The potential of widely distributed IoT devices to enable new business opportunities, streamline operations, and reduce costs is vast, but so are the security implications. With IoT playing an increasingly big role at branch offices, within vehicles and in the wild, larger attack surfaces are giving IT teams more to worry about than ever before.
Well-publicized attacks such as Mirai botnets and WannaCry grabbed headlines, but they're just the tip of the iceberg. IoT threats are becoming too prevalent and advanced to address with traditional security tools. Now is the time for software-defined, policy-based security solutions that isolate IoT devices and protect organizations' most valuable data - regardless of the WAN source.
Join Cradlepoint's Ken Hosac, VP of IoT strategy and business development, and Brandon Ashey, infrastructure and security manager, for a live webinar on March 21, 2018, at 9 am PT. Learn about IoT security challenges and best practices for mitigating risk, including Software-Defined Perimeter technology that creates micro-segmented device-to-cloud overlay networks that are completely cloaked from other networks.
The primary reason why people register their IP - including trademarks patents - is to protect their ideas from being used and monetized by others. Companies across the world spend trillions of dollars on research and patent thousands of new technologies each year, so why would you ever need IP insurance?
We see dozens of cases each year where companies and individuals are claiming infringement upon their IP and that's when IP insurance comes into play.
PatSnap is joined by Erik Alsegard, IP Practice Leader and Lewis Parle, In-House Solicitor and IP Underwriter, from CFC Underwriting to discuss the whys and hows of IP Insurance.
Join this webinar to learn about the risks of IP, if you should consider insurance and what are the pros and cons of the options available to you when it comes to protecting your Intellectual Property assets.
As you build your application environment you've undoubtedly thought about utilizing multiple providers at every level of your stack. The benefits to this are obvious - scalability, redundancy, and performance optimization, among others. However, syncing multiple providers can sometimes pose challenges.
In this webinar we'll focus on synchronization between multiple DNS providers, including:
- Available toolsets on the market today
- Example deployment using NS1's OctoDNS integration
- Example deployment using NS1's Terraform integration
- Network redundancy using NS1's Dedicated DNS
This webinar will be on opposition and appeals practice before the EPO. We’ll be discussing the streamlining of the opposition procedure by the EPO, the changes that we are seeing as a result and will be providing practical tips in view of these changes. The talk will also draw on recent case law.
Catherine Doyle, Investment Specialist del fondo multi-asset globale BNY Mellon Global Real Return, offrirà un aggiornamento dettagliato sull'andamento del fondo, sul posizionamento di portafoglio e sull'outlook di mercato del team di gestione, rispondendo alle domande dirette degli investitori.
With ERP vendors reporting double-digit growth in cloud revenue year over year, many organizations are faced with the challenging task of planning a cloud migration of their most critical assets. Because these systems are typically more complex, and also house the organization's critical data and processes, special precautions must be taken when building a migration plan.
During this webcast JP Perez-Etchegoyen, CTO of Onapsis Inc and Shamun Mahmud, Research Analyst at CSA, will present their key findings from the recently released white paper, "The State of Enterprise Resource Planning Security in the Cloud." Attendees will learn:
- Security requirements of ERP and Business-Critical Applications
- Cloud adoption trends
- Challenges of migrating ERP solutions to the cloud
- Common Security and privacy risks in cloud based ERP applications
o SaaS ERP Applications
o IaaS ERP Deployments
o ERP extensions in PaaS cloud
- Conclusions and key take-aways
A discussion around the role and the evolution of data. We will also cover the importance of protecting data throughout its lifecycle.
We will look at:
- Fundamental changes in the way we live, work and communicate
- How we have become highly reliant on data, so it means more to us
- The increasing value of data and why we need to protect it
Presenter: Laurence Pitt, Global Security Strategy Director at Juniper Networks
Curious about earning the CAMS designation? Not sure where to start? Confused about the certification process? This webinar was made especially for you! We understand that you may have many questions about becoming CAMS certified and we are here to answer them. This webinar will provide you with an in-depth look at the process becoming CAMS certified and help you navigate your way to success.
When GDPR becomes law in a few months, it will be the most wide-ranging and stringent data protection initiative in history. To prepare for this sea change, most organizations have streamlined and detailed their information security policies; however, many are unaware that immature application security programs arguably pose the biggest threat of a data breach. This oft-forgotten piece of data protection puts organizations at risk of GDPR fines.
