Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • How Healthcare CISOs Can Secure Mobile Devices that Access Sensitive Information
    How Healthcare CISOs Can Secure Mobile Devices that Access Sensitive Information Jim Routh,CSO at Aetna, and Adi Sharabani, SVP Modern OS Security at Symantec Recorded: Dec 18 2017 60 mins
    SEP Mobile research found that around 18 million Android devices have at least one medical app and a high-risk malware on it. The study also found that 1.96% of all devices in any organization are at a high risk of getting compromised.

    How do you create a mobile environment that is HIPAA compliant, secure, resilient and enables employees for increased productivity as compared to constraining them?

    View this on-demand webinar with Jim Routh, CSO at Aetna, and Adi Sharabani, SVP Modern OS Security at Symantec, to learn:

    - About the state of mobile security in Healthcare organizations
    - How to improve incident response and resilience of mHealth IT operations
    - How to leverage risk-based mobility to predict, detect and protect against threats
  • 1/3- Ética em Pesquisa e Publicações
    1/3- Ética em Pesquisa e Publicações Karin Hoch Fehlauer Ale Recorded: Dec 18 2017 49 mins
    Na primeira aula do curso, conversaremos sobre as bases éticas em pesquisa e publicações. Também abordaremos a detecção de erros honestos e má conduta em artigos. Encerraremos a aula com a retratação de artigos publicados.


    Minicurso "Seja um pesquisador responsável: publique com ética"

    O minicurso é composto por três aulas que abordarão o comportamento ético para a boa qualidade da pesquisa científica. A conduta antiética existe tanto dentro como fora do contexto do mundo acadêmico. Casos rotineiros de trapaça, fraudes e golpes são exemplos de comportamento antiético que têm consequências graves, passíveis de punição. Na Academia, a conduta antiética também pode ter desdobramentos sérios. O desenvolvimento de boas práticas em pesquisa ética ajuda os autores a publicarem seu trabalho de forma responsável e a evitarem assim rejeição e principalmente retração devido à má conduta. Além de acabar com uma trajetória profissional, a má conduta fere gravemente a integridade da Ciência. Neste curso, forneceremos orientação sobre quais são os preceitos éticos em publicação e como não cair em armadilhas durante o processo.

    This will be delivered in Portuguese
  • How to Prepare for GDPR: A Gemalto Case Study
    How to Prepare for GDPR: A Gemalto Case Study Jean-Pierre Mistral, Director of Global Data Privacy and Alex Hanway, Encryption Product Marketing Recorded: Dec 18 2017 60 mins
    Join us for a new webinar in our series focused on helping companies prepare for the upcoming global government regulations, like European General Data Protection Regulation (GDPR). Data sovereignty, especially for cloud-first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our Director of Global Data Privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Alex Hanway, Product Marketing, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •What is GDPR?
    •Case Study: A look at how Gemalto has prepared for GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • Strategy and Tactics for Securing Mobile Devices in Financial Organizations
    Strategy and Tactics for Securing Mobile Devices in Financial Organizations Brian Heemsoth, Director of Software & Mobile Security, Aetna Recorded: Dec 18 2017 56 mins
    Protecting financial data has gotten drastically more difficult in the age of mobility, with always-on, always-connected computers in our pockets. A whole new approach is required to effectively defend against mobile malware attacks, network attacks and attacks against OS vulnerabilities.

    View this webinar with Brian Heemsoth, Director of Software & Mobile Security at Aetna, to learn how Aetna protects its corporate data from mobile threats while providing a better user experience and complying with strict industry regulations.

    Key Learning Objectives:

    - How Aetna addressed 23.97 high risk vulnerabilities per device, mitigated 701 malware infections and 460 instances of high risk networks

    - How to manage risk on thousands of mobile devices stemming from malware, networks, and security vulnerabilities

    - How to make your workforce more agile and productive with mobile devices, while protecting corporate data from theft

    View Today
  • 2018 Predictions & Recommendations: Financial Services
    2018 Predictions & Recommendations: Financial Services Lawrence Chin, Security Market Architect, Palo Alto Networks Recorded: Dec 18 2017 4 mins
    Join Lawrence as he looks into the SWIFT mandatory security controls and what that means for financial institutions in 2018.

