Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • 5 Key Barriers to IT/OT Integration and How to Overcome Them
    5 Key Barriers to IT/OT Integration and How to Overcome Them Dan Ortega - VP Marketing at Blazent Recorded: Jul 21 2017 4 mins
    Operational Technology (OT) consists of hardware and software that are designed to detect or cause changes in physical processes through direct monitoring and control of devices. As companies increasingly embrace OT, they face a dilemma as to whether to keep these new systems independent or integrate them with their existing IT systems. As IT leaders evaluate the alternatives, there are 5 key barriers to IT/OT integration to consider.
    Business Process Knowledge
    Manageability & Support
    Dependency Risk – Two of the key challenges of enterprise IT environments are managing the complex web of dependencies and managing the risk of service impact when a dependent component fails or is unavailable. With traditional IT, the impact is typical to some human activity, and the user is able to mitigate impact through some type of manual activity. For OT, companies must be very careful managing the dependencies on IT components to avoid the risk of impacting physical processes when and where humans are not available to intervene and mitigate the situation.
    Management of OT Data – The data produced by OT devices can be large, diverse in content, time sensitive for consumption and geographically distributed (sometimes not even connected to the corporate network). In comparison, most IT systems have some level of tolerance for time delays, are relatively constrained in size and content and reliably connected to company networks, making them accessible to the IT staff for data management and support.
    Security – IT systems are a common target for malicious behavior by those wishing to harm the company. The integration of OT systems with IT creates additional vulnerability targets with the potential of impacting not just people and but also physical processes.
    Segmentation of IT
  • Comparing Next Generation Firewalls to Proxy
    Comparing Next Generation Firewalls to Proxy Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jul 21 2017 3 mins
    Learn about the complementary capabilities of Secure Web Gateways and Next Generation Firewalls and why each is important in an enterprise’s security infrastructure.
  • Taking Proxy to the Cloud
    Taking Proxy to the Cloud Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jul 21 2017 3 mins
    This quick video reviews the important capabilities a cloud-based proxy solution can provide enterprises and discusses key aspects of Symantec’s Web Security Service.
  • Protecting Sensitive Data in the Cloud
    Protecting Sensitive Data in the Cloud Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jul 21 2017 2 mins
    In this short video learn how Proxy and DLP enables information security on prem or in the cloud
  • Proxy Essentials
    Proxy Essentials Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jul 21 2017 3 mins
    This short video highlights the key capabilities of Secure Web Gateway proxies that enterprises need to implement to secure their use of web and cloud applications.
  • 3 Things to Know When Securing Mixed, Multi-Cloud Environments
    3 Things to Know When Securing Mixed, Multi-Cloud Environments David Gold of ProtectWise and Scott Register of Ixia Recorded: Jul 21 2017 57 mins
    Enterprises cannot move to the cloud quickly enough. In fact, Gartner estimates that by 2020, “cloud-first” and “cloud-only” will be standard corporate policies rather than exceptions.
    That’s a big problem for traditional security infrastructures. There’s a hodgepodge of disparate, disconnected security products that were not made to secure the cloud. Some vendors have “cloud-washed” their products, but these deliver questionable value. In real-world situations, these products perform poorly, lack critical functionality, and cannot provide the visibility time-strapped security teams require to be effective.

    ProtectWise and Ixia make it easy to secure workloads in the cloud, including multi-cloud environments, in addition to traditional on-premises networks. Running entirely from the cloud, the ProtectWise Grid delivers pervasive visibility via automatic real-time and retrospective threat detection, long-term retention of full-fidelity packet capture (PCAP) and unlimited forensic exploration. Ixia CloudLens™ simplifies capture of network traffic from public cloud, virtual, or physical environments and delivers it to The ProtectWise Grid seamlessly. Through this integration, ProtectWise and Ixia give security teams a single solution for end-to-end visibility across heterogenous public cloud, enterprise, and hybrid environments.

