Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.
To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.
Join us for this to learn:
- 6 reasons development should own security
- Best practices to employing Shift-Left security
- How to deploy secure apps at DevOps speed
ServiceNow’s Britt Champeau, chatted with Kirstie Magowan and Shane Carlson from 10 in Tech about champion enablement. She helps organizations spread the value of ServiceNow to the enterprise. Britt concentrates on the ‘soft side’ of a ServiceNow implementations. She emphasizes the value of organisational change management.
After a 17-year journey through hardships & learning experiences, 3-D Secure is finally undergoing a much-needed overhaul. EMVCo has released EMV 3-D Secure 2.0 (3DS 2.0); optimized for mobile and traditional web browser transactions.
The new protocol delivers important additional e-commerce transaction metadata, including an extensive set of device data. This enhanced data will facilitate even greater fraud prevention gains for customers, who participate in cardholder authentication programs based on 3-D Secure.
Join Ankur Karer, Director of Payment Security Presales at CA Technologies to learn how 3-D Secure 2.0 is poised to change online payments authentication.
• Discover the key drivers that influenced this indisputable transformation
• Evaluate the important benefits for mobile and in-app purchases
• Analyze the significant new data elements to combat fraud
For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.
Secure web gateways (SWGs) can deliver the insights and controls you need to mitigate the risks of the web. They pick up where next-generation firewalls (NGFWs) leave off, providing the Layer 7 termination and in-depth inspection of web traffic (port 80 and 443) required to uncover and protect against the increasingly sophisticated web threats targeting your business.
In this webinar learn how a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.
●A proxy-based architecture is ESSENTIAL to meeting the needs of the Cloud Generation.
●Symantec BC Proxy SG is the best security defense.
●Symantec Proxy SG dramatically improves threat protection, while reducing costs of other security infrastructure.
What does full stack network coverage look like? From fault, inventory, topology, performance, availability and logs, a comprehensive Network Operations and Analytics platform should cover the entire stack from traditional to SDx environments.
The software-defined data center has been a heavily touted concept over the past few years, and heralded by some as the next step in the evolution of virtualization and cloud computing. Having a data center that is governed by software, rather than dictated by hardware, can lead to more fully automated and intelligent operations. Having infrastructure elements such as networking, storage and security conceived of as a services is, indeed, an attractive concept to many.
In this webinar we will be joined by JR Rivers, Co-Founder and CTO of Cumulus Networks, to talk about how he (and Cumulus) define the concept of a software-defined data center. He will present how the definition of a software-defined data center has evolved since its inception, and how tools like VXLAN, EVPN, Ansible and more can help organizations further their journey to a “software-defined” state and simplify network operations.
The General Data Protection Regulation (GDPR) goes into effect in 2018 and it will affect any business that handles data, even if it's not based in the European Union.
Are you looking to move and host data for EU citizens? Do you have a roadmap and associated estimated costs for EU GDPR compliance?
Join this webinar to learn:
• Case study and legal/regulatory impact to GDPR
• Security Metrics
• Oversight of third parties
• How to measure cybersecurity preparedness
• Automated approaches to integrate Security into DevOps
In the age of the customer and data hacks a brand’s reputation can come down to their ability to protect customer data. The transparency that will develop between brand and consumer with the upcoming General Data Protection Regulation (GDPR) will provide organizations with an opportunity to empower and build trust with their customer.
Armed with a unified and single view of the customer, brands will be able to truly personalize the customer journey while maintaining compliance and securing customer data.
Hear from Lewis Barr and David Fowler as they discuss how to turn the GDPR into business opportunity while focusing on the following topics:
- Heightened consent requirements and consent lifecycle management
- Expanded privacy notice requirements
- Data subject access rights (SARs) and fulfillment requirements
- Business exposure and liability for failing to meet these GDPR requirements
- Practical next steps to achieve operational readiness
About the Presenters:
Lewis manages Janrain’s legal compliance and privacy functions as the company continues its international expansion. He brings more than 15 years of leadership in a wide range of legal and privacy-related matters for growing technology companies. Lewis also utilizes his diverse background as a litigator in private practice, federal appeals court staff attorney, and teacher.
David is the Head of Digital Compliance at Act-On Software and is responsible for all issues pertaining to digital compliance, including email deliverability, privacy compliance, and industry stewardship in regard to our customers and our corporate objectives. David has over 20 years’ experience providing senior leadership in the marketing industry. In the last nine years, he has been strictly focused on issues associated with email marketing, deliverability, digital marketing, and privacy compliance.
The General Data Protection Regulation (GDPR) goes into effect in May 2018. It’s predicted that over 50% of companies affected will not be in full compliance in time. With fines as much as 4% annual revenue, cybersecurity experts, executives and boards are paying attention.