Attend this joint webinar with Security Innovation and Smarttech247 to learn practical tips on incorporating application security best practices into an InfoSec program to achieve GDPR compliance.
* Summary of GDPR key concepts
* Security of data processing in software and the CIA triad
* The people and process problem of GDPR: Governance
* Using Data Protection by Design for secure design and business logic
* Assessments to verify the security of processing
Roman Garber, Security Innovation
Edward Skraba, Smarttech247
Las posibilidades que nos ofrecen las soluciones ITSM, en nuestro caso BMC Remedy ITSM, a la hora de utilizar Servicios Cognitivos, en la gestión de los servicios de TI:
•Ayuda a los servicios de Service Desk en la categorización y asignación de las peticiones e incidencias de los usuarios
•Promueve la innovación y mejora del servicio prestado a los usuarios a través técnicas de Inteligencia Artificial y Machine Learning, mediante la recopilación y el análisis de datos
•Habilita un nuevo canal de entrada en la relación con los usuarios finales y clientes, que permite la auto-resolución mediante un asistente virtual.
En el Webinar, se mostrará, la operativa a seguir por un usuario de help desk y el cliente final, y cómo a través de “Innovation Studio” nos integramos con IBM Watson, describiendo el proceso de entrenamiento, evaluación y pruebas de las distintas fases de aprendizaje que habitualmente se sigue en modelos de Machine Learning.
Agenda del webinar:
1.Búsqueda inteligente en el soporte TI
2.Motores de recomendación
3.Análisis predictivo en las operaciones de TI
4.Bots para autoservicio y autoayuda
Plataforma sobre la que se basa:
2. BMC Digital Workplace
3. BMC Innovation Studio
4. IBM Watson
This webinar will examine concepts for managing sensitive data in AWS. For example, using tools to encrypt client access with AWS Certificate Manager; secret management with AWS Systems Manager Parameter Store and its integration with deployment pipelines; and how to encrypt data at rest to ensure privacy.
Join this 20-minute webinar to see how Veracode can help you unlock the capabilities of DynamicDS and DynamicMP. With these deeper scanning abilities, your organization can identify and remediate application vulnerabilities and comply with several compliance standards, such as PCI and other financial industry regulations. See firsthand how Veracode’s dynamic scanning capabilities enable teams to:
•Secure individual web apps during SDLC or while in production
•Automate the overall dynamic scanning process to become an easy-to-use self-service offering
•Improve quality through vulnerability verification and login configuration assistance
What will the future talent pipeline mean for the future of the financial services industry?
We are delighted to be joined by three leading FinTech Influencers, Diana Biggs (Head of Innovation, HSBC Retail Banking), Igor Volzhanin CEO, Datasine), and Liz Lumley (global fintech commentor and advisor) to discuss the pressing issues around access to talent and digital skills, including how best to navigate a post-Brexit world.
By joining the FinTECHTalents webinar, you’ll be able to:
- Understand the current and future constraints on access to talent
- Learn how the financial services industry draws in the next generation of innovators
- Understand how to overcome some of the challenges that your organisation faces in talent acquisition
- Learn the steps industry can take in order to attract tomorrow’s talent to drive change
Security tools alone are not enough as your AWS environment becomes more complex, and the need for comprehensive security – including people, process, and technology – becomes apparent. Cyber threats continue to increase in volume and sophistication, so where do you start when incorporating advanced threat detection and response capabilities into your security strategy?
Start here with Ryan Holland, Senior Director, Technology Services Group at Alert Logic, as he lists the top considerations to better protect your AWS workloads and applications. Learn the core fundamentals to a stronger AWS cloud security strategy.
Register now for this engaging webinar and gain key security takeaways, including:
• Guidelines to security risk modeling: understanding your AWS environment and the exposures your web apps face
• Learnings from top configuration vulnerabilities involving root, S3, IAM, security groups, and more
• The use of multiple data sources to attain a “defense in depth” security strategy
• Threat detection capabilities and creating an effective incident response plan
Pure, as one of the leading CRIS (or research information management RIM) systems, has facilitated the emergence of exciting opportunities for research organisations to transform their support for researchers, with many research libraries taking an increasingly important role. Broadly defined, RIM is the aggregation, curation, and utilization of information about institutional research activities, and as such, intersects with many aspects of traditional library services in discovery, acquisition, dissemination, and analysis of scholarly activities.
