Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • GDPR Ready – A 60-Day Action Plan
    GDPR Ready – A 60-Day Action Plan Brajesh Goyal (BG), Vice President, Engineering, Cavirin Recorded: Mar 23 2018 32 mins
    Spring is in the air and unfortunately, the risks of being unready for GDPR are growing exponentially. In a poll of US organizations at VMworld, late last year, 27% of respondents were concerned about GDPR but did not have a plan in place. And 51% of respondents said their organization is either not concerned about GDPR or unaware of its relevance to their business. If you fall into either of these categories, sign up to receive Cavirin’s on-demand Webinar (available March 25th), as experts provide guidance on what GDPR means to US companies and a 60-day action plan to get you ready. Reserve Your Copy!
  • Setup WAN: SD-WAN vs. Legacy WAN - IT Olympics
    Setup WAN: SD-WAN vs. Legacy WAN - IT Olympics Riverbed Technology Recorded: Mar 23 2018 1 min
    In the IT event of setting up a WAN, who will win? Will it be the legacy WAN using CLI or the SD-WAN with rules-based policy creation and deployment? Watch to see who takes the gold in the IT Olympics!
  • GDPR: Brace for Impact or Not?
    GDPR: Brace for Impact or Not? Mark Rasch, Martyn Hope, Lance James, David Morris Recorded: Mar 23 2018 76 mins
    The GDPR compliance date is fast approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?
  • You Should've Been a Doctor: How to turn your interests into a career
    You Should've Been a Doctor: How to turn your interests into a career Ina Yulo, Senior Content Strategy Manager, BrightTALK Recorded: Mar 23 2018 44 mins
    Ever since she was a kid, Ina Yulo's grandmother told her that she wasted the skills she had in math and science by going into the marketing and communication field. "You should've been a doctor," said her grandmother. To which she responded, "But I don't WANT to be one."

    Despite taking a while for her to really feel comfortable and proud about her chosen path, she now has a thriving career running content strategy and communities for the FinTech industry, where she has grown a community of over 300,000 global members.

    Join this session where you will learn:

    -How to intelligently turn your interests into an income-earning profession
    -The importance of putting time aside for learning
    -Finding your niche, your tribe, and yourself
    -The importance of speaking opportunities and throwing yourself out there
    -Branching out -- How not to be a one-trick pony
  • Intelligence in Cyber Defence - How to Win a Modern Cyber War
    Intelligence in Cyber Defence - How to Win a Modern Cyber War Alexander Poizner, CyberSecurity Advisor Parabellyx Recorded: Mar 23 2018 45 mins
    Modern cyber defence strategy requires us to deal with multiple degrees of unknowns. The effectiveness of traditional risk management approach is greatly reduced by dynamics of modern technology and threat landscape. Enterprises must increasingly rely on security analytics to win the battle against various threat actors. However, to become an efficient tool, your security analytics practice must have both internal and external intelligence at its disposal. During this session, we will discuss the challenges in cyber-intelligence and how to build an effective security analytics practice.
  • First – Fix the Plumbing - What’s broken in cyberspace and How to Fix it
    First – Fix the Plumbing - What’s broken in cyberspace and How to Fix it Amar Singh, Adam Gladsden Recorded: Mar 23 2018 57 mins
    Way back in 2000 it was common practice to spend considerable time configuring and tinkering the plumbing of what we today call cyberspace. The technology was embryonic, immature and often hours were spent ensuring nothing broke and that the business operations carried on smoothly.

    Today, those flaky technologies are settled and stable.
    - AI and Machine Learning are the focus of marketing teams.
    - Everyone keeps focusing on NG or next generation technology.
    - If not technology, we keep blaming the human!

    Today, surely, the technical plumbing, the boring stuff is secure and stable, correct?

    Think again.

    In this webinar we explore the bedrock technologies underpinning cyberspace and discuss why we need to focus on understanding and securing them.