What are the main obligations under the GDPR which will apply to your organization?
How can you identify the gaps that exist between your existing programs and GDPR requirements?
What changes are needed and which technologies can help to achieve compliance?
What is a pragmatic timetable, in what order of priority, and at what cost?
Join ESG Sr. Principal Analyst, Jon Oltsik, Symantec Director, Global Product Marketing and GTM Strategy, Salah Nassar, and Steven Grossman, Bay Dynamics’ Vice President of Strategy as we discuss how to:
- Identify what data matters for GDPR compliance
- Implement a framework for change
- Leverage DLP and behavioral analytics for data governance
Watch our partner webcast to learn about our award-winning, easy-to-sell AlienVault® USM™ platform and the AlienVault Partner Program. SIEM solutions integrate and analyze the data produced by other security technologies but unfortunately most mid-market organizations don't have the resources and time to create and maintain the data correlation rules that make SIEM solutions useful. This offers an opportunity for you to capitalize on the benefits of AlienVault USM. Once your prospects understand our approach to unified security management, it becomes a very quick sales cycle.
An intro to AlienVault USM
How to identify prospects quickly with a simple set of questions
How to sell the benefits of USM for easier and faster threat detection
Security continues to be one of the top three IT concerns for SMB, mid-market and large enterprise customers. Security and Cloud continue to be the top two industry/market spend opportunities for the channel to invest in, according to CompTIA’s 2016 Annual IT Report. The opportunity for MSPs to become Managed Security Service Providers (MSSPs) is exploding – as is the opportunity for MSSPs to strengthen and expand their bottom line and market share. If you are interested in expanding your current MSP practice with security offerings, please watch this “How-to" discussion on building and growing an MSSP. We discuss best practices and illustrate what “best in class” looks like when it comes to:
Common security challenges for the mid-market
Considerations when selecting security vendor partners and ensuring a profitable practice
Operational, financial, and process considerations that are key to a successful MSSP
Essential skills critical to build successful MSSPs
Solutions, business resources, tools, and programs available to enable the success of an MSSP
In addition, we discuss some common mistakes MSSPs make and how to avoid those when building your practice.
One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve.
In this session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.
Attend this Webchat and you will also learn:
The importance of developing a comprehensive understanding of not only the different data types collected for analysis, but also the ways in which the data types interact with each other
The need for an intelligent approach to identifying the latest threats to achieve the broadest view of threat vectors, attacker techniques and effective defenses
Why the use of coordinated rule set updates is key to maximizing the effectiveness and efficiency of threat intelligence
and to ensuring that your clients are protected no matter how (and how often) their business grows and needs change
As your clients work on their 2017 budgets, they will be paying a lot of attention to security. It’s probably the top priority for most of them. Threat profiles have expanded, new attack vectors have emerged and legacy systems simply can’t keep up. It’s not nearly enough to sell some security software or deploy a few firewalls. For IT service providers, this presents both a challenge and an opportunity. On one hand, your customers need new security solutions that you haven’t delivered before. But on the other hand, your customers want to pay you for services that will increase both your revenues and profits.
Given that your customers will want their security challenges addressed immediately, you need to rapidly develop the skills and services required to get the job done.
In this fast-paced session, join experts from AlienVault and MSPmentor to outline a step-by-step process you can follow to build a thriving, profitable security practice. Key topics to be addressed include:
The five vital technology tools you need to run an effective security practice
A detailed profile of the target customers most likely to adopt IT services to help accelerate your sales process
A map for building and pricing your security service packages to meet customers’ needs (and for building your profits)
Moving to the cloud is supposed to cost less. In reality, many organizations overspend on the cloud, paying for unused or under-utilized resources. CloudCheckr offers reports and tools that help administrators see, at a glance, where they are wasting money.
Additionally, CloudCheckr makes recommendations based on analytics to better utilize resource, upgrade or downgrade instances and more. The results are that customers typically report saving 30% on their cloud spend.
In this webinar, users will experience the CloudCheckr app in a live demo, with focus on:
No matter what level of modernization you are evaluating, any effort should start with a solid foundation.
A standardized environment based on an enterprise-ready, open source operating system like Red Hat® Enterprise Linux®, and a hardware platform based on Intel, is key to the modern data center.
Learn how organizations like yours approached server consolidation projects and migrations from proprietary systems to Linux, to improve efficiency and create a consistent foundation for current and cloud-future IT environments.
Learn how the EU General Data Protection Regulations affect US based companies.
Join CyberDefenses and Privacy Ref's Bob Siegel to review how the GDPR directly impacts US based corporations. These far-reaching regulations impact any company that stores or transmits identifying information of any individual within the EU.
In this webinar, you will be introduced to the basic elements of the GDPR and you will discuss the requirements that require action for US focused companies.