    Discover more by reading the blog in the attachments.
  • Actions, dette en devise locales ou crédit : Comment s'exposer aux émergents ?
    Actions, dette en devise locales ou crédit : Comment s'exposer aux émergents ? Federic Zamora (Standish), Colm McDonagh (Insight), Naomi Waistell (Newton) Recorded: Dec 18 2017 32 mins
    Dans ce webcast sous-titré en français, nos gérants sont interrogés sur l’évolution et les perspectives de leur marché respectif : actions, dette en devise locale et crédit.
  • Combating Advanced Threats with SonicWall Hosted Email Security
    Combating Advanced Threats with SonicWall Hosted Email Security John Aarsen Recorded: Dec 18 2017 23 mins
    Join us on Monday, December 18th at 9 a.m. GMT for the hosted email security webinar, Combating Advanced Threats with SonicWall Hosted Email Security.

    Email continues to be vital to business. However, as the volume of email increases, so too does the amount of ransomware, phishing, business email compromise (BEC), spoofing, spam and virus attacks.

    Cyber criminals falsify email sender addresses to fool recipients and inflict damage to unknowing, legitimate brands. Organizations can benefit from replacing legacy solutions with SonicWall’s easy-to-use, affordable cloud-based email security solution that defends against the dynamic, evolving email threat landscape.

    In this webinar, gain insights on:
    •Protection against advanced email threats
    •How SonicWall hosted email security enhances MS Office 365
    •Other benefits of the cloud-based email security subscription service
  • Tietosuojavastaava - Uusi tietosuoja-asetus HR:n näkökulmasta?
    Tietosuojavastaava - Uusi tietosuoja-asetus HR:n näkökulmasta? Jarkko Koivuniemi Recorded: Dec 18 2017 54 mins
    Uusi tietosuoja-asetus ja laki on tulossa, oletko valmistautunut? Mitä konkreettisesti tarkoittaa osoitusvelvollisuus? Lain henki tulee pystyä osoittamaan ohjeistuksen, toimintamallien ja dokumentoinnin avulla. Tule kuuntelemaan lisää, mitä tämä tarkoittaa henkilöstöhallinnon näkökulmasta. Tunne rekisterinpitäjän vastuut ja velvollisuudet.

    Sisältö:

    - Tietosuoja-asetuksen tausta
    - Miten tietosuoja-asetuksen uudistukset vaikuttavat henkilötietojen ja arkaluontoisten henkilötietojen käsittelyyn?
    - Millä perusteella työnantaja voi käsitellä henkilötietoja?
    - Mitkä ovat henkilötietojen käsittelijän vastuut?
    - Sopimukset hallinta tietosuoja-asetuksen näkökulmasta
    - Tietosuoja ja HR:n tilivelvollisuus
    - Henkilötietojen käsittelyprosessit ja dokumentointi
    - Esimerkkejä mm terveydentilatietojen sekä sairauspoissaolo -tietojen käsittely
    - Tietosuojavastaavan nimittäminen organisaatioon

    Puhuja:

    Jarkko Koivuniemi, Senior Consultant, Digitrain Oy

    Jarkko on pitkän linjan IT-alan yrittäjä ja moniosaaja. Viime aikoina pääpaino on ollut tietosuojassa, kokonaisarkkitehtuurissa ja digitalisaatiossa.
    Tällä hetkellä Jarkko toteuttaa useammalle asiakkaalle tietosuojan hallintamallien tekemistä ja konsultointeja.
    Asiakkaita löytyy mm Valtion hallinnosta, sairaanhoitopiireistä, kaupungeista, kunnista, kolmannelta sektorilta ja eri toimialoilla olevista yrityksistä.
  • GDPR Introduction
    GDPR Introduction Manish Walia and Munaf Razzak Recorded: Dec 16 2017 55 mins
    The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). The session is an introduction to what are some of the key regulations that are being introduced.
  • [Webinar] Shifting Left Without Sacrificing Security and Compliance
    [Webinar] Shifting Left Without Sacrificing Security and Compliance Maya Ber Lerner, VP of Product, Quali Recorded: Dec 15 2017 25 mins
    Deliver Production-like Environments Early in the Dev/Test Lifecycle
    As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
  • Build Your Angular Apps with Sencha Components
    Build Your Angular Apps with Sencha Components Marc Gusmano, Solutions Architect at Sencha Recorded: Dec 15 2017 61 mins
    Attend this hands-on webinar where you will learn how your Angular app can immediately gain access to hundreds of features, components, and widgets from Sencha, all synched to work together!

