Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Why a Unified Digital Transformation LOB Strategy is Vital
    Why a Unified Digital Transformation LOB Strategy is Vital Darren Guarnaccia, Global Leader of Partnerships & Alliances, Sitecore & Tom Fuchs, MTC Technical Architect, Microsoft Recorded: May 25 2017 20 mins
    Business and IT leaders are designing digital transformation together, and the discussion around technology is no longer confined to just IT.

    In today’s digital economy, organizations need to architect for agility and find new ways to create value at a rapid pace. As a result, the discussion around technology is no longer confined to IT. Leaders from across Marketing, HR, Finance and Ops are turning to IT Leaders to help drive innovation. Business leaders need to work together to design a digital strategy to drive competitive transformation. This series will cover topics that the business and IT should be working on together for increased value.

    In this webcast you’ll learn:
    - Solutions for digital customer engagement
    - How B2B marketers can apply B2C approaches to create a more human connection
    - Why instant access to real-time data is essential for today’s marketer to deliver personalized content
    - The intersection of commerce and content
  • IT Management Is Becoming So Predictive – Which Is Good. Right?
    IT Management Is Becoming So Predictive – Which Is Good. Right? Dan Ortega - Vice President of Marketing Recorded: May 25 2017 5 mins
    Improvements in IT data quality and analysis tools have enabled IT management to spend less time looking into the past and more time enabling the dynamic enterprise of the future. This allows them to anticipate business events more accurately, forecast costs and capacity, and identify operational risks before they appear. Empowered by technology-driven insights and technology-enabled prediction ability, IT leaders have secured a long-sought seat at the table with their business counterparts during the strategic planning process. IT management becoming more predictive is good. Right? Perhaps, but there are some risks to consider.

    Technology-enabled prediction is only as good as the underlying data, and does a poor job of addressing unknown variables. Human intuition and analysis skills have traditionally been used to fill gaps in available data, interpret meaning and project future events. The predictive abilities of most IT leaders are heavily dependent on the quality of information and technology-enabled processing power at their disposal. Modern machine learning systems have made tremendous strides in analyzing large volumes of data to identify trends and patterns based on past and current observations. Their capability to do so is limited, however, by the quality and dependability of data inputs. “Garbage in-garbage out” has been the rule for many years.

    Learning how to harness the power of technology and information and applying it to create valuable predictive insights for an organizations is definitely good; IT leaders should be commended for bringing new capabilities to the decision-making table. As we all know, however, no information is perfect, and technology has its limitations. Becoming entirely reliant on technology for prediction and losing the ability to apply a human filter is a risky situation for businesses. As with many business decisions, it is important to balance the potential benefits with the acceptable risk profile for your organization
  • Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace
    Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace Trent Fierro: Director of Software Solutions Marketing at HPE Aruba Recorded: May 25 2017 58 mins
    With the advent of the mobile workforce and IoT, it’s increasingly difficult to know who and what is on your network, how they got there, and whether or not they pose a risk to your business. Is your current security solution able to quickly detect and effectively respond when things go wrong? The answer lies in whether or not you can consolidate information from various security tools to prioritize remediation activities. Watch this webinar from TechTarget “Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace” and learn how to use data and analytics to protect your enterprise while simplifying remediation by enabling:

    * Device identification
    * Policy control
    * Workflow automation
    * Automated threat protection


    Presenters:

    Jamie Chui: Senior Manager, Technology Alliances at Intel Security
    Brian Beaver: Independent Consultant and Founder of Principle Logics
    Trent Fierro: Director of Software Solutions Marketing at HPE Aruba
  • Powering Containers with ScaleIO and REX-Ray
    Powering Containers with ScaleIO and REX-Ray Kendrick Coleman and Brian Dean Recorded: May 25 2017 69 mins
    Organizations are using containers to revolutionize and accelerate application deployment, but often have trouble with persistent applications.  Software-defined storage like Dell EMC ScaleIO, combined with storage orchestration engines like REX-Ray, gives users the freedom and flexibility to support Docker, Mesos, and Kubernetes environments with enterprise-class, persistent storage. Learn why software-defined storage provides the best architecture for running containers and how {code} by Dell EMC provides the integration for highly available persistent applications.
  • Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing
    Mobile DevSecOps 101: Common slip-ups in embedding mobile app security testing Brian Lawrence, NowSecure Solutions Engineer & Keith Mokris, NowSecure Product Marketing Leader Recorded: May 25 2017 32 mins
    Developers and DevOps engineers want to fail fast, iterate, and continuously improve. If security practioners want to join in the fun, they need to integrate security assessments into existing mobile DevOps workflows and toolchains. This webinar will teach security professionals, developers, and DevOps engineers how to avoid common mistakes in embedding automated app security testing into mobile DevOps practices.