    Attend this webinar and learn how easy it is to secure the cloud with the joint ProtectWise-Ixia solution and:
    Why security in mixed- and multi-cloud environments can be difficult
    How moving to the cloud limits visibility for legacy security solutions
    How a modern approach to security provides pervasive visibility
  • Big Data, HPC and Storage Interview with Frederic Van Haren, HighFens
    Big Data, HPC and Storage Interview with Frederic Van Haren, HighFens Mike Matchett, Taneja Group; Frederic Van Haren, HighFens Recorded: Jul 21 2017 12 mins
    In this highly topical interview, I get to question Frederic Van Haren about a number of big data and HPC storage topics. For years, before the world even called it big data, Frederic was responsible for some of the biggest and fastest growing big data/HPC analytical datasets in the world, actively used by large teams of highly advanced speech-to-text researchers with cutting edge analytics, and in global production operations for a variety of well-known applications.
    I ask Frederic for some of his hard-earned insights and best practice advice for those looking to implement big data storage in their enterprises for analytics, data lakes, and whatever the future may bring. We also get in some questions about what IT folks should do for their careers, and what to focus on first in these kinds of projects.
  • How to Plan for Storage Capacity Growth
    How to Plan for Storage Capacity Growth Brock Peterson, Solutions Architect at Blue Medora Recorded: Jul 21 2017 28 mins
    What does your current storage capacity look like in your organization? Are you poised to meet growth demands in the next year or five years? Without a plan in place to accommodate your organization's storage needs, you could be facing a disaster across your IT stack. In this webinar with Blue Medora's Brock Peterson, learn how you can effectively plan for storage capacity growth -- now and in the future -- so you can ensure you're investing where it matters the most.
  • Slack Product Lead on Excellence Under Uncertainty
    Slack Product Lead on Excellence Under Uncertainty Paul Rosania Recorded: Jul 21 2017 46 mins
    Software is hard. Getting the product right is challenging enough, and unless you're working alone, you're contending with people and process in a daily struggle to get things done. As product builders, how do we guarantee excellence when so much can go wrong? Slack product lead Paul Rosania gives an overview of the many risks that face software teams, and a recipe for building exceptional products.

    Paul Rosania leads the Core Product team at Slack, where he and his team build the interfaces millions of people use to get their work done each day. Previously, he led the Timelines Team at Twitter, where he spearheaded the transition to an algorithmically ranked feed. Paul graduated Dartmouth College with a BA in Computer Science and has spent the last decade building software he hopes brings people closer together.
  • Keys to Continuous Testing for Faster Delivery
    Keys to Continuous Testing for Faster Delivery Shane Evans, Director of Product Management and Ayal Cohen, Chief Functional Architect, HPE Recorded: Jul 21 2017 25 mins
    This Webinar will be available OnDemand on July 21, 2017.

    Your business needs to deliver faster. To accommodate, Development needs to introduce fewer changes but in a much more frequent cadence. This creates a challenge for test teams to keep up with the rapid pace of change without compromising on quality. Automation is paramount to the success or failure of Continuous Delivery, and Continuous Testing enables early and frequent quality feedback throughout the CI/CD pipeline. In this webinar, we will explore how to implement Continuous Testing to ensure high quality releases in a Continuous Delivery environment; including what to test and when to automate new functionality in order to optimize your efforts.
  • A Closer Look at SentinelOne
    A Closer Look at SentinelOne Rajiv Raghunarayan, SentinelOne Vice President, Product Marketing, Raj Rajamani, SentinelOne Vice President, Product Recorded: Jul 21 2017 63 mins
    Our R&D teams have had a busy year thus far and we would like to invite you to learn more about recent releases and updates made to the SentinelOne platform.

    Rajiv, our VP of Product Marketing, will lead you through the changing threat landscape and provide an overall platform update. Including:
    VDI - full memory protection, threat visibility on decommissioned devices, and more
    Updates to On-Premise Appliance for Fed, Gov, and GDPR use cases
    A brief demo of SentinelOne with AWS workspaces
    Highlights about recent ransomware attacks and our new executive team
  • How To Help New Sellers Thrive Like Your Top Performers
    How To Help New Sellers Thrive Like Your Top Performers Donald Kelly Recorded: Jul 21 2017 47 mins
    During this training sales leaders will learn how to coach their new reps so they can perform like their more experienced reps.
  • Ransomware Hostage Rescue Guide: Part 2 of 2
    Ransomware Hostage Rescue Guide: Part 2 of 2 Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Jul 21 2017 62 mins
    2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017.

