Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Cyber Security in Today's IoT World
    Cyber Security in Today's IoT World Parnian Najafi Borazjani, Senior Analyst, FireEye Live 45 mins
    IoT devices have become a mainstream part of our lives. IoT devices are no longer just consumer devices, rather they are interwoven in different parts of corporations.

    The August 2016 Mirai botnet attack has shown that security in IoT is required to have overall security. The lack of security in IoT devices not only affects users, but also affects the society in a larger scale. Manufactures of these devices need to follow a set of guidelines to ensure secure developments and deployments.
    Moreover, device consumers such as corporations should be aware of their attack surface.

    Join us for a live webinar as we address the top security and privacy issues in IoT devices, the threats that are targeting them and recommendations for possible solutions.
  • Your breach readiness master plan: take the sting out of a cyber attack
    Your breach readiness master plan: take the sting out of a cyber attack Judith Moore, Director & Partner, FleishmanHillard Fishburn; Mark Deem, Partner, Cooley; Mike Trevett, UKI Director, Mandiant Recorded: Oct 22 2018 61 mins
    With numerous market-leading companies making negative data breach headlines this year, and attackers constantly evolving their techniques, tactics and procedures, it seems there’s no longer a case of ‘if’ an organisation will be breached, but instead ‘when’.

    “Do you know how your team will respond to and remediate a cyber-attack?”, is an increasingly pertinent question that all C-suite leaders should be able to answer—and more importantly, have a role in finding that answer to ensure their organisation’s cyber-security posture and incident response (IR) plan is built for success.

    Join and contribute to the conversation as Judith Moore, Director & Partner, Corporate and Crisis at FleishmanHillard Fishburn, Mark Deem, Partner at Cooley LLP and Mike Trevett, UKI Director at Mandiant discuss:

    •How to identify security maturity improvement areas before, during and after a breach
    •Why constantly-evolving threats require organisations to periodically revisit their crisis communication plans
    •What actions organisations should take to ensure they can effectively protect their reputation in the event of a breach
    •Which key strategic communication tactics should be considered when reporting a breach
  • #ArubaAirheads_ Getting Started with the ClearPass REST API - CPPM
    #ArubaAirheads_ Getting Started with the ClearPass REST API - CPPM Saravanan Rajagopal, Aruba TAC team Recorded: Oct 22 2018 69 mins
    During this webinar, we will explore the REST API as the ClearPass API integrations and further developments are more focused to REST API than the other existing API services like xml-rpc, SOAP, etc.
  • Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbH Recorded: Oct 22 2018 59 mins
    Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
    Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
  • What Executives Should Know about Cyber AI
    What Executives Should Know about Cyber AI Claudio Scarabello Director Product, APAC FireEye Inc Recorded: Oct 22 2018 54 mins
    Artificial intelligence (AI) is a transformative technology that provides organizations with better cyber defense tools but also helps adversaries improve methods of attack. Organizations need to understand how AI will impact cyber security before they rely on it for their defenses.
    Watch this webinar as we discuss:
    • How AI tools can be used for offensive and defensive purposes in the cyber domain
    • Changing geopolitical landscape as threat actors develop and implement AI capabilities
    • Enhancement of a businesses’ defensive capabilities through AI technology
    • How FireEye uses machine learning to bolster its internal defenses and tools
  • FireEye Global Threat Response – How we Protect the World
    FireEye Global Threat Response – How we Protect the World Tim Wellsmore, Director, Government Security Programs, Mandiant International, a FireEye Company Recorded: Oct 22 2018 57 mins
    Most approaches to the global cyber security problem are usually focused locally inside separate organisations, who struggle to look out across the global landscape and effectively respond. National responses from government capabilities can be challenged by capacity and jurisdiction to truly understand the global threat environment, and to effectively respond. This presentation will highlight how FireEye utilises its various capabilities and threat focused teams from all parts of the business to build a cohesive global detection and response capability for the biggest global threats.