    Join NowSecure Solutions Engineer Brian Lawrence and Product Marketing Leader Keith Mokris to learn how to do things like:

    -- Address DevOps stakeholders' worries and concerns about integrating security testing
    -- Determine the right depth of analysis for continuous mobile app security testing
    -- Track mobile DevSecOps metrics over time to measure success
  • Workload Placement Made Simple: Private or Public?
    Workload Placement Made Simple: Private or Public? Jason McKinney, Chief Revenue Officer and Julian Macri. Cloud Consultant Recorded: May 25 2017 24 mins
    During this session you will learn how to bring clarity to help make cloud decisions in minutes, not months.

    Jason McKinney will be presenting.

    CloudAssist™ is the portal through which you research cloud options and map your application portfolio to the best cloud solution.

    Assess application profiles, model transformation scenarios, and discover the best execution venues for your needs based upon user demographics, service levels, security, technology and total cost of ownership.

    Define Requirements
    Compare Options and Providers
    Receive Actionable Recommendations
    Evaluate the Business Case
    Move from Decision to Provision
  • Recovering your data from a Ransomware Attack
    Recovering your data from a Ransomware Attack Sushant Rao, Senior Director, Product Marketing Recorded: May 25 2017 36 mins
    When you are hit by a ransomware attack, such as the recent WannaCrypt worm, you don’t have many options. You can pay the ransom, in the hopes that your data will be unencrypted. Or, you can wipe your systems clean, and then recover the data. But, backups are typically done on a daily basis. Depending on when the attack hit, the amount of data that you will lose could be in the hours. Fortunately, there is a better option.

    Continuous Data Protection (CDP) captures every write operation from an application and store it in a second location. This means that you can go back to the last data that was written before the ransomware attacked occurred. This ensure that data loss, if any, is minimal. Join this webinar to learn more about CDP and why it’s your safety net when ransomware hits.
  • Hunting From Network to Endpoint (Hunter Spotlight)
    Hunting From Network to Endpoint (Hunter Spotlight) Ryan Nolette, Hunter and security technologist at Sqrrl Recorded: May 25 2017 31 mins
    Ryan Nolette, Sqrrl's hunter and security technologist, will break down:
    • Determining what endpoints to investigate in a hunt
    • Pivoting from network to endpoint investigations
    • Essential tools and best practices for endpoint hunting

    About the hunter:
    Ryan is Sqrrl's primary security technologist and expert. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With over a decade in the infosec field, Ryan has been on the product and operations side of companies such as Carbon Black, Crossbeam Systems, SecureWorks and Fidelity. Ryan has been an active speaker and writer on threat hunting and endpoint security.
  • Get Started with Big Data in the Cloud ASAP
    Get Started with Big Data in the Cloud ASAP Shaun Connolly, Hortonworks and Tony Baer, Ovum Recorded: May 25 2017 64 mins
    Join experts from Ovum and Hortonworks to learn how to get big data analytics workloads up and running in the cloud immediately, and how it will accelerate your time-to-benefit and maximize your agility in the cloud.
  • Data Center Network Operations: Fragile to Agile
    Data Center Network Operations: Fragile to Agile Wyatt Sullivan Recorded: May 25 2017 47 mins
    Network infrastructure today does not provide the agility and availability to support business goals. As cloud, Internet of Things (IoT) and digital strategies take hold, network engineers need a solution for the data center network to increase their business velocity and close the gap between business demands and network service delivery.

    Join Wyatt Sullivan, Product Manager at Apstra®, on Thursday, May 25 at 11:00 AM PST / 2:00 PM EST as he discusses current and upcoming features in the Apstra Operating System™ that deliver a “command and control system” providing game-changing network service agility, uptime and dramatically improved infrastructure TCO.
  • Tech Demo - Pseudonymization and Data Masking for the GDPR
    Tech Demo - Pseudonymization and Data Masking for the GDPR Cheryl Tang - Director of Product Marketing, and Steve Pomroy - Chief Technologist, Camouflage Recorded: May 25 2017 35 mins
    This is the second in a series of product demos focused on addressing specific requirements of the General Data Protection Regulation (GDPR). In this webinar, we’ll look at how to use Imperva Camouflage Data Masking that can address pseudeomnymization requirements of the GDPR.

    We’ll provide an overview of:

    o What the General Data Protection Regulation (GDPR) is
    o What is pseudonymization and the benefits of pseudonymizing data
    o How data masking can help organizations comply with GDPR by pseudonymizing data classification capabilities

    Hope you can join us!
  • Office 2007 Retirement: Upgrade the smart way today
    Office 2007 Retirement: Upgrade the smart way today Haley Hendricks, Solutions Sales Professional Stage and Local Government Microsoft Corporation Recorded: May 25 2017 25 mins
    Upgrade your technology for continued support, security, and functionality.