    In this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth.

    Join Erich Kron CISSP, Technical Evangelist at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide, Part 2”. We will look at recent infections, give actionable info that you need to prevent infections, and cover what to do when you are hit with ransomware.
  • Improving Incident Response with Orchestration and Automation
    Improving Incident Response with Orchestration and Automation Bruce Schneier, IBM Resilient CTO Recorded: Jul 21 2017 3 mins
    To effectively respond to today’s complex cyberattacks, security teams need to coordinate their people and technology throughout the entire incident response (IR) process. When IR orchestration is supported by automation, organizations can accelerate their response and make their IR team more intelligent.

    In this video, IBM Resilient CTO Bruce Schneier compares and contrasts orchestration and automation, and outlines how organizations can orchestrate response with an incident response platform.
  • Why Office 365 Cannot Stop Phishing and Ransomware
    Why Office 365 Cannot Stop Phishing and Ransomware Michael Landewe, Cofounder Avanan Recorded: Jul 21 2017 24 mins
    Microsoft is struggling to stop phishing and ransomware in Office 365. Now there is a solution. Over 70 of the leading security vendors have joined together in one platform to create the most complete, cloud-native protection for SaaS-based email. Best of all, it works in parallel with Microsoft and Gmail to deploy as simply as an app-store one-click application.
  • Securing Business Intelligence on Salesforce.com with YubiKeys
    Securing Business Intelligence on Salesforce.com with YubiKeys Jerrod Chong (VP Solutions, Yubico), Itzik Koren (Director PM, Salesforce.com) Recorded: Jul 21 2017 21 mins
    As a Salesforce admin, you can allow your users to authenticate with a YubiKey any time they’re challenged to verify their identity. Once provisioned, users simply insert and tap their YubiKey to complete verification. It’s a secure, convenient alternative to using Salesforce Authenticator or one-time passwords sent by email or SMS.

    In this on-demand webinar, Itzik Koren (Salesforce) and Jerrod Chong (Yubico) demonstrate why it is important to activate U2F with single sign-on (SSO) on Salesforce.com, and the cost savings you can achieve with YubiKey as a hardware-based second factor.
  • Easy-to-Use MFA with Centrify Identity Service and YubiKeys
    Easy-to-Use MFA with Centrify Identity Service and YubiKeys David Maples, Solutions Architect Recorded: Jul 21 2017 42 mins
    In this webinar, we’ll show you real-life examples of the ways Yubico and Centrify provide context-based, adaptive authentication across enterprise users and resources. Across a wide range of use cases, Centrify and Yubico provide IT the flexibility to enforce security without user frustration.

    Centrify Identity Service can leverage the easy-to-use, multi-function YubiKey for use cases such as:

    -- Smart card AD-based login to Mac or Linux
    -- Smart card login to Centrify’s cloud service for SSO, secure remote access, or administration
    -- OATH OTP as a second factor for secure SSO to cloud apps
    -- OATH OTP for MFA to privilege elevation on servers
    -- Physical NFC token-based MFA for secure access to apps on mobile devices

    We’ll show you secure, simple, scalable solutions that both admins and users love.
  • Economic Snapshot - July 2017
    Economic Snapshot - July 2017 Guy Monson Recorded: Jul 21 2017 5 mins
    CIO Guy Monson presents his monthly look at the global economy, and the implications it has on investment strategy.
  • Human Factor Podcast : Tim Gallo and Allan Liska Ransomware
    Human Factor Podcast : Tim Gallo and Allan Liska Ransomware Jenny Radcliffe Recorded: Jul 21 2017 79 mins
    In this episode, I'm delighted to talk Tim Gallo and Allan Liska.

    Tim is a cyber security specialist engineer at Symantec. Tim has been working in IT security since 1999, but he’s also been a bouncer, a bartender, and a physicist. He loves finding new ways to do things, in particular by breaking them. Tim has been spending time lately tearing apart pumps, golf carts, and other items to rebuild them into something better, faster, and stronger.

