It’s probably not too often that you’ll get this perspective. Star Wars was really all about information disclosure threats! You’ll want to find out more as noted presenter and author Adam Shostack, references one of George Lucas’ epic sagas to deliver lessons on threat modeling. Not only was the Death Star badly threat modeled, the politics between Darth Vader and Gran Moff Tarkin distracted incidence response after the plans were stolen. This session will provide you with proven foundations for effective threat modeling as you develop and deploy systems. Adam will help you understand what works for threat modeling and how various approaches conflict or align. The force is strong with this session.
There are as many approaches to troubleshoot network issues as there are pros doing it. Lack of time and impatient users sometimes force us to skip steps and quickly band-aid network issues. In this webinar Chris Greer, Network Analyst, Love My Tool blogger, and packet analysis expert, will provide you a road map to more effectively and systematically troubleshoot and analyze your network including:
• Where you should start
• What to look for, starting with the OSI layers
• How to rule out common causes
• What tests/tools you should use
Next-generation firewalls and sandboxes stop attacks at various steps, but they only react to malicious communications and code after attacks have launched.
There’s another way—observing where attacks are ‘staged’.
We’re going to demonstrate how we can visualize Internet infrastructures for visibility into where attacks will emerge. Then, we’ll know where advanced malware will be downloaded and where compromised systems will callback—before attacks launch.
In this live session, you’ll learn:
7 steps of an attack and how you can use this data to get ahead of new security events.
3 ways to uncover malicious activity by looking at domain names, IP addresses, and autonomous system numbers (ASNs).
How to apply this intelligence to your current defenses.
Every day, your organization is creating more data that is critical to the operational success of your company. Making sure that you have a proper backup solution to recover data is not only important, it’s vital to the long term success of your business.
Even though users are creating more mission critical data than we have ever seen in the past, that doesn’t mean your backup solution has to be expensive. In this webinar we cover a wide range of options about how you can effectively backup your content without breaking the bank.
The solutions we will cover will take into account being highly fault-tolerant, mindful of high performance, and assurance that your data will be available when you need it.
Many organizations have struggled with BYOD programs due to MDM/MAM deployment challenges, user privacy concerns, and low adoption. This is causing some to question BYOD altogether. Fortunately, data shows that there is huge demand for BYOD, but such programs must meet employee needs in addition to IT needs.
In this webinar, you'll learn where existing BYOD programs have fallen short, and how the next-generation of mobile security products will ensure secure, broad adoption of BYOD.
Receive (ISC)² CPE credits for attending this webinar.
As marketers grow in their commitment to customer experience and in their understanding of the critical role data plays in marketing’s success, personalization at scale and in context continues to challenge even the most skilled and seasoned marketers. Somewhere between the rapid evolution of digital marketing engagements and the rush to aggregate and collect data, the path from data to intelligence has been obscured and makes a state of personalized customer experience even harder to reach. In a day when the customer expects relevance regardless of channel, marketing must take a leap of faith, turning to new strategies and new opportunities to ask even more critical questions of our customer data. It is, in short, a new opportunity to make true personalization entirely possible.
To explore the opportunity to take the next big pivot in customer experience strategy and address the new requirements of data, the CMO Council, in partnership with Microsoft, will explore the modern requirements of tapping into the power of personalization, gaining insight into where and how marketers can advance the voice of the customer in relevant and profitable experiences that transcend one-off campaigns. This webcast will pulse the marketing mindset to capture the best action plans of marketers looking to take the next step to personalization by leveraging the rich signals and contextual queues that customer intelligence has to offer.
Worried about your cyber exposure? Not sure if you are as secure as possible? Are you afraid you are the ‘low hanging fruit’ that hackers feast on?
If questions like these concern you we recommend you take this webinar.
By attending ‘Managing Cyber Exposure’ you will gain a deeper understanding of cyber exposures, how they can harm your organization, and a framework you can use to address them. The framework will allow you to evolve and adapt your cyber exposure defenses as the cyber eco-system you inhabit changes.
This webinar will bring the following points to your attention:
How Cyber exposures can hurt your organization in multiple ways;
How Cyber exposures are not confined to purely technical areas;
How If not addressed cyber threats will harm your organization
The Ethernet Alliance is pleased to announce the sixth “Analyst Hour” webinar where Dell’Oro will talk about “50GE and the Path to 200GE and 400GE”. Join us on Tuesday, October 13th at 10am PT featuring Alan Weckel, Vice President and Alam Tamboli, Senior Analyst with Dell’Oro Group. Weckel and Tamboli will present on the upcoming release of 25GE and 50GE (2X25G) products and how they will lead to 200GE and 400GE.
A case study on how Basware has combined content management, marketing automation and demand generation disciplines in the early stages of the buying cycle to increase engagement via personalised content, generate more quality leads and drive sales pipeline.
In this 30-minute webcast, industry experts Mike Rothman, President of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise.