    Office 2007 retirement has pressing ramifications for your Office 2007 system. These include reduced functionality when integrating with modern versions of Office servers, no Microsoft support, and disabled features.

    Because there will be no further security updates, while products will continue to boot up, they will be at risk from hackers, unsupported features, and connected applications. In order to maintain support, an upgrade is required.

    Join this webcast to:
    - Find out key dates for Office products approaching end of extended support
    - Learn which upgrade option is right for your organization
    - Make sure you implement changes appropriately to avoid a service interruption
  • Latest Advances in Process-Automation for Digital Lenders
    Latest Advances in Process-Automation for Digital Lenders Steve Craig, @ Mitek, Jami Schwartz @ Kabbage, Bill Nass @ TCI - George Popescu, Editor in Chief, Lending Times Recorded: May 25 2017 60 mins
    In today’s digital and mobile-first world, being able to seamlessly originate a loan is key for any organization looking to cut costs and increase top line revenue while meeting ever-stricter regulations. Additionally, the shift to digital lending has fraud rates skyrocketing.

    On the panel we will discuss:

    * Value prop of moving to digital channel – how to reduce costs and improve number of completed loans.
    * How do these latest automations fit with the latest financial institution’s compliance needs?
    * The latest advances in process automation for digital lenders.
    · For example, mobile capture for:
    o Data pre-fill
    o Identity verification
    o Submission of trailing documents
    * What is possible today, what is coming soon, and what is unlikely to be possible.

    Presenters:
    Panel of 3 industry experts:
    Steve Craig, Director of Products & Experience - Identity @ Mitek
    Bill Nass, President and co-founder @ TCI Credit
    Jami Schwartz, Head of Content and Marketing Tech @ Kabbage

    Moderator:
    George Popescu, Editor in Chief, Lending Times
  • Lifecycle Container & Docker Security - The CISO's Perspective
    Lifecycle Container & Docker Security - The CISO's Perspective Dave Ginsburg, Ravi Rajamiyer, Izak Mutlu Recorded: May 25 2017 50 mins
    Are containers & Docker secure? We look at best practices across their lifecycle, including image scanning within CI/CD process, container OS hardening, and orchestration security with Kubernetes. Guest speaker is Izak Mutlu, former CISO at Salesforce.
  • New Traps v4.0: Advancing Endpoint Security, Again!
    New Traps v4.0: Advancing Endpoint Security, Again! Michael Moshiri, Director, Endpoint Protection, Palo Alto Networks Recorded: May 25 2017 51 mins
    We’re excited to announce the availability of the new release of Traps™ advanced endpoint protection, version 4.0. This release is packed with new features and expanded multi-method prevention capabilities that deliver unsurpassed protection against known and unknown threats.

    Join us for a webinar to learn about these new capabilities and improvements in Traps v4.0, including:

    • Support for macOS™ and Android™
    • Protection from malicious macros
    • Prevention of script-based attacks
    • Exploit kit fingerprinting protection
    • Kernel privilege escalation protection

    Plus much more...
  • Governed & Self-Service Data - Better Together
    Governed & Self-Service Data - Better Together Scott Gidley, Vice President of Product Development at Zaloni Recorded: May 25 2017 27 mins
    Today’s companies need actionable insights that are immediate. It is no longer feasible to wait weeks, even months, on IT to prepare business-critical data. Data lakes done right can enable you to view your entire data catalog at a moment’s notice and apply self-service transformations to that data. These interactions are key to providing a quick, clear understanding of business needs. But enterprises have a legitimate concern regarding data lake governance issues such as data privacy, data quality, security, and lineage. How do you marry both - how do you provide governed self-service to data in the data lake?

    In this presentation, Scott Gidley, Vice President of Product Development at Zaloni, will highlight the benefits of governed self-service data and will provide a brief demo of Zaloni’s Self-service Data Platform.

    Topics covered:

    - Metadata management, the foundation for governed self service in the data lake
    - Data catalogs
    - Self-service data preparation
    - Self-service ingestion
    - Bringing it all together with Zaloni’s Self-service Data Platform
  • How to Use Behavioral Marketing in Your Emails
    How to Use Behavioral Marketing in Your Emails Marissa Goba, Account Manager at Movable Ink Recorded: May 25 2017 12 mins
    No two customers are the same. So why send one-size-fits-all email content? In this webinar, you'll learn how leading brands are using behavioral triggers to deliver relevant, customer-focused email campaigns. You'll get inspiration for your email marketing strategy and discover why behavioral marketing is powerful stuff. Sign up now!
  • Scalable Data Science with Spark, R, RStudio, & sparklyr
    Scalable Data Science with Spark, R, RStudio, & sparklyr Nanda Vijaydev, Director of Solutions Management, BlueData; and Anant Chintamaneni, Vice President, Products, BlueData Recorded: May 25 2017 62 mins
    Join this webinar to learn how to get started with large-scale distributed data science.