    Allan is an intelligence architect at Recorded Future. Allan has more than 15 years’ experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the co-author of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.
  • Meet the next generation of Dell EMC OEM PowerEdge appliances
    Meet the next generation of Dell EMC OEM PowerEdge appliances David Pennington, VP Global Sales & Jared Wilson, Entrerprise Product Manager Dell EMC OEM Solutions Recorded: Jul 21 2017 59 mins
    Digital transformation is driving a need for OEMs to address key concerns — agility, scalability, flexibility, simplicity and automation. Dell EMC’s next generation of PowerEdge servers meets those concerns head-on with an end-to-end portfolio of scalable, virtualized, software-defined and converged solutions on a common server platform capable of running any application, from traditional to native cloud applications (NCA). With Dell EMC PowerEdge servers, you can build your vision of a digitally transformed infrastructure with secure, worry-free solutions.
  • Amnon Bar-Lev - Check Point Executive Interview
    Amnon Bar-Lev - Check Point Executive Interview Amnon Bar Recorded: Jul 21 2017 10 mins
    We asked Amnon about the current key issues in data security and why having up-to-date threat information is becoming increasingly important, in what way malware attacks can be prevented, and how this intelligence can be harnessed and applied to the mobile and cloud environments.
    We also learn about Check Point Software’s new security architecture, Software Defined Protection, and how it can be used to control your security environment by combining intelligence with segmenting your network.
    View Amnon’s Executive Interview to learn how Check Point Software’s new architecture and other security solutions can be of benefit to your organisation.
  • Building Consensus Between Legal, Records and IT on What to Save and Not Save
    Building Consensus Between Legal, Records and IT on What to Save and Not Save Ed Rawson (PNC), Michele Hanrahan (Sound Transit), Shawn Cheadle (LMCO), Mark Diamond (Contoural) Recorded: Jul 20 2017 60 mins
    Business units want a policy that allows them to save everything. Legal wants the minimum saved. IT just wants something easy to execute. What should we do? A committee is formed, with legal, IT, records management, HR, and others. The committee meets. Discussions ensue: Which are business records? How long should we save them? Do we allow exceptions?

    The committee meets again. And again. We’re stuck.

    Join Ed Rawson , Michelle Hanrahan, Shawn Cheadle and Mark Diamond as they discuss strategies for building consensus across your organization and making sure your initiative doesn't get stuck!

    About the speakers:
    Ed Rawson is a strategic, results-oriented thought leader who has dedicated over 30 years of his career to helping organizations manage their paper and digital content lowering cost and increasing productivity. Ed has helped organizations to align information with business value and operational direction to maximize the return on investments, lowering risk and maintaining compliance.

    Michele Hanranhan is Records Manager at Sound Transit since January 2015 and is leading a RIM group to implement ECM solution organization wide. She previously worked at Federal Home Loan Bank of Seattle, PATH, and Washington State Department of Transportation and has over 16 years of experience in Records and Information (RIM) with a variety of business, government and non-profit organizations. 

    Shawn Cheadle is General Counsel to the Military Space line of business at Lockheed Martin Space Systems. He supports government and international contracts negotiations, drafting and dispute resolution. He also supports information governance, eDiscovery, records management, counterfeit parts investigations, and other functional organizations at Lockheed Martin. He is an ACC Global Board Member, current Information Governance Committee Chair and former Law Department Management Chair, and former Board member and President of ACC Colorado.
  • YubiKey Smart Card Mode for Computer Login
    YubiKey Smart Card Mode for Computer Login David Maples, Solutions Architect Recorded: Jul 20 2017 19 mins
    Smart cards are highly secure and used globally in environments with enhanced security concerns and usability demands. However, smart cards are cost prohibitive for many organizations. The YubiKey changes that.

    Watch our webinar on the YubiKey as a smart card for computer login. This webinar included end-user demonstrations on Windows, Windows RDP, and Mac machines.

    Learn about:
    - Cost-saving advantages of the YubiKey as a smart card
    - Native support across Windows, Mac, and Linux
    - Best practices for configuration and deployment considerations