    Join us and you will:

    - See why Sencha isn’t just Ext JS anymore - including how we are helping Angular and React developers
    - Understand the benefits of our 115+ commercially tested and supported components – a lifeline when your app is on the line
    - See real examples of:
    -->Data Analytics - Grids, Pivot Grids, Analysis, Exports, Excel
    -->Visualization tools – Charts, D3 Visualizations
    -->Prebuilt packages - Calendar, Forms, Tabs, Menus
  • Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack
    Exclusive Healthcare Webinar: Anatomy of an Email-Borne Attack Bob Adams, Mimecast Cybersecurity Expert; David Hood, Mimecast Director of Product Marketing Recorded: Dec 15 2017 62 mins
    Email remains the biggest entry point into your healthcare organization, and with medical records at least 10X as valuable as credit cards, potential payoffs are high. Security threats are real and debilitating – they can even affect patient care – and they aren’t going away anytime soon. Join us for Anatomy of an Email-Borne Attack where we'll paint the current healthcare threat landscape for attacks and demonstrate an actual live “hack.”
  • Intelligent Workload Placement and Optimization
    Intelligent Workload Placement and Optimization Bobby Allen, Dir of Technical Services, CloudGenera and Jim Wittry, GM Alliances & Channel, CloudGenera Recorded: Dec 15 2017 53 mins
    The audience will be exposed to a SaaS based analytics platform that allows them to define and or defend their Cloud/ Hybrid IT Strategy. Users have to ability to quickly review, substantive venue analysis for workload placement, with the ability to run “what if scenarios” as well for PVC-Hosted Environments and or Public Cloud as alternative Venues. You are guaranteed to learn something about Cloud and Workload placement that you can apply to your business immediately.
  • Security Review & 2018 Predictions for Financial Services
    Security Review & 2018 Predictions for Financial Services Adam Hamm, Managing Director, Protiviti Global Consulting Recorded: Dec 15 2017 62 mins
    The regulators are coming regarding cybersecurity. Are you ready?

    Join this interactive webinar to learn more about:
    - The NYDFS Part 500 cyber regulations, including insights on implementation and auditing
    - Review the NAIC's new Insurance Data Security Model Law adopted on October 24, 2017

    About the Presenter:
    Adam Hamm is a Managing Director at Protiviti Global Consulting who serves financial services industry clients across the country regarding risk, compliance, and cybersecurity matters. He has deep knowledge of financial services regulation with hands on experience in all insurance supervision and policy related matters. Before he joined Protiviti in January 2017, he was a former President of the National Association of Insurance Commissioners (NAIC), Chairman of the NAIC’s Cybersecurity Task Force, Principal on America’s Financial and Banking Information Infrastructure Committee (the primary national regulatory cybersecurity committee for the financial services sector), Principal on the United States Financial Stability Oversight Council (FSOC), and North Dakota’s elected insurance commissioner from 2007-2016. Adam also spent ten years as a violent crimes prosecutor and civil litigator.
  • Barefoot Deep Insight (TM) - See What Every Packet is Doing in Your Network.
    Barefoot Deep Insight (TM) - See What Every Packet is Doing in Your Network. Nick McKeown, Chief Scientist and Co-Founder. Roberto Mari, Director, Product Management Recorded: Dec 15 2017 59 mins
    A breakthrough in network monitoring, Barefoot Deep Insight is first to provide the four ground truths for every packet in the network:

    1. How did it get here? The sequence of switches the packet visited along its path.

    2. Why is it here? The set of rules it matched upon at every switch along the way.

    3. How long was it delayed? The time it spent buffered in every switch, to the nanosecond.

    4. Why was it delayed? The packets, flows, and applications that the packet shared each queue with.

    Armed with this information, Deep Insight detects almost any anomaly in the network.

    This webinar will cover the concepts used and the technology behind Barefoot Deep Insight network monitoring and analytics system.
  • How Cryptocurrencies are Changing the Face of Financial Services
    How Cryptocurrencies are Changing the Face of Financial Services Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy Recorded: Dec 15 2017 61 mins
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • Using Analytics to Protect At-Risk Children
    Using Analytics to Protect At-Risk Children Beena Tharakan, Ernst & Young and Greg Henderson, SAS Recorded: Dec 15 2017 64 mins
    One of the paramount responsibilities of government is the protection of the welfare of youths and children. Study after study has demonstrated the correlation between contact and interaction with child protective services and later quality-of-life outcomes. And on too many occasions, at-risk youth become tragic statistics before they reach adulthood.

    In the on-demand webinar Using Advanced Analytics to Protect At-Risk Children, hosted by Institute of Public Administration of Canada (IPAC) Chief Executive Officer Robert Taylor, experts from SAS Institute and Ernst & Young discuss the challenges facing child welfare professionals, how data from disparate sources can flag high-risk situations, and how an evidence-based approach, focused on outcomes for at-risk children, can be driven through the operation, from policy-makers to program managers to front-line workers and improve outcomes.
  • Cryptocurrency in your hands: Interview with Revolut
    Cryptocurrency in your hands: Interview with Revolut Ina Yulo, Senior Content Strategy (BrightTALK) and Lewis Stuff, Lead Platform Engineer (Revolut) Recorded: Dec 15 2017 48 mins
    Aside from hitting 1 million customers, digital bank Revolut has just announced that they will be launching a feature which will allow users to purchase Bitcoin, Litecoin, and Ethereum, and will look to expand to other cryptocurrencies soon after.