    Do your data science teams want to use R with Spark to analyze large data sets? How do you provide the flexibility, scalability, and elasticity that they need – from prototyping to production?

    In this webinar, we’ll discuss how to:

    *Evaluate compute choices for running R with Spark (e.g., SparkR or RStudio Server with sparklyr)
    *Provide access to data from different sources (e.g., Amazon S3, HDFS) to run with R and Spark
    *Create on-demand environments using Docker containers, either on-premises or in the cloud
    *Improve agility and flexibility while ensuring enterprise-grade security, monitoring, and scalability

    Find out how to deliver a scalable and elastic platform for data science with Spark and R.
  • Ever dream of eliminating your backup licenses?
    Ever dream of eliminating your backup licenses? Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: May 25 2017 49 mins
    Now you can. Hybrid cloud storage that delivers on-demand primary storage and offsite backup plus disaster recovery in a single service means you eliminate backup licenses, secondary storage sites and replicating data. Attend this webinar to learn more.
  • Let the countdown begin: What does the GDPR mean for US companies?
    Let the countdown begin: What does the GDPR mean for US companies? Stephen Bailey, Head of Privacy at NCC Group, Terry Blake, SureCloud EVP – North America, and Nick Rafferty, SureCloud COO. Recorded: May 25 2017 60 mins
    Exactly one year from the date of this webinar, the General Data Protection Regulation will take effect in the European Union. The GDPR applies to any organization that stores, processes or transfers the personal data of residents within the EU. It includes organizations located in and outside the EU. Non-compliance can result in fines of more than $20 million or 4% of worldwide revenues, whichever is greater. A recent survey found an alarming percentage of US-based companies are planning to reduce their presence in Europe or exit the European Union altogether rather than deal with the GDPR. Instead of tossing up their hands over the GDPR and going home, strategic US companies can follow the defined steps and adopt software solutions that can bring certainty to these uncertain times. In fact, they see another company’s exit from the EU as a potential opportunity to gain share. The good news is that you’re not too late in getting started to meet the GDPR deadline. But as the countdown begins, urgency escalates. The time to act is now.

    In this webinar, you will learn:
    What the GDPR means for you
    How to get started on your journey to compliance
    How the SureCloud GDPR Applications Suite can help you gain and demonstrate compliance and continuously improve your performance

    Agenda includes plenty of time to address your questions.
  • How CloudCheckr Makes 1.7 Million EC2 Decisions Easy
    How CloudCheckr Makes 1.7 Million EC2 Decisions Easy Todd Bernhard, Product Marketing Manager, CloudCheckr Recorded: May 25 2017 20 mins
    Choosing to move to the Cloud is a great decision, but it’s the first of many more decisions. You have to choose from 70 instance types, with 14 purchase options, running your choice of 4 operating systems, across dozens of availability zones and regions with distinct choices for tenancy and block storage. When you add it up, there are over a million options. In fact, Gartner has calculated that the number of decisions just for deploying an EC2 instance is over 1.7 million.

    It’s easy to make the wrong decisions and spend too much or be underprepared to meet demand. There’s only one way to make such decisions reliably and efficiently and that is to automate and follow best practices. In this in-depth discussion and demonstration, Todd Bernhard, CloudCheckr Product Marketing Manager, will show how to use CloudCheckr's Best Practices tool to manage costs.

    Join us for a "Deep Dive" into some of the 450+ Best Practice Checks offered by CloudCheckr to:

    - Make sure you are not paying for unused resources

    - Ensure the resources you are indeed using are being used at a high level of utilization

    - Identify areas where you can save money
  • Does the Autonomous Future Include the School Bus?
    Does the Autonomous Future Include the School Bus? Fred Andersky, Bendix Commercial Vehicles Systems Recorded: May 25 2017 64 mins
    All the talk today is about tomorrow and how automated/autonomous vehicles will impact the future. Often left out of the conversation, however, is the school bus – one of the safest modes of transportation. How will the technological change impacting cars and trucks impact school buses, and what can we expect in the future? Where automated technology is going is what this webinar is all about.
  • Effective Territory Management
    Effective Territory Management Michael Griego Recorded: May 25 2017 43 mins
    As a sales rep or sales manager, are you effectively managing territory? Are you focused, systematic, productive, and thorough in your approach while still being nuanced and flexible? Are you working the right deals, at the right level, at the right time, in the right way? Let's nail this down.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you
    WanaCrypt0r Ransomware – How Palo Alto Networks protects you Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42 May 26 2017 1:00 am UTC 45 mins
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention]
    SaaS Security: Adapt to the Changing Data Center Landscape [Breach Prevention] Charles Woo, Systems Engineer, Palo Alto Networks May 26 2017 2:00 am UTC 45 mins
    The first step for many organizations migrating to the cloud is the adoption of SaaS applications, such as Office 365, Box, Salesforce and many more. As an IT professional, this means you are giving permission to your users to store data in the cloud with corporate-approved services, such as OneDrive or SharePoint Online. The decision to move to the cloud is usually supported by a long list of cost and operational benefits. Infrastructure cost reduction? Check. Increased productivity? Check. License cost reduction? Check. But, have you thought about data governance and compliance, malware protection, and collaboration with external vendors? These are great questions to ask as you make this transition.

