to understand what the latest developments, including the repo rate cut earlier in August, mean for the Indian Fixed Income asset class and our strategy.
We are also marking the fifth anniversary of HGIF Indian Fixed Income, which has seen its AUM swell to ~ $600 million earlier this year. Gordon and Geoff will explain why the asset class continues to look appealing when compared with most of its EM and DM peers, and why we consider it a strategic rather than thematic allocation in a global portfolio.
The ultimate goal of marketing is to provide the consumer with a personalized experience across numerous channels and devices, at scale.
The first step to achieving omnichannel excellence starts with an often-underestimated channel, email. Why start here? The answer is simple; the consumer is constantly changing channels and devices, but not email address. In essence, an email address is the consumers’ digital ID. This is the first part of key data that the marketer needs to start the omnichannel journey.
In this presentation, we will focus on how to start your journey with the #1 digital channel for ROI, email.
For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.
Secure web gateways (SWGs) can deliver the insights and controls you need to mitigate the risks of the web. They pick up where next-generation firewalls (NGFWs) leave off, providing the Layer 7 termination and in-depth inspection of web traffic (port 80 and 443) required to uncover and protect against the increasingly sophisticated web threats targeting your business.
In this webinar learn how a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.
●A proxy-based architecture is ESSENTIAL to meeting the needs of the Cloud Generation.
●Symantec BC Proxy SG is the best security defense.
●Symantec Proxy SG dramatically improves threat protection, while reducing costs of other security infrastructure.
Kleiner Perkins Caufield & Byers (KPCB) partners with the brightest entrepreneurs to turn disruptive ideas into world-changing businesses. Oren Falkowitz demonstrates the increasing need for proper cybersecurity.
Cybersecurity was on the main stage for the first time at Fortune Tech 2017 moderator Jeff John Roberts joined Oren Falkowitz, CEO of Area 1 Security, as well as former NSA head Gen. Keith Alexander, now of IronNet and Marten Mickos of HackerOne discussed how to keep the internet safe from hackers.
Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations. Camilla Dahlen, Head of ISV, Cloud, Platform Partnerships at SAP and Tobias Bloch, VP Sales, North America at Accenture discuss the benefits of SAP’s ISV Partner Program, including the strength and seamlessness of go-to-market opportunities. Accenture is partnering with SAP to bring the power of SAP Cloud Platform to their customers.
PwC helps organizations and individuals create the value they're looking for. PwC leverages GRC technology to help clients manage risk with analytics. Elizabeth McNichol, Partner Risk and Compliance, PwC and Camilla Dahlen, Head of ISV, Cloud, Platform Partnerships at SAP discuss the benefits of SAP’s ISV Partner Program and SAP’s portfolio to manage large data sets.
The data strategy affects anything that happens before users start visualizing and analyzing the data. You can minimize the time to analysis for users by providing an analytic tool that simplifies preparation, ingestion and maintenance of data sets regardless of format, size and location of source data; and encourages reuse of already prepared data sets. Learn about Qlik’s innovative Qlik Sense data strategy, from connectivity to big data. We preview the connectivity services and look at visual data preparation with data profiling and added insights into data at "prep time". We also investigate efforts to increase and simplify reuse of data through an external Data Market and the upcoming Global Library, plus ways to handle complex big data sets through ODAG and other technologies, including Big Data indexing and IoT capabilities.
Hjalmar Gislason is VP of Data in Product Management at Qlik. Hjalmar joined Qlik in 2014 through the acquisition of DataMarket, of which Hjalmar was founder and CEO. Hjalmar is a proud "data nerd" and has spent his entire carrier bringing new product ideas to life.
Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.
This webcast will discuss such questions as:
> What issues are city officials prioritizing for resolution through smart community applications?
> How are communities planning for and deploying small cell infrastructure?
> Which departments are involved in communications infrastructure?
> How can suppliers navigate the multiple departments involved in decision making?
> What business models are cities negotiating with their technology product partners?
> What are some of the lessons learned from cities that you can translate into your own business offering?
Jascha Franklin-Hodge, CIO, Boston, MA
Kate Garman,Smart City Coordinator, Seattle, WA
Peter Marx, former CTO, City of Los Angeles, currently in the position of VP, GE Digital
10 in Tech hosts Shane Carlson and Kirstie Magowan talked with Brian Uhelski from Accorio at Knowledge17. Brian talked about setting vision and strategy and how important this is to a successful ServiceNow implementation. Do one thing and do it really well. Brian stressed the importance of being involved in the community as this helps customers to make the right decisions.
Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?
Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
- CPE opportunities, member benefits and getting involved
- Updates on (ISC)² news, developments and changes in your region
- Your membership requirements summarized
- Who are the (ISC)² EMEA team and how we can help you
- Focus discussions
- Q&A session
With Yellowfin you can engage users with governed data they will actually use. Learn how you can deliver timely engaging, and curated analytics with the highest employee usage in the industry.
The Yellowfin BI platform gives IT the control they need, analysts the tools and flexibility they need, and business decision-makers the trustworthy data they need. And it gives developers the flexibility and easy integration they desire.
Not a week goes by without another IoT hack headline, yet we’re not doing enough to address this threat. We’ll show you in this presentation why the threat of IoT should remain top of mind.
Join us for this webinar to learn about:
- Global scope of IoT devices and their vulnerability posture – aka the IoT threat landscape
- The growth of threat actor activity targeting IoT devices from 2016 to current day
- A viewpoint of pre and post Mirai as an indication of what’s to come
- The networks launching IoT attacks
- The countries being targeted
- What “dealing with” the threat of IoT looks like
F5 is releasing three years of original mass scanning data and analysis on cryptographic security posture.
What you’ll learn in the webinar:
•How you rank against the rest of the world and your competitors.
•Why TLS 1.3 should probably be named TLS 4.0.
•Which attacks are concealing payload within encrypted tunnels
Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.
To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.
Join us for this to learn:
- 6 reasons development should own security
- Best practices to employing Shift-Left security
- How to deploy secure apps at DevOps speed
ServiceNow’s Britt Champeau, chatted with Kirstie Magowan and Shane Carlson from 10 in Tech about champion enablement. She helps organizations spread the value of ServiceNow to the enterprise. Britt concentrates on the ‘soft side’ of a ServiceNow implementations. She emphasizes the value of organisational change management.
This case study is framed in a multinational company with 300k+ employees, present in 100+ countries, that is adding one extra layer of security based on big data analytics capabilities, in order to provide net-new value to their ongoing SOC-related investments.
Having billions of events being generated on a weekly basis, real-time monitoring must be complemented with deep analysis to hunt targeted and advanced attacks.
By leveraging a cloud-based Spark cluster, ElasticSearch, R, Scala and PowerBI, a security analytics platform based on anomaly detection is being progressively implemented.
Anomalies are spotted by applying well-known analytics techniques, from data transformation and mining to clustering, graph analysis, topic modeling, classification and dimensionality reduction.
Personalisation is the latest trend within email marketing and with good reason - it delivers the goods. However, the reason behind its success is not what you may think. In this must-attend session, Kath Pay, CEO of Holistic Email Marketing de-mystifies personalisation and reveals that contrary to popular opinion, personalisation should not in fact be our objective, but instead it should be to deliver a great customer experience using personalisation as a strategy to achieve this.
This session will be packed full of practical tips and advice on not only how to achieve a better customer experience using personalisation, but will also demonstrate as to why it's so powerful. Beware though - you may well be pleasantly surprised at the many ways to achieve personalised emails beyond product recommendations!
Humans have been protecting our complex network infrastructures for decades with varying degrees of success, while eusocial insects such as ants are capable of withstanding countless attacks on their networks.
This presentation is about what ants in general and Leafcutter Ants in particular approach security and how we can learn from these survivors of millions years of warfare.
You will learn:
-How social insects (ants) are dealing with predictive analysis
-Applying the defense mechanism of ants on threat intelligence
-How information sharing and communication can lead to better security
-Data and Identity Management
Tomorrow’s Marketer is focused on targeting key accounts to generate new business. What’s the secret to creating 1:1 moments with your key targets? Personalisation and Predictive Technologies are the secret weapons that empower account-based marketing (ABM) strategies to target and engage key accounts at the top of the funnel.