    BrightTALK's Senior Content Strategy Manager for FinTech and Financial Services, Ina Yulo, chats with Lewis Tuff, Lead Platform Engineer for Revolut.

    Aside from opening up to questions from the audience, they will discuss:
    -How will the new cryptocurrency feature work?
    -How to buy, sell, exchange, transfer cryptocurrencies with Revolut - Demo of the new feature
    -Which cryptocurrencies will be in phase 2?
    -Plans for expansion to North America, APAC, and the Middle East
    -The importance of Revolut's European Banking License application

    Ask your questions ahead of time on Twitter using #BrightTALKRevolut
  • The 2018 Cyber Threat Predictions from FortiGuard Labs
    The 2018 Cyber Threat Predictions from FortiGuard Labs Derek Manky, Global Security Strategist, Fortinet Recorded: Dec 15 2017 6 mins
    Join Derek Manky, Global Security Strategist at Fortinet, to learn about the top Threat Predictions for 2018, as identified by FortiGuard Labs' 200 expert threat researchers, and gain the latest intelligence on the threat landscape and our predictions for every critical area including malware, botnets, mobile threats and more.

    You can also access our 2018 Threat Prediction Report attached to understand what cybercriminals have in store for us and what you, as an IT security professional, should be most prepared to address.
  • Paysage des menaces : tendances cyber sécurité 2017 et au-delà
    Paysage des menaces : tendances cyber sécurité 2017 et au-delà Laurent Heslault, Directeur des Stratégies de Sécurité, Symantec France Recorded: Dec 15 2017 56 mins
    L’année qui s’achève a été essentiellement marquée par des attaques coûteuses, des fuites de données retentissantes et plusieurs cas de ransomwares et d’espionnage économique. La cyber criminalité a gagné en ampleur et en audace, avec des retombées financières bien plus élevées. Les cyber attaques sont désormais régulièrement citées dans les médias.
    Ce webcast aborde les points suivants :
    • Le paysage des menaces en 2017
    • Les personnes ou les erreurs qui ont conduit à ces incidents
    • Les enseignements à tirer de cette année pour les professionnels de la sécurité comme vous
    • Les solutions qui peuvent renforcer votre sécurité à l’approche de 2018
    Inscrivez-vous
  • How to bring your journal on par with prestigious international journals
    How to bring your journal on par with prestigious international journals Dr. Caven Mcloughlin & Mr. Satyajit Rout Dec 19 2017 2:30 am UTC 75 mins
    China is well on its way to becoming a world leader in research output. It is therefore critically important for Chinese journals and publishers to become global names and keep pace with China’s rapidly growing stature in scientific research. So how do international journals maintain and advance their standing?

    This webinar addresses the “business” of maintaining and advancing a high-quality international journal, delving into what it is that prestigious journals routinely do to attract prospective authors, promote their journal’s identity, and engage a broader readership.
    In the first part of this webinar, Professor Mcloughlin will share best practices leading journals follow to engage high-status author prospects, promote the work they publish, increase awareness of their best features, and remind potential contributors about their journals’ publishing opportunities.

    In the second part of this webinar, Mr. Rout will talk about how a growing number of journals today are pioneering the use of non-traditional content formats—jargon-free content and audio-visual summaries to increase the visibility of published research, and thereby reach out to and engage with a broader readership.

    Note that the webinar will be conducted in English.

    Who is this for?
    Editorial staff of academic journals who want to promote a more international footprint for their journal, who want to reach a reading audience outside their own nation, and receive submissions from researchers working internationally.


    Why should you attend?
    This webinar helps editorial staff learn from the practices of prestigious journals by sharing easily reproducible strategies for improving the academic reputation of a journal.
  • 한국 저자들이 흔하게 범하는 공통적 오류들: 수식어 & 명사 문자열
    한국 저자들이 흔하게 범하는 공통적 오류들: 수식어 & 명사 문자열 Jieun Hani Kim Dec 19 2017 5:30 am UTC 75 mins
    Have you received peer reviewer comments suggesting that your manuscript should be revised by a native English speaker? Would you like some tips on how you can avoid such comments?