    Organizations look to reduce the threat surface exposed by SaaS applications as their data is now hosted in data centers that are not managed by them. Join this webinar to learn more about the evolution of the data center landscape and how to redefine your security strategy to cover the unique risks surfacing from the adoption of SaaS applications.
  • Informatica Cloudで連携するデータ分析プラットフォーム
    Informatica Cloudで連携するデータ分析プラットフォーム クラウドセールスコンサルタント 高田 泰志 May 26 2017 4:45 am UTC 75 mins
    Informatica Cloudを利用したデータ分析プラットフォームの構築について、
    ユースケースを交えながらご紹介します。
  • Palo Alto Networks Next Generation Endpoint Solution Traps™
    Palo Alto Networks Next Generation Endpoint Solution Traps™ Paul Wilcox May 26 2017 8:00 am UTC 45 mins
    You are invited to join this live webinar for an overview of Palo Alto Networks® Traps™ advanced endpoint protection and learn about this market-leading solution that provides multi-method protection against known and unknown threats.

    Hosted by Paul Wilcox, APAC Sales Director for Palo Alto Networks Cybersecurity Solutions Group, you will learn why Traps is the most effective solution on the market today to address the current threat landscape, including:

    •How it effectively prevent attacks against exploits and malware – such as ransomware
    •An overview of the unique approach Traps takes to endpoint security
    •How legacy antivirus is no longer effective enough
    •How Traps can replace your existing legacy antivirus software
    Included in this live webinar will be a live demonstration of Traps in action.
  • VM Explorer – Недорогое решение для резервного копирования виртуальной среды
    VM Explorer – Недорогое решение для резервного копирования виртуальной среды Максим Луганский, технический консультант Департамента программных решений НРЕ в России May 26 2017 8:00 am UTC 45 mins
    Обзор и позиционирование HPE VM Explorer – эффективного, простого и руссифицированного решения по защите виртуальных инфраструктур.
  • Polska premiera IDPA - nowego applience’u backup/recovery
    Polska premiera IDPA - nowego applience’u backup/recovery Daniel Olkowski, Dell EMC May 26 2017 8:00 am UTC 60 mins
    Dell EMC World, Vegas, maj 2017.
    Jeden z 2 najważniejszych wdyarzeń tej imprezy to ogłoszenie:
    IDPA – Integrated Data Protection Appliance
    Czym jest IDPA?
    Dla kogo jest przeznaczony?
    Jakiej wartości dostarcza?
    Ile kosztuje?
    Zapraszam na krótką, 30-minutową sesję, w trakcie której powiemy o wszystkich szczegółach nowego urządzenia ze stajni Dell EMC.
  • WanaCrypt0r Ransomware – How Palo Alto Networks protects you
    WanaCrypt0r Ransomware – How Palo Alto Networks protects you Scott Simkin, Sr. Group Manager, Threat Intelligence Cloud and Bryan Lee, Threat Intelligence Analyst, Unit 42 May 26 2017 9:00 am UTC 45 mins
    Hours after WanaCrypt0r first emerged last week, the global ransomware campaign hit hundreds of thousands of computer systems and impacted multiple high-profile organizations around the world.
    Since the initial wave of attacks, new variants of the ransomware have been discovered in the wild, ensuring that the threat is far from over.

    Join our cybersecurity experts for an educational Unit 42 webinar, where you’ll learn:

    • How WanaCrypt0r exploits vulnerabilities and spreads across networks

    • How our Next-Generation Security Platform protects your organization from WanaCrypt0r ransomware through multiple complementary prevention controls

    • Actionable steps to protect your organization against this and future ransomware campaigns
  • Ransomware - The Great Shakedown
    Ransomware - The Great Shakedown Keith Rayle, Chief Security Strategist, Fortinet May 26 2017 4:45 pm UTC 60 mins
    Ransomware is the fastest growing security issue for professionals. Cyber criminals leverage a wide range of tools and methods for implementing these types of attacks. Join us in this Web cast to learn about the various types of ransomware, the history of it, current trends, and what you can do in order to protect your critical business environment.
  • Anatomy of WannaCry - Learning from the Ransomware that Paralyzed Global Systems
    Anatomy of WannaCry - Learning from the Ransomware that Paralyzed Global Systems Paul Schofield, Director, Partner Architecture & Enablement, enSilo May 26 2017 5:00 pm UTC 60 mins
    In early May, the world witnessed a massive ransomware campaign that had a crippling effect on businesses in multiple industries across the globe. What made this ransomware, called WannaCry, so different than others was the ransomware’s ability to combine lateral movement. As opposed to other ransomware that typically infects a few devices within an organization, WannaCry had worm-like capabilities, spreading itself throughout the organizational network and hitting servers.