Join our webinar as Ray Coppinger, Head of Marketing EMEA at Marketo looks at how personalisation and predictive content can power your account-based marketing strategy. You will learn how to:
* Complement your account-based marketing (ABM) strategy with personalisation
* Generate more sales-ready leads by focusing on the accounts that matter
* Leverage best practices from companies personalising their websites for prospects
* Measure the impact of your personalised campaigns with an account-focus
* Leverage predictive content to drive engagement with target accounts
The General Data Protection Regulation (GDPR) and the Network and Information Security (NIS) Directive will both be enforced as of May 2018. You may think you’re ready for these laws, but covered companies may need to improve the security of personal data they hold, and of their networks and information systems. Data breaches and security incidents will have to be reported. As they prepare for the GDPR and NIS, it is imperative that organisations understand their cybersecurity risks and invest appropriately.
One of digital marketing's biggest bugbears is the ability for brands to follow customers, often clumsily. Join this webinar on BrightTALK to hear how to make 'real time' work really well for your brand.
Join us to find out:
· Why to use it
· How to use it effectively
· Whether it actually makes a difference
· If it's worth the time, money and effort to set-up for the long-term benefits
Brands are increasingly investing in 'real time' content. This webinar will feature experts in email and real-time marketing to give you the answers your business needs. Explore what this actually means, and what the implications and rules are for marketers.
The recent ransomware outbreaks have destabilized business operations around the world.
The most recent ransomware scare came from what appeared to be a new variant of the Petya ransomware. Leveraging exploits and techniques similar to WannaCry, along with other advanced techniques, to cause damage by sabotaging systems, this latest attack clearly demonstrates how damaging malware can and likely will continue to be to organizations.
How can you proactively prepare for such threats?
Watch this webinar to learn how to apply a broader analytics-driven approach to do the fundamentals better, and minimize the risk that your organization will be affected.
This session will include live demonstrations, and will cover best practices in the following areas:
• Security fundamentals – the importance of consistent blocking/tackling and security hygiene
• Posture assessment – establishing end-to-end visibility of potential ransomware activity
• Investigation, hunting and remediation – IR techniques to verify alerts and hypotheses, and prioritize based on risk
• Threat intelligence – identifying C2, file hashes and other ransomware IoCs
• Automation and orchestration – integrating a layered security architecture to drive to faster decisions
• Leveraging machine learning to detect ransomware patterns and adapt threat models for the latest mutations
If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.
Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
Analytics risks can keep you up at night. What if…
· We make a big investment and don’t break even?
· Management doesn’t trust the results?
· Analysts cross data privacy boundaries?
What a dilemma! You see the perils, yet you want the rewards that analytics can bring. The appropriate process enables you to dramatically reduce risks and maximize returns on your data and analytics investment.
In this presentation, you will learn:
· What causes most analytics failures
· How you can diminish risk and maximize returns through strong analytics process
· Why you (yes, you!) have a pivotal opportunity to establish high standards for analytics process right now
Innovation in chemistry is required in all sectors of industry, whether it be in pharmaceuticals, material science, or indeed any other branch of science. These innovations are the foundation of our modern society and lead the way for businesses to progress - and help the world to progress.
Chemical by PatSnap seamlessly links chemical structure searches to intellectual property data, enabling you to effortlessly discover chemical structures linked to the most relevant of patents, no matter how they’re described or written.
In this webinar, we’ll be joined by Chemist and IP expert Andy Lai as he demonstrates how you can validate your target chemicals performance against 114 million structures, from over 100 patent jurisdictions.
Some other topics that will be discussed include:
- How to utilize the similar search function to discover structures very close to yours
- How the Chemscape can highlight opportunities for licensing and collaboration
- Discover what the good chemical performance indicators look like
The General Data Protection Regulation (GDPR) is fast approaching and whilst there's lots of information about GDPR from an IT security perspective, marketers are still trying to understand the implications it will have on their marketing efforts from 25 May 2018 and beyond.
As the modern email marketing landscape changes dramatically with the introduction of GDPR, this webinar explores the role of Marketing Automation in helping organisations stay GDPR compliant.
Information security has not kept pace with the new reality of a software-driven world. Traditional defenses are proving inadequate in this environment. We’ll discuss how organizations should evolve their security strategies as users and applications become the risk focal point. Attend this session and learn about new approaches such as:
• Work with the way developers work.
• Cover not only the apps an organization develops internally, but also those it purchases or assembles from components.
• Move beyond the software development lifecycle to the full software lifecycle, covering apps from inception through production.