    Who is this for?
    •Researchers and doctoral students who want to learn how to avoid common errors in manuscript writing.
    •논문 원고 영작에서 범하기 쉬운 오류들을 알고자 하는 연구원 및 박사 과정 학생들을 위한 웹세미나입니다
    Why should you attend?
    This webinar, which will be conducted in Korea, will cover some of the common errors in manuscript writing made by Korean authors. Specifically, we will look at errors in modifiers and noun strings. First we will define modifiers, which can be both a word or a phrase, and noun strings. Then we will learn how errors in modifiers and noun strings form, how to detect them, and how to avoid them in scientific writing.
    이 웹세비나는 논문 원고 작성에서 한국 저자들이 자주 범하는 오류 중 수식어 사용과 명사 문자열 사용을 다룰 것입니다. 영어에서 수식어와 명사 문자열의 사용을 살펴보고 어떤 오류들을 범할 수 있는지 다룰 것입니다. 이 웹세비나를 통해서 이런 오류들을 발견하는 것과 피하는 방법들을 배우시게 될 것입니다.
  • How to Stop All Impostor Threats Coming Into, and Going Out of Your Organization
    How to Stop All Impostor Threats Coming Into, and Going Out of Your Organization Ryan Terry, Product Marketing Manager and Ash Valeski, Sr. Manager Product Managemen Dec 19 2017 11:00 am UTC 60 mins
    The cost of Impostor email has risen to $5.1B. Business email compromise (BEC) is impacting employees, business partners and customers of organizations around the world.

    Proofpoint Email Fraud Defense (EFD) extends the security already offered by Email Protection to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organization, into sending money and other sensitive information to the attacker.

    Join us for a live webinar on Tuesday, June 6th at 10am PST where you will learn:
    • Latest impostor email trends including BEC and consumer phishing
    • How to extend your current protection to stop all impostor threats
    • Upcoming product integration with Email Protection to secure your entire email ecosystem
  • VDI with VxRail for VMware Horizon
    VDI with VxRail for VMware Horizon Andrew McDaniel: Director CCC Data Center Solutions (ISG) Dec 19 2017 11:00 am UTC 60 mins
    Please join us for the Dell EMC webcast on our new solution - VDI Complete with VxRail for VMware Horizon. In this session, you will learn how to maximize your opportunity with desktop and application virtualization through VMware Horizon® on Dell EMC VxRail™ hyper-converged infrastructure appliances. Learn how this industry-leading VDI solution helps you deliver faster time to deployment, radically simplified infrastructure management, and better performance at the edge to your customers, and more profitability to your bottom line. This webcast will be presented in English. We look forward to seeing you.
  • Cyber Security Webinar:  Strategies to protect your data in the cloud
    Cyber Security Webinar: Strategies to protect your data in the cloud Justin Harris, Public Cloud Architect and Jason Montgomery, EMEA Manager for Palo Alto Networks Aperture Dec 19 2017 11:00 am UTC 60 mins
    Join Justin Harris, Public Cloud Architect at Palo Alto Networks and Jason Montgomery, EMEA Manager for Palo Alto Networks Aperture to understand:

    - Why organisations are moving to the cloud and the obstacles getting there
    - The role of Cloud Access Security Brokers (CASB) and a simpler approach to securing SaaS applications
    - How a Next-Generation Firewall compliments and enhances AWS/ Azure's built in security tools
    - Automation and how to move quickly with cloud security
    - Key strategies to ensure your organisation's data remains protected
    - Questions and Answers

    We do hope you can join us for this exclusive webinar to understand new cloud security challenges and strategies for protecting your data.
  • [ARABIC] 2017 - How FireEye can help MEA organisations to protect against APTs
    [ARABIC] 2017 - How FireEye can help MEA organisations to protect against APTs Yazan Hammoudah, Director of System Engineers, Middle East and Africa Dec 19 2017 11:00 am UTC 45 mins
    From cyber criminals who seek personal financial information and intellectual property to state-sponsored cyberattacks designed to steal data and compromise infrastructure, today’s advanced persistent threats (APTs) can sidestep cyber security efforts and cause serious damage to your organisation. 2017 is already one of the most prolific years in terms of APT activity. Indeed, since the beginning of the year, there have been several examples of major cyberattacks across EMEA and more specifically in the Middle East. How can FireEye help your organisations protect against these persistent threats?

    Join this live webinar in Arabic as we will discuss the following topics:
    - FireEye Adaptive Defense
    - Technology
    - Intelligence
    - Expertise

    https://www.fireeye.com/
  • APT34 - New Targeted Attack in the Middle East
    APT34 - New Targeted Attack in the Middle East STUART DAVIS | DIRECTOR EUROPE, MIDDLE EAST & AFRICA; DAN CABAN | PRINCIPAL CONSULTANT, MIDDLE EAST & AFRICA Dec 19 2017 1:30 pm UTC 60 mins
    Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2014.