    While a “kill-switch” was used against WannaCry, organizations are undoubtedly going to continue suffering from WannaCry’s remnants within organizations. More so, the impact of WannaCry will motivate ransomware authors to start adopting lateral movement capabilities. Yet, with all the advanced malware techniques, security professionals are required to ensure the continuous operations of their systems.

    In this webinar, you will:
    - Learn about EternalBlue - the exploit in Microsoft's implementation of the SMB protocol that enabled WannaCry to propagate throughout the organization
    - Watch how WannaCry attacks an unpatched endpoint and encrypts data
    - Receive strategies and best practices to ensure that your systems are protected from advanced ransomware
  • Aligning Goals to Drive Organizational Performance
    Aligning Goals to Drive Organizational Performance Sri Chellappa, Co-Founder Engagedly May 26 2017 5:00 pm UTC 30 mins
    Organizations perform best when the employees are aligned with the organizational objectives. Effective alignment helps employees engage and create focus, giving them a clear view into how their personal contributions and successes help realize organizational objectives.
  • Email Fraud Defense - Live Demo
    Email Fraud Defense - Live Demo Aaron Neff, Sr Engineer, Parker Bowman Account Manager May 26 2017 5:00 pm UTC 60 mins
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • M-Trends 2017 : 최전선에서 바라본 부상하는 사이버 공격 트렌드
    M-Trends 2017 : 최전선에서 바라본 부상하는 사이버 공격 트렌드 윤삼수 전무, FireEye Korea May 29 2017 5:00 am UTC 60 mins
    M-트렌드2017 보고서는 파이어아이 맨디언트 침해조사팀이 지난 1년간 수행한 조사 내용을 기반으로 작성되는 연례 보고서로, 8번째 에디션을 발간하게 되었습니다. 이번 보고서에서는 특히, EMEA 및 APAC 지역의 트렌드를 집중 조명합니다. 주요 포렌식 조사를 통해, 최전선에서 위협을 그 안쪽까지 직접 들여다보실 수 있습니다.

    •조직을 침해하는 새로운 피싱 트렌드
    •최신 공격 원격 측정 및 방법의 변화
    •새롭게 부상하는 글로벌 위협에 대한 인텔리전스
    •조직을 더 적절히 보호하기 위한 방어 전략

    2017년 5월 29일 (월), FireEye 한국 팀은M-트렌드2017를 보다 쉽고 빠르게 이해하실 수 있도록 웨비나를 진행 예정입니다. 지금 바로 웨비나를 등록하시고 유용한 정보와 통찰력을 얻으세요!
  • Server Virtualization with EMC XtremIO All-Flash Array & VMware, A Perfect Match
    Server Virtualization with EMC XtremIO All-Flash Array & VMware, A Perfect Match Neil Hopwood, Sr. Systems Engineer All Flash Technologies May 29 2017 11:00 am UTC 75 mins
    This Webinar will highlight the performance and advantages of server virtualization based on EMC XtremIO all-flash array technology
  • De waarde van Next Generation Security Platform
    De waarde van Next Generation Security Platform Fred Streefland May 29 2017 12:00 pm UTC 60 mins
    De combinatie van complexe, moderne IT-omgevingen en een snel ontwikkelende bedreigingen maakt het voor veel bedrijven een uitdaging om kosten laag te houden en tegelijk de systemen te beschermen waarvan hun werk afhankelijk is.

    In veel gevallen zijn de uitdagingen het resultaat van te veel verschillende beveiligingsoplossingen die geen samenhang hebben in combinatie met een gebrek aan tijd en/of expertise.

    Organisaties in alle soorten en maten gaan deze uitdagingen aan door te zoeken naar manieren om hun beveiligingsinfrastructuur te bundelen, zodat ze hun beveiligingsbeleid kunnen verbeteren en de totale eigendomskosten (TCO) kunnen verlagen.

    Neem deel aan onze webinar waar we bespreken hoe het Next-Generation Security Platform van Palo Alto Networks uw organisatie in staat stelt om:

    - De bedreigings “footprint” te verkleinen
    - Bekende en onbekende aanvallen te voorkomen
    - Beleid aan gebruikers te verbinden
  • Come proteggere le comunicazioni e-mail
    Come proteggere le comunicazioni e-mail Cristiano Cafferata May 29 2017 1:30 pm UTC 75 mins
    Le comunicazioni basate sulla posta elettronica sono un elemento fondamentale per fare business in modo efficace. Ecco perché le e-mail sono un vettore privilegiato per il sabotaggio delle reti e un trampolino di lancio per la diffusione di malware, tra cui ransomware e minacce zero-day.