OCLC Research has been working with members of its international OCLC Research Library Partnership, including the University of St Andrews in Scotland, on a publication to help libraries and other institutional stakeholders to understand developing RIM practices and, in particular, their relevance for service and staff development purposes.
In this presentation, we will provide an overview of the OCLC position paper and provide a case study from the University of St Andrews.
In the wake of the high-profile, multi-million-dollar breaches using their infrastructure, SWIFT created the Customer Security Programme (CSP) to ensure their customers meet the required levels of security and compliance. Learn how ForeScout plays a crucial role in helping ensure SWIFT CSP compliance from ForeScout experts Matt Buller and Adam Kohler.
Vertica Eon Mode Beta, a separation of compute and storage architecture option, addresses the common need to rapidly scale your cluster to variable workloads. It also accommodates an almost endless data warehousing capability. Join us as we preview the benefits of this new architecture and walk through a step-by-step demonstration of its capabilities.
The future of work will look different than the current landscape, and it is approaching rapidly. To prepare, companies must “future-proof” their organizations through a re-evaluation of behaviors to embrace change.
One of these behaviors is how we think which has the capacity to handle the significant challenges (and opportunities!) that will come from IoT (Internet of Things), AI (Artificial Intelligence), Machine Learning and many other Industry 4.0 trends.
Simple tweaks to existing “thinking” will not be a match for what’s coming. We need a fresh and powerful perspective - a disruption - in the way we’ve approached thinking in the past.
Sign up for our free webinar to understand Disruptive Thinking to future-proof your organization.
Join Veena Rajkumar, Learning & Development Program Manager with Tegile, A Western Digital brand, in the first part of a webinar series about The Future of Thinking. Veena will discuss Disruptive Thinking – a method to alter the status quo, identify unique ways to solve real-world problems using simple ideas and existing resources and build effective results.
You will learn:
. The three parts of disruptive thinking: inquiry, discovery, and development
. Methods to leverage challenge as a vehicle for opportunity
“If you can’t change it, change the way you think about it.” ~ Maya Angelou
Open source software is embraced by developers, enterprises, and governments at every level, and with it comes many strong opinions and few facts. How much open source is really being used in the applications you buy? Does the "many eyes" theory make open source more secure? Does traditional security testing address vulnerabilities in open source?
With organizations becoming more agile but facing increasing regulatory governance, understanding how open source software development works, and how to secure open source, is increasingly important. In this session we’ll cover:
- Code contribution and IP management
- Fork management
- Release process
- Security response processes
- Realities of IP risk and open source
- Pass through security risk and responsibility
- Keeping up with scope of impact changes within a single disclosure
- Automating awareness of security risk from development through integration and delivery to deployment
In today’s digital marketplace, your applications are the backbone of your business. However, cloud-based apps create a host of complex challenges and new risks. With automated tools and hackers for hire, threats are increasing and cybercrime has turned into a game for profit. The digital world has opened the door to unprecedented threats, putting your corporate data and reputation at risk.
Join us for this webinar to learn about:
• The 7 most common threats to your apps and data: Malicious bots, Credential stuffing, DDoS, Ransomware, Web fraud, Phishing, and Malware
• How you can leverage threat intelligence to secure your apps and data
• Where to spend your security budget to provide the strongest level of protection
Information found in the biomedical literature is a significant source for every stage of the medical device life cycle, from concept and design through clinical trials to release and reimbursement, as well as post-market surveillance.
In June 2016, the updated Medical Device Clinical Evaluation Report (CER) guidelines came into effect (Revision 4 of MEDDEV 2.7/1), detailing where and how to search for literature and how to record the process of collecting, appraising and analyzing the items found.
In this session, Elsevier's senior product manager Dr. Ivan Krstic demonstrated how Embase is especially suited to help Medical Device manufacturers prepare CER, including:
- How to design effective literature searches for Clinical Evaluation reports using the PICO search form in Embase;
- How to build a more comprehensive search using Emtree terms and synonyms;
- How trade name and manufacturer name indexing supports analyses of devices already on the market;
- How to find mentions of adverse device reactions in the literature for effective post-market surveillance (PMS) reporting
Enterprise networks are changing fast. Traffic volumes are growing relentlessly, applications are increasingly dynamic and distributed, and some of them have moved outside of IT’s direct control. On top of these challenges, every category of business process is moving to digital — the network is now both your supply chain and your delivery vehicle. IT and network teams are feeling more squeezed than ever as their traditional tools fall further behind these modern requirements.