    This presentation will outline how we tactically respond within our internal capability teams, and across our customer base of 67 countries and how we keep the media, our customers and our government partners informed on the latest information. How we scale quickly to respond to WannaCry or NotPetya to ensure our Community Protection mandate is relentless maintained is an impressive story. This presentation will highlight how our FireEye technology arm and FireEye's subsidiary companies of Mandiant and iSight work seamlessly together in a global cyber threat event to bring our best against the world's most advanced cyber threat actors.
  • Kevin Mitnick Hacks LinkedIn Two-Factor Authentication
    Kevin Mitnick Hacks LinkedIn Two-Factor Authentication Kevin Mitnick Recorded: Oct 19 2018 7 mins
    KnowBe4's Chief Hacking Officer, Kevin Mitnick, shows a two-factor authentication exploit based on a credentials phishing attack using a typo-squatting domain. Once the user falls for this social engineering tactic and enters their credentials, the 2FA token gets intercepted and it's trivial to hack into the LinkedIn account.
  • Say Goodbye To Your Inner Critic and To Self-Sabotage
    Say Goodbye To Your Inner Critic and To Self-Sabotage Harriet Waley-Cohen, Speaker and certified coach Recorded: Oct 19 2018 61 mins
    Have you ever really wanted to achieve something, perhaps losing weight before a big occasion, or applying for your dream job, yet somehow you always seem to get in your own way, and there's a little voice in your head that tells you not to bother because you'll never get there anyway, so there's no point trying.

    We all have an inner critic to one extent or another, and we can all sabotage our own progress at times. Just ask anyone who needs to fill out their tax return if they've ever found themselves embarking on a kitchen cupboard clear out instead!

    In this webinar you will discover:
    How to identify your inner critic, and get clear on how it holds you back.
    The secret behind self-sabotage and your inner critic - why are they are so powerful?
    How to beat them both and achieve what you really want to achieve in life, be it in your career, relationships or wellbeing.
    Mindset hacks and processes that are immediately implementable that will make a big difference to you.
  • Tableau Careers - Tableau the Skill
    Tableau Careers - Tableau the Skill Andy Kriebel, Head Coach and Tableau Zen Master at The Data School & Eva Murray, Head of BI and Tableau Zen Master at Exasol Recorded: Oct 19 2018 46 mins
    Data analysis and visualization skills are in very high demand and rank among the top technical skills companies are looking for right now.

    Hear from Edward Beaurain, Director of Commercial Sales at Tableau, why Tableau skills have become so important in the market place and what the organizations he works with are looking for when they recruit new talent.

    As a final chapter of our Tableau Careers series, Edward will also share how you can join TC18 from anywhere in the world and make the most of the networking opportunities out there so you can land you dream data job.
  • Beyond the Executive Table: How to be seen as a leader and not a manager
    Beyond the Executive Table: How to be seen as a leader and not a manager Agata Domond, Certified Executive Presence & Career Development Coach, Domond Leadership Institute Recorded: Oct 19 2018 56 mins
    Are you struggling to secure that next promotion?

    One of the biggest challenge women leaders face is confidence and projecting a powerful image. Which then in turns impacts how we show up in career and business. As women continue to advance in leadership roles it’s imperative that we understand the distinction between managing a team and leading a team. To advance in your field you must be able to show up as one that leads.

    In this webinar we will work together to

    1.Discover your overall Leadership Vision and Style
    2.Identify three key strategies to build relationships not procedures
    3.Understand the importance of developing your team members versus directing them


    Agata Domond is the CEO of Domond Leadership Institute and Founder of non-profit organization Domond Immigrant Adult Learning Center (501c3). As a Certified Coach, Speaker & Trainer she specializes in Executive Presence for Women, Leadership and Career Development. Agata uses her experience and Corporate training as a former Senior Technical Project Manager for Fortune 10 company to help Women Leaders identify their life’s purpose and develop a strategy to maximize their impact and succeed in Career & Business. For proven tips on establishing your Executive Presence please visit www.MyExecutiveGift.com
  • Tableau Careers - Tableau the Skill
    Tableau Careers - Tableau the Skill Eva Murray, Andy Kriebel, Edward Beaurain Recorded: Oct 19 2018 1 min
    Data analysis and visualization skills are in very high demand and rank among the top technical skills companies are looking for right now.