During this webcast, attendees will learn
* Which tactics have the greatest effect on fostering cyber security awareness throughout the enterprise
* How to foster a risk-aware security culture while still encouraging trust among your employees and partners
* How to bridge the gap between IT security and IT operations (hint: knowing more about your assets is the first step)
Advanced Threat Protection is built on the principle of Prevention, Detection and Mitigation. However, if the different technologies within each of these areas operate independently, there will be gaps between the different elements, gaps that can and will be exploited during an attack.
This session will focus the concept of bringing together all of the elements of Advanced Threat Protection to form a holistic, collaborative solution that encompasses all of the network.
Come capire cosa è accaduto e ripristinare rapidamente l'operatività
Nei primi due Webcast abbiamo parlato del perché una violazione sia un problema inevitabile e come rilevare rapidamente una minaccia avanzata. Nell'ultimo appuntamento, illustreremo come la tecnologia Advanced Threat Protection può rimediare al problema rimuovendo con efficacia il malware dai tuoi sistemi. Ma il tuo obiettivo non è solo ripristinare l'operatività, è soprattutto evitare che il problema si ripeta in futuro. Quindi ti proporremo un approccio utile anche per approfondire questo aspetto.
Hai perso i primi due Webcast della serie? Puoi guardarli on-demand adesso.
Many security vendors claim to have access to the security intelligence and analytical capabilities needed to identify the trace elements of malware activity before cyber-attacks take place.
They claim the ability to identify threats and data breaches at the earliest possible stage. Even accepting that the average time to detect a breach has halved over the last eighteen months, a discovery and remediation timeline that is still close to 200 days is by any standards far too long.
This presentation looks at what can be done to improve things and what businesses should be demanding from there security service providers.
Global energy demand is rising primarily as a result of population and economic growth in the emerging economies. Meeting this growing demand places increasing stress on limited fresh water resources as electricity production uses large amounts of water. This has repercussions for other water consumers in the agricultural, industrial and domestic sectors. Climate change could exacerbate the situation. This webinar examines the availability of fresh water for power generation, in particular for coal-fired power plants. It shows where the water stressed areas are in the world today and the demand for power. Global water and energy demand are discussed, and the water requirements of different power generation technologies. Some technologies that use less water, for example, dry-cooled power plants, operate at a lower efficiency. Finally, water availability and management in China and the USA, with reference to their energy production and policies are compared.
We live in a world where technological change is rapid. There is a race against time to be faster and better than the competition. Businesses will need to change as a result of technology disruption or risk becoming irrelevant to their customers. It is during these times of tumultuous change and uncertainty when the unexpected - new attack opportunities and tools - are presented to cybercriminals to steal, harm or destroy the digital assets of organisations in an unprecedented way and scale.
In this presentation, Rik will identify the top disruptive technologies to government and business today and examine the impact of such innovations on the cybersecurity of corporate networks. He will also provide recommendations to assist organisations to prepare for the unexpected threats and challenges that will arise from technology disruption in the future.
Continual Service Improvement (CSI) provides the mechanism to enable IT to exploit the insight, knowledge and skills of its people to deliver the improvements that can make a difference and truly enhance customer satisfaction.
In this session we will look at how you can unlock the potential of your
teams and individuals to make CSI an integral part of the day job and
develop an approach where improvements however small can be viewed as a ‘marginal gain’ that in aggregate, i.e. lots of small improvements can make a big difference. The session provides the results from a case study to show how this approach can be successfully applied.
A Chartered IT Professional and industry acknowledged leader in the field of IT Service Management. Has a proven track record of delivering IT and organisational performance improvement through the adoption and deployment of IT and Quality Management best practice frameworks. An ITIL accredited author who has achieved UK and International recognition for his ‘thought leadership’ and is a regular contributor and speaker at Industry bodies and forums on IT best practice.
Between April and July of 2015, Gatepoint Research invited selected European executives to participate in a survey themed Enterprise Software Security Strategies. 71% of those surveyed report being very or critically concerned with application-related security and yet an astonishing 76% has not deployed application security testing solutions to help address the problem. This webinar will review the results of the survey in detail and show how you can address the top challenges identified. It will give practical steps that you can take to implement a comprehensive application security program that ensure that all applications are tested for security vulnerabilities prior to release. It will also discuss how, over time, you can mature this program and implement a full Secure Software Development Life-cycle to address the problem at source.
In celebration of Open Access Week 2015, join us for a webinar on ‘Your Route to Open Access: 5 steps to success’ to learn more how to successfully publish open access, from finding the best journal for your work, to complying with mandates to promoting your published paper.
Why Open Access?
The Author Journey
5 steps to success:
1. FIND A JOURNAL and Comply with OA Mandates.
2. SUBMISSION: the OA Checklist. Connect you to your research by registering for an ORCID iD
3. LICENSING AND OPEN ACCESS
4. PUBLICATION and ARCHIVING
5. PROMOTION: Making the most of open access
Hear it from the experts: a realistic depiction of the DDoS attack landscape today. In this session Arbor’s Darren Anstee, Chief Security Technologist, will review current ATLAS statistics showing the frequency of attacks, the volume of attack traffic clogging the pipes of the world's largest enterprises and service providers networks and theorize as to why the upward trend in DDoS attacks is happening – and more importantly what you can do to protect your organizations from these attacks.