Is your enterprise network facing one or more of these challenges?
Join Kentik’s Jim Meehan to learn how network traffic intelligence provides:
--Pervasive visibility within the data center, across the WAN, and into public cloud
--Proactive alerting and anomaly detection for both NetOps and SecOps
--Single-pane-of-glass visibility across all applications regardless of where they run
--And much more for modernizing your enterprise network
Docker comes bundled with some neat security safeguards by default: isolation, a smaller attack surface, and task specific workloads.
There are, however, some specific parts of Docker based architectures which are more prone to attacks. In this webinar we are going to cover 7 fundamental Docker security vulnerabilities and threats.
Each section will be divided into:
-Threat description: Attack vector and why it affects containers in particular.
-Docker security best practices: What can you do to prevent this kind of security threats.
-Proof of Concept Example(s): A simple but easily reproducible exercise to get some firsthand practice.
Avoid the expensive costs of a failed sales hire. Join this webinar to learn simple strategies to find and interview the right candidates and set them up for success. Be the first to access links to free tools to help in your hiring and onboarding processes.
Windows Server 2016 launched in late 2016, with new functionality such as Hyper-V, Storage Spaces Direct, Storage Replica and advanced Resilient File System (ReFS). As more and more enterprises are adopting and deploying Windows Server 2016 hyper-converged infrastructure, DataON and our partners would like to share our best practices and know-how so your HCI leverages all the key features and functionalities of a Microsoft software-defined data center (SDDC) with Storage Spaces Direct.
Veeam Cloud Connect provides cloud-based disaster recovery and offsite backup. It allows businesses and organizations to have physical and virtual backups off-site and replicate VMs without the cost and complexity of building and maintaining an offsite infrastructure. It’s also one of the few solutions that provides full, advanced support for Windows Server 2016.
HGST (a division of Western Digital) provides high quality and high capacity SAS HDDs that are the core of DataON’s DNS family of JBODs. It lays down the foundation for a worry-free data center powered by Windows Server 2016.
The webcast will explore the following topics:
•What are the top deployment best practices you need to know about in Windows Server 2016
•What is Veeam and how do they support Windows Server 2016
•How does HGST technology support a Windows Server-based data center
Presented by: DataON, Veeam, HGST, and a Microsoft MVP
This webinar will about the creative side of asset management marketing: ideation & execution.
Some questions to spark the conversation include:
How do you create, or re-create a legacy brand?
What conversations need to happen, how much creative license is used, and where does inspiration come from?
Is a different type of creativity than what people expect?
How does data, customer feedback & regulations figure into the creative process?
What considerations are needed to enter a new market?
Get to Inbox Zero everyday with Automated Threat Ranking
Do you struggle with getting too many phishing alerts? Does it take a long time to investigate and respond effectively?
Join us for a special presentation to see how some of the most sophisticated security teams are applying automated threat ranking to phishing reports from their users and detection tools, helping them get to inbox zero every single day.
Timely analysis and response is key to combating phishing threats while tracking and rewarding submissions helps keep submitters engaged and participating.
Join this webinar to gain insight into:
* The basics of Phishing investigations
* What automation can and cannot accomplish
* How to build the automation steps easily
* Best practices from industry experts
Learn how you can help make your phishing reporting initiative an asset that drives other security capabilities rather than a burden that exhausts your team!
Speaker: Tom D’Aquino, Director of Security Solutions at LogicHub
Beating Hackers at Their Own Game: Security Awareness Strategies That Work
If 2017’s explosion of cybersecurity breaches taught us anything, it’s that our workforces, more than ever, are one of our most critical defenses. But with as much as 30% of employees unable to spot a phishing email, how do you keep hackers from hijacking your data? The seemingly obvious answer is security awareness training. Unfortunately, many security education programs today fail to sufficiently change employees’ security attitudes, skills and behaviors -- providing a false sense of protection and safety. Even worse, 48% of companies do not have an employee security education program.