    APT34 are involved in long-term cyber espionage operations largely focused on the Middle East. This threat group has conducted broad targeting across a variety of industries, including financial, government, energy, chemical, and telecommunications.

    Join us in a live webinar as we discuss this threat group whom we assess to be working on behalf of the Iranian Government, with a mission that would benefit nation-state geopolitical and economic needs. APT34 uses a mix of public and non-public tools, often conducting spear phishing operations using compromised accounts from trusted third parties, sometimes coupled with social engineering tactics.

    Register today to gain deeper insights into this threat group!
  • Developing your app for scale: a talk with JustPark, UK's leading parking app
    Developing your app for scale: a talk with JustPark, UK's leading parking app Jono Warren, Senior Developer at JustPark; Ina Yulo and Harriet Jamieson, BrightTALK Dec 19 2017 2:00 pm UTC 60 mins
    Award-winning JustPark is the UK’s leading parking app, with more than 1.5 million users and over £1m in transactions each month. In 2015, its first crowd funding effort broke records, reaching £3.5m. Its second round – which is still in progress - raised £1m in just three hours.

    With investment in the second round currently sitting at just over £2m, we talk to one of the app’s senior developers about how JustPark will develop for scale, and its plans for taking on the £50bn UK parking industry.

    Discussions will include:

    • Recommendations for scaling for a growing user base

    • Coding environments, standards and styles

    • Mobile payments and integration
  • 2018 Predictions & Recommendations: ICS/SCADA
    2018 Predictions & Recommendations: ICS/SCADA Del Rodillas, Dir. Product Marketing, Palo Alto Networks Dec 19 2017 2:00 pm UTC 30 mins
    Prediction Number 1: In 2018 we will start seeing large-scale deployments of Automated Threat Response by leading operators of ICS in critical infrastructure and manufacturing environments.

    Find out more predictions about where Security and IOT will be in 2018 by watching the video.

    Discover more by reading the blog in the attachments.
  • The Winners - Best New Security Solution - Multi-protocol Signaling Firewall
    The Winners - Best New Security Solution - Multi-protocol Signaling Firewall Pieter Veenstra, Senior Manager Product Development – Security and Routing, NetNumber Dec 19 2017 4:00 pm UTC 60 mins
    The NetNumber Multi-protocol Signaling Firewall is the industry's most comprehensive signalling firewall, providing protection for all signalling protocols including SS7, Diameter, SIP, HTTP and DNS/ENUM. As these firewall applications can be combined seamlessly with other NetNumber applications such as an STP, DSC, HSS or HLR on the same TITAN platform, telecom operators have an unprecedented level of multi-protocol signaling protection, flexibility and operational uniformity in a platform that can reduce Opex/Capex costs and improve efficiency.
  • Why should banks and insurance companies care about Blockchain?
    Why should banks and insurance companies care about Blockchain? Paolo Sironi (IBM Watson Financial Services), Ariel Berman (AIG), Roberto Mancone (Deutsche Bank) Dec 19 2017 4:00 pm UTC 60 mins
    - Why is Blockchain a foundational innovation along 3 dimensions: complexity, novelty and computing power.

    - Why should banks and insurance companies care about Blockchain?

    - What are the major hurdles to overcome to make Blockchain truly transformational?

    - What are the consequences of Blockchain for payments and Digital Currencies?

    - What is Deutsche Bank working on with the Trade & Finance consortium?

    - What is AIG working on with Standard Chartered?

    - What benefits and impacts will Blockchain deliver in the near term?
  • 4 Steps to Risk Ranking Your Vulnerabilities
    4 Steps to Risk Ranking Your Vulnerabilities Mike Pittenger, VP Security Strategy, Black Duck Software Dec 19 2017 4:00 pm UTC 30 mins
    Vulnerabilities are an inevitable part of software development and management. Whether it’s open source or custom code, new vulnerabilities will be discovered as a code base ages. A 2017 Black Duck analysis of code audits conducted on 1,071 applications found that 97% contained open source, but 67% of the applications had open source vulnerabilities, half of which were categorized as severe. As the number of disclosures, patches, and updates grows, security professionals must decide which items are critical and must be addressed immediately and which items can be deferred.
     