    Questo webcast mostra come SonicWall Email Security – ora integrato con Capture Advanced Threat Protection – può fornire una protezione sandbox multi-engine basata sul cloud per le email dei tuoi clienti.

    Partecipa al webinar per scoprire come questa soluzione completa, flessibile e scalabile è in grado di:

    •Scansionare numerosi tipi di allegati e-mail per rilevare eventuali minacce avanzate
    •Analizzarli in una sandbox multi-engine
    •Bloccarli finché non viene accertata la loro natura
    •Installare rapidamente le signature di riparazione
  • SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture
    SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec May 30 2017 5:00 am UTC 30 mins
    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    We look forward to welcoming you in our webinar.

    Register today!
  • The General Data Protection Regulation or “We Don’t Know What We Don’t Know”
    The General Data Protection Regulation or “We Don’t Know What We Don’t Know” Patrick Grillo, Senior Director, Security Solutions, Fortinet May 30 2017 9:00 am UTC 45 mins
    The clock is ticking on the General Data Protection Regulation (GDPR) coming into effect and while there isn’t wide scale panic yet, lots of organizations are either 1) in denial or 2) just coming to grips with its implications.

    The difficulty with GDPR is that the regulation states the “WHAT” but pretty much is silent on the “HOW”. The overwhelming majority of the regulation deals with process, procedure and is it really necessary to collect the data and stresses the rights of the data subject. How to protect the data, in movement and in rest, is left to individual organizations to decide except for the vague mention of “continuous risk assessment” and “state of the art”.

    Another major change from the existing national regulations, which were enacted during the mid to late 1990s, GDPR takes into account the massive change in how technology plays in everyday. To protect the data subject, the punitive aspect of non-compliance is significant with penalties of €20M or 4% of annual turnover, whichever is GREATER.

    So in this confusing and changing environment, where do cyber security technologies come into play?

    This session will focus on the role of the underlying network in any organization’s GDPR compliance efforts and how to take advantage of certain aspects of GDPR to avoid the substantial penalties associated with the regulation.
  • Using e-Infrastructures for Biodiversity Conservation
    Using e-Infrastructures for Biodiversity Conservation Gianpaolo Coro, CNR-ISTI & BlueBRIDGE consortium May 30 2017 9:00 am UTC 75 mins
    An e-Infrastructure is a distributed network of service nodes, residing on multiple sites and managed by one or more organizations. E-Infrastructures allow scientists residing at distant places to collaborate. They offer a multiplicity of facilities as-a-service, supporting data sharing and usage at different levels of abstraction, e.g. data transfer, data harmonization, data processing workflows etc. e-Infrastructures are gaining an important place in the field of biodiversity conservation. Their computational capabilities help scientists to reuse models, obtain results in shorter time and share these results with other colleagues. They are also used to access several and heterogeneous biodiversity catalogues. This webinar will focus on how the BlueBRIDGE e-Infrastructure and Virtual Research Environments can enable data sharing and experiments reproducibility and repeatability in the biodiverisity conservation field. Examples of tools that can be adopted by the audience will be also showcased. Webinar contents in brief:

    e-Infrastructures and Virtual Research Environments
    Geospatial data visualization and representation
    Statistical models for species distribution modelling
    Accessing large heterogeneous biodiversity data catalogues
    Signal processing of biodiversity-related observations
    Machine Learning applied to species observation records
    Lexical search in large taxonomic trees
    Cloud computing applied to biodiversity analyses
  • Securing faster delivery time to market with top quality SaaS apps
    Securing faster delivery time to market with top quality SaaS apps Sami Suro, Director, Business Solutions, Tieto May 30 2017 9:00 am UTC 60 mins
    Tieto is securing deliveries with faster time to market thanks to top quality Saas applications. Including Tieto Test Tools Cloud, HPE ALM, HPE Fortify on Demand and HPE Software FlexCare Support.
  • Attacchi cyber in EMEA: i nuovi trend
    Attacchi cyber in EMEA: i nuovi trend Gabriele Zanoni, Systems Engineer di FireEye May 30 2017 9:30 am UTC 45 mins
    Partecipa al webinar con Gabriele Zanoni, Systems Engineer di FireEye, per scoprire come si sta evolvendo il panorama delle minacce sulla base dei dati sui cyber attacchi dello scorso anno, rilevati dalle investigazioni di Mandiant.