If your New Year’s infosec resolutions include launching a security awareness initiative, or reviving an existing one, what better way to guarantee results than to learn from pros who have been in your shoes. Join our expert panel as they share:
● Their most effective security awareness strategies to improve your organization’s security posture
● Proven methods to get employees to take security seriously (before a breach occurs)
● Security awareness program pitfalls to avoid and biggest lessons learned
● Predictions on what will cyber attacks will look like in the next couple years and what you should do in your security awareness program today to prepare
Criminal cases have long been thought of as an arena devoid of electronic discovery issues. But attorneys who regularly handle criminal cases know that’s not the case. So, are there any guidelines and best practices for handling eDiscovery in criminal cases? This CLE-approved* webcast session will take a look at the history of the development of standards and highlight specific issues of importance regarding eDiscovery in criminal matters. Topics include:
+ Overview of Rules for Criminal Matters
+ How Data is Acquired in Criminal Matters
+ Common Data Types and Examples of Cases
+ Data Exchange Formats and Protocols
+ Time Issues Specific to Criminal ESI
+ Working with Social Media as Evidence
+ Border Entry Considerations and Examples
+ Resources for More Information
Presentation Leader: Doug Austin
Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.
Special Consultant to CloudNine: Tom O'Connor
Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
Most mobile app penetration tests or vulnerability assessments take anywhere from a couple of days to two weeks to deliver because of the manual approaches, brittle open source stacks in homegrown testing rigs and legacy application security testing (AST) tools. The shift to agile development common in mobile app development teams has left appsec testing behind. New mobile app builds are pushed daily, weekly or monthly, and appsec testing teams struggle to keep up. Each new build brings new code, including 3rd-party libraries, and with that code comes new potential vulnerabilities.
Application security & testing teams - this one’s for you. If you’re looking for ways to join the agile approach and keep pace with the speed of your development team’s CI/CD pipeline, take stock of these 5 tips for mobile appsec testing and integrate them into your company’s workflow.
NowSecure - protecting the business at the speed of mobile.
Do you think security is overdue for actionable forecasts rather than security dogma? Are you a security leader tired of worrying about the next vulnerability with a logo and a web site? If we can forecast the weather, we can use similar models to foresee which vulnerabilities attackers are likely to weaponize.
Join Kenna Security's Michael Roytman, Chief Data Scientist and Ed Bellis, CTO, Co-Founder and ex-CISO at Orbitz for a live webinar where they will debut Kenna Security's new Exploit Prediction, the industry's first vulnerability exploit prediction capability, a significant breakthrough for security professionals looking to develop a more mature proactive approach to vulnerability management.
In this webinar cover:
"How Kenna Exploit Prediction has delivered 94 percent predictive accuracy
"How to adopt a proactive approach to contextualize, prioritize and remediate vulnerabilities, based on risk
"How the Kenna Security Platform with Exploit Predictions can help align security, IT operations, and executive management with a single view of risk
"A demonstration of the Kenna Security platform with the new Exploit Prediction capabilities
As corporate data moves into cloud applications like Office 365, Box, and Salesforce, organizations are forced to rethink their security posture. Modern threats to cloud data range from unauthorized access to uncontrolled BYO devices. IT leaders need a forward-thinking approach to cloud security and must consider best practices when expanding the enterprise's cloud footprint, including proper identity management, comprehensive visibility, and zero-day control to name a few.
Join cybersecurity experts Rich Campagna, Bitglass, Chief Marketing Officer and Salim Hafid, Bitglass, Product Marketing Manager for a deeper dive on these cloud security best practices.
•Explore the tools and training you need to protect data in any application
•Learn how cloud-first organizations are securing corporate data
•Gain insights to better enable employee productivity and mobility
Are you struggling to turn big data into useful, accurate, consistent, and impactful insights? Organizations are rapidly adopting new technologies like Hadoop, Spark, and Kafka to help lines of business develop new insights. However, with the sheer quantity of data available and complexity of new technologies, the opportunity to drive operational efficiencies and grow sales can feel overwhelming, inflexible, manual, and complex. Informatica's customers have successfully pursued digital transformation strategies through more systematic approaches for getting the right data, in the right place, at the right time to the right people.
In this webinar, learn how to:
• Design an architecture for data management with Hadoop and big data that can scale for large organizations
• Understand best practices for data integration, data quality, data cataloging, and data preparation
• Exploit automated approaches to data management to get more trusted data assets every time
Join experts from Cloudera and Informatica to learn about an enterprise approach to data management that enables big data to be turned into useful, accurate, consistent, and impactful business insights.