    Panelists -

    - Amar Singh - CEO and Founder Wisdom of Crowds, Cyber Management Alliance Ltd
    - Adam Gladsden - SME cybersecurity technologies.
    - NH - DV Cleared, Cyber Criminologist, Dark web researcher & master ethical hacker
  • Weakest Link to Strongest Asset: Let's Focus on the Culture
    Weakest Link to Strongest Asset: Let's Focus on the Culture Tarun Samtani, Group DPO for Vectura Group Plc, & SkyePharma Recorded: Mar 23 2018 39 mins
    It is commonly said that staff are the weakest link to security but is it really? Or we have missed something? Computers process and transmit data and we have been patching them for last 20 odd years or longer but how about humans?

    This session will be all about how you turn your so called weakest link (the people) in to your strongest asset in the fight for cybercrime. Especially, with the new upcoming regulation GDPR it has become even more crucial.

    About the Speaker:
    Tarun Samtani is the Group DPO for Vectura Group Plc, & SkyePharma. Tarun holds over 18+ years of experience across various sectors like Retail, Leisure, Telecommunications, ISP's, Financial Services, Gambling and most recently Pharmaceuticals. Tarun has worked across UK, Europe, Asia & Middle East on different assignments.
  • Building a Strong Information Security Program in 2018
    Building a Strong Information Security Program in 2018 Michelle Drolet, CEO and Co-founder, Towerwall Recorded: Mar 23 2018 42 mins
    How can you build a strong information security program that ensures the protection of the confidentiality, integrity, and availability of your information assets and supporting infrastructure? How are your governance functions evolving to meet the latest cybersecurity threats?

    Join this webinar to discuss the development of the following governance related functions and more;
    * Security Leadership
    * Security Strategy
    * Policy Management
    * Organizational Security Roles and Responsibilities
    * Third Party Security Management
    * Security Awareness
  • Testing Times for Mobile Applications
    Testing Times for Mobile Applications Rob Stock, Senior Solutions Architect, Micro Focus Recorded: Mar 23 2018 38 mins
    Mobile solutions are the pillar of digital transformation, but half of companies in a recent report said they struggle to even find time to test their applications. This and many other challenges to master the quality and end user value of mobile applications are frontiers to be conquered

    Join us on our webinar where we will show how businesses can focus on consistently improving the user experience of their mobile channels using Micro Focus application delivery management.
  • A Paradigm Shift in Enterprise Cyber Defence Strategies: The Role of End Users
    A Paradigm Shift in Enterprise Cyber Defence Strategies: The Role of End Users Dr Debbie Garside, CEO, GeoLang Ltd Recorded: Mar 23 2018 29 mins
    Every enterprise has a pre-built enterprise cyber defence arm; their employees. Enterprises are only now starting to recognise the potential cyber defence value employees offer. Harnessing and educating this currently untapped resource will change the face of enterprise cyber defence – putting responsibility on the front line, minus the blame culture.

    This webinar will highlight where and how your employees can add significant value to your Enterprise cyber defence in-depth strategy.
  • Proactive Data Defence for Digital Transformation
    Proactive Data Defence for Digital Transformation Ian Greenwood, Regional Sales Manager UK&I Recorded: Mar 23 2018 35 mins
    Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, more and more your corporate attack surface is being exposed.

    With data breaches at an all-time high and incidents of identity theft risen by 57% in a year, consumers are questioning the security of their personal data held by organisations. The rise of cloud and the Internet of Things, has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    This webinar will consider:

    • Key security considerations for a digital transformation strategy

    • Why a proactive data defence strategy is crucial

    • The benefits of maximising the level of control over data irrespective of where it is created, store or shared.
  • Tribal Warfare - On Users, Fear & Social Engineers
    Tribal Warfare - On Users, Fear & Social Engineers Jenny Radcliffe | “The People Hacker” Recorded: Mar 23 2018 34 mins
    Who are the corporate tribes who we need to unite against attackers? Why are "users" so key to the success or failure of organisational security? And why is fear such a vital weapon in the fight against malicious social engineering attacks?