    Hear from Edward Beaurain, Director of Commercial Sales at Tableau, why Tableau skills have become so important in the market place and what the organizations he works with are looking for when they recruit new talent.

    As a final chapter of our Tableau Careers series, Edward will also share how you can join TC18 from anywhere in the world and make the most of the networking opportunities out there so you can land you dream data job.
  • Two is company, is three too many clouds? Keeping the clichés out of multi-cloud
    Two is company, is three too many clouds? Keeping the clichés out of multi-cloud Brad King, Chief Architect and Co-Founder, Scality Recorded: Oct 19 2018 31 mins
    The term multi-cloud has caught on this year, and we’ll be discussing the reasons it could matter a great deal to your business. If you are a cloud user, a company providing services and solutions that use public cloud infrastructure, or currently defining a cloud strategy, we’ll discuss why being able to keep your cloud options open is so important. Scality is working hard to provide tools to help public and private cloud users keep control of their storage, permitting the use of the right cloud for the right job. We’ll be discussing the business implications of multi-cloud storage, the freedom that our Zenko technology allows. We’ll be joined by Nodeweaver who will share why multi-cloud is important to their business.
  • Worry-Free Security on Azure
    Worry-Free Security on Azure Robert Smith & Hubert Ng Recorded: Oct 19 2018 55 mins
    Presenter

    Robert Smith - Higher Education & Research Specialist – APAC - Microsoft

    Hubert Ng – Cloud Engagement Manager – Asia Pacific - Palo Alto Networks

    An exclusive webinar for the education sector

    Businesses are not the only organisations looking to take advantage of the innovation and disruption that moving to the cloud can provide. Schools, colleges and universities across the Asia-Pacific region are moving their data and applications to the cloud.

    Join our webinar on October 19, and learn how to secure your data and apps in Microsoft® Azure®.

    We will be joined by Robert Smith, higher education and research specialist – APAC from Microsoft, and Hubert Ng, cloud engagement manager for Palo Alto Networks, who will share their experience in bringing the advantages of the cloud specifically to organisations like yours.
  • Sécurité des mobiles: quelles sont les stratégies mises en place par vos pairs ?
    Sécurité des mobiles: quelles sont les stratégies mises en place par vos pairs ? Hervé Doreau, Directeur Technique, et Benjamin Ménard, Consultant Avant-Vente Recorded: Oct 19 2018 27 mins
    Les entreprises de toutes tailles doivent faire face aux nouveaux risques liés à l'utilisation grandissante des mobiles et il leur est difficile de définir la meilleure stratégie pour protéger leurs informations sensibles.
    Au travers de cas d'usages concrets, nos experts vous proposent lors de ce webcast d'en savoir plus sur :
    - Pourquoi est-ce si important de sécuriser les appareils mobiles ?
    - Quelles bonnes pratiques de vos pairs pouvez-vous appliquer dans l'adoption d'une stratégie de protection des terminaux ?
    - Quelles sont les fonctionnalités primordiales d'une solution de sécurité des mobiles ?
  • [#1] Big Data im Fokus: Der Data Catalog – Ihre Big Data Schatzkarte
    [#1] Big Data im Fokus: Der Data Catalog – Ihre Big Data Schatzkarte Thomas Bodenmüller-Dodek - Product Expert Big Data & Analytics, Informatica Recorded: Oct 19 2018 35 mins
    „You can´t use it, if you can´t find it” – Heutzutage werden in Unternehmen mehr Daten denn je gesammelt, gespeichert und genutzt. Studien und Umfragen zeigen jedoch, dass lieber gesammelt als genutzt wird.
    Woran liegt das? Eine Ursache hierfür ist, dass Unternehmen gar nicht wissen, welche Daten gesammelt werden, wo sie gespeichert werden und wie diese genutzt werden können. Es fehlt an Transparenz und Struktur.
    In unserem 45-minütigen Webinar möchten wir Ihnen anhand einiger Praxisbeispiele zeigen, wie Sie mit einem Data Catalog Informationen über alle Datentöpfe hinweg zentral zur Verfügung stellen können. Erfahren Sie, wie unsere Kunden davon profitieren und welche Herausforderungen mit einem Data Catalog gemeistert werden können.
  • Chmura jako archiwum – kiedy, dlaczego, za ile?
    Chmura jako archiwum – kiedy, dlaczego, za ile? Daniel Olkowski Recorded: Oct 19 2018 62 mins
    Czy chmura może być archiwum?
    Co zyskujemy a co tracimy?
    Czy jest to konkurencja do ośrodka zapasowego?