Cybersecurity is a key priority for CISOs in 2018. What are the cyber threats CISOs should be aware of? How can we build more resilient enterprises in an age of relentless cyber attacks?
Join this interactive panel to learn more about:
- The latest cyber threats
- New attack trends
- Fighting cyber crime in an age of breaches and stolen personal information
- Understanding your cyber risk
- CISO priorities for 2018
- Dan Paltiel, Security Intelligence Analyst, U.S. Bank
- Ben Johnson, CTO and Co-founder of Obsidian Security
- Roselle Safran, President of Rosint Labs
Organizations create roadmaps to communicate strategy. Roadmaps must have the right level of granularity and connect strategy with implementation to ensure desired outcomes are achieved and value is delivered. Roadmaps provide the benefit of visualizing future business outcomes in order to make better-informed investment decisions.
Join Andy and CA’s Jim Tisch as they address:
•Why product roadmaps are more important than ever in an agile operating environment
•How roadmaps can be leveraged to develop proactive solutions that guide industry trends
•The importance of integrated product and project portfolio management
•The need for active roadmap management across the entire product portfolio
This webinar will not only challenge your assumptions on modern business management, it will provide you a tangible action plan to improve your success through better product roadmap management. Don’t miss out, sign up today.
How can ServiceNow transform your HR Service Delivery? Start simplifying HR processes, reducing time spent on routine tasks, and modernizing the employee service experience.
- The Big Picture: Why are we all investing in HR?
- Real World Examples: What's possible in HRSD
- Build your Business Case: Alignment, Impact, and your 4 steps to a killer pitch
- Questions to expect: New demands and changes we see with Acorio clients as ServiceNow HRSD expands
Despite tremendous progress, there remain critically important areas, including multi-tenancy, performance optimization, and workflow monitoring where the DevOps team still requires management help. In this webinar, presenter Kirk lewis discusses the ways that big data clusters slow down, how to fix them, and how to keep them running at an optimal level. He also presents an overview of Pepperdata operation performance management (OPM) solutions. In this online webinar followed by a live Q and A, Field Engineer Kirk Lewis discusses:
• How Pepperdata Cluster Analyzer helps operators overcome Hadoop and Spark performance limitations by monitoring all facets of cluster performance in real time, including CPU, RAM, disk I/O, and network usage by user, job, and task.
• How Pepperdata Capacity Optimizer increases capacity utilization by 30-50% without adding new hardware
• How Pepperdata adaptively and automatically tunes the cluster based on real-time resource utilization with performance improvement results that cannot be achieved through manual tuning.
Kirk Lewis joined Pepperdata in 2015. Previously, he was a Solutions Engineer at StackVelocity. Before that he was the lead technical architect for big data production platforms at American Express. Kirk has a strong background in big data.
Phishing, ransomware, and data breaches plague organizations of all sizes and industries, but the financial services market has always had the largest target on its back. As a mid-market financial organization, how do you fend off these attacks when you don’t have the budget for everything you need: data feeds, tools, analysis and mitigation?
The answer: “Threat Intelligence-as-a-service.” This, robust, cost-effective option, brings together dozens of structured threat intelligence feeds, online monitoring of social media and the dark web, and round-the-clock human review to give you vetted, relevant intelligence specific to your organization. Even better, there is no hardware or software to install, this is a completely managed service that can be up and running in hours or days. It finally puts “big bank” threat intelligence capabilities within the reach of smaller organizations.
Join LookingGlass’ Vice President of Customer Support James Carnall and Vice President of Intelligence Operations Eric Olson on Wednesday, March 21 @ 2pm ET as they discuss how threat intelligence can be affordable for mid-market organizations with LookingGlass’ Information Security-as-a-Service package, a new offering tailor made for your organization’s cybersecurity needs.
2017 was full of sensational breach headlines—a year full of high-profile news about companies impacted by all sorts of malware and ransomware.
It’s not surprising, then, that CEOs are reacting to these reports. CEOs overwhelmingly cite malware as the most important cybersecurity risk threatening their organization’s success.
But technical officers on the front lines (CIOs, CTOs and CISOs) see it differently: They point to identity breaches—including privileged user identity attacks and default, stolen or weak passwords—as the biggest threat.