    Il webinar affronterà temi quali:

    •I nuovi trend negli attacchi di phishing usati per compromettere le aziende
    •I cambiamenti nella telemetria e nella metodologia degli attacchi
    •Le analisi di intelligence sulle minacce emergenti
    •Le nuove strategie di difesa per proteggere al meglio le aziende
    •L’impatto del GDPR sul business
    •Confronto fra trend europei, americani e asiatici
  • Securely Enabling a Hybrid Data Center with Microsoft Azure
    Securely Enabling a Hybrid Data Center with Microsoft Azure Matt Keil, Director of Product Marketing at Palo Alto Networks May 30 2017 12:00 pm UTC 45 mins
    Microsoft® Azure™ is enabling a data center transformation that results in a hybrid architecture that combines your on premises resources and the Azure cloud. From a security perspective, your challenge remains: how to protect your applications and data, regardless of their location.

    Join us for this live webinar to learn how the VM-Series can securely enable a hybrid data center. At the end of the webinar, you will learn:
    •Security considerations when moving to Azure
    •Top 3 VM-Series recommendations to protect your data
    •Tips and techniques to streamline your efforts
  • Inclusive Talent Management
    Inclusive Talent Management Danny Kalman, Stephen Frost May 30 2017 12:00 pm UTC 60 mins
    Diversity and Inclusion (D&I) is a subject that is front of mind in all our organisations – we know that it is the only way of ensuring access and retention of the best talent. While there is often leadership support and buy-in, organisations often struggle to be truly inclusive in the implementation, failing to design core business processes around it.

    We very much hope you can join us for this webinar to explore this important subject and hear from Stephen Frost and Danny Kalman (co-authors of Inclusive Talent management, published by Kogan Page) about some practical steps and best practice for incorporating inclusiveness and a leadership mind-set into your organisation’s talent management strategies.
  • Cashflow aware investing: building a portfolio
    Cashflow aware investing: building a portfolio John Burke and Nick Woodward May 30 2017 1:00 pm UTC 45 mins
    In a series of webinars Head of Institutional, John Burke and Head of Investment Solutions, Nick Woodward consider the cashflow aware strategies available to pension schemes and in this instalment, outline how to build a portfolio.
  • MiFIR Webinar Series - MiFIR for Wealth Managers
    MiFIR Webinar Series - MiFIR for Wealth Managers LSEG and WMA May 30 2017 2:00 pm UTC 60 mins
    Register now for this series of webinars to help educate firms on the different aspects of MiFIR reporting before the January 2018 go-live.

    London Stock Exchange Group and guest speakers will be providing clarity on how MiFIR will affect different industry segments across the most important parts of the regulation. Firms can turn MiFIR into an opportunity to improve their business, register to find out more.

    All sessions will include a live Q&A with the speakers and a chance to get all your questions answered.

    Speakers
    - Ian Cornwall - WMA
    - Tom Wieczorek - UnaVista, LSEG
    - Marcus Jeffery - UnaVista, LSEG
  • The benefits of gigahertz mode spacing for frequency comb applications
    The benefits of gigahertz mode spacing for frequency comb applications Dr Albrecht Bartels, managing director of Laser Quantum May 30 2017 2:00 pm UTC 60 mins
    After the first demonstration of an optical frequency comb based on a mode-locked laser in 1999, Ti:sapphire lasers with repetition rates around 1 GHz were the sources of choice for scientists around the world. Their key feature was a mode spacing 10 times higher than that of comparable 100 MHz sources (simplifying mode identification) and the ability to generate a fully coherent super-continuum with 100 times more power per mode either directly from the cavity or using an external microstructured fibre (enhancing signal-to-noise ratio). The world’s first optical atomic clock was built in 2001 using a 1 GHz Ti:sapphire laser and subsequently it has been shown that these lasers indeed support an accuracy at the 10–20 level with a 1 s stability at the 10–17 level and optical linewidths at the millihertz level, i.e. ideal candidate clockworks for a new generation of optical atomic clocks. The Ti:sapphire technology has even been taken out to as far as 10 GHz, a regime where individual modes with powers in excess of 1 mW can be separated with a grating spectrometer and used individually for direct spectroscopy, spectrograph calibration or optical arbitrary waveform generation.

    To overcome some of the disadvantages of early Ti:sapphire lasers (requirement for frequent alignment, cleaning and use of AO modulators for control purposes) and to make the full advantages of GHz frequency comb technology accessible to the science community, Laser Quantum has developed the hermetically sealed and permanently aligned taccor 1 GHz Ti:sapphire laser featuring an integrated pump laser with direct pump power control. This intervention free laser forms the basis for the new taccor comb system featuring an f-2f interferometer and full comb-stabilization electronics.

    This webinar reviews the benefits of gigahertz Ti:sapphire frequency combs and focuses on the recent progress using Laser Quantum‘s hermetically sealed line of taccor lasers.