    Zapraszam na 30 minutową dyskusję dotyczącą możliwości przechowywania długoterminowych kopii zapasowych w chmurze.
    Porozmawiamy o możliwościach, technologiach i oczywiście cenach.

    Piątek, 19.09, 10:00, 30 minut.

    Zapraszam na poranną kawę!

    Do zobaczenia…
    Daniel Olkowski
  • SUSE und Empalis: Höchstleistung für Ihre Storage-Umgebung
    SUSE und Empalis: Höchstleistung für Ihre Storage-Umgebung Thomas Grätz, SUSE Linux GmbH & Markus Stumpf, Empalis Consulting GmbH Recorded: Oct 19 2018 54 mins
    Sie haben eine dynamisch wachsende Storage-Umgebung? Sie stehen bei Backup, Desaster Recovery und Archivierung aktuell vor großen Herausforderungen? Sie suchen nach einer zukunftsfähigen Backup-Lösung, die entsprechend Ihrer Anforderungen skalierbar ist? Dann sollten Sie an unserem Webcast teilnehmen!

    Gemeinsam mit Empalis zeigen wir Ihnen, wie Sie mit Hilfe von SUSE Enterprise Storage Ihre TSM / Spectrum Protect Storage Umgebung optimieren und dabei die Grenzen traditioneller Systeme (mangelnde Skalierbarkeit, hohe Kosten, keine Cloudfähigkeit) umgehen. Die intelligente, softwaredefinierte Storage- Lösung auf Basis von Ceph-Technologie ermöglicht Ihnen die Transformation der Storage Infrastruktur Ihres Unternehmens, um Kosten zu senken und unbegrenzte Skalierbarkeit bereitzustellen.
  • Something Big Is Happening in Emerging Markets
    Something Big Is Happening in Emerging Markets Kevin Carter Founder & Chief Investment Officer, EMQQ Oct 22 2018 1:00 pm UTC 45 mins
    HANetf and EMQQ Index explore how increased affluence and growing access to mobile-based broadband is transforming lives and businesses in emerging and frontier market and introduce the EMQQ Emerging Market Internet & Ecommerce UCITS ETF
  • Kettle Hill US L/S Equity Fund Q3 2018 Webcast
    Kettle Hill US L/S Equity Fund Q3 2018 Webcast Andrew Kurita Oct 22 2018 1:00 pm UTC 60 mins
    Join us for our quarter-end strategy update webcast. Engage with portfolio manager Andrew Kurita to learn about what drove third-quarter performance, the portfolio manager's outlook, and current portfolio positioning.
  • 3D Organ-on-a-chip Applications Using the AIM Biotech Chip
    3D Organ-on-a-chip Applications Using the AIM Biotech Chip Kuan Chee Mun and Mahama Aziz Traore Oct 22 2018 1:00 pm UTC 75 mins
    In vitro 3D cell culture models have emerged as a bridge between conventional 2D cell culture models and the complex & expensive in vivo animal models. By analyzing and comparing the biological behavior of tissues embedded in 3 dimensional hydrogels, results are significantly different from classic 2D cell culture in terms of proliferation, morphology, drug response and gene expression. These differences have been attributed to the topographically complex 3D environment surrounding the cells, where cell adhesion, structure, effector transport and mechanotransduction are substantially altered. A carefully designed 3D model can provide more physiologically relevant information using experimental designs unachievable by conventional 2D assays at a fraction of the cost of in vivo models.
    Current 3D cell culture assays like hanging drop culture often lack the capability to organize different co-cultured cell types in a meaningful way. The application of chemical gradients or flow is usually not possible.
    We are now able to address this issue with a modular microfluidic platform that can co-culture multiple cell types in discrete 3D and 2D channels. Organotypic assays with animal model-like complexities using human cells have been developed for research, drug discovery & diagnostics. These include models for immune checkpoint, T-cell killing efficiency, angiogenesis, metastasis, cell migration, microvascular networks and the blood-brain barrier. Additional applications that focus on a liver model will also be discussed. Drug Induced Liver Injuries (DILI) contributes to drug failures, drug withdrawals and acute liver failures. The liver strongly interacts with other organ systems and in some instances the metabolites secreted by the liver are responsible for other organs' injury. Engineered 3D liver models may increase the physiological relevance of drug toxicity by maintaining the expression levels of key cytochrome P450 enzymes and metabolic activity in liver cells.
  • Cloud Security: The next generation
    Cloud Security: The next generation Chris Hill, RVP, Public Cloud EMEA; Alex Hilton, Chief Executive, Cloud Industry Forum Oct 22 2018 2:00 pm UTC 60 mins
    Multi-Cloud or hybrid environments has become a growing strategy for many organisations moving their applications and data in the cloud as it gives organisations the ability to be flexible in what they need for their business. In fact, according to recent research by Computing, 26 per cent of enterprises surveyed were using a multi-cloud approach compared with 22 per cent last year. However, along with this approach one thing organisations should not forget is that the need for security does not diminish. As the cloud continues to offer more in services, organisations need to be aware of the protection they are responsible for to ensure their applications and workloads are safe.