About Bob Siegel:
President and founder of Privacy Ref, Inc., Bob Siegel, started the company in 2012. After his time as Senior Manager of Worldwide Privacy and Compliance at Staples, Inc., Bob applied his experience and expertise to assisting companies implement and maintain strong privacy programs. Bob has worked with many different organizations, dealing with programs of all sizes and regulatory needs.
Always seeking to improve his own understanding of all things privacy, Bob has earned certifications from the International Association of Privacy Professionals. These include certifications in US private and public sector, European, and Canadian privacy laws. Bob has also earned certifications in Information Technology Privacy and Privacy Program Management. Bob Siegel has also been recognized as a Fellow of Information Privacy by the IAPP for his outstanding dedication to the privacy community. He has also served on the IAPP's Certification Advisory Board for the CIPM program and the IAPP's Publication Advisory Board. Bob also serves on the IAPP’s teaching faculty leading classes in the areas in which he is certified.
CyberDefenses is a premiere cyber security services organization, providing advanced security services to the commercial and federal sectors. CyberDefenses Academy provides advanced training the IT, security and privacy professionals that wish to be at the top of their field.
Anybody can deliver technology, but these days MSPs also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.
In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
Current threats and how they are evolving
Comprehensive threat protection for the cloud
Unified security for detecting threats and responding to incidents
The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.
Join us to learn:
- What is GDPR
- Deep dive into relevant data security articles of the GDPR
- Review how different technology can address some of the GDPR data security requirements
Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
Research shows that about half of organizations deploy a mix of in-house and outsourced IT security. Companies turn to outsourced and managed security services providers to alleviate the pressures they face, such as assessing and remediating against new types of attacks, protecting their organization against data theft, and addressing skills shortages and filling resource gaps. The 2017 Spotlight Report covering MSSP usage revealed the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs.
In this session you'll learn about key findings from this survey including:
The predominant driver for organizations to consider managed security services
The most critical capabilities organizations look for in MSSPs
The most requested security services offered by MSSPs
Key benefits respondents have achieved by partnering with an MSSP
Whether you are evaluating using an MSSP, or are an MSSP yourself, join us to gain valuable insights into how MSSPs are helping their clients. We'll also provide an overview of how our report sponsor, AlienVault, enables the threat detection capabilities of many MSSP's with their unified threat detection platform, AlienVault USM
10 in Tech’s Kirstie Magowan and Shane Carlson chatted with Chris Pope of Service Now at Knowledge17. There were 15,000 attendees at Knowledge17 and Chris talked about how ServiceNow is sticking to its roots of understanding how people work and what they want and need to do.
Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?
Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
- CPE opportunities, member benefits and getting involved
- Updates on (ISC)² news, developments and changes in your region
- Your membership requirements summarized
- Who are the (ISC)² EMEA team and how we can help you
- Focus discussions
- Q&A session
Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.
This webcast will discuss such questions as:
> What issues are city officials prioritizing for resolution through smart community applications?
> How are communities planning for and deploying small cell infrastructure?
> Which departments are involved in communications infrastructure?
> How can suppliers navigate the multiple departments involved in decision making?
> What business models are cities negotiating with their technology product partners?
> What are some of the lessons learned from cities that you can translate into your own business offering?
Jascha Franklin-Hodge, CIO, Boston, MA
Kate Garman,Smart City Coordinator, Seattle, WA
Peter Marx, currently in the position of VP, GE Digital and former CTO, City of Los Angeles
SANS' 2016 survey of incident response (IR) capabilities indicated that the IR landscape was ever changing. Advanced industries were able to maintain effective IR teams, but it identified hurdles responders face to increase the efficiency of their IR teams.
In this SANS Incident Response Survey webcast, James Carder, LogRhythm CISO & VP of LogRhythm Labs, joins industry experts to explore the results of the fourth annual SANS survey on incident response. Together they'll provide insight into the maturity of IR processes and functions spanning a variety of environments.
• Types of attacks experienced and nature of the breaches
• Time needed to detect, contain, and remediate breaches
• Maturity of network visibility infrastructures and security operations centers' response capabilities
Watch now to learn more about the incident response capabilities of your peers and how IR can help you protect your network.
Thanks to supportive macro and political conditions and the spate of reforms introduced in recent years, the Indian economy has been gathering momentum and is set to reach its medium to long term growth potential. Join Gordon Rodrigues and Geoff Lunt to understand what the latest developments, including the repo rate cut earlier in August, mean for the Indian Fixed Income asset class and our strategy.
We are also marking the fifth anniversary of HGIF Indian Fixed Income, which has seen its AUM swell to ~ $600 million earlier this year. Gordon and Geoff will explain why the asset class continues to look appealing when compared with most of its EM and DM peers, and why we consider it a strategic rather than thematic allocation in a global portfolio.