    This webinar debates these issues and looks and how and why the human element is still as important as ever in the defence of the fortress
  • Five Common Website Faux Pas You Can Solve With Sitefinity
    Five Common Website Faux Pas You Can Solve With Sitefinity Seth Cleaver Recorded: Mar 23 2018 61 mins
    Join us for this webinar as we work through some common omissions using Sitefinity. We guarantee you’ve missed one of these elements—

    What you’ll learn:
    · Key techniques for making your sites lightning fast
    · Find out how to make a content managers life easier
    · Pick up a few Sitefinity tips to add to your arsenal
  • Career Conversations w/ Debra J Farber - Privacy Guru
    Career Conversations w/ Debra J Farber - Privacy Guru Debra J. Farber, Privacy Guru and Jessica Gulick, WSC Vice President Recorded: Mar 22 2018 59 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Debra J Farber, CISSP-ISSMP, CIPP/US, CIPP/E, CIPT, CIPM, FIP | Executive Consultant & U.S. Chief Privacy Office, CRANIUM

    Hosted by: Jessica Gulick, WSC Vice President, CEO of Katzcy Consulting

    About the Speaker:
    Debra J. Farber (@privacyguru) is a data privacy and information security executive and entrepreneur with 13+ years of data strategy, operations, public policy, training, product, and compliance experience across industries and frameworks. She's Executive Consultant & U.S. Chief Privacy Officer, at CRANIUM, an EU-based privacy and security consulting firm with offices in Brussels, Utrecht, Budapest, NYC, & San Francisco. She also serves as an Executive Consultant and External DPO for CRANIUM's many clients.

    Based in San Francisco, Debra serves on several industry working groups and startup advisory boards. She is a member of the IEEE Data Privacy Process Standards Working Group, IAPP CIPT Exam Development Advisory Board, and privacy tech vendor BigID's Advisory Board. In addition, Debra serves as Editorial Board Member for Cyber Security: A Peer-Reviewed Journal. She also co-founded the SF-based non-profit project, Women in Security and Privacy (WISP).
  • Training Snapshot: Metadata Searching from CloudNine
    Training Snapshot: Metadata Searching from CloudNine Brian Kelley Recorded: Mar 22 2018 7 mins
    A snapshot demonstration of the various options for searching metadata fields from within the CloudNine eDiscovery Platform to locate documents responsive to specific objective and subjective criteria.

    Metadata is key to the management, tracking, and retrieval of documents within the discovery process. Whether you wish to locate a document sent or received by a particular individual, filter a collection by a relevant date range or locate documents that have been marked as responsive or privileged, the ability to be able to search both the system metadata (that metadata that is extracted from the document when it is processed for review) and user metadata (that metadata used by legal professionals to categorize and track documents during the review and production steps in discovery) is key to being able to manage that document collection efficiently and effectively.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • What Hackers Know That You Don’t: Personal Data Edition
    What Hackers Know That You Don’t: Personal Data Edition Nathan Rowe, Chief Product Officer & Co-Founder, Evident Recorded: Mar 22 2018 40 mins
    The internet is a rapidly shifting landscape that continues to integrate with our daily life. Today, having an easily searchable online identity that is inseparable from your own is considered a boon both in and outside of the workplace, and is often considered essential to maintaining a modern social circle. Half of internet users recycle their passwords, a practice that’s been shown to present a significant security risk, especially when it comes to the possibility of a data breach. The volume of stolen data increased 40% from 2015 to 2016 alone. These numbers aren’t just because there’s more information out there, either.

    Hackers are getting smarter and there are significant incentives for cyber-criminals to engage in and traffic stolen records on a massive scale. Coordinated attacks that exploit fundamental flaws in current data storage practices are becoming more common. As the digital presence of a user increases through multiple online services, all vying for different pieces of personal information, so does the chance that the information they enter may be compromised. Even with relatively limited access, attackers can combine what they’ve obtained from now-infamous breaches with publicly available info to further compromise a user’s identity to various ends.

    In this webinar, we will share solutions to mitigate the increasing threats to digital identity theft, as well as outline some of the economic factors that perpetuate the underground industry capitalizing on those threats. This webinar will focus on:

    - Share insight into how and why hackers are motivated to steal information now more than ever
    - Discuss how businesses can build secure ecosystems that are founded on authenticity, but created to protect personal data with less friction and risk
    - Review ways that businesses should rethink their approach to handling personal data and defend against the threat of a data breach
  • Conversation with an Enterprise Architect: Solving IT & Storage Challenges
    Conversation with an Enterprise Architect: Solving IT & Storage Challenges Mike Grandinetti, CMO/CSO at Reduxio Recorded: Mar 22 2018 23 mins
    Want to learn from your peers and have real valuable feedback on IT Management and Goals? Join this peer-to-peer webcast!