    So how do organisations stay ahead of the curve with security as well as being able to manage these multi-cloud or hybrid environments?

    Join our latest webinar where, Chris Hill, VP Public Cloud EMEA at Barracuda, and Alex Hilton, Chief Executive and Cloud Industry Forum (CIF)will discuss the latest challenges when it comes to migrating to the cloud, especially in a multi-cloud environment as well as analyse CIFs latest research findings on what organisations need to consider when adopting these cloud services.
  • Closing the Backdoor with Endpoint Security
    Closing the Backdoor with Endpoint Security Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne Oct 22 2018 3:00 pm UTC 60 mins
    Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.

    This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.

    In this webcast you’ll learn:

    •The current threat landscape
    •What backdoors are
    •How to stop backdoors like Calisto
    •How to roll back the damage of an attack like ransomware
  • Introduction to React Native and GraphQL for App Development: Part 1
    Introduction to React Native and GraphQL for App Development: Part 1 Nicola Zaghini - Solution Architect | Senior Software Engineer, Phorest Salon Software Oct 22 2018 3:00 pm UTC 75 mins
    The objective of the workshop is to provide basic understanding of the React Native framework and the React designs principles by building a Native App for iOS and Android platform.

    For a smoother and faster start of the workshop, please make sure you have your env setup and a running React Native App by following the sections below.

    Environment Setup
    Setup your machine by following the instructions available at official React Native getting started link. Click on Building Projects with Native Code tab, select your Operating System and desired target platform(s), then follow the setup instructions.

    VSCode is the IDE that will be used during the course. Unless you have strong preferences on other IDEs it is suggested to have it installed before the start of the Workshop. You can download and install VSCode from here.

    Create the App
    Create an application with the command react-native init MyMovies and run it via react-native run-ios and/or react-native run-android as per the getting started guide. In case of issues consult the troubleshoot section of the guide or refer to StackOverflow with the encountered issue.

    Please note that Java 8 is the actual supported Java version for Android. If you have already upgraded to Java 9 you can either downgrade or keep both, but carefully setup the env to only use Java 8 for Android builds.