    Join Black Duck’s VP of Security Strategy, Mike Pittenger, for a 30-minute discussion of best practices in open source security and vulnerability management. You’ll learn:
     
    - Methods for determining which applications are most attractive to attackers, and which pose the greatest risk
    - Ways to assess the risk associated with a disclosed open source vulnerability
    - Strategies to minimize the impact of open source security vulnerabilities when immediate fixes can’t be made
  • DFLabs IncMan Product Overview
    DFLabs IncMan Product Overview Oliver Rochford, VP of Security Evangelism at DFLabs, Steven Ditmore Senior Sales Engineer at DFLabs Dec 19 2017 4:00 pm UTC 45 mins
    Learn how DFLabs IncMan can help you automate, orchestrate and measure your incident response and security operations.

    By joining this webinar you will have the opportunity to discover DFLabs IncMan and how our solution can help you to:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the amount of handled Incidents by 300%
  • How Your Enterprise is Targeted - Today's Top Attack Vectors
    How Your Enterprise is Targeted - Today's Top Attack Vectors Michael Gorelik, CTO and VP R&D at Morphisec Dec 19 2017 4:00 pm UTC 45 mins
    Join Michael Gorelik, distinguished threat researcher and Morphisec Chief Technology Officer and Vice President of R&D, for a close look at top cyber threats targeting enterprises today. He will walk through the where, what and how of the leading attack vectors as well as explore ways to protect your company.
    • Learn the primary attack vectors used by cybercriminals to infiltrate an organization
    • Understand how different attack techniques work and what damage they can do
    • Find out what protection methods work and where they fall short
    • Get answers directly from our chief bad-guy researcher during the Q&
  • Where Do We Go From Here?  A Fork in the Road for Multimode Fiber
    Where Do We Go From Here? A Fork in the Road for Multimode Fiber Robert Reid, Panduit Dec 19 2017 4:00 pm UTC 90 mins
    This talk will explore the evolution of multimode fiber from inception to current time against the historical transceiver roadmap. We will explore various transceiver form-factors with respect to capability, technology risk, density and cost vs. fiber types that have been deployed (and those yet to be widely deployed). Both transceivers and supported fibers will also be discussed with respect to the evolution of standards that support them.
    Attendees will earn 1 BICSI CEC.
  • Practical Guide to Cloud Computing v3.0
    Practical Guide to Cloud Computing v3.0 Cloud Standards Customer Council Dec 19 2017 4:00 pm UTC 60 mins
    The Practical Guide to Cloud Computing is the CSCC’s seminal deliverable outlining key definitions, characteristics, and benefits of cloud computing. The heart of the guide is a comprehensive 10-step “Roadmap for Cloud Computing” containing guidance and strategies for the successful migration and deployment of cloud computing applications.

    In this webinar, the authors will review each of the 10 steps in the guide and highlight the technical changes made to this latest version including the emergence of hybrid cloud, containers, serverless computing and microservices architectures.

    Read the corresponding paper here:
    http://www.cloud-council.org/deliverables/practical-guide-to-cloud-computing.htm
  • Lifesize Deep Dive: A look at the engine that powers collaboration.
    Lifesize Deep Dive: A look at the engine that powers collaboration. Scott Rankin, Global Director of Sales Engineering, Lifesize & Amanda Etheridge, Sr. Product Marketing Manager, Lifesize Dec 19 2017 4:00 pm UTC 60 mins
    In this unique webinar we’ll cover:

    -The Lifesize Portfolio: what it does and why it matters
    -The Lifesize Icon 450: a zoomed in view of camera quality, smart framing, specs and more
    -The Lifesize Phone HD: a close up look at sound quality, ports and all.
    -The Brand New App: Take a tour of the interface

    Plus we’ll have time for Q&A from our product experts.
  • IDC FutureScape: Worldwide SMB 2018 Predictions
    IDC FutureScape: Worldwide SMB 2018 Predictions Ray Boggs, Vice President, Small and Medium Business Research Dec 19 2017 4:00 pm UTC 60 mins
    In this IDC FutureScape presentation, the IDC Worldwide SMB team discusses the key predictions that will impact CIOs and IT professionals in the worldwide industry over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • How to Approach a Cyber Security Review with Your Eyes Wide Open
    How to Approach a Cyber Security Review with Your Eyes Wide Open Matthew Rogers, Security Director at Freudenberg IT Dec 19 2017 4:00 pm UTC 15 mins
    Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.

    Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:

    • Security KPIs with risky validation processes (far more common than you think)

    • A checklist of security points that need tight inspection (and where to drill down)

    • New security services that streamline the process
  • Makeover Monday Viz Review - week 51
    Makeover Monday Viz Review - week 51 Andy Kriebel, Head Coach at The Data School & Eva Murray, Head of BI and Tableau Evangelist at Exasol Dec 19 2017 4:30 pm UTC 90 mins
    Join the Makeover Monday community for a 60min live webinar to discuss selected data visualizations from this week's submissions.