    This webcast has been created as a space to hold conversations with IT Infrastructure professionals who share similar concerns and challenges, as well as success stories and a real-world case study from Jorge Barreto, Enterprise Architect at BFL Canada, on how he addressed the following:


    1. Meet IOPS requirements
    2. Spend time in labor-intensive operations such as VM Recovery
    3. Lack of team expertise for complex operations required his personal time in completing tasks

    Join us for live Q&A and discussion with fellow IT professionals!
  • How Bro Provides Better Data and Enables 10x Faster Incident Response
    How Bro Provides Better Data and Enables 10x Faster Incident Response Vince Stoffer, Director of Customer Solutions at Corelight Recorded: Mar 22 2018 46 mins
    Resolving security incidents and threat hunting relies on access to great data. Network data is ground truth at any organization because essentially all threats must traverse a network. And when it comes to network data, there's no better source than Bro, the open source network monitoring project created in 1995.

    This webinar will be an overview of how Bro creates better network data, and why it gives incident responders and threat hunters a powerful new tool that can cut the time required to resolve typical incidents by a factor of 10 or more.

    Watch this webinar to learn:
    - The massive improvement in the work of incident response effectiveness with and without Bro
    - How Bro can reduce the time to resolve incidents and help you get to the truth faster
    - The specific capabilities of Bro and how that helps security teams hunt and defend more effectively
    - How Bro may help you reduce or eliminate any further investment in PCAP systems

    Vince Stoffer, Director of Customer Solutions at Corelight, spent the first part of his career as an incident responder. He will talk about his experience doing incident response before he became aware of Bro, and contrast that with his role at Lawrence Berkeley Lab where he was defending the national lab network where Bro was first developed.
  • ATM EcoCast "Storage, Flash and NVMe EcoCast!"
    ATM EcoCast "Storage, Flash and NVMe EcoCast!" Gokul Sathiacama, Director, Product Marketing, Data Center Systems, Tegile Recorded: Mar 22 2018 31 mins
    What You Need To Know

    The storage market has transformed in recent years, with the standalone storage array being attacked from all sides by ambitious rivals vying for customer attention in a world demand more and more from beleaguered IT departments. Today, storage comes in all kinds of forms, from the aforementioned standalone arrays to systems built atop powerful software platforms to fully integrated offerings. We now live in a brave new world in which “buying storage” carries with it far more nuance than in days past. On top of the new choices available in form factor come new choices in media. Flash is now almost a requirement for many products, but that’s not enough for many, either. NVMe is now here to stay and promises to reimagine the data interface in a way that hasn’t been done in a generation.

    With both current and emerging flash storage systems, companies are gaining benefits that were only dreams in the days of the disk-based SAN. Far beyond just providing crazy levels of performance, flash storage systems have the potential to help IT organizations focus on the business and less on technology. After all, when you have IOPS to spare, other metrics can take center stage. These can include latency, cost per gig, power consumption, gig per rack unit, and many more.

    There are a whole lot of vendors in this burgeoning space, with more jumping in every day. Do you truly understand what each of them brings to the table and how they differ? This ActualTech Media 2018 Storage Flash, and NVMe Storage EcoCast is your opportunity to get deep understanding of this technology and gain knowledge about the leading vendors in this transformational market.

    Don’t miss this special event hosted by David Davis and Scott D Lowe!
  • Tagging for AWS and Azure to Gain Control and Visibility
    Tagging for AWS and Azure to Gain Control and Visibility Dave DeYager, CloudCheckr Support Recorded: Mar 22 2018 28 mins
    Maintaining accountability across an ephemeral IaaS infrastructure can be a challenge for Finance and DevOps teams. With the proper tagging strategy and implementation, organizations can manage cloud costs around their EC2 instances and resources.

    Join CloudCheckr March 22nd at 2 pm Eastern, 11 am Pacific for a live webinar discussing proactive tactics and tips to execute an AWS and Azure tagging strategy as your organization scales, including:

    - Tagging rule guidelines to gain visibility and control over your asset inventory
    - Cost allocation reports and tools to understand cloud expenses and recognize optimization opportunities
    - How CloudCheckr can help enforce tagging policies and reduce cloud costs