The ultimate goal of marketing is to provide the consumer with a personalized experience across numerous channels and devices, at scale.
The first step to achieving omnichannel excellence starts with an often-underestimated channel, email. Why start here? The answer is simple; the consumer is constantly changing channels and devices, but not email address. In essence, an email address is the consumers’ digital ID. This is the first part of key data that the marketer needs to start the omnichannel journey.
In this presentation, we will focus on how to start your journey with the #1 digital channel for ROI, email.
This case study is framed in a multinational company with 300k+ employees, present in 100+ countries, that is adding one extra layer of security based on big data analytics capabilities, in order to provide net-new value to their ongoing SOC-related investments.
Having billions of events being generated on a weekly basis, real-time monitoring must be complemented with deep analysis to hunt targeted and advanced attacks.
By leveraging a cloud-based Spark cluster, ElasticSearch, R, Scala and PowerBI, a security analytics platform based on anomaly detection is being progressively implemented.
Anomalies are spotted by applying well-known analytics techniques, from data transformation and mining to clustering, graph analysis, topic modeling, classification and dimensionality reduction.
Personalisation is the latest trend within email marketing and with good reason - it delivers the goods. However, the reason behind its success is not what you may think. In this must-attend session, Kath Pay, CEO of Holistic Email Marketing de-mystifies personalisation and reveals that contrary to popular opinion, personalisation should not in fact be our objective, but instead it should be to deliver a great customer experience using personalisation as a strategy to achieve this.
This session will be packed full of practical tips and advice on not only how to achieve a better customer experience using personalisation, but will also demonstrate as to why it's so powerful. Beware though - you may well be pleasantly surprised at the many ways to achieve personalised emails beyond product recommendations!
Humans have been protecting our complex network infrastructures for decades with varying degrees of success, while eusocial insects such as ants are capable of withstanding countless attacks on their networks.
This presentation is about what ants in general and Leafcutter Ants in particular approach security and how we can learn from these survivors of millions years of warfare.
You will learn:
-How social insects (ants) are dealing with predictive analysis
-Applying the defense mechanism of ants on threat intelligence
-How information sharing and communication can lead to better security
-Data and Identity Management
The General Data Protection Regulation (GDPR) and the Network and Information Security (NIS) Directive will both be enforced as of May 2018. You may think you’re ready for these laws, but covered companies may need to improve the security of personal data they hold, and of their networks and information systems. Data breaches and security incidents will have to be reported. As they prepare for the GDPR and NIS, it is imperative that organisations understand their cybersecurity risks and invest appropriately.
Tomorrow’s Marketer is focused on targeting key accounts to generate new business. What’s the secret to creating 1:1 moments with your key targets? Personalisation and Predictive Technologies are the secret weapons that empower account-based marketing (ABM) strategies to target and engage key accounts at the top of the funnel.
Join our webinar as Ray Coppinger, Head of Marketing EMEA at Marketo looks at how personalisation and predictive content can power your account-based marketing strategy. You will learn how to:
* Complement your account-based marketing (ABM) strategy with personalisation
* Generate more sales-ready leads by focusing on the accounts that matter
* Leverage best practices from companies personalising their websites for prospects
* Measure the impact of your personalised campaigns with an account-focus
* Leverage predictive content to drive engagement with target accounts
One of digital marketing's biggest bugbears is the ability for brands to follow customers, often clumsily. Join this webinar on BrightTALK to hear how to make 'real time' work really well for your brand.
Join us to find out:
· Why to use it
· How to use it effectively
· Whether it actually makes a difference
· If it's worth the time, money and effort to set-up for the long-term benefits
Brands are increasingly investing in 'real time' content. This webinar will feature experts in email and real-time marketing to give you the answers your business needs. Explore what this actually means, and what the implications and rules are for marketers.
If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.
Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
Analytics risks can keep you up at night. What if…
· We make a big investment and don’t break even?
· Management doesn’t trust the results?
· Analysts cross data privacy boundaries?
What a dilemma! You see the perils, yet you want the rewards that analytics can bring. The appropriate process enables you to dramatically reduce risks and maximize returns on your data and analytics investment.
In this presentation, you will learn:
· What causes most analytics failures
· How you can diminish risk and maximize returns through strong analytics process
· Why you (yes, you!) have a pivotal opportunity to establish high standards for analytics process right now
The General Data Protection Regulation (GDPR) is fast approaching and whilst there's lots of information about GDPR from an IT security perspective, marketers are still trying to understand the implications it will have on their marketing efforts from 25 May 2018 and beyond.
As the modern email marketing landscape changes dramatically with the introduction of GDPR, this webinar explores the role of Marketing Automation in helping organisations stay GDPR compliant.