    Notes
    You may get confused between react-native init and create-react-native init . The first is the usual way you create a react native project with native dependencies and that's the approach used during the Workshop. The latter is a simplified setup which allows running iOS and Android react native without the need of Xcode or Android Studio to actually compile your app. Both are valid approaches and please note from the latter you can eject to the former. Still, the Workshop will just cover the react-native init setup.
  • Getting Identity Management Right
    Getting Identity Management Right Neil Chapman (ForgeRock), Regina Yulo (BrightTALK) Oct 22 2018 3:30 pm UTC 30 mins
    Finding the right balance between security and risk is a tough one to manage. Banks and financial services organisations face larger challenges because of their complex legacy systems and the amount of sensitive data they have to deal with.

    Join this session where our identity expert will discuss:
    -What are the key challenges we see in the industry adopting and adapting the technology?
    -How can businesses know when they have got identity management right?
    -What are the barriers to making this happen?
    -How will IoT and AI change how we think about, and manage, identity?
    -How can we make identity an enabler of, rather than a barrier to, innovation?
    -How is Open Banking and PSD2 affecting and impacting the wider industry?
  • The Latest Innovations in Informatica MDM and MDM Customer 360 v10.3
    The Latest Innovations in Informatica MDM and MDM Customer 360 v10.3 Oliver Soans, Principal Product Manager, MDM Solutions, Informatica Oct 22 2018 4:00 pm UTC 60 mins
    As an enduring leader in master data management, Informatica continues to innovate, anticipate market needs, deliver new functionality and enhancements to organizations of all sizes. The newest capabilities delivered in Multidomain MDM 10.3 and MDM – Customer 360 10.3 make it easier for the business user to manage, curate, and consume master data. This includes:
    •Configurable, secure and feature-rich user interfaces for managing master data
    •Improved search and query experiences, more workflow configuration options, and new capabilities to support compliance use cases
    •Improved business user interface to make it easier to work with different mastered domains, hierarchies, and stewardship
    •Increased efficiency for data stewards through ad hoc match, wizard-driven reports and charts, and more

    Join Oliver Soans, Principal Product Manager, MDM Solutions to learn how Informatica is simplifying the complex art of master data management to deliver business value faster. You will also see a demo of the product.
  • eCommerce and Friendly Fraud: Deflecting Chargebacks and Recovering Lost Revenue
    eCommerce and Friendly Fraud: Deflecting Chargebacks and Recovering Lost Revenue Julie Fergerson (Ethoca) & Regina Yulo (BrightTALK) Oct 22 2018 4:30 pm UTC 30 mins
    Fraud is one of the biggest challenges keeping merchants and issuers up at night. Aside from creating friction in the payments process, it makes for a negative customer experience.

    Join this interview where Julie Fergerson, Senior VP at Ethoca will discuss:

    -What are the biggest challenges facing the ecommerce industry?
    -Why is customer experience a bigger priority today than it was even five years ago?
    -How can banks and merchants mitigate eCommerce fraud issues?
    -Why is friendly fraud a growing issue and what can be done about it?
  • Cloud Strategy & Improving Your Enterprise Security Posture in 2019
    Cloud Strategy & Improving Your Enterprise Security Posture in 2019 Sushila Nair (NTT DATA Services) | Yonatan Klein (AlgoSec) | Diana Kelley (Microsoft) Oct 22 2018 5:00 pm UTC 60 mins
    This keynote panel is part of Cloud Month on BrightTALK.

    Join this keynote panel of security and cloud experts as they discuss:
    - The most prevalent security risks and challenges and how to contend with them
    - Your cloud strategy and how it affects your overall security posture
    - How to extend network security to the cloud
    - Areas for automation
    - Best practices on how to secure your enterprise in 2019

    Speakers:
    - Sushila Nair Sr. Director Security Portfolio, NTT DATA Services
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Yonatan Klein, Director of Product, Algosec
  • Off-Network: The New Security Normal
    Off-Network: The New Security Normal Christina Ayiotis, Cyber Strategy Consultant Oct 22 2018 5:00 pm UTC 51 mins
    Long gone are the days when Security Professionals could protect their actual network and not have to worry about organization, employee, student or customer information being at risk. In today's always-connected world, much happens beyond the network (especially in the cloud) and the concept of perimeter security has all but evaporated.