    You can participate in the webinar, ask questions but also submit a viz ahead of time for review (do this on Twitter via the usual process, and include #MMVizReview if you want live feedback).

    VIZ REVIEW is our way to provide much more comprehensive feedback for everyone, which is always difficult within the limitations of Twitter.

    Find out more about Makeover Monday on www.makeovermonday.co.uk and join the conversation on Twitter by following Andy (@VizWizBI) and Eva (@TriMyData) as well as the #MakeoverMonday community.
  • Ensuring a Trusted Internet of Things
    Ensuring a Trusted Internet of Things Christian Renaud, Research Director at 451 Research & Josh Jabs, Vice President at Entrust Datacard Dec 19 2017 5:00 pm UTC 60 mins
    During this upcoming webinar we will discuss the current state of IoT adoption, security and trust challenges to deployment by key vertical markets. We will also dive into lessons learned, emerging standards for IoT security, and the necessary innovative technologies required for the Internet of Things to succeed. Please join Entrust Datacard and 451 Research for this informative upcoming webinar.
  • Developing a Successful Secure Product Lifecycle (SPLC) Program
    Developing a Successful Secure Product Lifecycle (SPLC) Program Julia Knecht and Taylor Lobb of Adobe Dec 19 2017 5:00 pm UTC 60 mins
    A secure product lifecycle (SPLC) is integral to ensuring software is written with security in mind, but companies struggle to create a successful process with limited security resources and minimal impact to engineering teams.

    In this webinar, Julia Knecht and Taylor Lobb – Managers, Security & Privacy Architecture at Adobe, will explain how a team of just two security pros helped roll out a successful SPLC program that has scaled to support thousands of engineers by leveraging automation and establishing security ambassadors (champions) within the product engineering teams.

    Defining security requirements and KPIs for engineering teams is just the first step in creating the SPLC. In order to make the design a reality for several products, thousands of engineers, and millions of lines of code, Adobe’s team was organized into an “as a service” model and utilized automation to scale to meet this demand. Establishing a strong security ambassador program helped ensure the success of the SPLC. The centralized ambassador network has been crucial to the success all product security initiatives throughout the business unit.

    You’ll walk away with on-the-ground knowledge you can use to establish an effective SPLC in your own organization by establishing and utilizing security ambassadors and providing seamless automation to support these key initiatives.
  • 2/3- Plágio, submissão simultânea e fragmentação
    2/3- Plágio, submissão simultânea e fragmentação Karin Hoch Fehlauer Ale Dec 19 2017 5:30 pm UTC 90 mins
    Nessa aula, iniciaremos a exploração de condutas antiéticas específicas. Aprenderemos sobre plágio, submissão simultânea, duplicação e fragmentação de artigos. Para cada conduta, discutiremos o que fazer para evitá-la e quais podem ser as suas consequências.


    Minicurso "Seja um pesquisador responsável: publique com ética"

    O minicurso é composto por três aulas que abordarão o comportamento ético para a boa qualidade da pesquisa científica. A conduta antiética existe tanto dentro como fora do contexto do mundo acadêmico. Casos rotineiros de trapaça, fraudes e golpes são exemplos de comportamento antiético que têm consequências graves, passíveis de punição. Na Academia, a conduta antiética também pode ter desdobramentos sérios. O desenvolvimento de boas práticas em pesquisa ética ajuda os autores a publicarem seu trabalho de forma responsável e a evitarem assim rejeição e principalmente retração devido à má conduta. Além de acabar com uma trajetória profissional, a má conduta fere gravemente a integridade da Ciência. Neste curso, forneceremos orientação sobre quais são os preceitos éticos em publicação e como não cair em armadilhas durante o processo.

    This will be delivered in Portuguese
  • 30min Demo Webinar: Lightning-Fast Insights w/Periscope's Unified Data Platform
    30min Demo Webinar: Lightning-Fast Insights w/Periscope's Unified Data Platform Brett Li, Senior Product Marketing Manager Dec 19 2017 5:30 pm UTC 30 mins
    In this 30-minute demo webinar, you will learn about how Periscope Data’s Unified Data Platform can help you:

    • Unify your teams — from business, analysts, and engineers under a single end-to-end platform

    • Accelerate your analytics — by connecting directly to your data sources, blending them, and delivering actionable charts and dashboards, no modeling required

    • Uncover true insights — by enabling powerful and flexible ad hoc analysis with a single solution

    • Share your insights anytime, anywhere — with live dashboards, reports, or embedded charts

    • Know your data is secure and up-to-date with our best-in-class security and 99.9% uptime.