Join us for a live webinar that examines recent trends and research on cyber attacks. You will learn about:
- Recent malware attacks including wannacry, petya, notpetya and badrabbit
- Current research asking CEOs about cybersecurity strategy and spending
- The most common cause of breaches that you may be overlooking — compromised credentials
- A surefire way to secure access without boundaries through the power of Zero Trust Security
What is the strategic difference between customer service and customer experience? How can contact centers improve ROI by improving the customer experience? Join us as Nate Brown breaks it all down, and arms you with strategic direction to drive growth in the year ahead. You'll learn how to gain the buy-in you need to move your CX initiatives forward, how to find opportunities for quick wins, and how to leverage customer feedback to generate revenue. Bonus: attendees will gain free access to Nate's newly released CX Primer tool.
Now that 802.11ac Wi-Fi has established itself in the market, we’re already looking at what’s in development for the next generation of wireless communications. Will communication speeds continue on their rapid upward trend and, if so, what new applications could emerge as a result? And with 5G cellular garnering a lot of attention lately, will it make a play to obsolete Wi-Fi? Register for this webinar to learn:
-The status of 802.11ax and ay
-An overview of 5G cellular and how it will effect wireless
-How infrastructure will adapt to support these new developments
Over 99% of companies are private. Do you sell to these companies but are challenged to engage at the C-suite? If so, attend this webinar and learn how to develop insights into their goals, financial performance, and what matters most; and how to use these insights to gain access to C-level executives.
Examining 2017 to prepare for what's coming in 2018
The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.
Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.
While every organization needs to keep data protected and accessible for its users, many are unaware of the risky protection and recovery gaps when malicious attacks occur or point-in-time recovery is required. Many organizations are asking themselves, “Is Microsoft O365 good enough protection and recovery?” or “Is my on-premises backup solution enough?” Join this webinar to learn where your biggest risks are and how to mitigate them.
Shane Harris - Director Product Marketing, Mimecast
Shane Harris has had varied experience spanning 20 years across IT, Product Management, Sales, Engineering and Research Analyst roles in the areas information management, eDiscovery, archive and compliance. Prior to Mimecast , Shane was the lead analyst for the Enterprise Information Archiving Magic Quadrant at Gartner and has held executive leadership positions at kCura, Commvault and Johns Hopkins. In these roles, he has held countless customer conversations across all verticals and was a frequent speaker, presenter and thought-leader at industry events.
Glenn Brown - Director Product Management, Mimecast
Glenn joined Mimecast in 2007 and is responsible for Mimecast’s archiving, compliance and data resilience products group. He is tasked with defining and bringing the product roadmap from vision to reality and is a passionate advocate of cloud technology enabling strong data resilience strategies.
Is the status quo really an option? What do maritime stakeholders (shipping companies, terminal operators, cruise lines, port authorities) need to do to prevent, prepare for and respond to the next attack on the horizon?
To coin an old adage that has been used in many sports discussions and is also known as a principal of war, "The best defense is a good offense." This webinar will demonstrate tools and resources that maritime stakeholders can utilize to be Proactive and control their cyber risk.
This webinar, focused on maritime operations, will provide unique insights of the recent cyber events and emerging threats. We will also:
• Discuss nationally-recognized solutions and management approaches that can lead your organization to a proactive and predictive posture with a Cyber Risk Management strategy,
• Include experts from a “bench” of cybersecurity experts that are recognized internationally for their knowledge and skills,
• Demonstrate our Cyber Risk Management platform that can give you the “Situational Analysis and Awareness” that you need in today’s rapidly expanding and complex environment, and
• Learn how we can provide you the same resources that the Department of Defense, NASA, and other federal agencies use and trust, with RiskSense.
Attending this webinar will provide you and your staff valuable insights and offer a course of action that can be a game changer for all maritime organizations
For decades, OOH measurement was limited to impressions. But all that is changing. By using mobile data, we’re now able to track the movements of people who pass by an out-of-home unit. Combined with the right data science, measurement goes beyond simple impressions to a true map of your OOH campaign’s impact.
In this webinar, our Science Product Director Aaron Stewart and Chief Scientist Shawn Spooner will walk you through a real campaign that we tracked. You’ll get a chance to see advanced measurement in action and how it answers these key marketing questions:
How many people saw the ad, then went to the client location?
Who are these visitors? Where do they go and what do they do?
How do I target people who saw my ad with online ads?
How can we build a stronger audience profile?
We are on the cusp of a whole new world that integrates out-of-home seamlessly into our technological society. And observational results are only the beginning. Join us to see how data science and technology are changing the out-of-home world.