    Wherever Users are - the office, the classroom, traveling, or working from home - organizations need to enable security so Users can easily and safely to do their jobs. Users want to be able to just "connect" and work-- oblivious to the dangers out there. Moving security "behind the scenes" means needing to be more predictive about how attacks will happen and engaging early in the attack cycle. DNS-layer security is an important component piece of an overall security strategy that aims to stop attacks before they cause irreparable harm. Watch this webcast to learn more.
  • Securing the Financial Sector
    Securing the Financial Sector Theodora Lau (Unconventional Ventures), Al Pascual (Javelin), David Pollino (Bank of the West) + 1 panelist Oct 22 2018 5:30 pm UTC 60 mins
    With new technology comes new risks. Security challenges are at the top of mind of many professionals in the Financial Services industry and banks, payments companies, and FIs need to stay ahead of criminals in order to protect their clients’ valuable assets.

    Join this live panel streamed from Money20/20 Vegas where our speakers will discuss:
    -Trends in biometrics, authentication, and identity management
    -Using AI and machine learning for preventing and detecting fraud
    -Best practices for payment security: commerce, PCI compliance, mobile, and tokenisation
    -Managing security risks with new innovations
    -Dealing with breaches
  • Outsmart Hackers by Coordinating Your Defenses
    Outsmart Hackers by Coordinating Your Defenses Greg Bennett, Engineer, Sophos Oct 22 2018 6:00 pm UTC 45 mins
    Smart hackers coordinate their attacks across your system. Now, you can learn how to outsmart the hackers by coordinating your defenses!

    Synchronized Security is a best-of-breed security system that enables security solutions to talk to each other, sharing information and responding automatically to threats.

    For example, if the endpoint detects a threat, the firewall automatically isolates the infected computer and then the cleanup kicks right in to finish the job.

    Join us for this engaging webinar to learn more about this new approach to IT security. You’ll find out how Synchronized Security:

    • Gives you unprecedented protection against advanced threats

    • Slashes incident response time by 99.9%

    • Saves IT time and effort every day
  • Evolving to an Intel-led Security Organization
    Evolving to an Intel-led Security Organization Nigel Gardner, MGM Resorts Intl., Joseph O’Laughlin, FireEye; Jason Tuininga, FireEye Oct 22 2018 6:00 pm UTC 60 mins
    Threat intelligence has the power to enhance an organization’s security effectiveness, improve its time-to-response, and reduce business risk. No matter where an organization is on the continuum of security operations maturity, threat intelligence can provide significant value. The question is, what is the best way to maximize that value? What advantages can you gain through simple process or technology changes to ensure that you’re ready to respond quickly to the threats that matter? Come hear from our experts about what threat intelligence can do for you, and hear from a FireEye customer who has made this journey, transforming its security operations to be intelligence-led.
  • Uncovering Canada’s Smart Water Solutions
    Uncovering Canada’s Smart Water Solutions Seth Cutler (Moderator) John Presta, Gary Thompson, Darrol Weiss Oct 22 2018 7:00 pm UTC 75 mins
    Canadian utilities struggle with fiscal constraints, high customer service expectations, and disparate and aging networks, just like many other utilities globally. At the same time, they have built a reputation for the progressive adoption of advanced technologies and solutions, including smart water data-based solutions. This puts Canadian water and wastewater utilities in a pivotal position to share knowledge and best practices for tackling local problems that deliver global lessons.

    Key Takeaways:
    • Understand how asset management information and internal and external data points are leveraged to deliver millions of dollars in savings annually
    • Learn how utilities companies transformed fiscal and operational challenges into strengths
    • Improve the operating conditions and financial health of your service
  • Addressing Today’s Cloud Attack Vectors
    Addressing Today’s Cloud Attack Vectors Joe Leonard, CISO, Presidio Oct 22 2018 7:00 pm UTC 60 mins
    During this session, we will discuss today’s cloud attack vectors and the potential impact there could be on your organization’s data.

    -How are these attack vectors exploited by an adversary?
    -What can you do to prevent these types of attack?
    -How are cloud security controls maturing to address these concerns?

    We will discuss what security controls can be put in place to reduce the attack vectors surface and minimize the risk to your organization.